What RADIUS features could be used by XYZ to assign the proper network permissions to users during authenticat
Given:XYZ company has recently installed a controller based WLAN and is using a RADIUS server to proxy authenticate request to an LDAP server user based across controls and would like to use the RADIUS server to facilitate network authorization
What RADIUS features could be used by XYZ to assign the proper network permissions to users during authentication? (Choose 3)
What disadvantage does EAP-TLS have when compared with PEAPvO EAP/MSCHAPv2 as an 802. 11 WLAN security solutio
What disadvantage does EAP-TLS have when compared with PEAPvO EAP/MSCHAPv2 as an 802. 11 WLAN security solution?
what type of attacks?
Given:You manage a wireless network that services 200 wireless users. Your facility requires 20 access points and you have installed an IEEE 802.1X LEAP with AES CCMP as an authentication and encryption solution.In this configuration the wireless network is initially susceptible to what type of attacks?(Choose 2)
What one advantage of using EAP-TTLS instead of EAP-TLS as an authentication mechanism in 802.11WLAN?
What one advantage of using EAP-TTLS instead of EAP-TLS as an authentication mechanism in 802.11WLAN?
What option specifies the best approach to achieve this goal at your public hotspot?
You own a coffee shop and have recently installed a 802.11g wireless hot spot for the benefit of your customers. For legal reasons you want to minimize your network and avoid liability related to the operations of hot spots. What option specifies the best approach to achieve this goal at your public hotspot?
what method does the WIPS apply a security classification to newly discovered AP?
Given:A new Access point is connected to an authorized network segment and is detected wirelessly by a WIPS.
By what method does the WIPS apply a security classification to newly discovered AP?
What elements should be addressed by a WLAN security policy?
What elements should be addressed by a WLAN security policy? (Choose 2)
Role-based access control (RBAC) allows a WLAN administrator to perform that network function?
Role-based access control (RBAC) allows a WLAN administrator to perform that network function?
What 802 11 WLAN security problem is addressed by 802.1X/EAP mutual authentication.
What 802 11 WLAN security problem is addressed by 802.1X/EAP mutual authentication.
what type of devices would be capable of identifying rouge APs that use HT Greenfield 40 MHZ channels?
In an effort to optimize WLAN performance ABC Company has already upgraded their infrastructure from 802 11b/gto802 11n. ABC has always been highly security conscious but they are concerned with security threats introduced by incompatibilities between 802.11n and 802.11a/g in the past.ABC has performed manual and automated scans with products that were originally designed for use in 802 11a/g networks.Including laptop-based spectrum and protocol analyzers as well as an overlay 802 11a/g WIPS solution.ABC has sought your input to understand and respond to potential security threats.
In ABC’s network environment, what type of devices would be capable of identifying rouge APs that use HT Greenfield 40 MHZ channels? (Choose 3)