Wireless Intrusion Prevention Systems (WIPS) provide what network security services? (Choose 2)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
B, E
Q: 2
Given: When the CCMP cipher suite is used for protection of data frames, 16 bytes of overhead are
added to the Layer 2 frame. 8 of these bytes comprise the MIC.
What purpose does the encrypted MIC play in protecting the data frame?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
B
Q: 3
Given: ABC Hospital wishes to create a strong security policy as a first step in securing their 802.11
WLAN.
Before creating the WLAN security policy, what should you ensure you possess?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
B
Q: 4
When implementing a WPA2-Enterprise security solution, what protocol must the selected RADIUS
server support?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
C
Q: 5
Given: XYZ Company has recently installed an 802.11ac WLAN. The company needs the ability to
control access to network services, such as file shares, intranet web servers, and Internet access
based on an employee's job responsibilities.
What WLAN security solution meets this requirement?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
D
Q: 6
You are configuring seven APs to prevent common security attacks. The APs are to be installed in a
small business and to reduce costs, the company decided to install all consumer-grade wireless
routers. The wireless routers will connect to a switch, which connects directly to the Internet
connection providing 50 Mbps of Internet bandwidth that will be shared among 53 wireless clients
and 17 wired clients.
To ensure the wireless network is as secure as possible from common attacks, what security measure
can you implement given only the hardware referenced?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
D
Q: 7
Given: You are using a Wireless Aggregator utility to combine multiple packet captures. One capture
exists for each of channels 1, 6 and 11. What kind of troubleshooting are you likely performing with
such a tool?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
C
Q: 8
Given: ABC Company secures their network with WPA2-Personal authentication and AES-CCMP
encryption.
What part of the 802.11 frame is always protected from eavesdroppers by this type of security?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
A
Q: 9
In order to acquire credentials of a valid user on a public hot-spot network, what attacks may be conducted? Choose the single completely correct answer
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Correct Answer:
A
Q: 10
Given: You manage a wireless network that services 200 wireless users. Your facility requires 20
access points, and you have installed an IEEE 802.11-compliant implementation of 802.1X/LEAP with
AES-CCMP as an authentication and encryption solution.
In this configuration, the wireless network is initially susceptible to what type of attacks? (Choose 2)