Question: 1
What protocol, listed here, allows a network manager to securely administer the network?
Question: 2
The following numbered items show some of the contents of each of the four frames exchanged during the 4-way handshake.
* Encrypted GTK sent
* Confirmation of temporal key installation
* ANonce sent from authenticator to supplicant
* SNonce sent from supplicant to authenticator, MIC included
Arrange the frames in the correct sequence beginning with the start of the 4-way handshake.
A 1, 2, 3, 4
B 3, 4, 1, 2
C 4, 3, 1, 2
D 2, 3, 4, 1
Answer : B
Show Answer
Hide Answer
Question: 3
What software and hardware tools are used in the process performed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?
Question: 4
A large enterprise is designing a secure, scalable, and manageable 802.11n WLAN that will support thousands of users. The enterprise will support both 802.1X/EAP-TTLS and PEAPv0/MSCHAPv2. Currently, the company is upgrading network servers as well and will replace their existing Microsoft IAS implementation with Microsoft NPS, querying Active Directory for user authentication. For this organization, as they update their WLAN infrastructure, what WLAN controller feature will likely be least valuable?
Question: 5
Role-Based Access Control (RBAC) allows a WLAN administrator to perform what network function?