Given: Fred works primarily from home and public wireless hot-spots rather than commuting to the office. He
frequently accesses the office network remotely from his Mac laptop using the local 802.11 WLAN.
In this remote scenario, what single wireless security practice will provide the greatest security for Fred?
Given: ABC Company is deploying an IEEE 802.11-compliant wireless security solution using 802.1X/EAP
authentication. According to company policy, the security solution must prevent an eavesdropper from
decrypting data frames traversing a wireless connection.
What security characteristics and/or components play a role in preventing data decryption? (Choose 2)
Given: Your company has just completed installation of an IEEE 802.11 WLAN controller with 20
controller-based APs. The CSO has specified PEAPv0/EAP-MSCHAPv2 as the only authorized WLAN
authentication mechanism. Since an LDAP-compliant user database was already in use, a RADIUS server was
installed and is querying authentication requests to the LDAP server.
Where must the X.509 server certificate and private key be installed in this network?
As the primary security engineer for a large corporate network, you have been asked to author a new security
policy for the wireless network. While most client devices support 802.1X authentication, some legacy devices
still only support passphrase/PSK-based security methods.
When writing the 802.11 security policy, what password-related items should be addressed?
© Copyrights DumpsEngine 2024. All Rights Reserved
We use cookies to ensure your best experience. So we hope you are happy to receive all cookies on the DumpsEngine.