<< Prev Question Next Question >>

Question 30/110

In what deployment scenarios would it be desirable to enable peer-to-peer traffic blocking?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (110q)
Question 1: What is one advantage of using EAP-TTLS instead of EAP-TLS a...
Question 2: When implementing a WPA2-Enterprise security solution, what ...
Question 3: ABC Company uses the wireless network for highly sensitive n...
Question 4: You work as the security administrator for your organization...
Question 5: Given: ABC Company has recently installed a WLAN controller ...
Question 6: You have been recently hired as the wireless network adminis...
Question 7: Given: You manage a wireless network that services 200 wirel...
Question 8: Given: You view a protocol analyzer capture decode with the ...
Question 9: Given: Many computer users connect to the Internet at airpor...
Question 10: What security vulnerabilities may result from a lack of stag...
Question 11: You are using a protocol analyzer for random checks of activ...
Question 12: What is a primary criteria for a network to qualify as a Rob...
Question 13: What wireless authentication technologies may build a TLS tu...
Question 14: Given: ABC Company has 20 employees and only needs one acces...
Question 15: You are configuring seven APs to prevent common security att...
Question 16: Given: ABC Company is an Internet Service Provider with thou...
Question 17: Given: XYZ Company has recently installed an 802.11ac WLAN. ...
Question 18: Wireless Intrusion Prevention Systems (WIPS) provide what ne...
Question 19: Given: A WLAN consultant has just finished installing a WLAN...
Question 20: After completing the installation of a new overlay WIPS for ...
Question 21: Given: You are using a Wireless Aggregator utility to combin...
Question 22: An attack is under way on the network. The attack is prevent...
Question 23: Given: XYZ Company has recently installed a controller-based...
Question 24: Given: You are using WEP as an encryption solution. You are ...
Question 25: Given: Mary has just finished troubleshooting an 802.11g net...
Question 26: Given: A WLAN protocol analyzer trace reveals the following ...
Question 27: The following numbered items show some of the contents of ea...
Question 28: Given: You have a Windows laptop computer with an integrated...
Question 29: You perform a protocol capture using Wireshark and a compati...
Question 30: In what deployment scenarios would it be desirable to enable...
Question 31: What field in the RSN information element (IE) will indicate...
Question 32: Given: Your organization is using EAP as an authentication f...
Question 33: Given: An 802.1X/EAP implementation includes an Active Direc...
Question 34: Which one of the following is a valid reason to avoid the us...
Question 35: What EAP type supports using MS-CHAPv2, EAP-GTC or EAP-TLS f...
Question 36: Given: John Smith uses a coffee shop's Internet hot-spot (no...
Question 37: When TKIP is selected as the pairwise cipher suite, what fra...
Question 38: What elements should be addressed by a WLAN security policy?...
Question 39: You are using a utility that takes input and generates rando...
Question 40: When monitoring APs within a LAN using a Wireless Network Ma...
Question 41: You must locate non-compliant 802.11 devices. Which one of t...
Question 42: Given: AAA is an architectural framework used to provide thr...
Question 43: Given: You must implement 7 APs for a branch office location...
Question 44: Role-Based Access Control (RBAC) allows a WLAN administrator...
Question 45: Given: The Aircrack-ng WLAN software tool can capture and tr...
Question 46: In the IEEE 802.11-2012 standard, what is the purpose of the...
Question 47: Given: Many corporations configure guest VLANs on their WLAN...
Question 48: What 802.11 WLAN security problem is directly addressed by m...
Question 49: You are implementing an 802.11ac WLAN and a WIPS at the same...
Question 50: ABC Company has deployed a Single Channel Architecture (SCA)...
Question 51: Given: XYZ Hospital plans to improve the security and perfor...
Question 52: Given: Your network includes a controller-based WLAN archite...
Question 53: Given: ABC Corporation is evaluating the security solution f...
Question 54: Given: Fred works primarily from home and public wireless ho...
Question 55: Given: WLAN protocol analyzers can read and record many wire...
Question 56: Given: Your company has just completed installation of an IE...
Question 57: ABC Company requires the ability to identify and quickly loc...
Question 58: Which of the following security attacks cannot be detected b...
Question 59: Given: ABC Company secures their network with WPA2-Personal ...
Question 60: Given: ABC Company has a WLAN controller using WPA2-Enterpri...
Question 61: What WLAN client device behavior is exploited by an attacker...
Question 62: What type of WLAN attack is prevented with the use of a per-...
Question 63: While seeking the source of interference on channel 11 in yo...
Question 64: What are the three roles of the 802.1X framework, as defined...
Question 65: Given: You are the WLAN administrator in your organization a...
Question 66: Given: One of the security risks introduced by WPA2-Personal...
Question 67: In order to acquire credentials of a valid user on a public ...
Question 68: For a WIPS system to identify the location of a rogue WLAN d...
Question 69: The IEEE 802.11 standard defined Open System authentication ...
Question 70: Given: A network security auditor is preparing to perform a ...
Question 71: Select the answer option that arranges the numbered events i...
Question 72: A single AP is configured with three separate WLAN profiles,...
Question 73: Which one of the following describes the correct hierarchy o...
Question 74: What drawbacks initially prevented the widespread acceptance...
Question 75: When using a tunneled EAP type, such as PEAP, what component...
Question 76: What statement is true regarding the nonces (ANonce and SNon...
Question 77: What attack cannot be detected by a Wireless Intrusion Preve...
Question 78: What software and hardware tools are used together to hijack...
Question 79: What protocols allow a network administrator to securely man...
Question 80: The IEEE 802.11 Pairwise Transient Key (PTK) is derived from...
Question 81: When used as part of a WLAN authentication solution, what is...
Question 82: What TKIP feature was introduced to counter the weak integri...
Question 83: You have an AP implemented that functions only using 802.11-...
Question 84: When using the 802.1X/EAP framework for authentication in 80...
Question 85: Given: WLAN attacks are typically conducted by hackers to ex...
Question 86: Given: During 802.1X/LEAP authentication, the username is pa...
Question 87: As the primary security engineer for a large corporate netwo...
Question 88: You must support a TSN as you have older wireless equipment ...
Question 89: Given: ABC Company is deploying an IEEE 802.11-compliant wir...
Question 90: Given: In XYZ's small business, two autonomous 802.11ac APs ...
Question 91: Given: The Marketing department's WLAN users need to reach t...
Question 92: What policy would help mitigate the impact of peer-to-peer a...
Question 93: Given: Your network implements an 802.1X/EAP-based wireless ...
Question 94: Wireless Intrusion Prevention Systems (WIPS) are used for wh...
Question 95: Your organization required compliance reporting and forensic...
Question 96: What preventative measures are performed by a WIPS against i...
Question 97: What statements are true about 802.11-2012 Protected Managem...
Question 98: Given: ABC Hospital wishes to create a strong security polic...
Question 99: What wireless security protocol provides mutual authenticati...
Question 100: In an effort to optimize WLAN performance, ABC Company has u...
Question 101: Given: ABC Company is implementing a secure 802.11 WLAN at t...
Question 102: What disadvantage does EAP-TLS have when compared with PEAPv...
Question 103: Given: ABC Corporation's 802.11 WLAN is comprised of a redun...
Question 104: Given: You support a coffee shop and have recently installed...
Question 105: Given: You have implemented strong authentication and encryp...
Question 106: As a part of a large organization's security policy, how sho...
Question 107: While performing a manual scan of your environment using a s...
Question 108: Joe's new laptop is experiencing difficulty connecting to AB...
Question 109: Given: The ABC Corporation currently utilizes an enterprise ...
Question 110: Given: You are installing 6 APs on the outside of your facil...