<< Prev Question Next Question >>

Question 29/110

You perform a protocol capture using Wireshark and a compatible 802.11 adapter in Linux. When viewing the capture, you see an auth req frame and an auth rsp frame. Then you see an assoc req frame and an assoc rsp frame. Shortly after, you see DHCP communications and then ISAKMP protocol packets. What security solution is represented?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (110q)
Question 1: What is one advantage of using EAP-TTLS instead of EAP-TLS a...
Question 2: When implementing a WPA2-Enterprise security solution, what ...
Question 3: ABC Company uses the wireless network for highly sensitive n...
Question 4: You work as the security administrator for your organization...
Question 5: Given: ABC Company has recently installed a WLAN controller ...
Question 6: You have been recently hired as the wireless network adminis...
Question 7: Given: You manage a wireless network that services 200 wirel...
Question 8: Given: You view a protocol analyzer capture decode with the ...
Question 9: Given: Many computer users connect to the Internet at airpor...
Question 10: What security vulnerabilities may result from a lack of stag...
Question 11: You are using a protocol analyzer for random checks of activ...
Question 12: What is a primary criteria for a network to qualify as a Rob...
Question 13: What wireless authentication technologies may build a TLS tu...
Question 14: Given: ABC Company has 20 employees and only needs one acces...
Question 15: You are configuring seven APs to prevent common security att...
Question 16: Given: ABC Company is an Internet Service Provider with thou...
Question 17: Given: XYZ Company has recently installed an 802.11ac WLAN. ...
Question 18: Wireless Intrusion Prevention Systems (WIPS) provide what ne...
Question 19: Given: A WLAN consultant has just finished installing a WLAN...
Question 20: After completing the installation of a new overlay WIPS for ...
Question 21: Given: You are using a Wireless Aggregator utility to combin...
Question 22: An attack is under way on the network. The attack is prevent...
Question 23: Given: XYZ Company has recently installed a controller-based...
Question 24: Given: You are using WEP as an encryption solution. You are ...
Question 25: Given: Mary has just finished troubleshooting an 802.11g net...
Question 26: Given: A WLAN protocol analyzer trace reveals the following ...
Question 27: The following numbered items show some of the contents of ea...
Question 28: Given: You have a Windows laptop computer with an integrated...
Question 29: You perform a protocol capture using Wireshark and a compati...
Question 30: In what deployment scenarios would it be desirable to enable...
Question 31: What field in the RSN information element (IE) will indicate...
Question 32: Given: Your organization is using EAP as an authentication f...
Question 33: Given: An 802.1X/EAP implementation includes an Active Direc...
Question 34: Which one of the following is a valid reason to avoid the us...
Question 35: What EAP type supports using MS-CHAPv2, EAP-GTC or EAP-TLS f...
Question 36: Given: John Smith uses a coffee shop's Internet hot-spot (no...
Question 37: When TKIP is selected as the pairwise cipher suite, what fra...
Question 38: What elements should be addressed by a WLAN security policy?...
Question 39: You are using a utility that takes input and generates rando...
Question 40: When monitoring APs within a LAN using a Wireless Network Ma...
Question 41: You must locate non-compliant 802.11 devices. Which one of t...
Question 42: Given: AAA is an architectural framework used to provide thr...
Question 43: Given: You must implement 7 APs for a branch office location...
Question 44: Role-Based Access Control (RBAC) allows a WLAN administrator...
Question 45: Given: The Aircrack-ng WLAN software tool can capture and tr...
Question 46: In the IEEE 802.11-2012 standard, what is the purpose of the...
Question 47: Given: Many corporations configure guest VLANs on their WLAN...
Question 48: What 802.11 WLAN security problem is directly addressed by m...
Question 49: You are implementing an 802.11ac WLAN and a WIPS at the same...
Question 50: ABC Company has deployed a Single Channel Architecture (SCA)...
Question 51: Given: XYZ Hospital plans to improve the security and perfor...
Question 52: Given: Your network includes a controller-based WLAN archite...
Question 53: Given: ABC Corporation is evaluating the security solution f...
Question 54: Given: Fred works primarily from home and public wireless ho...
Question 55: Given: WLAN protocol analyzers can read and record many wire...
Question 56: Given: Your company has just completed installation of an IE...
Question 57: ABC Company requires the ability to identify and quickly loc...
Question 58: Which of the following security attacks cannot be detected b...
Question 59: Given: ABC Company secures their network with WPA2-Personal ...
Question 60: Given: ABC Company has a WLAN controller using WPA2-Enterpri...
Question 61: What WLAN client device behavior is exploited by an attacker...
Question 62: What type of WLAN attack is prevented with the use of a per-...
Question 63: While seeking the source of interference on channel 11 in yo...
Question 64: What are the three roles of the 802.1X framework, as defined...
Question 65: Given: You are the WLAN administrator in your organization a...
Question 66: Given: One of the security risks introduced by WPA2-Personal...
Question 67: In order to acquire credentials of a valid user on a public ...
Question 68: For a WIPS system to identify the location of a rogue WLAN d...
Question 69: The IEEE 802.11 standard defined Open System authentication ...
Question 70: Given: A network security auditor is preparing to perform a ...
Question 71: Select the answer option that arranges the numbered events i...
Question 72: A single AP is configured with three separate WLAN profiles,...
Question 73: Which one of the following describes the correct hierarchy o...
Question 74: What drawbacks initially prevented the widespread acceptance...
Question 75: When using a tunneled EAP type, such as PEAP, what component...
Question 76: What statement is true regarding the nonces (ANonce and SNon...
Question 77: What attack cannot be detected by a Wireless Intrusion Preve...
Question 78: What software and hardware tools are used together to hijack...
Question 79: What protocols allow a network administrator to securely man...
Question 80: The IEEE 802.11 Pairwise Transient Key (PTK) is derived from...
Question 81: When used as part of a WLAN authentication solution, what is...
Question 82: What TKIP feature was introduced to counter the weak integri...
Question 83: You have an AP implemented that functions only using 802.11-...
Question 84: When using the 802.1X/EAP framework for authentication in 80...
Question 85: Given: WLAN attacks are typically conducted by hackers to ex...
Question 86: Given: During 802.1X/LEAP authentication, the username is pa...
Question 87: As the primary security engineer for a large corporate netwo...
Question 88: You must support a TSN as you have older wireless equipment ...
Question 89: Given: ABC Company is deploying an IEEE 802.11-compliant wir...
Question 90: Given: In XYZ's small business, two autonomous 802.11ac APs ...
Question 91: Given: The Marketing department's WLAN users need to reach t...
Question 92: What policy would help mitigate the impact of peer-to-peer a...
Question 93: Given: Your network implements an 802.1X/EAP-based wireless ...
Question 94: Wireless Intrusion Prevention Systems (WIPS) are used for wh...
Question 95: Your organization required compliance reporting and forensic...
Question 96: What preventative measures are performed by a WIPS against i...
Question 97: What statements are true about 802.11-2012 Protected Managem...
Question 98: Given: ABC Hospital wishes to create a strong security polic...
Question 99: What wireless security protocol provides mutual authenticati...
Question 100: In an effort to optimize WLAN performance, ABC Company has u...
Question 101: Given: ABC Company is implementing a secure 802.11 WLAN at t...
Question 102: What disadvantage does EAP-TLS have when compared with PEAPv...
Question 103: Given: ABC Corporation's 802.11 WLAN is comprised of a redun...
Question 104: Given: You support a coffee shop and have recently installed...
Question 105: Given: You have implemented strong authentication and encryp...
Question 106: As a part of a large organization's security policy, how sho...
Question 107: While performing a manual scan of your environment using a s...
Question 108: Joe's new laptop is experiencing difficulty connecting to AB...
Question 109: Given: The ABC Corporation currently utilizes an enterprise ...
Question 110: Given: You are installing 6 APs on the outside of your facil...