1-50 Flashcards

1
Q

In an effort to optimize WLAN performance ABC Company has already upgraded their infrastructure from 802 11b/g to 802 11n. ABC has always been highly security conscious but they are concerned with security threats introduced by incompatibilities between 802.11n and 802.11a/g in the past. ABC has performed manual and automated scans with products that were originally designed for use in 802 11a/g networks. Including laptop-based spectrum and protocol analyzers as well as an overlay 802 11a/g WIPS solution. ABC has sought your input to understand and respond to potential security threats.

In ABC’s network environment, what type of devices would be capable of identifying rouge APs that use HT Greenfield 40 MHZ channels? (Choose 3)

A. 802.11n WPS sensor with a single 2x2 radio

B. The company’s current laptop-based protocol analysis tools

C. WIPS solution that is integrated in the company’s AP infrastructure

D. The company’s current overlay WIPS solution

E. The company’s current laptop-based spectrum analysis tools

A

A,B,C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Given: A new Access point is connected to an authorized network segment and is detected wirelessly by a WIPS. By what method does the WIPS apply a security classification to newly discovered AP?

A. According to the location service profile

B. According to the SNMP MIB table

C. According to the RADIUS rectum attribute

D. According to the site survey template

E. According to the default security policy

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What elements should be addressed by a WLAN security policy? (Choose 2)

A. Verification that administrative passwords are unique to each infrastructure device

B. Enabling encryption to prevent MAC addresses from being sent in clear text

C. Security policy details should be safeguarded from non IT employees to prevent vulnerability exposure

D. End user training for password selection and acceptable network use

E. Social engineering recognition and mitigation technique.

A

D, E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Role-based access control (RBAC) allows a WLAN administrator to perform that network function?

A. Allows access to specific files and applications based on the user’s WMM AC.

B. Provide admission control to VoWiFi clients on selected access points.

C. Allows one user group to access an internet gateway while denying internet access gateway to another group

D. Provide differing levels of management access to a WLAN controller based on the user account.

E. Allow simultaneous support of multiple EAP types on a single Access point.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The following numbered items show the contents of the four frames exchanged during the 4-way handshake. - Encrypted GTK sent - Confirmation of temporal key installation - Announce sent from authenticator to supplicant, unprotected by MIC - Snonce sent from applicant to authenticator, protected by MIC. Arrange the frames in the correct sequence beginning with the start of the 4-way handshake

A. 3, 4, 1, 2

B. 2, 3, 4, 1

C. 1, 2, 3, 4

D. 4, 3, 1, 2

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What 802 11 WLAN security problem is addressed by 802.1X/EAP mutual authentication.

A. Disassociation attacks

B. Weak initialization vectors

C. Offline dictionary attacks

D. Weak password policies

E. MAC spoofing

F. Wireless hijacking attacks

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What disadvantage does EAP-TLS have when compared with PEAPvO EAP/MSCHAPv2 as an 802. 11 WLAN security solution?

A. EAP-TLS requires a PKI to create X509 certificates for both the server and client, which increases administrative overhead.

B. EAP-TLS does not use SSL to establish a secure tunnel for internal EAP authentication.

C. Fast/secure roaming in an 802 11 RSN is significantly longer when EAP-TLS is use.

D. EAP-TLS does not protect the client’s username and password in side an encrypted tunnel.

E. Though more secure EAP-TLS is not widely supported by wireless infrastructure or client vendors.

F. Initially mobility authentication with EAP-TLS is significantly longer due to X509 certificate verification.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PICTURE

Given: The illustration shows a WLAN protocol analyzer decoding an 802.11 beacon frame. What statement about the access points BSS is true and can be confirmed with this illustration?

A. This is a TSN and stations may use only the TKIP chiper suit.

B. The BSS’s group key chiper will be rotated by the access point after two more beacon frames.

C. The BSS supports both CCMP and TKIP chiper suit simultaneously.

D. There is currently one wireless client associated with the AP using TKIP chiper suit within the BSS.

E. The BSS is an RSN, but the only chiper suit supported in BSS is TKIP.

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Given: You manage a wireless network that services 200 wireless users. Your facility requires 20 access points and you have installed an IEEE 802.1X LEAP with AES CCMP as an authentication and encryption solution. In this configuration the wireless network is initially susceptible to what type of attacks? (Choose 2)

A. Eavesdropping

B. Offline dictionary

C. Layer 1 DoS

D. Session hijacking

E. Man-in-the-middle

F. Layer 3 peer-to-peer

A

B, E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PICTURE

Given: The network in this diagram implements an 802.1X/EAP-based wireless security solution. What device functions as EAP authenticator?

A. Ethernet switch

B. Mobile device

C. LDAP server

D. Access point

E. WLAN controller

F. RADIUS server

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What one advantage of using EAP-TTLS instead of EAP-TLS as an authentication mechanism in 802.11WLAN?

A. EAP-TTLS does not require the use of PKI.

B. EAP-TTLS does not require an authenticator server.

C. EAP-TTLS sends encrypted supplicant credentials to the authentication server.

D. EAP-TTLS supports mutual authentication between supplicants and authentication servers.

E. EAP-TTLS supports smart card clients.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PICTURE

In this diagram illustrating an example of IEEE 802.11standard’s4-Way handshake what is the purpose of ANonce and Snonce?

A. There are values used in the derivation of the pairwise Transient key.

B. The IEEE 802.11 standard requires that all crypto graphic frames contain a nonce for security purposes.

C. They are used to pad message 1 and message 2 so each frame contains the same number of bytes.

D. They are added together and used as the GMK, from which the GTK is derived.

E. They allow the participating STAs to avoid sending unicast encryption keys acrossthe wireless medium

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You own a coffee shop and have recently installed a 802.11g wireless hot spot for the benefit of your customers. For legal reasons you want to minimize your network and avoid liability related to the operations of hot spots. What option specifies the best approach to achieve this goal at your public hot-spot?

A. Allow only trusted patrons to use the WLAN

B. Use a WIPS to deauthenticate the malicious stations

C. Require clients STAs to have updated firewall and antivirus software

D. Disable the WLAN during non business hours

E. Use the captive portal to force users to agree to an acceptable use disclaimer

F. Configure WPA2-personal security on your access point

G. Block TCP port 25out bound on the internet router

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Given: XYZ company has recently installed a controller based WLAN and is using a RADIUS server to proxy authenticate request to an LDAP server user based across controls and would like to use the RADIUS server to facilitate network authorization What RADIUS features could be used by XYZ to assign the proper network permissions to users during authentication? (Choose 3)

A. The RADIUS server can support vendor-specific attributes in the ACCESS-ACCEPT response which can be used for ASL or firewall assignment.

B. The RADIUS server can communicate with the DHCP server to issue the appropriate IP address and VLAN assignments to users.

C. According to database entries, RADIUS can reassign client 801.11assosiations to proper SSID by referring a user name to SSID mapping

D. RADIUS return list attributes can be used to assign permission level, such as read only permission, to users of particular network source.

E. RADIUS can send a VLAN assignment for each authorized user to the VLAN controller in a return list attribute.

A

A, B, E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Given: ABC company is developing an IEEE 802.11 complaint wireless security solution using 802.1X/EAP authentication. According to company policy the security should prevent an eavesdropper from decrypting data frames traversing a wireless connection. What security solution features play a role in adhering to this policy requirement? (Choose 2)

A. Group temporal key

B. Message integrity check (MIC)

C. Multi-factor authentication

D. Encrypted passphrase

E. Integrity check value

F. 4-Way handshake

A

A, F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Given: John smith uses a coffee shop’s internet hot spot to transfer funds between his checking and saving accounts at his bank’s website. The bank’s website uses HTTPS protocol to protect sensitive account information.

A hacker was able to obtain john’s bank account user ID and password and transfers john’s money to another account. How did the hacker obtain john’s bank Account user ID and password?

A. John uses same username and password for banking that he does for email. John used a pop3 email client at the wirelesshot-spotto check the email and the user ID and password were not encrypted.

B. The bank’s web server is using anX509 certificate that is no signed by a root CA, causing the user ID and password to be sent unencrypted

C. John’s bank is using an expiredX509 certificate on there web server. The certificate is on john’s certificate Revocation list (CRL), causing the user ID and password to be sent unencrypted.

D. Before connecting to the banks website, johns association to the AP was hijacked. The Attacker interrupted the HTTPS public encryption key from the bank’s web server and has decrypted john’s login credentials in real time.

E. John accessed his corporate network with the IPSec VPN software at the wirelesshot-spot. An IPSec VPN only encrypts data, so the user ID and password were sent in clear text. John uses the same username and password for banking that he does for his IPSec VPN software.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What statement accurately describes the functions of the IEEE 802.1X standard?

A. Port-based access control with support for EAP authentication and AES-CCMP encryption only

B. Port-based access control with encryption key management and distribution

C. Port-based access control with support for authenticated-user VLANs only

D. Port-based access control with 802.3 and 802.11 LANs E. Port-based access control with permission for three frame types: EAP, DHCP, DNS.

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Company’s 500 employees use ABC’s dual band HT 802.11 WLAN extensively general data traffic, VoWiFi, and guest access internet-only data. Size and network applications, what solution effects common and recommended security practices for this type of network?

A. His high security requirements, support EAT-TLS for corporate data and VoWiFi, require WPA or WPA2-personal as well as MAC address filtering for all guest solutions. Segment each data type using a separate data type SSID, frequently band, and VLAN.

B. WPA2-Personal for corporate data and VoWiFi application with a long passphrase. For guest access, implementation open authentication. Configure two and VLAN-one for corporate access and one for guest access-and support WMM on the corporate network. For ease-of-use and net work discovery hide the corporate broad cast to the guest SSID.

C. PEAPvO/EAP-MSCHAPv2 for corporate data end VoWiFi, use open authentication with captive portal on the guest network. If the VoWiFi phones can not support, use WPA2-personal with a string passphrase. Segment the three types of traffic by using separate SSIDs and VLANs.

D. WPA2 enterprise for all types of network access. For added configuration simplicity, authenticate all users from a single VLAN but apply filtering with IP ACLs by giving each user to group using RADIUS group attributes. Configure the IPACLs so that each group can only access the necessary resources.

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Given: A VLAN consultant has just finished installing a WLAN controller with 15 controller based APs. Two SSIDs with separate VLANs are configured for this network and LANs are configured to use the same RADIUS server. The SSIDs are configured as follows SSID Blue -VLAN 10-lightweight EAP (LEAP) authentication-CCMP cipher suit SSID Red - VLAN 20-802.1X/PEAPv0 authentication-TKIP cipher suit The consultants computer can successfully authenticate and browse the internet when using the Blue SSID. The same computer can authenticate when using the Red SSID. What is most likely cause of problem

A. The consultant does not have a valid Kerberos ID on the Blue VLAN.

B. The TKIP cipher suit is not a valid option for 802.1 X/PEAPv0 authentications.

C. The clock on the consultant’s computer post dates the RADIUS server’s certificate expiration date/time.

D. PEAPv0 authentication is not supported over controller based access points.

E. The red VLAN does not support certificate based authentication traffic.

A

E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

After completing the installation of new overlay WIPS, what baseline function MUST be performed?

A. Approved 802.1X/EAP methods need to be selected and confirmed.

B. Configure specifications for upstream and down stream throughout thresholds.

C. Classify the authorized, neighbor, and rogue WLAN devices.

D. Configure profiles for operation among different regularity domains.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What different security benefits are provided by endpoint security solution software? (Choose 3)

A. Can collect statistics about a user’s network use and monitor network threats while they are connected.

B. Must be present for support of 802.11k neighbor reports, which improves fast BSS transitions.

C. Can be use to monitor and prevent network activity from nearby rogue clients or APs.

D. Can prevent connections to networks with security settings that do not confirm to company policy.

E. Can restrict client connections to network with specific SSIDs and encryption types.

A

A, D, E

22
Q

What software and hardware tools are used together to hijack a wireless station from the authorized wireless network in to an unauthorized wireless networks? (Choose 2)

A. A low-gain patch antenna and terminal emulation software

B. Narrow band RF jamming devices and wireless radio card

C. DHCP server software and access point software

D. A wireless work group bridge and protocol analyzer

E. MAC spoofing software and MAC DOS software

A

B, C

23
Q

Given: ABC company is implementing a secure 802.11WLAN at there head quarters building in New York and at each of the 10 small, remote branch offices around the country 802.1X/EAP is ABC’s preferred security solution. Where possible At all access points (at the headquarters building and all branch offices) connect to single WLAN controller located at the head quarters building, what additional security considerations should be made? (Choose 2)

A. An encrypted connection between the WLAN controller and each controller-based AP should be used or all branch offices should be connected to the head quarters building a VPN.

B. Remote WIPS sensors should be installed at the headquarters building and at all branch office to monitor and enforce wireless security.

C. RADIUS service should always be provided at branch offices so that user authentication is kept on the local network.

D. Remote management via telnet, SSH, HTTP, HTTPs should be permitted across the WLAN link.

A

A, B

24
Q

ABC Company uses the wireless network for highly sensitive network traffic. For that reason they intend to protect there network in all possible ways. They are continually researching new network threats and new preventative measure. They are interested in the security benefits of 802.11w, but would like to know its limitations. What types of wireless attacks are protected by 802.11w? (Choose 2)

A. NAV-based DoS attacks

B. RF DoS attacks

C. Layer 2 Disassociation attacks

D. Robust management frame replay attacks

E. EAPoL flood attacks

A

C, D

25
Q

The IEEE 802.11 pairwise transient key (PTK) is derived from what cryptographic element?

A. Phase shift key (PSK)

B. Group master key (GMK)

C. Peerkey (PK)

D. Group temporal key (GTK)

E. Pairwise master key (PMK)

A

E

26
Q

What wireless authentication technologies build a TLS-encrypted tunnel between the supplicant and the authentication server before passing client authentication credentials to the authentication server? (Choose 3)

A. EAP-TTLS

B. EAP-FAST

C. LEAP

D. EAP-MD5

E. MS-CHAPv2

F. PEAPv1/EAP-GTC

A

A, B, F

27
Q

Given: ABC Company has recently installed a WLAN controller and configured it to support WPA2-Enterprise security. The administrator has confirmed a security profile on the WLAN controller for each group within the company (manufacturing, sales, and engineering) How are authenticated users assigned to groups so that they receive the correct security profile within the WLAN controller?

A. The WLAN controller polls the RADIUS server for a complete list of authenticated users and groups after each user authentication.

B. The RADIUS server forwards a request for a group attribute to an LDAP database service, and LDAP sends the group attribute to the WLAN controller.

C. The RADIUS server sends a group name return list attribute to the WLAN controller during every successful user authentication.

D. The RADIUS server sends the list of authenticated users and groups to the WLAN controller as a part of a 4-way handshake prior to user authentication.

A

B

28
Q

Given: Jane Smith works primarily from home and public wireless hot spot rather than commuting to the office. She frequently accesses the office network frequently from her laptop using the 802.11 WLAN. To safeguard her data, what wireless security policy items should be implemented? (Choose 2)

A. Use 802.1X/PEAPv0 to connect to the corporate office network.

B. Use secure protocols, such as FTP, for remote file transfer with encryption.

C. Use an IPSec VPN for connectivity to the office network.

D. Use an HTTPS captive portal for authent6ication at hot spots.

E. Use WIPS sensor software to monitor for risks.

F. Use personal firewall software on her laptop.

A

C, F

29
Q

PICTURE

What is illustrated on the RF spectrum analyzer?

A. A low-power narrow band RF attacks is in progress on channel 11, causing significant 802.11 interference.

B. A frequency hoping device is being used as a signal jammer on channel 11 only.

C. An HR/DSSS AP and an ERP AP are both operating on channel 11 simultaneously.

D. An ERP AP operating normally on channel 11.

A

A

30
Q

What security weakness is presented in pre-RSNA system using 802.1X with dynamic WEP?

A. There is support for authentication of individual users.

B. All version of EAP used with dynamic WEP pass the user name across the wireless medium in clear text.

C. The session key is crackable if enough traffic is transmitted using the key.

D. With out notification, APs downgrade the security mechanism to 104-bit static WEP when the client device does not support dynamic WEP.

A

C

31
Q

PICTURE

What type of system is installed in graphics?

A. Distributed RF spectrum analyzer

B. Wireless Intrusion Prevention System

C. WLAN Controller Device Monitors

D. WLAN Emulation System

E. Wireless VPN Management System

A

B

32
Q

PICTURE

Joe’s new laptop is experiencing difficulty connecting to ABC Company’s 802.11 WLAN using 802.1X/EAP PEAPv0. The company’s wireless network action network administrator assured Joe that his laptop was authorized in the WIPS for connectivity to all marketing department APs before it was given to him yesterday the WIPS terminations given to him yesterday. The WIPS termination policy is shown in exhibit. What is a possible reason that Joe can not connect to the network?

A. Joe disabled his laptop’s integrated 802.11 radio and is using a personal PC card radio with a different chipset, drivers, and client utilities.

B. An ASLEAP attack has been detected on APs to which Joe’s laptop was trying to associate. This WIPS responded by disabling the APs.

C. Joe’s 802.11radio sending too many probe request and EAPoL start frame due to corrupted driver.

D. Joe configured his 802.11 radio card to transmit at 100mW to increase his SNR. The WIPS is detecting his much out put power as a DoS attack.

E. Joe changed the system limit on his computer, and WIPS is detecting this as usage time violation.

A

A

33
Q

Given: Many corporations have guest VLANs configured on their WLAN controller that allowvisitors to have wireless internet access only. What risks are associated with implementing the guest VLAN without any protocol filtering features enabled? (Choose 2)

A. Unauthorized users can perform internet based network attacks through the WLAN.

B. Intruders can send spam to the internet through the guest VLAN.

C. Peer-to-peer attacks between the guest users can not be prevented without protocol filtering.

D. Once guest users are associated to the WLAN, they can capture 802.11 frames from the corporate VLANs.

E. Guest users can reconfigure APs in the guest VKAN unless unsecure network management protocols (e.g. Telnet, HTTP) are filtered.

A

A, C

34
Q

What limitations are present with PMK caching (or PMKSA caching) when 802.1X/EAP authentication is in use?

A. PMK caching may only be supported when the authentication server (SA) is collocated with the authenticator, as with WLAN controllers using an internal RADIUS server.

B. PMK caching has a maximum PMKSA storage threshold of five keys, which limits the fast roaming capability to a mobility group of five APs.

C. PMK caching allows to fast roaming between APs when they are managed by a single controller, but it does not support inter-controller handoffs

D. PMK caching can only retain PMKSAs once they are present, but it can not create new PMKSAs without a full 802.1X/EAP authentication nor can it distribute an existing PMKSA to other APs.

A

C

35
Q

In what deployment scenarios would it be desirable to enable peer-to-peer traffic blocking?

A. In home networks in which file and pointer sharing is enabled

B. In corporate VoWiFi is networks with push to talk multicast capabilities

C. At publichot-spots in which many clients use diverse application

D. In university environment with multicast training

A

C

36
Q

As a primary security engineer for a large corporate network you have been asked to author a new security policy for the wireless network while most clients devices support 802.11X authentication some legacy devices still passphrase. When writing the 802.11 security policy, what password related items should be addressed?

A. Password should include a combination of upper and lower case latter, numbers, and special characters.

B. Certificate should always by recommended instead of passwords for 802.11 client authentication.

C. Password complexity should be maximized so that the weak IV attacks are prevented.

D. Password creation process should be defined to maximize the strength of PSK based authentication.

E. MSCHAPv2 passwords used with EAP/PEAPv0 should be stronger than typical WPA2=PSK passphrase.

A

A, D

37
Q

When opportunistic key caching (OKC) is supported on the wireless network, what steps must occur before a successful roam is completed? (Choose 2)

A. EAP authentication must be conducted between the supplicant and AS

B. The AS must be queried for derivation of new PMK

C. The authenticator must query the RADIUS server to validate the supplicant

D. New open system authentication must be performed

E. Supplicant and authenticator must establish a new PTK

A

A, C

38
Q

PICTURE

Choose the statement that explains that why the frame exchanged from Exhibit -1 took more frames than the frames exchanged from Exhibit-2 when both authentication were successful.

A. Exhibit-1 and Exhibit -2 are using different EAP types.

B. Exhibit-2 has transmission of EAP frames.

C. Exhibit-1 is a TSN, and Exhibit-2 is an RSN

D. Exhibit-1 is association and Exhibit-2 is an initial association.

E. Exhibit-1 and Exhibit-2 are using different cipher suits.

A

D

39
Q

What TKIP features prevent attacks against the known weaknesses of WEP? (Choose 3)

A. 32 bit ICV (CRC 32)

B. Sequence counters

C. Michael

D. RC5 stream cipher

E. Block cipher support

F. Increased IV length

A

B, C, F

40
Q

Given: The ABC corporation currently utilizes a public key infrastructure (PKI) to allow employees to securely access network resources using smart cards. The wireless network will use WPA2- Enterprise as its primary security solution. You have been hired to recommend a Wi-Fi alliance tested EAP method What solutions will require the least change in how users are currently authenticated and still integrate with there existing PKI?

A. PEAPv0/EAP-MSCHAPv2

B. EAP-TLS

C. EAP-TTLS/MSCHAPv2

D. PEAPv0/EAP-TLS E. LEAP

A

D

41
Q

Given: Many travelling business users connect to internet at airports, which often have 802.11g access points with a captive portal for authentication. While using an airport hot spot with this security solution, to what type of wireless attack is user susceptible? (Choose 2)

A. IGMP-snooping

B. Man-in-middle

C. Wi-Fi ARP poising

D. Management interface exploits

E. Wi-Fi phishing

A

A, E

42
Q

PICTURE

Review the exhibit and answer the following question. When monitoring APs within A LAN using a wireless network management system (WNMS, what secure protocol may be used by the WNMS to issue configuration change to APs?

A. TFTP

B. SNMPv3

C. 802.1X/EAP

D. PPTP

E. IPSec/ESP

A

B

43
Q

What penetative measures are performed by a WIPS against intrusions?

A. Uses SNMP to disable the switch port to which rogue APs connect

B. Deauthentication attack against a classified neighbor AP

C. Evil twin attack against a classified neighbor AP

D. Evil twin attack against a rogue AP E. EAPoL reject frame flood against AP

A

A, B

44
Q

PICTURE

What WLAN security function can be performed by the illustrated software utility? (Choose 3)

A. Generating PMKs that can be imported into 802.11 RSN systems

B. Generating passphrases for WLAN system secured with WPA2-personal

C. Generating random EAP-TTLS session keys

D. Generating passwords for WLAN infrastructure equipment logins

E. Generating high-entropy EAP-TLS passphrase for client authentication

F. Generating secret keys for RADIUS server and WLAN infrastructure devices

A

B, D, F

45
Q

PICTURE

The exhibit shows one of the ABC Company’s APs and its associated clients. AP-00:1F:C3is configured with three separate WLAN profile, as follows - SSID: guestVLAN90-security: Open with captive portal authentication-2 current clients - SSID: ABCData-VLAN 10-security. PEAPv0/EAP\MSCH with AES-CCMP-5 current clients - SSID: ABC voice –VLAN 10-security:WPA2-personal-2 current clients Two of the clients stations that are connected via the ABCData SSID are corporate executives. Theses executives are the part of multicast group that is used to share sensitive videos among executive users. What client stations possess the key that are necessary to decrypt the multicast data packets charring theses sensitive videos?

A. Only the members of executive team that are the part of the multicast group

B. All clients that are associated to AP-00:IF:C3 using the ABCData SSID

C. All clients that are associated to AP:00:IF:C:3 with shared GTK, which includes ABCData and ABC voice

D. All clients that are associated to AP-00:IF:C3 using any SSID

A

B

46
Q

Given: ABC hospital wishes to create a strong security policy as a first step in securing there 802.11 WLAN What are the appropriate sections of a WLAN security policy? (Choose 3)

A. Attack classification

B. Physical security of the RF medium

C. Acceptable use of the network

D. SSID broadcasting regulations

E. End-user and administrator training

F. Network audits

A

A, C, E

47
Q

What impact may 802.11w have on the efforts of rogue device containment with an overlay WIPS?

A. 802.11w introduces data integrity protection for some management and action frames, which may limits the methods used by WIPS to disconnect, and mitigate the impact of, rogue AP or client communications

B. 802.11w introduces new mechanisms by which unassociated clients can refuse Deauthentication frames that can not be rejected by APs. This introduces new security concerns for WIPS containing Deauthentication attacks

C. 802.11 introduces a mechanism to Encrypt MAC headers in management and control frames, which have traditionally have been used by WIPS to detect network threats such as hijacking attacks and MAC spoofing

D. 802.11w inadvertently exposes new methods for attacks to exploit TKIP countermeasure using spoofed management frames of legitimate stations. WIPS solutions are in capable of preventing this type of attack

A

B

48
Q

In An IEEE 802.11-complaint WLAN, when is 802.1X controlled port placed into the unblocked state?

A. After open system authentication

B. After any group handshake

C. After the 4-way handshake

D. After RADIUS authentication

A

C

49
Q

When using a tunneled EAP type, what is protected from clear text across the wireless medium?

A. X.509 certificates

B. User credentials

C. EAPoL keys

D. Pairwise Master keys

E. Server credentials

A

B

50
Q

PICTURE

The illustration shows the 802.11 association procedure from the IEEE 802.11 standard. In a WPA2-Enterprise network what process immediately flows the 802.11 association procedure?

A. 802.1X EAP authentication

B. 4-way handshake

C. Group key handshake

D. RADIUS shared secret lookup

E. DHCP request

F. EAP Passphrase-to-PSK mapping

A

A