Which of the following are the security measures that are needed to maintain the security of wireless LAN?
Each correct answer represents a complete solution. Choose all that apply.
A. WIDS
B. WLAN controller
C. WIPS
D. Firewalls
正解:A,C,D
解説: (Pass4Test メンバーにのみ表示されます)
質問 2:
When opportunistic key caching (OKC) is supported on the wireless network, what steps must occur before a successful roam is completed? (Choose 2)
A. Supplicant and authenticator must establish a new PTK
B. New open system authentication must be performed
C. The AS must be queried for derivation of new PMK
D. EAP authentication must be conducted between the supplicant and AS
E. The authenticator must query the RADIUS server to validate the supplicant
正解:D,E
解説: (Pass4Test メンバーにのみ表示されます)
質問 3:
802.1X/EAP-TLS supports what client authentication credential type?
A. x.509 Certificates
B. Passwords
C. Biometric
D. Digital Security Token
E. MD5 Hash Exchange
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
質問 4:
Which of the following encryption algorithms is used by Wired Equivalent Privacy (WEP)?
A. RSA
B. CCMP
C. RC4
D. TKIP
正解:C
解説: (Pass4Test メンバーにのみ表示されます)
質問 5:
A university's WLAN administrator is seeking an efficient and effective method of detecting and eliminating rogue access points and wireless Ad Hoc networks across the entire campus. The administrator's friend suggests that the he use a WLAN protocol analyzer to perform a weekly survey of the campus to discover rogues devices. The administrator considers this option and then asks you to offer advice on the subject. What is your advice to the administrator? (Choose two)
A. WLAN protocol analyzers are not a comprehensive rogue detection solution because they
cannot detectaccess points that are configured to hide the SSID in beacons.
B. Because WLAN protocol analyzers can see all frames on the wireless medium, they are the
mostcomprehensive solution for detecting rogue wireless devices of any kind.
C. By assigning one IT worker to do weekly scans using a WLAN protocol analyzer, Wi-Fi,
Bluetooth, and
Infrared rogue access points and Ad Hoc networks can be effectively located and removed.
D. In a campus environment, manual scanning for rogues requires too much time and resources to
effectivelyand consistently locate all rogue devices. A system is needed that can inspect the entire
campus in realtime.
E. WLAN protocol analyzers will not detect rogue devices that do not use the 802.11 protocol
frame format.
正解:D,E
解説: (Pass4Test メンバーにのみ表示されます)
質問 6:
Which of the following protocols is used to provide security for network traffic transmitted across a TCP/IP network?
A. Explanation:
IPSec is the primary security protocol used in TCP/IP networks. Internet Protocol security (IPSec)
provides data protection during network communication. IPSec performs the following security
functions.
Authenticates the sender of IP data.
Ensures the integrity of the IP data. Encrypts all data for full confidentiality. Hides the originating IP addresses. IPSec can be configured for Authentication Header (AH) security and Encapsulating Security Payload (ESP) security.
B. UDP
C. IP
D. IPSec
E. TCP
正解:D
解説: (Pass4Test メンバーにのみ表示されます)
質問 7:
Given: The ABC corporation currently utilizes a public key infrastructure (PKI) to allow employees to securely access network resources using smart cards. The wireless network will use WPA2Enterprise as its primary security solution. You have been hired to recommend a Wi-Fi alliance tested EAP method
What solutions will require the least change in how users are currently authenticated and still integrate with there existing PKI?
A. PEAPv0/EAP-TLS
B. LEAP
C. EAP-TLS
D. PEAPv0/EAP-MSCHAPv2
E. EAP-TTLS/MSCHAPv2
正解:A
解説: (Pass4Test メンバーにのみ表示されます)
米仓** -
1問の不正解で合格しました。
このトレーニング資料で学んだことが多数出題されました。試験前の最終追い込みも重要です。
どうもありがとうございました。