What is one advantage of using EAP-TTLS instead of EAP-TLS as an authentication mechanism in an 802.11 WLAN?
A. EAP-TTLS does not require the use of a certificate for each STA as authentication credentials, but EAP-TLS does.
B. EAP-TTLS sends encrypted supplicant credentials to the authentication server, but EAP-TLS uses unencrypted user credentials.
C. EAP-TTLS does not require an authentication server, but EAP-TLS does.
D. EAP-TTLS supports client certificates, but EAP-TLS does not.
正解:A
質問 2:
What preventative measures are performed by a WIPS against intrusions?
A. Evil twin attack against a rogue AP
B. ASLEAP attack against a rogue AP
C. EAPoL Reject frame flood against a rogue AP
D. Deauthentication attack against a classified neighbor AP
E. Uses SNMP to disable the switch port to which rogue APs connect
正解:E
質問 3:
The following numbered items show some of the contents of each of the four frames exchanged during the 4-way handshake:
1.Encrypted GTK sent
2.Confirmation of temporal key installation
3.Anonce sent from authenticator to supplicant
4.Snonce sent from supplicant to authenticator, MIC included
Arrange the frames in the correct sequence beginning with the start of the 4-way handshake.
A. 3, 4, 1, 2
B. 2, 3, 4, 1
C. 1, 2, 3, 4
D. 4, 3, 1, 2
正解:A
質問 4:
What 802.11 WLAN security problem is directly addressed by mutual authentication?
A. Weak Initialization Vectors
B. Disassociation attacks
C. Wireless hijacking attacks
D. Weak password policies
E. MAC spoofing
F. Offline dictionary attacks
正解:C
質問 5:
You are implementing a wireless LAN that will be used by point-of-sale (PoS) systems in a retail environment. Thirteen PoS computers will be installed. To what industry requirement should you ensure you adhere?
A. ISA99
B. Directive 8500.01
C. PCI-DSS
D. HIPAA
正解:C
質問 6:
A single AP is configured with three separate WLAN profiles, as follows:
1.SSID: ABCData - BSSID: 00:11:22:00:1F:C3 - VLAN 10 - Security: PEAPv0/EAPMSCHAPv2 with AES-CCMP - 3 current clients
2.SSID: ABCVoice - BSSID: 00:11:22:00:1F:C4 - VLAN 60 - Security: WPA2-Personal with AES-CCMP - 2 current clients
3.SSID: Guest - BSSID: 00:11:22:00:1F:C5 - VLAN 90 - Security: Open with captive portal authentication - 3 current clients
Three STAs are connected to ABCData. Three STAs are connected to Guest. Two STAs are connected to ABCVoice.
How many unique GTKs and PTKs are currently in place in this scenario?
A. 3 GTKs - 8 PTKs
B. 2 GTKs - 5 PTKs
C. 1 GTK - 8 PTKs
D. 2 GTKs - 8 PTKs
正解:B
質問 7:
What software and hardware tools are used together to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network? (Choose 2)
A. MAC spoofing software and MAC DoS software
B. A low-gain patch antenna and terminal emulation software
C. RF jamming device and a wireless radio card
D. A wireless workgroup bridge and a protocol analyzer
E. DHCP server software and access point software
正解:C,E
質問 8:
What protocols allow a network administrator to securely manage the configuration of WLAN controllers and access points? (Choose 2)
A. Telnet
B. SNMPv1
C. HTTPS
D. TFTP
E. FTP
F. SSHv2
正解:C,F
質問 9:
The IEEE 802.11 Pairwise Transient Key (PTK) is derived from what cryptographic element?
A. PeerKey (PK)
B. Key Confirmation Key (KCK)
C. Pairwise Master Key (PMK)
D. Phase Shift Key (PSK)
E. Group Master Key (GMK)
F. Group Temporal Key (GTK)
正解:C