0006 Which of the following should be implemented if all the organizations use the native 802.1X client on their mobile devices? RADIUS Federation 0325 Which of the following security measures can the administrator use to help protect the company's WiFi network against war driving? (Select TWO)
Implement a warning banner 0636 Which of the following is provided by PEAP, EAP-TLS, and EAP-TTLS? Key rotation 0025 Which of the following forms of authentication are being used? (Select two.) PEAP-MSCHAP 0998 Which of the following should the systems administrator configure? EAP-TLS 0501 Given these requirements, which of the following statements BEST represents what the analyst should recommend and configure? Configure a captive portal for guest and WPA2 Enterprise for staff 0965 WPA2 0656 Which of the following protocols should be configured on the RADIUS server? (Choose two.) NTLM 0589 Which of the following should be implemented to harden the infrastructure without upgrading the Implement WEP and RC4
0868 Evil twin 0128 EAP-TLS 0823 Which of the following configurations should the engineer choose? PEAP 0545 Which of the following configurations should the instructor implement? 0086 Which Shared accountsof the following should the administrator implement? Sponsored guest 0961 Which of the following is the MINIMUM acceptable configuration to meet this single requirement? Open WiFi 1020 Which of the following protocols would be required to accomplish this? EAP-MD5 0364 Which of the following should be used in the design to meet the requirements? (Choose two.) (The term “background reconnection” does not
exist in any WiFi documentation; PEAP does Open Systems Authentication 0317 Utilizing a previously unknown security flaw against the target 0617 [Anmerkung: Zur Zeit liegen leider nur Screenshots für den Access Point vor!] 0067 WPA+TKIP 0546 Given these requirements, which of the following should the analyst implement and recommend? (Select TWO.) WPA2-PSK 0265 Upgrade the encryption to WPA or WPA2Which of the following would further obscure the presence of the wireless network? Disable responses to a broadcast probe request 0079 Which of the following technologies allows for encrypted authentication of wireless clients over TLS? 0195 Which of the following is the MOST likely cause of the connectivity issues? The wireless signal is not strong enough When connected to a secure WAP, which of the following encryption technologies is MOST likely to be configured 0175 Which of the following security measures did the technician MOST likely implement to cause this Scenario? Deactivation of SSID broadcast 0420 Setting up a TACACS+ server 0083 WPA2 using a RADIUS back-end for 802.1X authentication 0653 Which of the following should be used in the design to meet the requirements? 0806 Which of the following would be the MOST secure setup that conforms to the organization's requirements? Use WPA2-PSK with a 24-character complex password and change the password monthly. 0363 Which of the following should be configured on the company's
Enable ESSID broadcast 0054 Which of the following should be implemented in the administrator does not want to provide the wireless password or the certificate to the employees? 0913 Which of the following should the administrator configure? 802.1X 0461 Which of the following should the systems administrator configure? L2TP with MAC filtering 0671 Which of the following should the security administrator use to assess connectivity? Sniffer 0885 Which of the following technologies should the coffee shop use in place of PSK? WEP 0048 Host IP Mac Mac Filter DadPC 192.168.1.10 00:1d:blabla On MomPC 192.168.1.10 21:13:blabla Off JuniorPC 192.168.1.10 42:a7:blabla On Unknown 192.168.1.10 10:b3:blabla Off Which of the following should be the NEXT step to determine if there is an unauthorized user on the network? Conduct a ping sweep of each of the authorized systems and see if an echo response is
received. 0224 Packet sniffing 0151 Which of the following wireless security methods should the technician implement to provide basic accountability for access to the public network? Wi-Fi Protected Setup 0620 Which of the following should the company use? WiFi-protected setup 0712 0994 Which of the following should the systems administrator implement? 1025 Which of the following precautions should the CEO take? (Choose two.) Change the connection type to WPA2 0821 Which of the following protocols must be supported by both the RADIUS server and the WAPs? 0280 Which of the following is the MOST likely reason the thermostat is not connecting to the internet? The company implements a captive portal 0214 Bluejacking |