A WLAN protocol analyzer trace reveals the following sequence of frames (excluding the ACK frames):
* 802.11 Probe Req and 802.11 Probe Rsp
* 802.11 Auth and then another 802.11 Auth
* 802.11 Assoc Req and 802.11 Assoc Rsp
* EAPOL-KEY
* EAPOL-KEY
* EAPOL-KEY
* EAPOL-KEY
What security mechanism is being used on the WLAN?
Answer : A
After completing the installation of a new overlay WIPS for the purpose of rogue detection and security monitoring at your corporate headquarters, what baseline function MUST be performed in order to identify the security threats?
Answer : B
WLAN protocol analyzers can read and record many wireless frame parameters. What parameter is needed to physically locate rogue APs with a protocol analyzer?
Answer : E
When monitoring APs within a LAN using a Wireless Network Management System (WNMS), what secure protocol may be used by the WNMS to issue configuration changes to APs?
Answer : D
What preventative measures are performed by a WIPS against intrusions?
Answer : A
What field in the RSN information element (IE) will indicate whether PSK- or Enterprise-based WPA or WPA2 is in use?
Answer : C
What security vulnerability may result from a lack of staging, change management, and installation procedures for WLAN infrastructure equipment?
Answer : D