Given: The Aircrack-ng WLAN software tool can capture and transmit modified 802.11 frames over the wireless network. It comes pre-installed on Kali Linux and some other Linux distributions.
What are three uses for such a tool? (Choose 3)
Answer : A, B, D
What 802.11 WLAN security problem is directly addressed by mutual authentication?
Answer : A
The IEEE 802.11 Pairwise Transient Key (PTK) is derived from what cryptographic element?
Answer : C
What statements are true about 802.11-2012 Protected Management Frames? (Choose 2)
Answer : A, D
Given: The ABC Corporation currently utilizes an enterprise Public Key Infrastructure (PKI) to allow employees to securely access network resources with smart cards. The new wireless network will use WPA2-Enterprise as its primary authentication solution. You have been asked to recommend a Wi-Fi Alliance-tested EAP method.
What solutions will require the least change in how users are currently authenticated and still integrate with their existing PKI?
Answer : B
In what deployment scenarios would it be desirable to enable peer-to-peer traffic blocking?
Answer : B
What EAP type supports using MS-CHAPv2, EAP-GTC or EAP-TLS for wireless client authentication?
Answer : D