Given: In a security penetration exercise, a WLAN consultant obtains the WEP key of XYZ Corporation’s
wireless network. Demonstrating the vulnerabilities of using WEP, the consultant uses a laptop running a
software AP in an attempt to hijack the authorized user’s connections. XYZ’s legacy network is using 802.11n
APs with 802.11b, 11g, and 11n client devices.
With this setup, how can the consultant cause all of the authorized clients to establish Layer 2 connectivity
with the software access point?
Your organization required compliance reporting and forensics features in relation to the 802.11ac WLAN
they have recently installed. These features are not built into the management system provided by the WLAN
vendor. The existing WLAN is managed through a centralized management console provided by the AP
vendor with distributed APs and multiple WLAN controllers configured through this console.
What kind of system should be installed to provide the required compliance reporting and forensics features?
You are using a protocol analyzer for random checks of activity on the WLAN. In the process, you notice two
different EAP authentication processes. One process (STA1) used seven EAP frames (excluding ACK frames)
before the 4-way handshake and the other (STA2) used 11 EAP frames (excluding ACK frames) before the
4-way handshake.
Which statement explains why the frame exchange from one STA required more frames than the frame
exchange from another STA when both authentications were successful? (Choose the single most probable
answer given a stable WLAN.)
© Copyrights DumpsEngine 2025. All Rights Reserved
We use cookies to ensure your best experience. So we hope you are happy to receive all cookies on the DumpsEngine.
