What attack cannot be detected by a Wireless Intrusion Prevention System (WIPS)?
What policy would help mitigate the impact of peer-to-peer attacks against wireless-enabled corporate laptop computers when the laptops are also used on public access networks such as wireless hot-spots?
As a part of a large organization’s security policy, how should a wireless security professional address the problem of rogue access points?
What elements should be addressed by a WLAN security policy? (Choose 2)
Given: ABC Hospital wishes to create a strong security policy as a first step in securing their 802.11 WLAN.
Before creating the WLAN security policy, what should you ensure you possess?
In what deployment scenarios would it be desirable to enable peer-to-peer traffic blocking?
As the primary security engineer for a large corporate network, you have been asked to author a new security policy for the wireless network. While most client devices support 802.1X authentication, some legacy devices still only support passphrase/PSK-based security methods.
When writing the 802.11 security policy, what password-related items should be addressed?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
CWNP Free Exams |
---|
![]() |