In order to acquire credentials of a valid user on a public hotspot network, what attacks may be conducted? Choose the single completely correct answer.
A. MAC denial of service and/or physical theft
B. Social engineering and/or eavesdropping
C. Authentication cracking and/or RF DoS
D. Code injection and/or XSS
E. RF DoS and/or physical theft
What WLAN client device behavior is exploited by an attacker during a hijacking attack?
A. After the initial association and 4-way handshake, client stations and access points do not need to perform another 4-way handshake, even if connectivity is lost.
B. Client drivers scan for and connect to access point in the 2.4 GHz band before scanning the 5 GHz band.
C. When the RF signal between a client and an access point is disrupted for more than a few seconds, the client device will attempt to associate to an access point with better signal quality.
D. When the RF signal between a client and an access point is lost, the client will not seek to reassociate with another access point until the 120 second hold down timer has expired.
E. As specified by the Wi-Fi Alliance, clients using Open System authentication must allow direct client-toclient connections, even in an infrastructure BSS.
Which of the following is a valid reason to avoid the use of EAP-MD5 in production WLANs?
A. It does not support a RADIUS server.
B. It is not a valid EAP type.
C. It does not support mutual authentication.
D. It does not support the outer identity.
Your organization is using EAP as an authentication framework with a specific type that meets the requirements of your corporate policies. Which one of the following statements is true related to this implementation?
A. The client STAs may communicate over the controlled port in order to authenticate as soon as the Open System authentication completes.
B. The client STAs may communicate over the uncontrolled port in order to authenticate as soon as the Open System authentication completes.
C. The client STAs may use a different, but complementary, EAP type than the AP STAs.
D. The client will be the authenticator in this scenario.
Role-Based Access Control (RBAC) allows a WLAN administrator to perform what network function?
A. Provide two or more user groups connected to the same SSID with different levels of network privileges.
B. Allow access to specific files and applications based on the user's WMM access category.
C. Allow simultaneous support for multiple EAP types on a single access point.
D. Minimize traffic load on an AP by requiring mandatory admission control for use of the Voice access category.
ABC Company is implementing a secure 802.11 WLAN at their headquarters (HQ) building in New York and at each of the 10 small, remote branch offices around the United States. 802.1X/EAP is ABC's preferred security solution, where possible. All access points (at the HQ building and all branch offices) connect to a single WLAN controller located at HQ. Each branch office has only a single AP and minimal IT resources. What security best practices should be followed in this deployment scenario?
A. Remote management of the WLAN controller via Telnet, SSH, HTTP, and HTTPS should be prohibited across the WAN link.
B. RADIUS services should be provided at branch offices so that authentication server and suppliant credentials are not sent over the Internet.
C. An encrypted VPN should connect the WLAN controller and each remote controller-based AP, or each remote site should provide an encrypted VPN tunnel to HQ.
D. APs at HQ and at each branch office should not broadcast the same SSID; instead each branch should have a unique ID for user accounting purposes.
You are using a utility that takes input and generates random output. For example, you can provide the input of a known word as a secret word and then also provide another known word as salt input. When you process the input it generates a secret code which is a combination of letters and numbers with case sensitivity. For what is the described utility used?
A. Generating PMKs that can be imported into 802.11 RSN-compatible devices.
B. Generating passwords for WLAN infrastructure equipment logins.
C. Generating dynamic session keys used for IPSec VPNs.
D. Generating GTKs for broadcast traffic encryption.
For which one of the following purposes would a WIPS not be a good solution?
A. Enforcing wireless network security policy.
B. Detecting and defending against eavesdropping attacks.
C. Performance monitoring and troubleshooting.
D. Security monitoring and notification.
You are the WLAN administrator in your organization and you are required to monitor the network and ensure all active WLANs are providing RSNs. You have a laptop protocol analyzer configured. In what frame could you see the existence or non-existence of proper RSN configuration parameters for each BSS through the RSN IE?
A. CTS
B. Beacon
C. RTS
D. Data frames
E. Probe request
WLAN protocol analyzers can read and record many wireless frame parameters. What parameter is needed to physically locate rogue APs with a protocol analyzer?
A. IP Address
B. Noise floor
C. RSN IE
D. SSID
E. Signal strength
F. BSSID