New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What security vulnerabilities may result from a lack of staging, change management, and installation procedures for WLAN infrastructure equipment? (Choose 2)

A.

The WLAN system may be open to RF Denial-of-Service attacks

B.

WIPS may not classify authorized, rogue, and neighbor APs accurately

C.

Authentication cracking of 64-bit Hex WPA-Personal PSK

D.

Management interface exploits due to the use of default usernames and passwords for AP management

E.

AES-CCMP encryption keys may be decrypted

Given: You are the WLAN administrator in your organization and you are required to monitor the network and ensure all active WLANs are providing RSNs. You have a laptop protocol analyzer configured.

In what frame could you see the existence or non-existence of proper RSN configuration parameters for each BSS through the RSN IE?

A.

Probe request

B.

Beacon

C.

RTS

D.

CTS

E.

Data frames

You must locate non-compliant 802.11 devices. Which one of the following tools will you use and why?

A.

A spectrum analyzer, because it can show the energy footprint of a device using WPA differently from a device using WPA2.

B.

A spectrum analyzer, because it can decode the PHY preamble of a non-compliant device.

C.

A protocol analyzer, because it can be used to view the spectrum energy of non-compliant 802.11 devices, which is always different from compliant devices.

D.

A protocol analyzer, because it can be used to report on security settings and regulatory or rule compliance