For a WIPS system to identify the location of a rogue WLAN device using location patterning (RF fingerprinting), what must be done as part of the WIPS installation?
In what deployment scenarios would it be desirable to enable peer-to-peer traffic blocking?
While performing a manual scan of your environment using a spectrum analyzer on a laptop computer, you notice a signal in the real time FFT view. The signal is characterized by having peak power centered on channel 11 with an approximate width of 20 MHz at its peak. The signal widens to approximately 40 MHz after it has weakened by about 30 dB.What kind of signal is displayed in the spectrum analyzer?
As the primary security engineer for a large corporate network, you have been asked to author a new security policy for the wireless network. While most client devices support 802.1X authentication, some legacy devices still only support passphrase/PSK-based security methods.When writing the 802.11 security policy, what password-related items should be addressed?
Given: A network security auditor is preparing to perform a comprehensive assessment of an 802.11ac network’s security.What task should be performed at the beginning of the audit to maximize the auditor’s ability to expose network vulnerabilities?
What elements should be addressed by a WLAN security policy? (Choose 2)