Given: ABC Hospital wishes to create a strong security policy as a first step in securing their 802.11 WLAN.Before creating the WLAN security policy, what should you ensure you possess?
What policy would help mitigate the impact of peer-to-peer attacks against wireless-enabled corporate laptop computers when the laptops are also used on public access networks such as wireless hot-spots?
What is one advantage of using EAP-TTLS instead of EAP-TLS as an authentication mechanism in an 802.11 WLAN?
What wireless authentication technologies may build a TLS tunnel between the supplicant and the authentication server before passing client authentication credentials to the authentication server? (Choose 3)
While performing a manual scan of your environment using a spectrum analyzer on a laptop computer, you notice a signal in the real time FFT view. The signal is characterized by having peak power centered on channel 11 with an approximate width of 20 MHz at its peak. The signal widens to approximately 40 MHz after it has weakened by about 30 dB.What kind of signal is displayed in the spectrum analyzer?
Given: John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website. The banks website uses the HTTPS protocol to protect sensitive account information. While John was using the hot-spot, a hacker was able to obtain Johns bank account user ID and password and exploit this information.What likely scenario could have allowed the hacker to obtain Johns bank account user ID and password?