Given: ABC Corporations 802.11 WLAN is comprised of a redundant WLAN controller pair (N+1) and 30 access points implemented in 2004. ABC implementedWEP encryption with IPSec VPN technology to secure their wireless communication because it was the strongest security solution available at the time it was implemented. IT management has decided to upgrade the WLAN infrastructure and implement Voice over Wi-Fi and is concerned with security because mostVoice over Wi-Fi phones do not support IPSec.As the wireless network administrator, what new security solution would be best for protecting ABCs data?
Given: The ABC Corporation currently utilizes an enterprise Public Key Infrastructure (PKI) to allow employees to securely access network resources with smart cards. The new wireless network will use WPA2-Enterprise as its primary authentication solution. You have been asked to recommend a Wi-Fi Alliance-testedEAP method.What solutions will require the least change in how users are currently authenticated and still integrate with their existing PKI?
What statement accurately describes the functionality of the IEEE 802.1X standard?
In the IEEE 802.11-2012 standard, what is the purpose of the 802.1X Uncontrolled Port?
Given: An 802.1X/EAP implementation includes an Active Directory domain controller running Windows Server 2012 and an AP from a major vendor. A Linux server is running RADIUS and it queries the domain controller for user credentials. A Windows client is accessing the network.What device functions as the EAP Supplicant?
Given: John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website. The banks website uses the HTTPS protocol to protect sensitive account information. While John was using the hot-spot, a hacker was able to obtain Johns bank account user ID and password and exploit this information.What likely scenario could have allowed the hacker to obtain Johns bank account user ID and password?