Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

What AP configuration option is often thought to provide security but actually provides no security because of

the simple spoofing attack weakens it?

A.

MAC filtering

B.

WEP

C.

Shared Key Authentication

D.

SSID hiding

Full Access
Question # 5

You use 802.1X/EAP for all WLAN authentication in your network. You have several VoIP handsets that work well until they have to roam from one AP to another. When they roam, calls are often dropped or call quality is significantly diminished. What is the most likely cause of this problem?

A.

Wrong passphrase entered on the VoIP handsets

B.

Non-implemented roaming features on the APs

C.

Wrong SSID used by the VoIP handsets

D.

Wrong certificate installed on the VoIP handsets

Full Access
Question # 6

What kind of AP mounting kit is most likely to use U-brackets?

A.

Desktop mount

B.

Ceiling mount

C.

Pole/mast mount

D.

Wall mount

Full Access
Question # 7

What 802.11 process must always occur before 802.11 association?

A.

Time synchronization

B.

Authentication

C.

Confidentiality

D.

Encryption

Full Access
Question # 8

If the AP’s time is not automatically configured to match the rest of the network, what infrastructure service

may be unreachable by the AP?

A.

DNS

B.

DHCP

C.

NTP

D.

FTP

Full Access
Question # 9

You have implemented an 802.11 security solution that requires certificates. What are you using?

A.

WEP

B.

WPA2-Enterprise

C.

WPA-Personal

D.

WPA2-Personal

Full Access