{"id":79103,"date":"2024-05-03T02:36:46","date_gmt":"2024-05-03T02:36:46","guid":{"rendered":"https:\/\/www.dumpsbase.com\/freedumps\/?p=79103"},"modified":"2024-05-03T02:36:51","modified_gmt":"2024-05-03T02:36:51","slug":"boost-your-skills-in-cwnp-certified-wireless-security-professional-cwsp-exam-with-the-latest-cwsp-207-dumps-of-dumpsbase","status":"publish","type":"post","link":"https:\/\/www.dumpsbase.com\/freedumps\/boost-your-skills-in-cwnp-certified-wireless-security-professional-cwsp-exam-with-the-latest-cwsp-207-dumps-of-dumpsbase.html","title":{"rendered":"Boost Your Skills in CWNP Certified Wireless Security Professional (CWSP) Exam with the Latest CWSP-207 Dumps of DumpsBase"},"content":{"rendered":"\n<p>The CWNP Certified Wireless Security Professional (CWSP) is a demanded certification, which proves you can<\/p>\n<ul>\n<li>Understand how to evaluate network vulnerabilities and proactively prevent potential attacks<\/li>\n<li>Be capable of conducting wireless network security audits and deploying compliance monitoring systems<\/li>\n<li>Be experienced in establishing Wireless Intrusion Prevention Systems (WIPS)<\/li>\n<\/ul>\n<p>So you may be eager to pass the CWSP-207 exam, but how? Make use of the preparation material available on DumpsBase and effectively prepare with the CWNP CWSP-207 dumps to Excel. We deliver the latest CWSP-207 exam dumps to prepare for the CWNP Certified Wireless Security Professional (CWSP) exam and correctly upgrade your capabilities with all the CWNP CWSP-207 questions and answers. With the latest CWSP-207 dumps of DumpsBase, you may improve your preparation and validate your expertise with the premium CWNP CWSP-207 questions and answers.<\/p>\n<p><!-- notionvc: ce25bda3-f624-4c6f-a63d-ade66400d743 --><\/p>\n<h2>CWNP Certified Wireless Security Professional (CWSP) <em><span style=\"background-color: #00ffff;\">CWSP-207 Free Dumps<\/span><\/em><\/h2>\n<script>\n\t  window.fbAsyncInit = function() {\n\t    FB.init({\n\t      appId            : '622169541470367',\n\t      autoLogAppEvents : true,\n\t      xfbml            : true,\n\t      version          : 'v3.1'\n\t    });\n\t  };\n\t\n\t  (function(d, s, id){\n\t     var js, fjs = d.getElementsByTagName(s)[0];\n\t     if (d.getElementById(id)) {return;}\n\t     js = d.createElement(s); js.id = id;\n\t     js.src = \"https:\/\/connect.facebook.net\/en_US\/sdk.js\";\n\t     fjs.parentNode.insertBefore(js, fjs);\n\t   }(document, 'script', 'facebook-jssdk'));\n\t<\/script><script type=\"text\/javascript\" >\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \nif(!window.jQuery) alert(\"The important jQuery library is not properly loaded in your site. Your WordPress theme is probably missing the essential wp_head() call. You can switch to another theme and you will see that the plugin works fine and this notice disappears. If you are still not sure what to do you can contact us for help.\");\n});\n<\/script>  \n  \n<div  id=\"watupro_quiz\" class=\"quiz-area single-page-quiz\">\n<p id=\"submittingExam8480\" style=\"display:none;text-align:center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\"><\/p>\n\n<div class=\"watupro-exam-description\" id=\"description-quiz-8480\"><\/div>\n\n<form action=\"\" method=\"post\" class=\"quiz-form\" id=\"quiz-8480\"  enctype=\"multipart\/form-data\" >\n<div class='watu-question ' id='question-1' style=';'><div id='questionWrap-1'  class='   watupro-question-id-326410'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>1. <\/span>What are of some of the common security capabilities often integrated within in access points deployed in a distributed WLAN architecture?<\/div><input type='hidden' name='question_id[]' id='qID_1' value='326410' \/><input type='hidden' id='answerType326410' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326410[]' id='answer-id-1276838' class='answer   answerof-326410 ' value='1276838'   \/><label for='answer-id-1276838' id='answer-label-1276838' class=' answer'><span>Captive web portal<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326410[]' id='answer-id-1276839' class='answer   answerof-326410 ' value='1276839'   \/><label for='answer-id-1276839' id='answer-label-1276839' class=' answer'><span>Firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326410[]' id='answer-id-1276840' class='answer   answerof-326410 ' value='1276840'   \/><label for='answer-id-1276840' id='answer-label-1276840' class=' answer'><span>Integrated RADIUS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326410[]' id='answer-id-1276841' class='answer   answerof-326410 ' value='1276841'   \/><label for='answer-id-1276841' id='answer-label-1276841' class=' answer'><span>WIPS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326410[]' id='answer-id-1276842' class='answer   answerof-326410 ' value='1276842'   \/><label for='answer-id-1276842' id='answer-label-1276842' class=' answer'><span>All of the above<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-2' style=';'><div id='questionWrap-2'  class='   watupro-question-id-326411'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>2. <\/span>In what deployment scenarios would it be desirable to enable peer-to-peer traffic blocking?<\/div><input type='hidden' name='question_id[]' id='qID_2' value='326411' \/><input type='hidden' id='answerType326411' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326411[]' id='answer-id-1276843' class='answer   answerof-326411 ' value='1276843'   \/><label for='answer-id-1276843' id='answer-label-1276843' class=' answer'><span>In home networks in which file and printer sharing is enabled<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326411[]' id='answer-id-1276844' class='answer   answerof-326411 ' value='1276844'   \/><label for='answer-id-1276844' id='answer-label-1276844' class=' answer'><span>At public hot-spots in which many clients use diverse applications<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326411[]' id='answer-id-1276845' class='answer   answerof-326411 ' value='1276845'   \/><label for='answer-id-1276845' id='answer-label-1276845' class=' answer'><span>In corporate Voice over Wi-Fi networks with push-to-talk multicast capabilities<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326411[]' id='answer-id-1276846' class='answer   answerof-326411 ' value='1276846'   \/><label for='answer-id-1276846' id='answer-label-1276846' class=' answer'><span>In university environments using multicast video training sourced from professor's laptops<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-3' style=';'><div id='questionWrap-3'  class='   watupro-question-id-326412'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>3. <\/span>What are some of the purposes of the 4-Way Handshake? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_3' value='326412' \/><input type='hidden' id='answerType326412' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326412[]' id='answer-id-1276847' class='answer   answerof-326412 ' value='1276847'   \/><label for='answer-id-1276847' id='answer-label-1276847' class=' answer'><span>Transfer the GTK to the supplicant.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326412[]' id='answer-id-1276848' class='answer   answerof-326412 ' value='1276848'   \/><label for='answer-id-1276848' id='answer-label-1276848' class=' answer'><span>Derive a PTK from the PM<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326412[]' id='answer-id-1276849' class='answer   answerof-326412 ' value='1276849'   \/><label for='answer-id-1276849' id='answer-label-1276849' class=' answer'><span>Transfer the GMK to the supplicant.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326412[]' id='answer-id-1276850' class='answer   answerof-326412 ' value='1276850'   \/><label for='answer-id-1276850' id='answer-label-1276850' class=' answer'><span>Confirm cipher suites.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-4' style=';'><div id='questionWrap-4'  class='   watupro-question-id-326413'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>4. <\/span>What kind of remote actions can an MDM administrator send to the mobile device over the Internet?<\/div><input type='hidden' name='question_id[]' id='qID_4' value='326413' \/><input type='hidden' id='answerType326413' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326413[]' id='answer-id-1276851' class='answer   answerof-326413 ' value='1276851'   \/><label for='answer-id-1276851' id='answer-label-1276851' class=' answer'><span>Configuration changes<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326413[]' id='answer-id-1276852' class='answer   answerof-326413 ' value='1276852'   \/><label for='answer-id-1276852' id='answer-label-1276852' class=' answer'><span>Restrictions changes<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326413[]' id='answer-id-1276853' class='answer   answerof-326413 ' value='1276853'   \/><label for='answer-id-1276853' id='answer-label-1276853' class=' answer'><span>Locking the device<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326413[]' id='answer-id-1276854' class='answer   answerof-326413 ' value='1276854'   \/><label for='answer-id-1276854' id='answer-label-1276854' class=' answer'><span>Wiping the device<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326413[]' id='answer-id-1276855' class='answer   answerof-326413 ' value='1276855'   \/><label for='answer-id-1276855' id='answer-label-1276855' class=' answer'><span>Application changes<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326413[]' id='answer-id-1276856' class='answer   answerof-326413 ' value='1276856'   \/><label for='answer-id-1276856' id='answer-label-1276856' class=' answer'><span>All of the above<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-5' style=';'><div id='questionWrap-5'  class='   watupro-question-id-326414'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>5. <\/span>Given: You must implement 7 APs for a branch office location in your organization. All APs will be autonomous and provide the same two SSIDs (CORP1879 and Guest). <br \/>\r<br>Because each AP is managed directly through a web-based interface, what must be changed on every AP before enabling the WLANs to ensure proper staging procedures are followed?<\/div><input type='hidden' name='question_id[]' id='qID_5' value='326414' \/><input type='hidden' id='answerType326414' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326414[]' id='answer-id-1276857' class='answer   answerof-326414 ' value='1276857'   \/><label for='answer-id-1276857' id='answer-label-1276857' class=' answer'><span>Fragmentation threshold<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326414[]' id='answer-id-1276858' class='answer   answerof-326414 ' value='1276858'   \/><label for='answer-id-1276858' id='answer-label-1276858' class=' answer'><span>Administrative password<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326414[]' id='answer-id-1276859' class='answer   answerof-326414 ' value='1276859'   \/><label for='answer-id-1276859' id='answer-label-1276859' class=' answer'><span>Output power<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326414[]' id='answer-id-1276860' class='answer   answerof-326414 ' value='1276860'   \/><label for='answer-id-1276860' id='answer-label-1276860' class=' answer'><span>Cell radius<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-6' style=';'><div id='questionWrap-6'  class='   watupro-question-id-326415'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>6. <\/span>When using the 802.1X\/EAP framework for authentication in 802.11 WLANs, why is the 802.1X Controlled Port still blocked after the 802.1X\/EAP framework has completed successfully?<\/div><input type='hidden' name='question_id[]' id='qID_6' value='326415' \/><input type='hidden' id='answerType326415' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326415[]' id='answer-id-1276861' class='answer   answerof-326415 ' value='1276861'   \/><label for='answer-id-1276861' id='answer-label-1276861' class=' answer'><span>The 802.1X Controlled Port is always blocked, but the Uncontrolled Port opens after the EAP authentication process completes.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326415[]' id='answer-id-1276862' class='answer   answerof-326415 ' value='1276862'   \/><label for='answer-id-1276862' id='answer-label-1276862' class=' answer'><span>The 802.1X Controlled Port remains blocked until an IP address is requested and accepted by the Supplicant.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326415[]' id='answer-id-1276863' class='answer   answerof-326415 ' value='1276863'   \/><label for='answer-id-1276863' id='answer-label-1276863' class=' answer'><span>The 4-Way Handshake must be performed before the 802.1X Controlled Port changes to the unblocked state.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326415[]' id='answer-id-1276864' class='answer   answerof-326415 ' value='1276864'   \/><label for='answer-id-1276864' id='answer-label-1276864' class=' answer'><span>The 802.1X Controlled Port is blocked until Vender Specific Attributes (VSAs) are exchanged inside a RADIUS packet between the Authenticator and Authentication Server.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-7' style=';'><div id='questionWrap-7'  class='   watupro-question-id-326416'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>7. <\/span>As an auditor you have been asked to determine if the WLAN access points and client devices have been configured with the proper encryption. <br \/>\r<br>What should you use to answer this question for your customer? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_7' value='326416' \/><input type='hidden' id='answerType326416' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326416[]' id='answer-id-1276865' class='answer   answerof-326416 ' value='1276865'   \/><label for='answer-id-1276865' id='answer-label-1276865' class=' answer'><span>Written corporate security policy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326416[]' id='answer-id-1276866' class='answer   answerof-326416 ' value='1276866'   \/><label for='answer-id-1276866' id='answer-label-1276866' class=' answer'><span>WLAN protocol analyzer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326416[]' id='answer-id-1276867' class='answer   answerof-326416 ' value='1276867'   \/><label for='answer-id-1276867' id='answer-label-1276867' class=' answer'><span>Aircrack-ng<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326416[]' id='answer-id-1276868' class='answer   answerof-326416 ' value='1276868'   \/><label for='answer-id-1276868' id='answer-label-1276868' class=' answer'><span>coWPAtty<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326416[]' id='answer-id-1276869' class='answer   answerof-326416 ' value='1276869'   \/><label for='answer-id-1276869' id='answer-label-1276869' class=' answer'><span>Asleap<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-8' style=';'><div id='questionWrap-8'  class='   watupro-question-id-326417'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>8. <\/span>Which RADIUS packets can be sent from a RADIUS server to an access point when 802.1X\/EAP is the deployed WLAN security solution? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_8' value='326417' \/><input type='hidden' id='answerType326417' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326417[]' id='answer-id-1276870' class='answer   answerof-326417 ' value='1276870'   \/><label for='answer-id-1276870' id='answer-label-1276870' class=' answer'><span>RADIUS Access-Request<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326417[]' id='answer-id-1276871' class='answer   answerof-326417 ' value='1276871'   \/><label for='answer-id-1276871' id='answer-label-1276871' class=' answer'><span>RADIUS Access-Challenge<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326417[]' id='answer-id-1276872' class='answer   answerof-326417 ' value='1276872'   \/><label for='answer-id-1276872' id='answer-label-1276872' class=' answer'><span>RADIUS Access-Accept<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326417[]' id='answer-id-1276873' class='answer   answerof-326417 ' value='1276873'   \/><label for='answer-id-1276873' id='answer-label-1276873' class=' answer'><span>RADIUS Access-Reject<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-9' style=';'><div id='questionWrap-9'  class='   watupro-question-id-326418'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>9. <\/span>What can happen when an intruder compromises the preshared key used during WPA\/WPA2-Personal authentication? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_9' value='326418' \/><input type='hidden' id='answerType326418' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326418[]' id='answer-id-1276874' class='answer   answerof-326418 ' value='1276874'   \/><label for='answer-id-1276874' id='answer-label-1276874' class=' answer'><span>Decryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326418[]' id='answer-id-1276875' class='answer   answerof-326418 ' value='1276875'   \/><label for='answer-id-1276875' id='answer-label-1276875' class=' answer'><span>Eavesdropping<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326418[]' id='answer-id-1276876' class='answer   answerof-326418 ' value='1276876'   \/><label for='answer-id-1276876' id='answer-label-1276876' class=' answer'><span>Spoofing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326418[]' id='answer-id-1276877' class='answer   answerof-326418 ' value='1276877'   \/><label for='answer-id-1276877' id='answer-label-1276877' class=' answer'><span>Encryption cracking<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326418[]' id='answer-id-1276878' class='answer   answerof-326418 ' value='1276878'   \/><label for='answer-id-1276878' id='answer-label-1276878' class=' answer'><span>Access to network resources<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-10' style=';'><div id='questionWrap-10'  class='   watupro-question-id-326419'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>10. <\/span>What are some of the advantages of using SAE authentication over PSK authentication? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_10' value='326419' \/><input type='hidden' id='answerType326419' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326419[]' id='answer-id-1276879' class='answer   answerof-326419 ' value='1276879'   \/><label for='answer-id-1276879' id='answer-label-1276879' class=' answer'><span>Protects against brute-force dictionary attacks.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326419[]' id='answer-id-1276880' class='answer   answerof-326419 ' value='1276880'   \/><label for='answer-id-1276880' id='answer-label-1276880' class=' answer'><span>Protects against forgery and replay attacks.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326419[]' id='answer-id-1276881' class='answer   answerof-326419 ' value='1276881'   \/><label for='answer-id-1276881' id='answer-label-1276881' class=' answer'><span>Protects against rogue APs and clients.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326419[]' id='answer-id-1276882' class='answer   answerof-326419 ' value='1276882'   \/><label for='answer-id-1276882' id='answer-label-1276882' class=' answer'><span>PMKs cannot be compromised or regenerated.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326419[]' id='answer-id-1276883' class='answer   answerof-326419 ' value='1276883'   \/><label for='answer-id-1276883' id='answer-label-1276883' class=' answer'><span>PMKs are no longer needed.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-11' style=';'><div id='questionWrap-11'  class='   watupro-question-id-326420'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>11. <\/span>What protocols allow a network administrator to securely manage the configuration of WLAN controllers and access points? (Choose 2)<\/div><input type='hidden' name='question_id[]' id='qID_11' value='326420' \/><input type='hidden' id='answerType326420' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326420[]' id='answer-id-1276884' class='answer   answerof-326420 ' value='1276884'   \/><label for='answer-id-1276884' id='answer-label-1276884' class=' answer'><span>SNMPv1<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326420[]' id='answer-id-1276885' class='answer   answerof-326420 ' value='1276885'   \/><label for='answer-id-1276885' id='answer-label-1276885' class=' answer'><span>HTTPS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326420[]' id='answer-id-1276886' class='answer   answerof-326420 ' value='1276886'   \/><label for='answer-id-1276886' id='answer-label-1276886' class=' answer'><span>Telnet<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326420[]' id='answer-id-1276887' class='answer   answerof-326420 ' value='1276887'   \/><label for='answer-id-1276887' id='answer-label-1276887' class=' answer'><span>TFTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326420[]' id='answer-id-1276888' class='answer   answerof-326420 ' value='1276888'   \/><label for='answer-id-1276888' id='answer-label-1276888' class=' answer'><span>FTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326420[]' id='answer-id-1276889' class='answer   answerof-326420 ' value='1276889'   \/><label for='answer-id-1276889' id='answer-label-1276889' class=' answer'><span>SSHv2<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-12' style=';'><div id='questionWrap-12'  class='   watupro-question-id-326421'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>12. <\/span>What field in the RSN information element (IE) will indicate whether PSK- or Enterprise-based WPA or WPA2 is in use?<\/div><input type='hidden' name='question_id[]' id='qID_12' value='326421' \/><input type='hidden' id='answerType326421' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326421[]' id='answer-id-1276890' class='answer   answerof-326421 ' value='1276890'   \/><label for='answer-id-1276890' id='answer-label-1276890' class=' answer'><span>AKM Suite List<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326421[]' id='answer-id-1276891' class='answer   answerof-326421 ' value='1276891'   \/><label for='answer-id-1276891' id='answer-label-1276891' class=' answer'><span>Group Cipher Suite<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326421[]' id='answer-id-1276892' class='answer   answerof-326421 ' value='1276892'   \/><label for='answer-id-1276892' id='answer-label-1276892' class=' answer'><span>RSN Capabilities<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326421[]' id='answer-id-1276893' class='answer   answerof-326421 ' value='1276893'   \/><label for='answer-id-1276893' id='answer-label-1276893' class=' answer'><span>Pairwise Cipher Suite List<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-13' style=';'><div id='questionWrap-13'  class='   watupro-question-id-326422'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>13. <\/span>Which management protocols are often used between a network management server (NMS) and remote access points for the purpose of monitoring a WLAN? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_13' value='326422' \/><input type='hidden' id='answerType326422' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326422[]' id='answer-id-1276894' class='answer   answerof-326422 ' value='1276894'   \/><label for='answer-id-1276894' id='answer-label-1276894' class=' answer'><span>IPsec<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326422[]' id='answer-id-1276895' class='answer   answerof-326422 ' value='1276895'   \/><label for='answer-id-1276895' id='answer-label-1276895' class=' answer'><span>GRE<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326422[]' id='answer-id-1276896' class='answer   answerof-326422 ' value='1276896'   \/><label for='answer-id-1276896' id='answer-label-1276896' class=' answer'><span>CAPWAP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326422[]' id='answer-id-1276897' class='answer   answerof-326422 ' value='1276897'   \/><label for='answer-id-1276897' id='answer-label-1276897' class=' answer'><span>DTLS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326422[]' id='answer-id-1276898' class='answer   answerof-326422 ' value='1276898'   \/><label for='answer-id-1276898' id='answer-label-1276898' class=' answer'><span>SNMP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-14' style=';'><div id='questionWrap-14'  class='   watupro-question-id-326423'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>14. <\/span>What would be the intended purpose of simulating Layer 2 deauthentication attacks as part of a WLAN audit?<\/div><input type='hidden' name='question_id[]' id='qID_14' value='326423' \/><input type='hidden' id='answerType326423' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326423[]' id='answer-id-1276899' class='answer   answerof-326423 ' value='1276899'   \/><label for='answer-id-1276899' id='answer-label-1276899' class=' answer'><span>Audit Layer 1<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326423[]' id='answer-id-1276900' class='answer   answerof-326423 ' value='1276900'   \/><label for='answer-id-1276900' id='answer-label-1276900' class=' answer'><span>Audit Layer 2<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326423[]' id='answer-id-1276901' class='answer   answerof-326423 ' value='1276901'   \/><label for='answer-id-1276901' id='answer-label-1276901' class=' answer'><span>Audit the wired infrastructure<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326423[]' id='answer-id-1276902' class='answer   answerof-326423 ' value='1276902'   \/><label for='answer-id-1276902' id='answer-label-1276902' class=' answer'><span>Audit the WIPS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-15' style=';'><div id='questionWrap-15'  class='   watupro-question-id-326424'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>15. <\/span>The science of concealing plaintext and then revealing it is known as ___________, and the science of decrypting the ciphertext without knowledge of the key or cipher is known as ____________.<\/div><input type='hidden' name='question_id[]' id='qID_15' value='326424' \/><input type='hidden' id='answerType326424' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326424[]' id='answer-id-1276903' class='answer   answerof-326424 ' value='1276903'   \/><label for='answer-id-1276903' id='answer-label-1276903' class=' answer'><span>encryption, decryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326424[]' id='answer-id-1276904' class='answer   answerof-326424 ' value='1276904'   \/><label for='answer-id-1276904' id='answer-label-1276904' class=' answer'><span>cryptanalysis, cryptology<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326424[]' id='answer-id-1276905' class='answer   answerof-326424 ' value='1276905'   \/><label for='answer-id-1276905' id='answer-label-1276905' class=' answer'><span>cryptology, cryptanalysis<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326424[]' id='answer-id-1276906' class='answer   answerof-326424 ' value='1276906'   \/><label for='answer-id-1276906' id='answer-label-1276906' class=' answer'><span>cryptography, cryptanalysis<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326424[]' id='answer-id-1276907' class='answer   answerof-326424 ' value='1276907'   \/><label for='answer-id-1276907' id='answer-label-1276907' class=' answer'><span>cryptography, steganography<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-16' style=';'><div id='questionWrap-16'  class='   watupro-question-id-326425'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>16. <\/span>Wireless Intrusion Prevention Systems (WIPS) provide what network security services? (Choose 2)<\/div><input type='hidden' name='question_id[]' id='qID_16' value='326425' \/><input type='hidden' id='answerType326425' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326425[]' id='answer-id-1276908' class='answer   answerof-326425 ' value='1276908'   \/><label for='answer-id-1276908' id='answer-label-1276908' class=' answer'><span>Configuration distribution for autonomous APs<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326425[]' id='answer-id-1276909' class='answer   answerof-326425 ' value='1276909'   \/><label for='answer-id-1276909' id='answer-label-1276909' class=' answer'><span>Wireless vulnerability assessment<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326425[]' id='answer-id-1276910' class='answer   answerof-326425 ' value='1276910'   \/><label for='answer-id-1276910' id='answer-label-1276910' class=' answer'><span>Application-layer traffic inspection<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326425[]' id='answer-id-1276911' class='answer   answerof-326425 ' value='1276911'   \/><label for='answer-id-1276911' id='answer-label-1276911' class=' answer'><span>Analysis and reporting of AP CPU utilization<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326425[]' id='answer-id-1276912' class='answer   answerof-326425 ' value='1276912'   \/><label for='answer-id-1276912' id='answer-label-1276912' class=' answer'><span>Policy enforcement and compliance management<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-17' style=';'><div id='questionWrap-17'  class='   watupro-question-id-326426'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>17. <\/span>3DES has effective key sizes of how many bits? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_17' value='326426' \/><input type='hidden' id='answerType326426' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326426[]' id='answer-id-1276913' class='answer   answerof-326426 ' value='1276913'   \/><label for='answer-id-1276913' id='answer-label-1276913' class=' answer'><span>56<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326426[]' id='answer-id-1276914' class='answer   answerof-326426 ' value='1276914'   \/><label for='answer-id-1276914' id='answer-label-1276914' class=' answer'><span>64<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326426[]' id='answer-id-1276915' class='answer   answerof-326426 ' value='1276915'   \/><label for='answer-id-1276915' id='answer-label-1276915' class=' answer'><span>112<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326426[]' id='answer-id-1276916' class='answer   answerof-326426 ' value='1276916'   \/><label for='answer-id-1276916' id='answer-label-1276916' class=' answer'><span>128<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326426[]' id='answer-id-1276917' class='answer   answerof-326426 ' value='1276917'   \/><label for='answer-id-1276917' id='answer-label-1276917' class=' answer'><span>168<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326426[]' id='answer-id-1276918' class='answer   answerof-326426 ' value='1276918'   \/><label for='answer-id-1276918' id='answer-label-1276918' class=' answer'><span>192<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-18' style=';'><div id='questionWrap-18'  class='   watupro-question-id-326427'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>18. <\/span>What inputs are used by passphrase-PSK mapping to create a final 256-bit PSK during 802.11 PSK authentication? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_18' value='326427' \/><input type='hidden' id='answerType326427' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326427[]' id='answer-id-1276919' class='answer   answerof-326427 ' value='1276919'   \/><label for='answer-id-1276919' id='answer-label-1276919' class=' answer'><span>BSSID<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326427[]' id='answer-id-1276920' class='answer   answerof-326427 ' value='1276920'   \/><label for='answer-id-1276920' id='answer-label-1276920' class=' answer'><span>SNonce<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326427[]' id='answer-id-1276921' class='answer   answerof-326427 ' value='1276921'   \/><label for='answer-id-1276921' id='answer-label-1276921' class=' answer'><span>SSID<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326427[]' id='answer-id-1276922' class='answer   answerof-326427 ' value='1276922'   \/><label for='answer-id-1276922' id='answer-label-1276922' class=' answer'><span>Client MAC address<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326427[]' id='answer-id-1276923' class='answer   answerof-326427 ' value='1276923'   \/><label for='answer-id-1276923' id='answer-label-1276923' class=' answer'><span>AP MAC address<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326427[]' id='answer-id-1276924' class='answer   answerof-326427 ' value='1276924'   \/><label for='answer-id-1276924' id='answer-label-1276924' class=' answer'><span>Passphrase<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326427[]' id='answer-id-1276925' class='answer   answerof-326427 ' value='1276925'   \/><label for='answer-id-1276925' id='answer-label-1276925' class=' answer'><span>ANonce<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-19' style=';'><div id='questionWrap-19'  class='   watupro-question-id-326428'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>19. <\/span>A WIDS\/WIPS consists of which of the following components? (Choose two.)<\/div><input type='hidden' name='question_id[]' id='qID_19' value='326428' \/><input type='hidden' id='answerType326428' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326428[]' id='answer-id-1276926' class='answer   answerof-326428 ' value='1276926'   \/><label for='answer-id-1276926' id='answer-label-1276926' class=' answer'><span>WIDS\/WIPS server<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326428[]' id='answer-id-1276927' class='answer   answerof-326428 ' value='1276927'   \/><label for='answer-id-1276927' id='answer-label-1276927' class=' answer'><span>Midspan injector<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326428[]' id='answer-id-1276928' class='answer   answerof-326428 ' value='1276928'   \/><label for='answer-id-1276928' id='answer-label-1276928' class=' answer'><span>Sensors<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326428[]' id='answer-id-1276929' class='answer   answerof-326428 ' value='1276929'   \/><label for='answer-id-1276929' id='answer-label-1276929' class=' answer'><span>MDM server<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326428[]' id='answer-id-1276930' class='answer   answerof-326428 ' value='1276930'   \/><label for='answer-id-1276930' id='answer-label-1276930' class=' answer'><span>SNMP server<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-20' style=';'><div id='questionWrap-20'  class='   watupro-question-id-326429'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>20. <\/span>Which encryption types can be used to encrypt and decrypt unicast traffic with the pairwise transient key (PTK) that is generated from a 4-Way Handshake? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_20' value='326429' \/><input type='hidden' id='answerType326429' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326429[]' id='answer-id-1276931' class='answer   answerof-326429 ' value='1276931'   \/><label for='answer-id-1276931' id='answer-label-1276931' class=' answer'><span>Temporal Key Integrity Protocol<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326429[]' id='answer-id-1276932' class='answer   answerof-326429 ' value='1276932'   \/><label for='answer-id-1276932' id='answer-label-1276932' class=' answer'><span>3-DES<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326429[]' id='answer-id-1276933' class='answer   answerof-326429 ' value='1276933'   \/><label for='answer-id-1276933' id='answer-label-1276933' class=' answer'><span>Dynamic WEP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326429[]' id='answer-id-1276934' class='answer   answerof-326429 ' value='1276934'   \/><label for='answer-id-1276934' id='answer-label-1276934' class=' answer'><span>CCMP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326429[]' id='answer-id-1276935' class='answer   answerof-326429 ' value='1276935'   \/><label for='answer-id-1276935' id='answer-label-1276935' class=' answer'><span>Proprietary encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326429[]' id='answer-id-1276936' class='answer   answerof-326429 ' value='1276936'   \/><label for='answer-id-1276936' id='answer-label-1276936' class=' answer'><span>Static WEP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-21' style=';'><div id='questionWrap-21'  class='   watupro-question-id-326430'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>21. <\/span>What is some of the proper documentation needed prior to the WLAN security audit?<\/div><input type='hidden' name='question_id[]' id='qID_21' value='326430' \/><input type='hidden' id='answerType326430' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326430[]' id='answer-id-1276937' class='answer   answerof-326430 ' value='1276937'   \/><label for='answer-id-1276937' id='answer-label-1276937' class=' answer'><span>Statement of work<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326430[]' id='answer-id-1276938' class='answer   answerof-326430 ' value='1276938'   \/><label for='answer-id-1276938' id='answer-label-1276938' class=' answer'><span>Liability waiver<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326430[]' id='answer-id-1276939' class='answer   answerof-326430 ' value='1276939'   \/><label for='answer-id-1276939' id='answer-label-1276939' class=' answer'><span>Nondisclosure agreement<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326430[]' id='answer-id-1276940' class='answer   answerof-326430 ' value='1276940'   \/><label for='answer-id-1276940' id='answer-label-1276940' class=' answer'><span>All of the above<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-22' style=';'><div id='questionWrap-22'  class='   watupro-question-id-326431'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>22. <\/span>What must occur in order for dynamic TKIP\/ARC4 or CCMP\/AES encryption keys to be generated? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_22' value='326431' \/><input type='hidden' id='answerType326431' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326431[]' id='answer-id-1276941' class='answer   answerof-326431 ' value='1276941'   \/><label for='answer-id-1276941' id='answer-label-1276941' class=' answer'><span>Shared Key authentication and 4-Way Handshake<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326431[]' id='answer-id-1276942' class='answer   answerof-326431 ' value='1276942'   \/><label for='answer-id-1276942' id='answer-label-1276942' class=' answer'><span>802.1X\/EAP authentication and 4-Way Handshake<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326431[]' id='answer-id-1276943' class='answer   answerof-326431 ' value='1276943'   \/><label for='answer-id-1276943' id='answer-label-1276943' class=' answer'><span>Open System authentication and 4-Way Handshake<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326431[]' id='answer-id-1276944' class='answer   answerof-326431 ' value='1276944'   \/><label for='answer-id-1276944' id='answer-label-1276944' class=' answer'><span>PSK authentication and 4-Way Handshake<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-23' style=';'><div id='questionWrap-23'  class='   watupro-question-id-326432'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>23. <\/span>What statement accurately describes the functionality of the IEEE 802.1X standard?<\/div><input type='hidden' name='question_id[]' id='qID_23' value='326432' \/><input type='hidden' id='answerType326432' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326432[]' id='answer-id-1276945' class='answer   answerof-326432 ' value='1276945'   \/><label for='answer-id-1276945' id='answer-label-1276945' class=' answer'><span>Port-based access control with EAP encapsulation over the LAN (EAPoL)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326432[]' id='answer-id-1276946' class='answer   answerof-326432 ' value='1276946'   \/><label for='answer-id-1276946' id='answer-label-1276946' class=' answer'><span>Port-based access control with dynamic encryption key management and distribution<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326432[]' id='answer-id-1276947' class='answer   answerof-326432 ' value='1276947'   \/><label for='answer-id-1276947' id='answer-label-1276947' class=' answer'><span>Port-based access control with support for authenticated-user VLANs only<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326432[]' id='answer-id-1276948' class='answer   answerof-326432 ' value='1276948'   \/><label for='answer-id-1276948' id='answer-label-1276948' class=' answer'><span>Port-based access control with mandatory support of AES-CCMP encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326432[]' id='answer-id-1276949' class='answer   answerof-326432 ' value='1276949'   \/><label for='answer-id-1276949' id='answer-label-1276949' class=' answer'><span>Port-based access control, which allows three frame types to traverse the uncontrolled port: EAP, DHCP, and DN<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-24' style=';'><div id='questionWrap-24'  class='   watupro-question-id-326433'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>24. <\/span>Which of these types of EAP require a server-side certificate to create an encrypted TLS tunnel?<\/div><input type='hidden' name='question_id[]' id='qID_24' value='326433' \/><input type='hidden' id='answerType326433' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326433[]' id='answer-id-1276950' class='answer   answerof-326433 ' value='1276950'   \/><label for='answer-id-1276950' id='answer-label-1276950' class=' answer'><span>EAP-TTLS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326433[]' id='answer-id-1276951' class='answer   answerof-326433 ' value='1276951'   \/><label for='answer-id-1276951' id='answer-label-1276951' class=' answer'><span>EAP-PEAPv0 (EAP-MSCHAPv2)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326433[]' id='answer-id-1276952' class='answer   answerof-326433 ' value='1276952'   \/><label for='answer-id-1276952' id='answer-label-1276952' class=' answer'><span>EAP-PEAPv0 (EAP-TLS)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326433[]' id='answer-id-1276953' class='answer   answerof-326433 ' value='1276953'   \/><label for='answer-id-1276953' id='answer-label-1276953' class=' answer'><span>EAP-FAST<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326433[]' id='answer-id-1276954' class='answer   answerof-326433 ' value='1276954'   \/><label for='answer-id-1276954' id='answer-label-1276954' class=' answer'><span>EAP-PEAPv1 (EAP-GTC)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326433[]' id='answer-id-1276955' class='answer   answerof-326433 ' value='1276955'   \/><label for='answer-id-1276955' id='answer-label-1276955' class=' answer'><span>EAP-LEAP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-25' style=';'><div id='questionWrap-25'  class='   watupro-question-id-326434'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>25. <\/span>To calculate the capability Jeff should have on the network, which of the following can the NAC server use to initially identify and set his permission? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_25' value='326434' \/><input type='hidden' id='answerType326434' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326434[]' id='answer-id-1276956' class='answer   answerof-326434 ' value='1276956'   \/><label for='answer-id-1276956' id='answer-label-1276956' class=' answer'><span>Posture<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326434[]' id='answer-id-1276957' class='answer   answerof-326434 ' value='1276957'   \/><label for='answer-id-1276957' id='answer-label-1276957' class=' answer'><span>DHCP fingerprinting<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326434[]' id='answer-id-1276958' class='answer   answerof-326434 ' value='1276958'   \/><label for='answer-id-1276958' id='answer-label-1276958' class=' answer'><span>RADIUS attributes<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326434[]' id='answer-id-1276959' class='answer   answerof-326434 ' value='1276959'   \/><label for='answer-id-1276959' id='answer-label-1276959' class=' answer'><span>RADIUS CoA<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326434[]' id='answer-id-1276960' class='answer   answerof-326434 ' value='1276960'   \/><label for='answer-id-1276960' id='answer-label-1276960' class=' answer'><span>MDM profiles<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-26' style=';'><div id='questionWrap-26'  class='   watupro-question-id-326435'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>26. <\/span>Which of these attacks are wireless users susceptible to at a public-access hotspot? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_26' value='326435' \/><input type='hidden' id='answerType326435' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326435[]' id='answer-id-1276961' class='answer   answerof-326435 ' value='1276961'   \/><label for='answer-id-1276961' id='answer-label-1276961' class=' answer'><span>Wi-Fi phishing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326435[]' id='answer-id-1276962' class='answer   answerof-326435 ' value='1276962'   \/><label for='answer-id-1276962' id='answer-label-1276962' class=' answer'><span>Happy AP attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326435[]' id='answer-id-1276963' class='answer   answerof-326435 ' value='1276963'   \/><label for='answer-id-1276963' id='answer-label-1276963' class=' answer'><span>Peer-to-peer attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326435[]' id='answer-id-1276964' class='answer   answerof-326435 ' value='1276964'   \/><label for='answer-id-1276964' id='answer-label-1276964' class=' answer'><span>Malicious eavesdropping<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326435[]' id='answer-id-1276965' class='answer   answerof-326435 ' value='1276965'   \/><label for='answer-id-1276965' id='answer-label-1276965' class=' answer'><span>802.11 reverse ARP attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326435[]' id='answer-id-1276966' class='answer   answerof-326435 ' value='1276966'   \/><label for='answer-id-1276966' id='answer-label-1276966' class=' answer'><span>Man-in-the-middle<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326435[]' id='answer-id-1276967' class='answer   answerof-326435 ' value='1276967'   \/><label for='answer-id-1276967' id='answer-label-1276967' class=' answer'><span>Wireless hijacking<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-27' style=';'><div id='questionWrap-27'  class='   watupro-question-id-326436'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>27. <\/span>For an 802.1X\/EAP solution to work properly with a WLAN, which two components must both support the same type of encryption?<\/div><input type='hidden' name='question_id[]' id='qID_27' value='326436' \/><input type='hidden' id='answerType326436' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326436[]' id='answer-id-1276968' class='answer   answerof-326436 ' value='1276968'   \/><label for='answer-id-1276968' id='answer-label-1276968' class=' answer'><span>Supplicant and authenticator<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326436[]' id='answer-id-1276969' class='answer   answerof-326436 ' value='1276969'   \/><label for='answer-id-1276969' id='answer-label-1276969' class=' answer'><span>Authorizer and authenticator<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326436[]' id='answer-id-1276970' class='answer   answerof-326436 ' value='1276970'   \/><label for='answer-id-1276970' id='answer-label-1276970' class=' answer'><span>Authenticator and authentication server<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326436[]' id='answer-id-1276971' class='answer   answerof-326436 ' value='1276971'   \/><label for='answer-id-1276971' id='answer-label-1276971' class=' answer'><span>Supplicant and authentication server<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-28' style=';'><div id='questionWrap-28'  class='   watupro-question-id-326437'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>28. <\/span>When an attacker passively captures and examines wireless frames from a victim\u2019s network, what type of attack is taking place?<\/div><input type='hidden' name='question_id[]' id='qID_28' value='326437' \/><input type='hidden' id='answerType326437' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326437[]' id='answer-id-1276972' class='answer   answerof-326437 ' value='1276972'   \/><label for='answer-id-1276972' id='answer-label-1276972' class=' answer'><span>Injection<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326437[]' id='answer-id-1276973' class='answer   answerof-326437 ' value='1276973'   \/><label for='answer-id-1276973' id='answer-label-1276973' class=' answer'><span>Data destruction<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326437[]' id='answer-id-1276974' class='answer   answerof-326437 ' value='1276974'   \/><label for='answer-id-1276974' id='answer-label-1276974' class=' answer'><span>Frame manipulation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326437[]' id='answer-id-1276975' class='answer   answerof-326437 ' value='1276975'   \/><label for='answer-id-1276975' id='answer-label-1276975' class=' answer'><span>Man in the middle<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326437[]' id='answer-id-1276976' class='answer   answerof-326437 ' value='1276976'   \/><label for='answer-id-1276976' id='answer-label-1276976' class=' answer'><span>Eavesdropping<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-29' style=';'><div id='questionWrap-29'  class='   watupro-question-id-326438'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>29. <\/span>Wired leakage occurs under which of the following circumstances?<\/div><input type='hidden' name='question_id[]' id='qID_29' value='326438' \/><input type='hidden' id='answerType326438' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326438[]' id='answer-id-1276977' class='answer   answerof-326438 ' value='1276977'   \/><label for='answer-id-1276977' id='answer-label-1276977' class=' answer'><span>When weak wireless encryption is used<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326438[]' id='answer-id-1276978' class='answer   answerof-326438 ' value='1276978'   \/><label for='answer-id-1276978' id='answer-label-1276978' class=' answer'><span>When weak wireless authentication is used<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326438[]' id='answer-id-1276979' class='answer   answerof-326438 ' value='1276979'   \/><label for='answer-id-1276979' id='answer-label-1276979' class=' answer'><span>When wired broadcast traffic is passed through an AP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326438[]' id='answer-id-1276980' class='answer   answerof-326438 ' value='1276980'   \/><label for='answer-id-1276980' id='answer-label-1276980' class=' answer'><span>When wired unicast traffic is passed through an AP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326438[]' id='answer-id-1276981' class='answer   answerof-326438 ' value='1276981'   \/><label for='answer-id-1276981' id='answer-label-1276981' class=' answer'><span>When the protection mode is disabled on an AP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-30' style=';'><div id='questionWrap-30'  class='   watupro-question-id-326439'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>30. <\/span>These qualifications for interoperability are usually based on key components and functions that are defined in the IEEE 802.11-2012 standard and various 802.11 amendments.<\/div><input type='hidden' name='question_id[]' id='qID_30' value='326439' \/><input type='hidden' id='answerType326439' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326439[]' id='answer-id-1276982' class='answer   answerof-326439 ' value='1276982'   \/><label for='answer-id-1276982' id='answer-label-1276982' class=' answer'><span>Request for Comments<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326439[]' id='answer-id-1276983' class='answer   answerof-326439 ' value='1276983'   \/><label for='answer-id-1276983' id='answer-label-1276983' class=' answer'><span>Wi-Fi Alliance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326439[]' id='answer-id-1276984' class='answer   answerof-326439 ' value='1276984'   \/><label for='answer-id-1276984' id='answer-label-1276984' class=' answer'><span>Federal Information Processing Standards<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326439[]' id='answer-id-1276985' class='answer   answerof-326439 ' value='1276985'   \/><label for='answer-id-1276985' id='answer-label-1276985' class=' answer'><span>Internet Engineering Task Force<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326439[]' id='answer-id-1276986' class='answer   answerof-326439 ' value='1276986'   \/><label for='answer-id-1276986' id='answer-label-1276986' class=' answer'><span>Wi-Fi CERTIFIED<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-31' style=';'><div id='questionWrap-31'  class='   watupro-question-id-326440'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>31. <\/span>CCMP is an acronym made up of multiple components. <br \/>\r<br>Which of the following is an expanded version of this acronym? (Choose all that apply)<\/div><input type='hidden' name='question_id[]' id='qID_31' value='326440' \/><input type='hidden' id='answerType326440' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326440[]' id='answer-id-1276987' class='answer   answerof-326440 ' value='1276987'   \/><label for='answer-id-1276987' id='answer-label-1276987' class=' answer'><span>Counter Mode with Cipher-Block Chaining Message Authentication Code Protocol<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326440[]' id='answer-id-1276988' class='answer   answerof-326440 ' value='1276988'   \/><label for='answer-id-1276988' id='answer-label-1276988' class=' answer'><span>Counter Message with Cipher-Block Chaining Mode Authentication Code Protocol<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326440[]' id='answer-id-1276989' class='answer   answerof-326440 ' value='1276989'   \/><label for='answer-id-1276989' id='answer-label-1276989' class=' answer'><span>CTR with CBC-MAC Protocol<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326440[]' id='answer-id-1276990' class='answer   answerof-326440 ' value='1276990'   \/><label for='answer-id-1276990' id='answer-label-1276990' class=' answer'><span>Counter Mode with CBC-MAC Protocol<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326440[]' id='answer-id-1276991' class='answer   answerof-326440 ' value='1276991'   \/><label for='answer-id-1276991' id='answer-label-1276991' class=' answer'><span>None of these is accurate.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-32' style=';'><div id='questionWrap-32'  class='   watupro-question-id-326441'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>32. <\/span>Which RADIUS attribute is used to protect encapsulated EAP frames within RADIUS packets?<\/div><input type='hidden' name='question_id[]' id='qID_32' value='326441' \/><input type='hidden' id='answerType326441' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326441[]' id='answer-id-1276992' class='answer   answerof-326441 ' value='1276992'   \/><label for='answer-id-1276992' id='answer-label-1276992' class=' answer'><span>(11) Filter-Id<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326441[]' id='answer-id-1276993' class='answer   answerof-326441 ' value='1276993'   \/><label for='answer-id-1276993' id='answer-label-1276993' class=' answer'><span>(26) Vendor-Specific<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326441[]' id='answer-id-1276994' class='answer   answerof-326441 ' value='1276994'   \/><label for='answer-id-1276994' id='answer-label-1276994' class=' answer'><span>(40) Acct-Status-Type<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326441[]' id='answer-id-1276995' class='answer   answerof-326441 ' value='1276995'   \/><label for='answer-id-1276995' id='answer-label-1276995' class=' answer'><span>(79) EAP-Message<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326441[]' id='answer-id-1276996' class='answer   answerof-326441 ' value='1276996'   \/><label for='answer-id-1276996' id='answer-label-1276996' class=' answer'><span>(80) Message-Authenticator<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-33' style=';'><div id='questionWrap-33'  class='   watupro-question-id-326442'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>33. <\/span>Which of these security methods is being considered by the Wi-Fi Alliance as a replacement for PSK authentication?<\/div><input type='hidden' name='question_id[]' id='qID_33' value='326442' \/><input type='hidden' id='answerType326442' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326442[]' id='answer-id-1276997' class='answer   answerof-326442 ' value='1276997'   \/><label for='answer-id-1276997' id='answer-label-1276997' class=' answer'><span>Per-user\/per-device PSK<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326442[]' id='answer-id-1276998' class='answer   answerof-326442 ' value='1276998'   \/><label for='answer-id-1276998' id='answer-label-1276998' class=' answer'><span>Wi-Fi Protected Setup (WPS)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326442[]' id='answer-id-1276999' class='answer   answerof-326442 ' value='1276999'   \/><label for='answer-id-1276999' id='answer-label-1276999' class=' answer'><span>Simultaneous Authentication of Equals (SAE)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326442[]' id='answer-id-1277000' class='answer   answerof-326442 ' value='1277000'   \/><label for='answer-id-1277000' id='answer-label-1277000' class=' answer'><span>EAP-PSK<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326442[]' id='answer-id-1277001' class='answer   answerof-326442 ' value='1277001'   \/><label for='answer-id-1277001' id='answer-label-1277001' class=' answer'><span>WPA2 Personal<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-34' style=';'><div id='questionWrap-34'  class='   watupro-question-id-326443'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>34. <\/span>After consulting your written security policy, to meet the new demands of an industry standard with which your organization must be compliant, an administrator logs into your WLAN controller and changes the authentication and encryption configurations on all your APs. <br \/>\r<br>The help desk becomes overwhelmed with calls from angry users stating that they can no longer access the network. One by one, the users are reconfigured to reconnect to the network, causing significant loss of time. <br \/>\r<br>Which portion of a well-written security policy is most likely missing from your company\u2019s wireless security policy that caused this problem?<\/div><input type='hidden' name='question_id[]' id='qID_34' value='326443' \/><input type='hidden' id='answerType326443' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326443[]' id='answer-id-1277002' class='answer   answerof-326443 ' value='1277002'   \/><label for='answer-id-1277002' id='answer-label-1277002' class=' answer'><span>External influence compliance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326443[]' id='answer-id-1277003' class='answer   answerof-326443 ' value='1277003'   \/><label for='answer-id-1277003' id='answer-label-1277003' class=' answer'><span>Authentication requirements<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326443[]' id='answer-id-1277004' class='answer   answerof-326443 ' value='1277004'   \/><label for='answer-id-1277004' id='answer-label-1277004' class=' answer'><span>Encryption compliance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326443[]' id='answer-id-1277005' class='answer   answerof-326443 ' value='1277005'   \/><label for='answer-id-1277005' id='answer-label-1277005' class=' answer'><span>Change control process<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326443[]' id='answer-id-1277006' class='answer   answerof-326443 ' value='1277006'   \/><label for='answer-id-1277006' id='answer-label-1277006' class=' answer'><span>User notification process<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-35' style=';'><div id='questionWrap-35'  class='   watupro-question-id-326444'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>35. <\/span>168.80.5\/24 <br \/>\r<br>User VLANS: <br \/>\r<br>VLAN 201 <br \/>\r<br>VLAN 202 <br \/>\r<br>VLAN 203 <br \/>\r<br>SSIDs: <br \/>\r<br>SSID-1: (employee) security: (802.1X\/EAP\/CCMP) - VLAN 201 - BSSID (00:08:12:43:0F:30) <br \/>\r<br>SSID-2 (voice) security: (PSK\/TKIP and WEP) - VLAN 202 - BSSID (00:08:12:43:0F:31) <br \/>\r<br>SSID-3: (guest) security: (WEP) - VLAN 203 - BSSID (00:08:12:43:0F:32) <br \/>\r<br>Based on the settings on Bob\u2019s access point, what type of WLAN security exits within the coverage area of the AP? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_35' value='326444' \/><input type='hidden' id='answerType326444' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326444[]' id='answer-id-1277007' class='answer   answerof-326444 ' value='1277007'   \/><label for='answer-id-1277007' id='answer-label-1277007' class=' answer'><span>Closed security network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326444[]' id='answer-id-1277008' class='answer   answerof-326444 ' value='1277008'   \/><label for='answer-id-1277008' id='answer-label-1277008' class=' answer'><span>Transition security network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326444[]' id='answer-id-1277009' class='answer   answerof-326444 ' value='1277009'   \/><label for='answer-id-1277009' id='answer-label-1277009' class=' answer'><span>Pre-RSNA security network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326444[]' id='answer-id-1277010' class='answer   answerof-326444 ' value='1277010'   \/><label for='answer-id-1277010' id='answer-label-1277010' class=' answer'><span>Open security network<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326444[]' id='answer-id-1277011' class='answer   answerof-326444 ' value='1277011'   \/><label for='answer-id-1277011' id='answer-label-1277011' class=' answer'><span>Robust security network<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-36' style=';'><div id='questionWrap-36'  class='   watupro-question-id-326445'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>36. <\/span>802.11 pre-RSNA security defines which wireless security solution?<\/div><input type='hidden' name='question_id[]' id='qID_36' value='326445' \/><input type='hidden' id='answerType326445' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326445[]' id='answer-id-1277012' class='answer   answerof-326445 ' value='1277012'   \/><label for='answer-id-1277012' id='answer-label-1277012' class=' answer'><span>Dynamic WEP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326445[]' id='answer-id-1277013' class='answer   answerof-326445 ' value='1277013'   \/><label for='answer-id-1277013' id='answer-label-1277013' class=' answer'><span>802.1X\/EAP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326445[]' id='answer-id-1277014' class='answer   answerof-326445 ' value='1277014'   \/><label for='answer-id-1277014' id='answer-label-1277014' class=' answer'><span>128-bit static WEP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326445[]' id='answer-id-1277015' class='answer   answerof-326445 ' value='1277015'   \/><label for='answer-id-1277015' id='answer-label-1277015' class=' answer'><span>Temporal Key Integrity Protocol<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326445[]' id='answer-id-1277016' class='answer   answerof-326445 ' value='1277016'   \/><label for='answer-id-1277016' id='answer-label-1277016' class=' answer'><span>CCMP\/AES<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-37' style=';'><div id='questionWrap-37'  class='   watupro-question-id-326446'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>37. <\/span>Given: ABC Company has recently installed a WLAN controller and configured it to support WPA2-Enterprise security. <br \/>\r<br>The administrator has configured a security profile on the WLAN controller for each group within the company (Marketing, Sales, and Engineering). <br \/>\r<br>How are authenticated users assigned to groups so that they receive the correct security profile within the WLAN controller?<\/div><input type='hidden' name='question_id[]' id='qID_37' value='326446' \/><input type='hidden' id='answerType326446' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326446[]' id='answer-id-1277017' class='answer   answerof-326446 ' value='1277017'   \/><label for='answer-id-1277017' id='answer-label-1277017' class=' answer'><span>The WLAN controller polls the RADIUS server for a complete list of authenticated users and groups after each user authentication.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326446[]' id='answer-id-1277018' class='answer   answerof-326446 ' value='1277018'   \/><label for='answer-id-1277018' id='answer-label-1277018' class=' answer'><span>The RADIUS server sends a group name return list attribute to the WLAN controller during every successful user authentication.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326446[]' id='answer-id-1277019' class='answer   answerof-326446 ' value='1277019'   \/><label for='answer-id-1277019' id='answer-label-1277019' class=' answer'><span>The RADIUS server forwards the request for a group attribute to an LDAP database service, and LDAP sends the group attribute to the WLAN controller.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326446[]' id='answer-id-1277020' class='answer   answerof-326446 ' value='1277020'   \/><label for='answer-id-1277020' id='answer-label-1277020' class=' answer'><span>The RADIUS server sends the list of authenticated users and groups to the WLAN controller as part of a 4- Way Handshake prior to user authentication.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-38' style=';'><div id='questionWrap-38'  class='   watupro-question-id-326447'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>38. <\/span>After viewing the frame capture in the graphic shown here, identify which type of encryption method is being used. <br \/>\r<br><br><img decoding=\"async\" width=651 height=233 id=\"\u56fe\u7247 20\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/05\/image001-8.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_38' value='326447' \/><input type='hidden' id='answerType326447' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326447[]' id='answer-id-1277021' class='answer   answerof-326447 ' value='1277021'   \/><label for='answer-id-1277021' id='answer-label-1277021' class=' answer'><span>TKIP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326447[]' id='answer-id-1277022' class='answer   answerof-326447 ' value='1277022'   \/><label for='answer-id-1277022' id='answer-label-1277022' class=' answer'><span>CCMP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326447[]' id='answer-id-1277023' class='answer   answerof-326447 ' value='1277023'   \/><label for='answer-id-1277023' id='answer-label-1277023' class=' answer'><span>xSec<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326447[]' id='answer-id-1277024' class='answer   answerof-326447 ' value='1277024'   \/><label for='answer-id-1277024' id='answer-label-1277024' class=' answer'><span>Fortress<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326447[]' id='answer-id-1277025' class='answer   answerof-326447 ' value='1277025'   \/><label for='answer-id-1277025' id='answer-label-1277025' class=' answer'><span>WEP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326447[]' id='answer-id-1277026' class='answer   answerof-326447 ' value='1277026'   \/><label for='answer-id-1277026' id='answer-label-1277026' class=' answer'><span>AES<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-39' style=';'><div id='questionWrap-39'  class='   watupro-question-id-326448'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>39. <\/span>Given: In a security penetration exercise, a WLAN consultant obtains the WEP key of XYZ Corporation's wireless network. <br \/>\r<br>Demonstrating the vulnerabilities of using WEP, the consultant uses a laptop running a software AP in an attempt to hijack the authorized user's connections. XYZ's legacy network is using 802.11n APs with 802.11b, 11g, and 11n client devices. <br \/>\r<br>With this setup, how can the consultant cause all of the authorized clients to establish Layer 2 connectivity with the software access point?<\/div><input type='hidden' name='question_id[]' id='qID_39' value='326448' \/><input type='hidden' id='answerType326448' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326448[]' id='answer-id-1277027' class='answer   answerof-326448 ' value='1277027'   \/><label for='answer-id-1277027' id='answer-label-1277027' class=' answer'><span>All WLAN clients will reassociate to the consultant's software AP if the consultant's software AP provides the same SSID on any channel with a 10 dB SNR improvement over the authorized A<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326448[]' id='answer-id-1277028' class='answer   answerof-326448 ' value='1277028'   \/><label for='answer-id-1277028' id='answer-label-1277028' class=' answer'><span>A higher SSID priority value configured in the Beacon frames of the consultant's software AP will take priority over the SSID in the authorized AP, causing the clients to reassociate.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326448[]' id='answer-id-1277029' class='answer   answerof-326448 ' value='1277029'   \/><label for='answer-id-1277029' id='answer-label-1277029' class=' answer'><span>When the RF signal between the clients and the authorized AP is temporarily disrupted and the consultant's software AP is using the same SSID on a different channel than the authorized AP, the clients will reassociate to the software A<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326448[]' id='answer-id-1277030' class='answer   answerof-326448 ' value='1277030'   \/><label for='answer-id-1277030' id='answer-label-1277030' class=' answer'><span>If the consultant's software AP broadcasts Beacon frames that advertise 802.11g data rates that are faster rates than XYZ's current 802.11b data rates, all WLAN clients will reassociate to the faster A<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-40' style=';'><div id='questionWrap-40'  class='   watupro-question-id-326449'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>40. <\/span>Which of these alarms should be configured to send an automatic notification to the WIPS administrator\u2019s phone and\/or email account? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_40' value='326449' \/><input type='hidden' id='answerType326449' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326449[]' id='answer-id-1277031' class='answer   answerof-326449 ' value='1277031'   \/><label for='answer-id-1277031' id='answer-label-1277031' class=' answer'><span>Man-in-the-middle attack detected<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326449[]' id='answer-id-1277032' class='answer   answerof-326449 ' value='1277032'   \/><label for='answer-id-1277032' id='answer-label-1277032' class=' answer'><span>Unauthorized client detected<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326449[]' id='answer-id-1277033' class='answer   answerof-326449 ' value='1277033'   \/><label for='answer-id-1277033' id='answer-label-1277033' class=' answer'><span>Rogue AP detected<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326449[]' id='answer-id-1277034' class='answer   answerof-326449 ' value='1277034'   \/><label for='answer-id-1277034' id='answer-label-1277034' class=' answer'><span>Unauthorized AP detected<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-41' style=';'><div id='questionWrap-41'  class='   watupro-question-id-326450'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>41. <\/span>What is another name for a wireless hijacking attack?<\/div><input type='hidden' name='question_id[]' id='qID_41' value='326450' \/><input type='hidden' id='answerType326450' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326450[]' id='answer-id-1277035' class='answer   answerof-326450 ' value='1277035'   \/><label for='answer-id-1277035' id='answer-label-1277035' class=' answer'><span>Wi-Fi phishing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326450[]' id='answer-id-1277036' class='answer   answerof-326450 ' value='1277036'   \/><label for='answer-id-1277036' id='answer-label-1277036' class=' answer'><span>Man-in-the-middle<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326450[]' id='answer-id-1277037' class='answer   answerof-326450 ' value='1277037'   \/><label for='answer-id-1277037' id='answer-label-1277037' class=' answer'><span>Fake AP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326450[]' id='answer-id-1277038' class='answer   answerof-326450 ' value='1277038'   \/><label for='answer-id-1277038' id='answer-label-1277038' class=' answer'><span>Evil twin<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326450[]' id='answer-id-1277039' class='answer   answerof-326450 ' value='1277039'   \/><label for='answer-id-1277039' id='answer-label-1277039' class=' answer'><span>AirSpy<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-42' style=';'><div id='questionWrap-42'  class='   watupro-question-id-326451'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>42. <\/span>Which of these terms best describes a measure of uncertainty associated with a random variable?<\/div><input type='hidden' name='question_id[]' id='qID_42' value='326451' \/><input type='hidden' id='answerType326451' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326451[]' id='answer-id-1277040' class='answer   answerof-326451 ' value='1277040'   \/><label for='answer-id-1277040' id='answer-label-1277040' class=' answer'><span>Entropy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326451[]' id='answer-id-1277041' class='answer   answerof-326451 ' value='1277041'   \/><label for='answer-id-1277041' id='answer-label-1277041' class=' answer'><span>Encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326451[]' id='answer-id-1277042' class='answer   answerof-326451 ' value='1277042'   \/><label for='answer-id-1277042' id='answer-label-1277042' class=' answer'><span>Encapsulation<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326451[]' id='answer-id-1277043' class='answer   answerof-326451 ' value='1277043'   \/><label for='answer-id-1277043' id='answer-label-1277043' class=' answer'><span>Encoding<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-43' style=';'><div id='questionWrap-43'  class='   watupro-question-id-326452'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>43. <\/span>Which of these tools are required for a proper WLAN security audit? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_43' value='326452' \/><input type='hidden' id='answerType326452' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326452[]' id='answer-id-1277044' class='answer   answerof-326452 ' value='1277044'   \/><label for='answer-id-1277044' id='answer-label-1277044' class=' answer'><span>Spectrum analyzer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326452[]' id='answer-id-1277045' class='answer   answerof-326452 ' value='1277045'   \/><label for='answer-id-1277045' id='answer-label-1277045' class=' answer'><span>WLAN protocol analyzer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326452[]' id='answer-id-1277046' class='answer   answerof-326452 ' value='1277046'   \/><label for='answer-id-1277046' id='answer-label-1277046' class=' answer'><span>WLAN penetration testing software tools<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326452[]' id='answer-id-1277047' class='answer   answerof-326452 ' value='1277047'   \/><label for='answer-id-1277047' id='answer-label-1277047' class=' answer'><span>Global positioning sensor (GPS)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326452[]' id='answer-id-1277048' class='answer   answerof-326452 ' value='1277048'   \/><label for='answer-id-1277048' id='answer-label-1277048' class=' answer'><span>Cameras<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-44' style=';'><div id='questionWrap-44'  class='   watupro-question-id-326453'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>44. <\/span>In an IEEE 802.11-compliant WLAN, when is the 802.1X Controlled Port placed into the unblocked state?<\/div><input type='hidden' name='question_id[]' id='qID_44' value='326453' \/><input type='hidden' id='answerType326453' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326453[]' id='answer-id-1277049' class='answer   answerof-326453 ' value='1277049'   \/><label for='answer-id-1277049' id='answer-label-1277049' class=' answer'><span>After EAP authentication is successful<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326453[]' id='answer-id-1277050' class='answer   answerof-326453 ' value='1277050'   \/><label for='answer-id-1277050' id='answer-label-1277050' class=' answer'><span>After Open System authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326453[]' id='answer-id-1277051' class='answer   answerof-326453 ' value='1277051'   \/><label for='answer-id-1277051' id='answer-label-1277051' class=' answer'><span>After the 4-Way Handshake<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326453[]' id='answer-id-1277052' class='answer   answerof-326453 ' value='1277052'   \/><label for='answer-id-1277052' id='answer-label-1277052' class=' answer'><span>After any Group Handshake<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-45' style=';'><div id='questionWrap-45'  class='   watupro-question-id-326454'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>45. <\/span>Which of these authentication methods are supported by RADIUS and can be used for WLAN security? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_45' value='326454' \/><input type='hidden' id='answerType326454' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326454[]' id='answer-id-1277053' class='answer   answerof-326454 ' value='1277053'   \/><label for='answer-id-1277053' id='answer-label-1277053' class=' answer'><span>Hologram authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326454[]' id='answer-id-1277054' class='answer   answerof-326454 ' value='1277054'   \/><label for='answer-id-1277054' id='answer-label-1277054' class=' answer'><span>Captive web portal authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326454[]' id='answer-id-1277055' class='answer   answerof-326454 ' value='1277055'   \/><label for='answer-id-1277055' id='answer-label-1277055' class=' answer'><span>MAC authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326454[]' id='answer-id-1277056' class='answer   answerof-326454 ' value='1277056'   \/><label for='answer-id-1277056' id='answer-label-1277056' class=' answer'><span>TSA authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326454[]' id='answer-id-1277057' class='answer   answerof-326454 ' value='1277057'   \/><label for='answer-id-1277057' id='answer-label-1277057' class=' answer'><span>802.1X\/EAP authentication<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-46' style=';'><div id='questionWrap-46'  class='   watupro-question-id-326455'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>46. <\/span>Tammy, the WLAN security engineer, has recommended to management that WPA-Personal security not be deployed within the ACME Company\u2019s WLAN. <br \/>\r<br>What are some of the reasons for Tammy\u2019s recommendation? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_46' value='326455' \/><input type='hidden' id='answerType326455' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326455[]' id='answer-id-1277058' class='answer   answerof-326455 ' value='1277058'   \/><label for='answer-id-1277058' id='answer-label-1277058' class=' answer'><span>Static passphrases and PSKs are susceptible to social engineering attacks.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326455[]' id='answer-id-1277059' class='answer   answerof-326455 ' value='1277059'   \/><label for='answer-id-1277059' id='answer-label-1277059' class=' answer'><span>WPA-Personal is susceptible to brute-force dictionary attacks, but WPA-Personal is not at risk.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326455[]' id='answer-id-1277060' class='answer   answerof-326455 ' value='1277060'   \/><label for='answer-id-1277060' id='answer-label-1277060' class=' answer'><span>WPA-Personal uses static encryption keys.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326455[]' id='answer-id-1277061' class='answer   answerof-326455 ' value='1277061'   \/><label for='answer-id-1277061' id='answer-label-1277061' class=' answer'><span>WPA-Personal uses weaker TKIP encryption.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326455[]' id='answer-id-1277062' class='answer   answerof-326455 ' value='1277062'   \/><label for='answer-id-1277062' id='answer-label-1277062' class=' answer'><span>802.11 data frames can be decrypted if the passphrase is compromised.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-47' style=';'><div id='questionWrap-47'  class='   watupro-question-id-326456'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>47. <\/span>What is the recommended ratio of WIPS sensors providing security monitoring to access points that are providing access for WLAN clients?<\/div><input type='hidden' name='question_id[]' id='qID_47' value='326456' \/><input type='hidden' id='answerType326456' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326456[]' id='answer-id-1277063' class='answer   answerof-326456 ' value='1277063'   \/><label for='answer-id-1277063' id='answer-label-1277063' class=' answer'><span>1:2<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326456[]' id='answer-id-1277064' class='answer   answerof-326456 ' value='1277064'   \/><label for='answer-id-1277064' id='answer-label-1277064' class=' answer'><span>1:3<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326456[]' id='answer-id-1277065' class='answer   answerof-326456 ' value='1277065'   \/><label for='answer-id-1277065' id='answer-label-1277065' class=' answer'><span>1:4<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326456[]' id='answer-id-1277066' class='answer   answerof-326456 ' value='1277066'   \/><label for='answer-id-1277066' id='answer-label-1277066' class=' answer'><span>1:5<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326456[]' id='answer-id-1277067' class='answer   answerof-326456 ' value='1277067'   \/><label for='answer-id-1277067' id='answer-label-1277067' class=' answer'><span>Depends on the customer\u2019s needs<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-48' style=';'><div id='questionWrap-48'  class='   watupro-question-id-326457'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>48. <\/span>Laura is attempting to diagnose a WLAN by using a packet analyzer to capture the exchange of frames and packets between a wireless client and the AP. <br \/>\r<br>In the process of analyzing the packets, she sees two 802.11 authentication frames, two 802.11 association frames, and DHCP requests and responses, and then she begins to see encrypted data. <br \/>\r<br>Which of the following could the client be using? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_48' value='326457' \/><input type='hidden' id='answerType326457' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326457[]' id='answer-id-1277068' class='answer   answerof-326457 ' value='1277068'   \/><label for='answer-id-1277068' id='answer-label-1277068' class=' answer'><span>Open System authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326457[]' id='answer-id-1277069' class='answer   answerof-326457 ' value='1277069'   \/><label for='answer-id-1277069' id='answer-label-1277069' class=' answer'><span>Shared Key authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326457[]' id='answer-id-1277070' class='answer   answerof-326457 ' value='1277070'   \/><label for='answer-id-1277070' id='answer-label-1277070' class=' answer'><span>802.1X\/EAP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326457[]' id='answer-id-1277071' class='answer   answerof-326457 ' value='1277071'   \/><label for='answer-id-1277071' id='answer-label-1277071' class=' answer'><span>WEP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326457[]' id='answer-id-1277072' class='answer   answerof-326457 ' value='1277072'   \/><label for='answer-id-1277072' id='answer-label-1277072' class=' answer'><span>IPsec<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-49' style=';'><div id='questionWrap-49'  class='   watupro-question-id-326458'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>49. <\/span>What statements are true about 802.11-2012 Protected Management Frames? (Choose 2)<\/div><input type='hidden' name='question_id[]' id='qID_49' value='326458' \/><input type='hidden' id='answerType326458' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326458[]' id='answer-id-1277073' class='answer   answerof-326458 ' value='1277073'   \/><label for='answer-id-1277073' id='answer-label-1277073' class=' answer'><span>802.11w frame protection protects against some Layer 2 denial-of-service (DoS) attacks, but it cannot prevent all types of Layer 2 DoS attacks.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326458[]' id='answer-id-1277074' class='answer   answerof-326458 ' value='1277074'   \/><label for='answer-id-1277074' id='answer-label-1277074' class=' answer'><span>When frame protection is in use, the PHY preamble and header as well as the MAC header are encrypted with 256- or 512-bit AE<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326458[]' id='answer-id-1277075' class='answer   answerof-326458 ' value='1277075'   \/><label for='answer-id-1277075' id='answer-label-1277075' class=' answer'><span>Authentication, association, and acknowledgment frames are protected if management frame protection is enabled, but deauthentication and disassociation frames are not.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326458[]' id='answer-id-1277076' class='answer   answerof-326458 ' value='1277076'   \/><label for='answer-id-1277076' id='answer-label-1277076' class=' answer'><span>Management frame protection protects disassociation and deauthentication frames.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-50' style=';'><div id='questionWrap-50'  class='   watupro-question-id-326459'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>50. <\/span>The IEEE 802.11-2012 standard requires an authentication and key management protocol (AKMP) that can be either a preshared (PSK) or an EAP protocol used during 802.1X\/EAP authentication. <br \/>\r<br>What is another name for PSK authentication? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_50' value='326459' \/><input type='hidden' id='answerType326459' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326459[]' id='answer-id-1277077' class='answer   answerof-326459 ' value='1277077'   \/><label for='answer-id-1277077' id='answer-label-1277077' class=' answer'><span>Wi-Fi Protected Setup<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326459[]' id='answer-id-1277078' class='answer   answerof-326459 ' value='1277078'   \/><label for='answer-id-1277078' id='answer-label-1277078' class=' answer'><span>WPA\/WPA2-Personal<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326459[]' id='answer-id-1277079' class='answer   answerof-326459 ' value='1277079'   \/><label for='answer-id-1277079' id='answer-label-1277079' class=' answer'><span>WPA\/WPA2-PSK<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326459[]' id='answer-id-1277080' class='answer   answerof-326459 ' value='1277080'   \/><label for='answer-id-1277080' id='answer-label-1277080' class=' answer'><span>WPA\/WPA2-Preshared Key<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326459[]' id='answer-id-1277081' class='answer   answerof-326459 ' value='1277081'   \/><label for='answer-id-1277081' id='answer-label-1277081' class=' answer'><span>WPA\/WPA2-Passphrase<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-51' style=';'><div id='questionWrap-51'  class='   watupro-question-id-326460'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>51. <\/span>When two client stations are already associated to an AP, which handshake is used to create a different unicast key that the two client stations can use for a private conversation while they remain associated to the AP?<\/div><input type='hidden' name='question_id[]' id='qID_51' value='326460' \/><input type='hidden' id='answerType326460' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326460[]' id='answer-id-1277082' class='answer   answerof-326460 ' value='1277082'   \/><label for='answer-id-1277082' id='answer-label-1277082' class=' answer'><span>Mesh Group Key Handshake<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326460[]' id='answer-id-1277083' class='answer   answerof-326460 ' value='1277083'   \/><label for='answer-id-1277083' id='answer-label-1277083' class=' answer'><span>Group Key Handshake<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326460[]' id='answer-id-1277084' class='answer   answerof-326460 ' value='1277084'   \/><label for='answer-id-1277084' id='answer-label-1277084' class=' answer'><span>4-Way Handshake<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326460[]' id='answer-id-1277085' class='answer   answerof-326460 ' value='1277085'   \/><label for='answer-id-1277085' id='answer-label-1277085' class=' answer'><span>2-Way Handshake<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326460[]' id='answer-id-1277086' class='answer   answerof-326460 ' value='1277086'   \/><label for='answer-id-1277086' id='answer-label-1277086' class=' answer'><span>TDLS Peer Key Handshake<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-52' style=';'><div id='questionWrap-52'  class='   watupro-question-id-326461'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>52. <\/span>What operations must occur before the virtual controlled port of the authenticator becomes unblocked? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_52' value='326461' \/><input type='hidden' id='answerType326461' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326461[]' id='answer-id-1277087' class='answer   answerof-326461 ' value='1277087'   \/><label for='answer-id-1277087' id='answer-label-1277087' class=' answer'><span>802.1X\/EAP authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326461[]' id='answer-id-1277088' class='answer   answerof-326461 ' value='1277088'   \/><label for='answer-id-1277088' id='answer-label-1277088' class=' answer'><span>4-Way Handshake<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326461[]' id='answer-id-1277089' class='answer   answerof-326461 ' value='1277089'   \/><label for='answer-id-1277089' id='answer-label-1277089' class=' answer'><span>2-Way Handshake<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326461[]' id='answer-id-1277090' class='answer   answerof-326461 ' value='1277090'   \/><label for='answer-id-1277090' id='answer-label-1277090' class=' answer'><span>RADIUS proxy<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-53' style=';'><div id='questionWrap-53'  class='   watupro-question-id-326462'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>53. <\/span>Bob the WLAN administrator is troubleshooting an IPsec VPN problem that has been deployed as the security solution over a point-to-point 802.11 wireless bridge link between two buildings. Bob cannot get the VPN tunnel to establish and notices that there is a certificate error during the IKE Phase 1 exchange. <br \/>\r<br>What are the possible causes of this problem? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_53' value='326462' \/><input type='hidden' id='answerType326462' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326462[]' id='answer-id-1277091' class='answer   answerof-326462 ' value='1277091'   \/><label for='answer-id-1277091' id='answer-label-1277091' class=' answer'><span>The VPN server behind the root bridge is using AES-256 encryption, and the VPN endpoint device behind the nonroot bridge is using AES-192 encryption.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326462[]' id='answer-id-1277092' class='answer   answerof-326462 ' value='1277092'   \/><label for='answer-id-1277092' id='answer-label-1277092' class=' answer'><span>The VPN server behind the root bridge is using SHA-1 hash for data integrity, and the VPN endpoint device behind the nonroot bridge is using MD-5 for data integrity.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326462[]' id='answer-id-1277093' class='answer   answerof-326462 ' value='1277093'   \/><label for='answer-id-1277093' id='answer-label-1277093' class=' answer'><span>The root CA certificate installed on the VPN device behind the nonroot bridge was not used to sign the server certificate on the VPN server behind the root bridge.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326462[]' id='answer-id-1277094' class='answer   answerof-326462 ' value='1277094'   \/><label for='answer-id-1277094' id='answer-label-1277094' class=' answer'><span>The clock settings of the VPN server that is deployed behind the root bridge predate the creation of the server certificate.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326462[]' id='answer-id-1277095' class='answer   answerof-326462 ' value='1277095'   \/><label for='answer-id-1277095' id='answer-label-1277095' class=' answer'><span>The public\/private IP address settings are misconfigured on the VPN device behind the nonroot bridge.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-54' style=';'><div id='questionWrap-54'  class='   watupro-question-id-326463'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>54. <\/span>Which of the following are the security measures that are needed to maintain the security of wireless LAN? <br \/>\r<br>Each correct answer represents a complete solution. Choose all that apply.<\/div><input type='hidden' name='question_id[]' id='qID_54' value='326463' \/><input type='hidden' id='answerType326463' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326463[]' id='answer-id-1277096' class='answer   answerof-326463 ' value='1277096'   \/><label for='answer-id-1277096' id='answer-label-1277096' class=' answer'><span>WIDS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326463[]' id='answer-id-1277097' class='answer   answerof-326463 ' value='1277097'   \/><label for='answer-id-1277097' id='answer-label-1277097' class=' answer'><span>Firewalls<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326463[]' id='answer-id-1277098' class='answer   answerof-326463 ' value='1277098'   \/><label for='answer-id-1277098' id='answer-label-1277098' class=' answer'><span>WLAN controller<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326463[]' id='answer-id-1277099' class='answer   answerof-326463 ' value='1277099'   \/><label for='answer-id-1277099' id='answer-label-1277099' class=' answer'><span>WIPS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-55' style=';'><div id='questionWrap-55'  class='   watupro-question-id-326464'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>55. <\/span>This graphic shows a WLAN discovery tool screen capture. <br \/>\r<br><br><img decoding=\"async\" width=651 height=365 id=\"\u56fe\u7247 19\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/05\/image002-8.jpg\"><br><br \/>\r<br>How many SSIDs are configured with cloaking enabled? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_55' value='326464' \/><input type='hidden' id='answerType326464' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326464[]' id='answer-id-1277100' class='answer   answerof-326464 ' value='1277100'   \/><label for='answer-id-1277100' id='answer-label-1277100' class=' answer'><span>None<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326464[]' id='answer-id-1277101' class='answer   answerof-326464 ' value='1277101'   \/><label for='answer-id-1277101' id='answer-label-1277101' class=' answer'><span>At least ten<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326464[]' id='answer-id-1277102' class='answer   answerof-326464 ' value='1277102'   \/><label for='answer-id-1277102' id='answer-label-1277102' class=' answer'><span>One<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326464[]' id='answer-id-1277103' class='answer   answerof-326464 ' value='1277103'   \/><label for='answer-id-1277103' id='answer-label-1277103' class=' answer'><span>Ten<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326464[]' id='answer-id-1277104' class='answer   answerof-326464 ' value='1277104'   \/><label for='answer-id-1277104' id='answer-label-1277104' class=' answer'><span>Exact number cannot be determined<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-56' style=';'><div id='questionWrap-56'  class='   watupro-question-id-326465'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>56. <\/span>Which technologies use the RC4 or ARC4 cipher? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_56' value='326465' \/><input type='hidden' id='answerType326465' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326465[]' id='answer-id-1277105' class='answer   answerof-326465 ' value='1277105'   \/><label for='answer-id-1277105' id='answer-label-1277105' class=' answer'><span>Static WEP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326465[]' id='answer-id-1277106' class='answer   answerof-326465 ' value='1277106'   \/><label for='answer-id-1277106' id='answer-label-1277106' class=' answer'><span>Dynamic WEP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326465[]' id='answer-id-1277107' class='answer   answerof-326465 ' value='1277107'   \/><label for='answer-id-1277107' id='answer-label-1277107' class=' answer'><span>PPTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326465[]' id='answer-id-1277108' class='answer   answerof-326465 ' value='1277108'   \/><label for='answer-id-1277108' id='answer-label-1277108' class=' answer'><span>L2TP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326465[]' id='answer-id-1277109' class='answer   answerof-326465 ' value='1277109'   \/><label for='answer-id-1277109' id='answer-label-1277109' class=' answer'><span>MPPE<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-57' style=';'><div id='questionWrap-57'  class='   watupro-question-id-326466'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>57. <\/span>You have been tasked with configuring a secure WLAN for 600 APs at the corporate offices. All the APs and employee Windows laptops have been configured for 802.1X\/EAP. <br \/>\r<br><br><img decoding=\"async\" width=650 height=277 id=\"\u56fe\u7247 18\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/05\/image003-7.jpg\"><br><br \/>\r<br>The domain user accounts are failing authentication with every attempt. After looking at some packet captures of the authentication failures, you have determined that an SSL\/TLS tunnel is never created. <br \/>\r<br>After viewing the graphic shown here, determine the possible causes of the problem. (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_57' value='326466' \/><input type='hidden' id='answerType326466' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326466[]' id='answer-id-1277110' class='answer   answerof-326466 ' value='1277110'   \/><label for='answer-id-1277110' id='answer-label-1277110' class=' answer'><span>The Windows laptops are missing a client certificate.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326466[]' id='answer-id-1277111' class='answer   answerof-326466 ' value='1277111'   \/><label for='answer-id-1277111' id='answer-label-1277111' class=' answer'><span>The incorrect root certificate is selected in the supplicant.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326466[]' id='answer-id-1277112' class='answer   answerof-326466 ' value='1277112'   \/><label for='answer-id-1277112' id='answer-label-1277112' class=' answer'><span>The server certificate has expired.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326466[]' id='answer-id-1277113' class='answer   answerof-326466 ' value='1277113'   \/><label for='answer-id-1277113' id='answer-label-1277113' class=' answer'><span>PACs have not been provisioned properly.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326466[]' id='answer-id-1277114' class='answer   answerof-326466 ' value='1277114'   \/><label for='answer-id-1277114' id='answer-label-1277114' class=' answer'><span>The root certificate has expired.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-58' style=';'><div id='questionWrap-58'  class='   watupro-question-id-326467'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>58. <\/span>You must locate non-compliant 802.11 devices. <br \/>\r<br>Which one of the following tools will you use and why?<\/div><input type='hidden' name='question_id[]' id='qID_58' value='326467' \/><input type='hidden' id='answerType326467' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326467[]' id='answer-id-1277115' class='answer   answerof-326467 ' value='1277115'   \/><label for='answer-id-1277115' id='answer-label-1277115' class=' answer'><span>A spectrum analyzer, because it can show the energy footprint of a device using WPA differently from a device using WPA2.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326467[]' id='answer-id-1277116' class='answer   answerof-326467 ' value='1277116'   \/><label for='answer-id-1277116' id='answer-label-1277116' class=' answer'><span>A spectrum analyzer, because it can decode the PHY preamble of a non-compliant device.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326467[]' id='answer-id-1277117' class='answer   answerof-326467 ' value='1277117'   \/><label for='answer-id-1277117' id='answer-label-1277117' class=' answer'><span>A protocol analyzer, because it can be used to view the spectrum energy of non-compliant 802.11 devices, which is always different from compliant devices.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326467[]' id='answer-id-1277118' class='answer   answerof-326467 ' value='1277118'   \/><label for='answer-id-1277118' id='answer-label-1277118' class=' answer'><span>A protocol analyzer, because it can be used to report on security settings and regulatory or rule compliance<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-59' style=';'><div id='questionWrap-59'  class='   watupro-question-id-326468'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>59. <\/span>What is one advantage of using EAP-TTLS instead of EAP-TLS as an authentication mechanism in an 802.11 WLAN?<\/div><input type='hidden' name='question_id[]' id='qID_59' value='326468' \/><input type='hidden' id='answerType326468' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326468[]' id='answer-id-1277119' class='answer   answerof-326468 ' value='1277119'   \/><label for='answer-id-1277119' id='answer-label-1277119' class=' answer'><span>EAP-TTLS sends encrypted supplicant credentials to the authentication server, but EAP-TLS uses unencrypted user credentials.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326468[]' id='answer-id-1277120' class='answer   answerof-326468 ' value='1277120'   \/><label for='answer-id-1277120' id='answer-label-1277120' class=' answer'><span>EAP-TTLS supports client certificates, but EAP-TLS does not.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326468[]' id='answer-id-1277121' class='answer   answerof-326468 ' value='1277121'   \/><label for='answer-id-1277121' id='answer-label-1277121' class=' answer'><span>EAP-TTLS does not require an authentication server, but EAP-TLS does.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326468[]' id='answer-id-1277122' class='answer   answerof-326468 ' value='1277122'   \/><label for='answer-id-1277122' id='answer-label-1277122' class=' answer'><span>EAP-TTLS does not require the use of a certificate for each STA as authentication credentials, but EAP-TLS does.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-60' style=';'><div id='questionWrap-60'  class='   watupro-question-id-326469'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>60. <\/span>As defined by the 802.11-2012 standard, which of these authentication methods can be used by a client station to establish a pairwise master key security association (PMKSA)? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_60' value='326469' \/><input type='hidden' id='answerType326469' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326469[]' id='answer-id-1277123' class='answer   answerof-326469 ' value='1277123'   \/><label for='answer-id-1277123' id='answer-label-1277123' class=' answer'><span>PSK authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326469[]' id='answer-id-1277124' class='answer   answerof-326469 ' value='1277124'   \/><label for='answer-id-1277124' id='answer-label-1277124' class=' answer'><span>WEP authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326469[]' id='answer-id-1277125' class='answer   answerof-326469 ' value='1277125'   \/><label for='answer-id-1277125' id='answer-label-1277125' class=' answer'><span>802.1X\/EAP authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326469[]' id='answer-id-1277126' class='answer   answerof-326469 ' value='1277126'   \/><label for='answer-id-1277126' id='answer-label-1277126' class=' answer'><span>Open authentication<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326469[]' id='answer-id-1277127' class='answer   answerof-326469 ' value='1277127'   \/><label for='answer-id-1277127' id='answer-label-1277127' class=' answer'><span>SAE authentication<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-61' style=';'><div id='questionWrap-61'  class='   watupro-question-id-326470'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>61. <\/span>Which of the following is a valid reason to avoid the use of EAP-MD5 in production WLANs?<\/div><input type='hidden' name='question_id[]' id='qID_61' value='326470' \/><input type='hidden' id='answerType326470' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326470[]' id='answer-id-1277128' class='answer   answerof-326470 ' value='1277128'   \/><label for='answer-id-1277128' id='answer-label-1277128' class=' answer'><span>It does not support a RADIUS server.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326470[]' id='answer-id-1277129' class='answer   answerof-326470 ' value='1277129'   \/><label for='answer-id-1277129' id='answer-label-1277129' class=' answer'><span>It is not a valid EAP type.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326470[]' id='answer-id-1277130' class='answer   answerof-326470 ' value='1277130'   \/><label for='answer-id-1277130' id='answer-label-1277130' class=' answer'><span>It does not support mutual authentication.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326470[]' id='answer-id-1277131' class='answer   answerof-326470 ' value='1277131'   \/><label for='answer-id-1277131' id='answer-label-1277131' class=' answer'><span>It does not support the outer identity.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-62' style=';'><div id='questionWrap-62'  class='   watupro-question-id-326471'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>62. <\/span>Which WLAN architectural models typically require support for 802.1Q tagging at the edge on the network when multiple user VLANs are required? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_62' value='326471' \/><input type='hidden' id='answerType326471' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326471[]' id='answer-id-1277132' class='answer   answerof-326471 ' value='1277132'   \/><label for='answer-id-1277132' id='answer-label-1277132' class=' answer'><span>Autonomous WLAN architecture<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326471[]' id='answer-id-1277133' class='answer   answerof-326471 ' value='1277133'   \/><label for='answer-id-1277133' id='answer-label-1277133' class=' answer'><span>Centralized WLAN architecture<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326471[]' id='answer-id-1277134' class='answer   answerof-326471 ' value='1277134'   \/><label for='answer-id-1277134' id='answer-label-1277134' class=' answer'><span>Distributed WLAN architecture<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326471[]' id='answer-id-1277135' class='answer   answerof-326471 ' value='1277135'   \/><label for='answer-id-1277135' id='answer-label-1277135' class=' answer'><span>None of the above<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-63' style=';'><div id='questionWrap-63'  class='   watupro-question-id-326472'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>63. <\/span>What software and hardware tools are used in the process performed to hijack a wireless  station from the authorized wireless network onto an unauthorized wireless network?<\/div><input type='hidden' name='question_id[]' id='qID_63' value='326472' \/><input type='hidden' id='answerType326472' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326472[]' id='answer-id-1277136' class='answer   answerof-326472 ' value='1277136'   \/><label for='answer-id-1277136' id='answer-label-1277136' class=' answer'><span>A low-gain patch antenna and terminal emulation software<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326472[]' id='answer-id-1277137' class='answer   answerof-326472 ' value='1277137'   \/><label for='answer-id-1277137' id='answer-label-1277137' class=' answer'><span>MAC spoofing software and MAC DoS software<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326472[]' id='answer-id-1277138' class='answer   answerof-326472 ' value='1277138'   \/><label for='answer-id-1277138' id='answer-label-1277138' class=' answer'><span>RF jamming device and a wireless radio card<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326472[]' id='answer-id-1277139' class='answer   answerof-326472 ' value='1277139'   \/><label for='answer-id-1277139' id='answer-label-1277139' class=' answer'><span>A wireless workgroup bridge and a protocol analyzer<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-64' style=';'><div id='questionWrap-64'  class='   watupro-question-id-326473'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>64. <\/span>Given: An 802.1X\/EAP implementation includes an Active Directory domain controller running Windows Server 2012 and an AP from a major vendor. A Linux server is running RADIUS and it queries the domain controller for user credentials. <br \/>\r<br>A Windows client is accessing the network. <br \/>\r<br>What device functions as the EAP Supplicant?<\/div><input type='hidden' name='question_id[]' id='qID_64' value='326473' \/><input type='hidden' id='answerType326473' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326473[]' id='answer-id-1277140' class='answer   answerof-326473 ' value='1277140'   \/><label for='answer-id-1277140' id='answer-label-1277140' class=' answer'><span>Linux server<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326473[]' id='answer-id-1277141' class='answer   answerof-326473 ' value='1277141'   \/><label for='answer-id-1277141' id='answer-label-1277141' class=' answer'><span>Windows client<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326473[]' id='answer-id-1277142' class='answer   answerof-326473 ' value='1277142'   \/><label for='answer-id-1277142' id='answer-label-1277142' class=' answer'><span>Access point<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326473[]' id='answer-id-1277143' class='answer   answerof-326473 ' value='1277143'   \/><label for='answer-id-1277143' id='answer-label-1277143' class=' answer'><span>Windows server<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326473[]' id='answer-id-1277144' class='answer   answerof-326473 ' value='1277144'   \/><label for='answer-id-1277144' id='answer-label-1277144' class=' answer'><span>An unlisted switch<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326473[]' id='answer-id-1277145' class='answer   answerof-326473 ' value='1277145'   \/><label for='answer-id-1277145' id='answer-label-1277145' class=' answer'><span>An unlisted WLAN controller<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-65' style=';'><div id='questionWrap-65'  class='   watupro-question-id-326474'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>65. <\/span>What preventative measures are performed by a WIPS against intrusions?<\/div><input type='hidden' name='question_id[]' id='qID_65' value='326474' \/><input type='hidden' id='answerType326474' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326474[]' id='answer-id-1277146' class='answer   answerof-326474 ' value='1277146'   \/><label for='answer-id-1277146' id='answer-label-1277146' class=' answer'><span>EAPoL Reject frame flood against a rogue AP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326474[]' id='answer-id-1277147' class='answer   answerof-326474 ' value='1277147'   \/><label for='answer-id-1277147' id='answer-label-1277147' class=' answer'><span>Evil twin attack against a rogue AP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326474[]' id='answer-id-1277148' class='answer   answerof-326474 ' value='1277148'   \/><label for='answer-id-1277148' id='answer-label-1277148' class=' answer'><span>Deauthentication attack against a classified neighbor AP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326474[]' id='answer-id-1277149' class='answer   answerof-326474 ' value='1277149'   \/><label for='answer-id-1277149' id='answer-label-1277149' class=' answer'><span>ASLEAP attack against a rogue AP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326474[]' id='answer-id-1277150' class='answer   answerof-326474 ' value='1277150'   \/><label for='answer-id-1277150' id='answer-label-1277150' class=' answer'><span>Uses SNMP to disable the switch port to which rogue APs connect<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-66' style=';'><div id='questionWrap-66'  class='   watupro-question-id-326475'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>66. <\/span>Which organization is responsible for the creation of documents known as Requests for Comments?<\/div><input type='hidden' name='question_id[]' id='qID_66' value='326475' \/><input type='hidden' id='answerType326475' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326475[]' id='answer-id-1277151' class='answer   answerof-326475 ' value='1277151'   \/><label for='answer-id-1277151' id='answer-label-1277151' class=' answer'><span>IEEE<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326475[]' id='answer-id-1277152' class='answer   answerof-326475 ' value='1277152'   \/><label for='answer-id-1277152' id='answer-label-1277152' class=' answer'><span>ISO<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326475[]' id='answer-id-1277153' class='answer   answerof-326475 ' value='1277153'   \/><label for='answer-id-1277153' id='answer-label-1277153' class=' answer'><span>IETF<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326475[]' id='answer-id-1277154' class='answer   answerof-326475 ' value='1277154'   \/><label for='answer-id-1277154' id='answer-label-1277154' class=' answer'><span>Wi-Fi Alliance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326475[]' id='answer-id-1277155' class='answer   answerof-326475 ' value='1277155'   \/><label for='answer-id-1277155' id='answer-label-1277155' class=' answer'><span>RFC Consortium<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-67' style=';'><div id='questionWrap-67'  class='   watupro-question-id-326476'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>67. <\/span>You must support a TSN as you have older wireless equipment that will not support the required processing of AES encryption. <br \/>\r<br>Which one of the following technologies will you use on the network so that a TSN can be implemented that would not be required in a network compliant with 802.11-2012 non-deprecated technologies?<\/div><input type='hidden' name='question_id[]' id='qID_67' value='326476' \/><input type='hidden' id='answerType326476' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326476[]' id='answer-id-1277156' class='answer   answerof-326476 ' value='1277156'   \/><label for='answer-id-1277156' id='answer-label-1277156' class=' answer'><span>WEP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326476[]' id='answer-id-1277157' class='answer   answerof-326476 ' value='1277157'   \/><label for='answer-id-1277157' id='answer-label-1277157' class=' answer'><span>RC4<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326476[]' id='answer-id-1277158' class='answer   answerof-326476 ' value='1277158'   \/><label for='answer-id-1277158' id='answer-label-1277158' class=' answer'><span>CCMP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326476[]' id='answer-id-1277159' class='answer   answerof-326476 ' value='1277159'   \/><label for='answer-id-1277159' id='answer-label-1277159' class=' answer'><span>WPA2<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-68' style=';'><div id='questionWrap-68'  class='   watupro-question-id-326477'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>68. <\/span>What 802.11 WLAN security problem is directly addressed by mutual authentication?<\/div><input type='hidden' name='question_id[]' id='qID_68' value='326477' \/><input type='hidden' id='answerType326477' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326477[]' id='answer-id-1277160' class='answer   answerof-326477 ' value='1277160'   \/><label for='answer-id-1277160' id='answer-label-1277160' class=' answer'><span>Wireless hijacking attacks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326477[]' id='answer-id-1277161' class='answer   answerof-326477 ' value='1277161'   \/><label for='answer-id-1277161' id='answer-label-1277161' class=' answer'><span>Weak password policies<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326477[]' id='answer-id-1277162' class='answer   answerof-326477 ' value='1277162'   \/><label for='answer-id-1277162' id='answer-label-1277162' class=' answer'><span>MAC spoofing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326477[]' id='answer-id-1277163' class='answer   answerof-326477 ' value='1277163'   \/><label for='answer-id-1277163' id='answer-label-1277163' class=' answer'><span>Disassociation attacks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326477[]' id='answer-id-1277164' class='answer   answerof-326477 ' value='1277164'   \/><label for='answer-id-1277164' id='answer-label-1277164' class=' answer'><span>Offline dictionary attacks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326477[]' id='answer-id-1277165' class='answer   answerof-326477 ' value='1277165'   \/><label for='answer-id-1277165' id='answer-label-1277165' class=' answer'><span>Weak Initialization Vectors<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-69' style=';'><div id='questionWrap-69'  class='   watupro-question-id-326478'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>69. <\/span>Although your organization\u2019s written policy and many external policy influences may require only periodic scanning for rogue devices, you are trying to make a case for deploying a WIPS. <br \/>\r<br>What are some of the benefits of using a WIPS to achieve policy compliance that make it more desirable than using periodic handheld or laptop-based scanning solutions? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_69' value='326478' \/><input type='hidden' id='answerType326478' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326478[]' id='answer-id-1277166' class='answer   answerof-326478 ' value='1277166'   \/><label for='answer-id-1277166' id='answer-label-1277166' class=' answer'><span>WIPSs are less expensive and easier to implement.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326478[]' id='answer-id-1277167' class='answer   answerof-326478 ' value='1277167'   \/><label for='answer-id-1277167' id='answer-label-1277167' class=' answer'><span>WIPSs can provide 24-hour scanning and protection.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326478[]' id='answer-id-1277168' class='answer   answerof-326478 ' value='1277168'   \/><label for='answer-id-1277168' id='answer-label-1277168' class=' answer'><span>WIPSs are a more scalable solution for security.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326478[]' id='answer-id-1277169' class='answer   answerof-326478 ' value='1277169'   \/><label for='answer-id-1277169' id='answer-label-1277169' class=' answer'><span>WIPSs can correlate across multiple locations.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326478[]' id='answer-id-1277170' class='answer   answerof-326478 ' value='1277170'   \/><label for='answer-id-1277170' id='answer-label-1277170' class=' answer'><span>WIPSs can provide both compliance and security.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-70' style=';'><div id='questionWrap-70'  class='   watupro-question-id-326479'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>70. <\/span>What security vulnerabilities may result from a lack of staging, change management, and installation procedures for WLAN infrastructure equipment? (Choose 2)<\/div><input type='hidden' name='question_id[]' id='qID_70' value='326479' \/><input type='hidden' id='answerType326479' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326479[]' id='answer-id-1277171' class='answer   answerof-326479 ' value='1277171'   \/><label for='answer-id-1277171' id='answer-label-1277171' class=' answer'><span>The WLAN system may be open to RF Denial-of-Service attacks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326479[]' id='answer-id-1277172' class='answer   answerof-326479 ' value='1277172'   \/><label for='answer-id-1277172' id='answer-label-1277172' class=' answer'><span>WIPS may not classify authorized, rogue, and neighbor APs accurately<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326479[]' id='answer-id-1277173' class='answer   answerof-326479 ' value='1277173'   \/><label for='answer-id-1277173' id='answer-label-1277173' class=' answer'><span>Authentication cracking of 64-bit Hex WPA-Personal PSK<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326479[]' id='answer-id-1277174' class='answer   answerof-326479 ' value='1277174'   \/><label for='answer-id-1277174' id='answer-label-1277174' class=' answer'><span>Management interface exploits due to the use of default usernames and passwords for AP management<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326479[]' id='answer-id-1277175' class='answer   answerof-326479 ' value='1277175'   \/><label for='answer-id-1277175' id='answer-label-1277175' class=' answer'><span>AES-CCMP encryption keys may be decrypted<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-71' style=';'><div id='questionWrap-71'  class='   watupro-question-id-326480'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>71. <\/span>In a point-to-point bridge environment where 802.1X\/EAP is used for bridge authentication, what device in the network acts as the 802.1X supplicant?<\/div><input type='hidden' name='question_id[]' id='qID_71' value='326480' \/><input type='hidden' id='answerType326480' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326480[]' id='answer-id-1277176' class='answer   answerof-326480 ' value='1277176'   \/><label for='answer-id-1277176' id='answer-label-1277176' class=' answer'><span>Nonroot bridge<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326480[]' id='answer-id-1277177' class='answer   answerof-326480 ' value='1277177'   \/><label for='answer-id-1277177' id='answer-label-1277177' class=' answer'><span>WLAN controller<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326480[]' id='answer-id-1277178' class='answer   answerof-326480 ' value='1277178'   \/><label for='answer-id-1277178' id='answer-label-1277178' class=' answer'><span>Root bridge<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326480[]' id='answer-id-1277179' class='answer   answerof-326480 ' value='1277179'   \/><label for='answer-id-1277179' id='answer-label-1277179' class=' answer'><span>RADIUS server<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326480[]' id='answer-id-1277180' class='answer   answerof-326480 ' value='1277180'   \/><label for='answer-id-1277180' id='answer-label-1277180' class=' answer'><span>Layer 3 core switch<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-72' style=';'><div id='questionWrap-72'  class='   watupro-question-id-326481'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>72. <\/span>What are some of the recommendations that might be made to a customer after a successful WLAN security audit? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_72' value='326481' \/><input type='hidden' id='answerType326481' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326481[]' id='answer-id-1277181' class='answer   answerof-326481 ' value='1277181'   \/><label for='answer-id-1277181' id='answer-label-1277181' class=' answer'><span>Physical security<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326481[]' id='answer-id-1277182' class='answer   answerof-326481 ' value='1277182'   \/><label for='answer-id-1277182' id='answer-label-1277182' class=' answer'><span>Employee training<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326481[]' id='answer-id-1277183' class='answer   answerof-326481 ' value='1277183'   \/><label for='answer-id-1277183' id='answer-label-1277183' class=' answer'><span>Dynamic RF configuration<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326481[]' id='answer-id-1277184' class='answer   answerof-326481 ' value='1277184'   \/><label for='answer-id-1277184' id='answer-label-1277184' class=' answer'><span>Monitoring capabilities<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326481[]' id='answer-id-1277185' class='answer   answerof-326481 ' value='1277185'   \/><label for='answer-id-1277185' id='answer-label-1277185' class=' answer'><span>AP and client power settings<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-73' style=';'><div id='questionWrap-73'  class='   watupro-question-id-326482'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>73. <\/span>What encryption methods are defined by the IEEE 802.11-2012 standard? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_73' value='326482' \/><input type='hidden' id='answerType326482' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326482[]' id='answer-id-1277186' class='answer   answerof-326482 ' value='1277186'   \/><label for='answer-id-1277186' id='answer-label-1277186' class=' answer'><span>3DES<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326482[]' id='answer-id-1277187' class='answer   answerof-326482 ' value='1277187'   \/><label for='answer-id-1277187' id='answer-label-1277187' class=' answer'><span>WPA-2<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326482[]' id='answer-id-1277188' class='answer   answerof-326482 ' value='1277188'   \/><label for='answer-id-1277188' id='answer-label-1277188' class=' answer'><span>SSL<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326482[]' id='answer-id-1277189' class='answer   answerof-326482 ' value='1277189'   \/><label for='answer-id-1277189' id='answer-label-1277189' class=' answer'><span>TKIP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326482[]' id='answer-id-1277190' class='answer   answerof-326482 ' value='1277190'   \/><label for='answer-id-1277190' id='answer-label-1277190' class=' answer'><span>CCMP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326482[]' id='answer-id-1277191' class='answer   answerof-326482 ' value='1277191'   \/><label for='answer-id-1277191' id='answer-label-1277191' class=' answer'><span>WEP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-74' style=';'><div id='questionWrap-74'  class='   watupro-question-id-326483'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>74. <\/span>Evan has configured a laptop and an AP, each with two WEP keys. WEP key 1 is the same on both devices, and WEP key 2 is the same on both devices. <br \/>\r<br>He configured the laptop to use WEP key 1 to encrypt its data. He configured the AP to use WEP key 2 to encrypt its data. Will this configuration work?<\/div><input type='hidden' name='question_id[]' id='qID_74' value='326483' \/><input type='hidden' id='answerType326483' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326483[]' id='answer-id-1277192' class='answer   answerof-326483 ' value='1277192'   \/><label for='answer-id-1277192' id='answer-label-1277192' class=' answer'><span>No, since there is only one WEP key on each device.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326483[]' id='answer-id-1277193' class='answer   answerof-326483 ' value='1277193'   \/><label for='answer-id-1277193' id='answer-label-1277193' class=' answer'><span>No, since the value of the WEP key must be identical on both the laptop and the A<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326483[]' id='answer-id-1277194' class='answer   answerof-326483 ' value='1277194'   \/><label for='answer-id-1277194' id='answer-label-1277194' class=' answer'><span>Yes, as long as the value of WEP key 1 is identical on both computers and the value of WEP key 2 is identical on both computers.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326483[]' id='answer-id-1277195' class='answer   answerof-326483 ' value='1277195'   \/><label for='answer-id-1277195' id='answer-label-1277195' class=' answer'><span>Yes. The laptop and AP will only use the first WEP key, so as long as the value of these keys is identical, the configuration will work.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326483[]' id='answer-id-1277196' class='answer   answerof-326483 ' value='1277196'   \/><label for='answer-id-1277196' id='answer-label-1277196' class=' answer'><span>Yes. The laptop and AP will attempt to use each of the WEP keys when decrypting a frame.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-75' style=';'><div id='questionWrap-75'  class='   watupro-question-id-326484'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>75. <\/span>What is the main purpose of using a WLAN protocol analyzer during the Layer 2 analysis of a WLAN security audit? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_75' value='326484' \/><input type='hidden' id='answerType326484' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326484[]' id='answer-id-1277197' class='answer   answerof-326484 ' value='1277197'   \/><label for='answer-id-1277197' id='answer-label-1277197' class=' answer'><span>Identifying unauthorized devices<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326484[]' id='answer-id-1277198' class='answer   answerof-326484 ' value='1277198'   \/><label for='answer-id-1277198' id='answer-label-1277198' class=' answer'><span>Auditing the wired infrastructure<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326484[]' id='answer-id-1277199' class='answer   answerof-326484 ' value='1277199'   \/><label for='answer-id-1277199' id='answer-label-1277199' class=' answer'><span>Performing penetration testing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326484[]' id='answer-id-1277200' class='answer   answerof-326484 ' value='1277200'   \/><label for='answer-id-1277200' id='answer-label-1277200' class=' answer'><span>Validating security compliance of authorized devices<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326484[]' id='answer-id-1277201' class='answer   answerof-326484 ' value='1277201'   \/><label for='answer-id-1277201' id='answer-label-1277201' class=' answer'><span>Auditing the WIPS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-76' style=';'><div id='questionWrap-76'  class='   watupro-question-id-326485'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>76. <\/span>What type of WLAN security is depicted by this graphic? <br \/>\r<br><br><img decoding=\"async\" width=651 height=335 id=\"\u56fe\u7247 17\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/uploads\/2024\/05\/image004-6.jpg\"><br><\/div><input type='hidden' name='question_id[]' id='qID_76' value='326485' \/><input type='hidden' id='answerType326485' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326485[]' id='answer-id-1277202' class='answer   answerof-326485 ' value='1277202'   \/><label for='answer-id-1277202' id='answer-label-1277202' class=' answer'><span>RSN<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326485[]' id='answer-id-1277203' class='answer   answerof-326485 ' value='1277203'   \/><label for='answer-id-1277203' id='answer-label-1277203' class=' answer'><span>TSN<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326485[]' id='answer-id-1277204' class='answer   answerof-326485 ' value='1277204'   \/><label for='answer-id-1277204' id='answer-label-1277204' class=' answer'><span>VPN<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326485[]' id='answer-id-1277205' class='answer   answerof-326485 ' value='1277205'   \/><label for='answer-id-1277205' id='answer-label-1277205' class=' answer'><span>WPS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326485[]' id='answer-id-1277206' class='answer   answerof-326485 ' value='1277206'   \/><label for='answer-id-1277206' id='answer-label-1277206' class=' answer'><span>WMM<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-77' style=';'><div id='questionWrap-77'  class='   watupro-question-id-326486'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>77. <\/span>What disadvantage does EAP-TLS have when compared with PEAPv0 EAP\/MSCHAPv2 as an 802.11 WLAN security solution?<\/div><input type='hidden' name='question_id[]' id='qID_77' value='326486' \/><input type='hidden' id='answerType326486' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326486[]' id='answer-id-1277207' class='answer   answerof-326486 ' value='1277207'   \/><label for='answer-id-1277207' id='answer-label-1277207' class=' answer'><span>Fast\/secure roaming in an 802.11 RSN is significantly longer when EAP-TLS is in use.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326486[]' id='answer-id-1277208' class='answer   answerof-326486 ' value='1277208'   \/><label for='answer-id-1277208' id='answer-label-1277208' class=' answer'><span>EAP-TLS does not protect the client's username and password inside an encrypted tunnel.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326486[]' id='answer-id-1277209' class='answer   answerof-326486 ' value='1277209'   \/><label for='answer-id-1277209' id='answer-label-1277209' class=' answer'><span>EAP-TLS cannot establish a secure tunnel for internal EAP authentication.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326486[]' id='answer-id-1277210' class='answer   answerof-326486 ' value='1277210'   \/><label for='answer-id-1277210' id='answer-label-1277210' class=' answer'><span>EAP-TLS is supported only by Cisco wireless infrastructure and client devices.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326486[]' id='answer-id-1277211' class='answer   answerof-326486 ' value='1277211'   \/><label for='answer-id-1277211' id='answer-label-1277211' class=' answer'><span>EAP-TLS requires extensive PKI use to create<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326486[]' id='answer-id-1277212' class='answer   answerof-326486 ' value='1277212'   \/><label for='answer-id-1277212' id='answer-label-1277212' class=' answer'><span>509 certificates for both the server and all clients, which increases administrative overhead.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-78' style=';'><div id='questionWrap-78'  class='   watupro-question-id-326487'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>78. <\/span>ABC Company uses the wireless network for highly sensitive network traffic. For that reason, they intend to protect their network in all possible ways. <br \/>\r<br>They are continually researching new network threats and new preventative measures. They are interested in the security benefits of 802.11w, but would like to know its limitations. <br \/>\r<br>What types of wireless attacks are protected by 802.11w? (Choose 2)<\/div><input type='hidden' name='question_id[]' id='qID_78' value='326487' \/><input type='hidden' id='answerType326487' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326487[]' id='answer-id-1277213' class='answer   answerof-326487 ' value='1277213'   \/><label for='answer-id-1277213' id='answer-label-1277213' class=' answer'><span>RF DoS attacks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326487[]' id='answer-id-1277214' class='answer   answerof-326487 ' value='1277214'   \/><label for='answer-id-1277214' id='answer-label-1277214' class=' answer'><span>Layer 2 Disassociation attacks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326487[]' id='answer-id-1277215' class='answer   answerof-326487 ' value='1277215'   \/><label for='answer-id-1277215' id='answer-label-1277215' class=' answer'><span>Robust management frame replay attacks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326487[]' id='answer-id-1277216' class='answer   answerof-326487 ' value='1277216'   \/><label for='answer-id-1277216' id='answer-label-1277216' class=' answer'><span>Social engineering attacks<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-79' style=';'><div id='questionWrap-79'  class='   watupro-question-id-326488'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>79. <\/span>Which method of guest management can be used by a company to gather valuable personal information about guest users?<\/div><input type='hidden' name='question_id[]' id='qID_79' value='326488' \/><input type='hidden' id='answerType326488' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326488[]' id='answer-id-1277217' class='answer   answerof-326488 ' value='1277217'   \/><label for='answer-id-1277217' id='answer-label-1277217' class=' answer'><span>Social login<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326488[]' id='answer-id-1277218' class='answer   answerof-326488 ' value='1277218'   \/><label for='answer-id-1277218' id='answer-label-1277218' class=' answer'><span>Kiosk mode<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326488[]' id='answer-id-1277219' class='answer   answerof-326488 ' value='1277219'   \/><label for='answer-id-1277219' id='answer-label-1277219' class=' answer'><span>Receptionist registration<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326488[]' id='answer-id-1277220' class='answer   answerof-326488 ' value='1277220'   \/><label for='answer-id-1277220' id='answer-label-1277220' class=' answer'><span>Self-registration<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326488[]' id='answer-id-1277221' class='answer   answerof-326488 ' value='1277221'   \/><label for='answer-id-1277221' id='answer-label-1277221' class=' answer'><span>Employee sponsorship<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-80' style=';'><div id='questionWrap-80'  class='   watupro-question-id-326489'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>80. <\/span>Which of these radio form factors are used in 802.11 WIDS\/WIPS sensors? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_80' value='326489' \/><input type='hidden' id='answerType326489' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326489[]' id='answer-id-1277222' class='answer   answerof-326489 ' value='1277222'   \/><label for='answer-id-1277222' id='answer-label-1277222' class=' answer'><span>Sensor with 2.4 GHz and 5 GHz radio<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326489[]' id='answer-id-1277223' class='answer   answerof-326489 ' value='1277223'   \/><label for='answer-id-1277223' id='answer-label-1277223' class=' answer'><span>Sensor with 5 GHz radio and software-defined radio (SDR) for both 2.4 and 5 GHz<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326489[]' id='answer-id-1277224' class='answer   answerof-326489 ' value='1277224'   \/><label for='answer-id-1277224' id='answer-label-1277224' class=' answer'><span>Sensor with three radios: 2.4 GHz, 5 GHz, and SDR radio<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326489[]' id='answer-id-1277225' class='answer   answerof-326489 ' value='1277225'   \/><label for='answer-id-1277225' id='answer-label-1277225' class=' answer'><span>Sensor with 2.4 GHz radio, 5 GHz radio, and spectrum analyzer chip<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326489[]' id='answer-id-1277226' class='answer   answerof-326489 ' value='1277226'   \/><label for='answer-id-1277226' id='answer-label-1277226' class=' answer'><span>Sensor with 900 MHz radio, 2.4 GHz radio, and 5 GHz radio<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326489[]' id='answer-id-1277227' class='answer   answerof-326489 ' value='1277227'   \/><label for='answer-id-1277227' id='answer-label-1277227' class=' answer'><span>Depends on the vendor<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-81' style=';'><div id='questionWrap-81'  class='   watupro-question-id-326490'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>81. <\/span>SSID: ABCVoice VLAN 60 Security: WPA2-Personal 2 current clients <br \/>\r<br>Two client STAs are connected to ABCData and can access a media server that requires authentication at the Application Layer and is used to stream multicast video streams to the clients. <br \/>\r<br>What client stations possess the keys that are necessary to decrypt the multicast data packets carrying these videos?<\/div><input type='hidden' name='question_id[]' id='qID_81' value='326490' \/><input type='hidden' id='answerType326490' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326490[]' id='answer-id-1277228' class='answer   answerof-326490 ' value='1277228'   \/><label for='answer-id-1277228' id='answer-label-1277228' class=' answer'><span>Only the members of the executive team that are part of the multicast group configured on the media server<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326490[]' id='answer-id-1277229' class='answer   answerof-326490 ' value='1277229'   \/><label for='answer-id-1277229' id='answer-label-1277229' class=' answer'><span>All clients that are associated to the AP using the ABCData SSID<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326490[]' id='answer-id-1277230' class='answer   answerof-326490 ' value='1277230'   \/><label for='answer-id-1277230' id='answer-label-1277230' class=' answer'><span>All clients that are associated to the AP using any SSID<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326490[]' id='answer-id-1277231' class='answer   answerof-326490 ' value='1277231'   \/><label for='answer-id-1277231' id='answer-label-1277231' class=' answer'><span>All clients that are associated to the AP with a shared GTK, which includes ABCData and ABCVoice.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-82' style=';'><div id='questionWrap-82'  class='   watupro-question-id-326491'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>82. <\/span>Which of the following encryption methods use symmetric algorithms? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_82' value='326491' \/><input type='hidden' id='answerType326491' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326491[]' id='answer-id-1277232' class='answer   answerof-326491 ' value='1277232'   \/><label for='answer-id-1277232' id='answer-label-1277232' class=' answer'><span>WEP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326491[]' id='answer-id-1277233' class='answer   answerof-326491 ' value='1277233'   \/><label for='answer-id-1277233' id='answer-label-1277233' class=' answer'><span>TKIP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326491[]' id='answer-id-1277234' class='answer   answerof-326491 ' value='1277234'   \/><label for='answer-id-1277234' id='answer-label-1277234' class=' answer'><span>Public-key cryptography<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326491[]' id='answer-id-1277235' class='answer   answerof-326491 ' value='1277235'   \/><label for='answer-id-1277235' id='answer-label-1277235' class=' answer'><span>CCMP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-83' style=';'><div id='questionWrap-83'  class='   watupro-question-id-326492'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>83. <\/span>Which of the following can be used with a wireless network to segment or restrict access to parts of the network? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_83' value='326492' \/><input type='hidden' id='answerType326492' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326492[]' id='answer-id-1277236' class='answer   answerof-326492 ' value='1277236'   \/><label for='answer-id-1277236' id='answer-label-1277236' class=' answer'><span>VLANs<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326492[]' id='answer-id-1277237' class='answer   answerof-326492 ' value='1277237'   \/><label for='answer-id-1277237' id='answer-label-1277237' class=' answer'><span>WPA-2<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326492[]' id='answer-id-1277238' class='answer   answerof-326492 ' value='1277238'   \/><label for='answer-id-1277238' id='answer-label-1277238' class=' answer'><span>Firewall<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326492[]' id='answer-id-1277239' class='answer   answerof-326492 ' value='1277239'   \/><label for='answer-id-1277239' id='answer-label-1277239' class=' answer'><span>802.11i<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326492[]' id='answer-id-1277240' class='answer   answerof-326492 ' value='1277240'   \/><label for='answer-id-1277240' id='answer-label-1277240' class=' answer'><span>RBAC<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-84' style=';'><div id='questionWrap-84'  class='   watupro-question-id-326493'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>84. <\/span>Given: Mary has just finished troubleshooting an 802.11g network performance problem using a laptop-based WLAN protocol analyzer. The wireless network implements 802.1X\/PEAP and the client devices are authenticating properly. <br \/>\r<br>When Mary disables the WLAN protocol analyzer, configures her laptop for PEAP authentication, and then tries to connect to the wireless network, she is unsuccessful. <br \/>\r<br>Before using the WLAN protocol analyzer, Mary's laptop connected to the network without any problems. <br \/>\r<br>What statement indicates why Mary cannot access the network from her laptop computer?<\/div><input type='hidden' name='question_id[]' id='qID_84' value='326493' \/><input type='hidden' id='answerType326493' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326493[]' id='answer-id-1277241' class='answer   answerof-326493 ' value='1277241'   \/><label for='answer-id-1277241' id='answer-label-1277241' class=' answer'><span>The nearby WIPS sensor categorized Mary's protocol analyzer adapter as a threat and is performing a deauthentication flood against her computer.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326493[]' id='answer-id-1277242' class='answer   answerof-326493 ' value='1277242'   \/><label for='answer-id-1277242' id='answer-label-1277242' class=' answer'><span>The PEAP client's certificate was voided when the protocol analysis software assumed control of the wireless adapter.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326493[]' id='answer-id-1277243' class='answer   answerof-326493 ' value='1277243'   \/><label for='answer-id-1277243' id='answer-label-1277243' class=' answer'><span>The protocol analyzer's network interface card (NIC) drivers are still loaded and do not support the version of PEAP being used.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326493[]' id='answer-id-1277244' class='answer   answerof-326493 ' value='1277244'   \/><label for='answer-id-1277244' id='answer-label-1277244' class=' answer'><span>Mary's supplicant software is using PEAPv0\/EAP-MSCHAPv2, and the access point is using PEAPv1\/EAP- GT<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-85' style=';'><div id='questionWrap-85'  class='   watupro-question-id-326494'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>85. <\/span>What type of files are used by the MDM profiles for Apple Mac OS and iOS devices? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_85' value='326494' \/><input type='hidden' id='answerType326494' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326494[]' id='answer-id-1277245' class='answer   answerof-326494 ' value='1277245'   \/><label for='answer-id-1277245' id='answer-label-1277245' class=' answer'><span>HTTP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326494[]' id='answer-id-1277246' class='answer   answerof-326494 ' value='1277246'   \/><label for='answer-id-1277246' id='answer-label-1277246' class=' answer'><span>XML<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326494[]' id='answer-id-1277247' class='answer   answerof-326494 ' value='1277247'   \/><label for='answer-id-1277247' id='answer-label-1277247' class=' answer'><span>JAVA<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326494[]' id='answer-id-1277248' class='answer   answerof-326494 ' value='1277248'   \/><label for='answer-id-1277248' id='answer-label-1277248' class=' answer'><span>PHP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326494[]' id='answer-id-1277249' class='answer   answerof-326494 ' value='1277249'   \/><label for='answer-id-1277249' id='answer-label-1277249' class=' answer'><span>Python<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-86' style=';'><div id='questionWrap-86'  class='   watupro-question-id-326495'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>86. <\/span>Given: The ABC Corporation currently utilizes an enterprise Public Key Infrastructure (PKI) to allow employees to securely access network resources with smart cards. <br \/>\r<br>The new wireless network will use WPA2-Enterprise as its primary authentication solution. You have been asked to recommend a Wi-Fi Alliance-tested EAP method. <br \/>\r<br>What solutions will require the least change in how users are currently authenticated and still integrate with their existing PKI?<\/div><input type='hidden' name='question_id[]' id='qID_86' value='326495' \/><input type='hidden' id='answerType326495' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326495[]' id='answer-id-1277250' class='answer   answerof-326495 ' value='1277250'   \/><label for='answer-id-1277250' id='answer-label-1277250' class=' answer'><span>EAP-FAST<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326495[]' id='answer-id-1277251' class='answer   answerof-326495 ' value='1277251'   \/><label for='answer-id-1277251' id='answer-label-1277251' class=' answer'><span>EAP-TLS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326495[]' id='answer-id-1277252' class='answer   answerof-326495 ' value='1277252'   \/><label for='answer-id-1277252' id='answer-label-1277252' class=' answer'><span>PEAPv0\/EAP-MSCHAPv2<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326495[]' id='answer-id-1277253' class='answer   answerof-326495 ' value='1277253'   \/><label for='answer-id-1277253' id='answer-label-1277253' class=' answer'><span>LEAP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326495[]' id='answer-id-1277254' class='answer   answerof-326495 ' value='1277254'   \/><label for='answer-id-1277254' id='answer-label-1277254' class=' answer'><span>PEAPv0\/EAP-TLS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326495[]' id='answer-id-1277255' class='answer   answerof-326495 ' value='1277255'   \/><label for='answer-id-1277255' id='answer-label-1277255' class=' answer'><span>EAP-TTLS\/MSCHAPv2<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-87' style=';'><div id='questionWrap-87'  class='   watupro-question-id-326496'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>87. <\/span>When developing a security policy, it is important to include many influences such as internal requirements, governmental regulations, and industry standards. <br \/>\r<br>When is it allowable not to include a specific external influence in your policy development?<\/div><input type='hidden' name='question_id[]' id='qID_87' value='326496' \/><input type='hidden' id='answerType326496' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326496[]' id='answer-id-1277256' class='answer   answerof-326496 ' value='1277256'   \/><label for='answer-id-1277256' id='answer-label-1277256' class=' answer'><span>When there is little to no chance of being audited for compliance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326496[]' id='answer-id-1277257' class='answer   answerof-326496 ' value='1277257'   \/><label for='answer-id-1277257' id='answer-label-1277257' class=' answer'><span>When your organization is not part of the applicable audience of the external policy influence<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326496[]' id='answer-id-1277258' class='answer   answerof-326496 ' value='1277258'   \/><label for='answer-id-1277258' id='answer-label-1277258' class=' answer'><span>When implementing wireless devices without the knowledge of the governing body that developed the external policy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326496[]' id='answer-id-1277259' class='answer   answerof-326496 ' value='1277259'   \/><label for='answer-id-1277259' id='answer-label-1277259' class=' answer'><span>When adherence to the external regulation or standard is cost prohibitive<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-88' style=';'><div id='questionWrap-88'  class='   watupro-question-id-326497'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>88. <\/span>An HT client STA is transmitting to an HT AP using modulation and coding scheme (MCS) #12 that defines 16-QAM modulation, two spatial streams, a 40-MHz bonded channel, and an 800 ns guard interval to achieve a data rate of 162 Mbps. <br \/>\r<br>According to the IEEE, which types of encryption should be used by the HT client STA? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_88' value='326497' \/><input type='hidden' id='answerType326497' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326497[]' id='answer-id-1277260' class='answer   answerof-326497 ' value='1277260'   \/><label for='answer-id-1277260' id='answer-label-1277260' class=' answer'><span>Static WEP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326497[]' id='answer-id-1277261' class='answer   answerof-326497 ' value='1277261'   \/><label for='answer-id-1277261' id='answer-label-1277261' class=' answer'><span>Dynamic WEP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326497[]' id='answer-id-1277262' class='answer   answerof-326497 ' value='1277262'   \/><label for='answer-id-1277262' id='answer-label-1277262' class=' answer'><span>TKIP\/ARC4<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326497[]' id='answer-id-1277263' class='answer   answerof-326497 ' value='1277263'   \/><label for='answer-id-1277263' id='answer-label-1277263' class=' answer'><span>CCMP\/AES<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326497[]' id='answer-id-1277264' class='answer   answerof-326497 ' value='1277264'   \/><label for='answer-id-1277264' id='answer-label-1277264' class=' answer'><span>All of the above<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-89' style=';'><div id='questionWrap-89'  class='   watupro-question-id-326498'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>89. <\/span>How does a RADIUS server communicate with an authenticator? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_89' value='326498' \/><input type='hidden' id='answerType326498' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326498[]' id='answer-id-1277265' class='answer   answerof-326498 ' value='1277265'   \/><label for='answer-id-1277265' id='answer-label-1277265' class=' answer'><span>UDP ports 1812 and 1813<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326498[]' id='answer-id-1277266' class='answer   answerof-326498 ' value='1277266'   \/><label for='answer-id-1277266' id='answer-label-1277266' class=' answer'><span>TCP ports 1645 and 1646<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326498[]' id='answer-id-1277267' class='answer   answerof-326498 ' value='1277267'   \/><label for='answer-id-1277267' id='answer-label-1277267' class=' answer'><span>Encrypted TLS tunnel<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326498[]' id='answer-id-1277268' class='answer   answerof-326498 ' value='1277268'   \/><label for='answer-id-1277268' id='answer-label-1277268' class=' answer'><span>Encrypted IPsec tunnel<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326498[]' id='answer-id-1277269' class='answer   answerof-326498 ' value='1277269'   \/><label for='answer-id-1277269' id='answer-label-1277269' class=' answer'><span>RADIUS IP packets<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326498[]' id='answer-id-1277270' class='answer   answerof-326498 ' value='1277270'   \/><label for='answer-id-1277270' id='answer-label-1277270' class=' answer'><span>EAPOL frames<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-90' style=';'><div id='questionWrap-90'  class='   watupro-question-id-326499'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>90. <\/span>You are configuring seven APs to prevent common security attacks. The APs are to be installed in a small business and to reduce costs, the company decided to install all consumer grade wireless routers. <br \/>\r<br>The wireless routers will connect to a switch, which connects directly to the Internet connection providing 50 Mbps of Internet bandwidth that will be shared among 53 wireless clients and 17 wired clients. <br \/>\r<br>To ensure the wireless network is as secure as possible from common attacks, what security measure can you implement given only the hardware referenced?<\/div><input type='hidden' name='question_id[]' id='qID_90' value='326499' \/><input type='hidden' id='answerType326499' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326499[]' id='answer-id-1277271' class='answer   answerof-326499 ' value='1277271'   \/><label for='answer-id-1277271' id='answer-label-1277271' class=' answer'><span>WPA-Enterprise<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326499[]' id='answer-id-1277272' class='answer   answerof-326499 ' value='1277272'   \/><label for='answer-id-1277272' id='answer-label-1277272' class=' answer'><span>802.1X\/EAP-PEAP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326499[]' id='answer-id-1277273' class='answer   answerof-326499 ' value='1277273'   \/><label for='answer-id-1277273' id='answer-label-1277273' class=' answer'><span>WPA2-Enterprise<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326499[]' id='answer-id-1277274' class='answer   answerof-326499 ' value='1277274'   \/><label for='answer-id-1277274' id='answer-label-1277274' class=' answer'><span>WPA2-Personal<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-91' style=';'><div id='questionWrap-91'  class='   watupro-question-id-326500'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>91. <\/span>The IEEE 802.11-2012 standard mandates this encryption for robust security network associations and the optional use of which other encryption?<\/div><input type='hidden' name='question_id[]' id='qID_91' value='326500' \/><input type='hidden' id='answerType326500' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326500[]' id='answer-id-1277275' class='answer   answerof-326500 ' value='1277275'   \/><label for='answer-id-1277275' id='answer-label-1277275' class=' answer'><span>WEP, AES<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326500[]' id='answer-id-1277276' class='answer   answerof-326500 ' value='1277276'   \/><label for='answer-id-1277276' id='answer-label-1277276' class=' answer'><span>IPsec, AES<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326500[]' id='answer-id-1277277' class='answer   answerof-326500 ' value='1277277'   \/><label for='answer-id-1277277' id='answer-label-1277277' class=' answer'><span>MPPE, TKIP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326500[]' id='answer-id-1277278' class='answer   answerof-326500 ' value='1277278'   \/><label for='answer-id-1277278' id='answer-label-1277278' class=' answer'><span>TKIP, WEP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326500[]' id='answer-id-1277279' class='answer   answerof-326500 ' value='1277279'   \/><label for='answer-id-1277279' id='answer-label-1277279' class=' answer'><span>CCMP, TKIP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-92' style=';'><div id='questionWrap-92'  class='   watupro-question-id-326501'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>92. <\/span>What type of WLAN attacks might be detected by a distributed WIDS\/WIPS solution using a signature analysis software engine? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_92' value='326501' \/><input type='hidden' id='answerType326501' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326501[]' id='answer-id-1277280' class='answer   answerof-326501 ' value='1277280'   \/><label for='answer-id-1277280' id='answer-label-1277280' class=' answer'><span>PS-Poll flood<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326501[]' id='answer-id-1277281' class='answer   answerof-326501 ' value='1277281'   \/><label for='answer-id-1277281' id='answer-label-1277281' class=' answer'><span>Deauthentication attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326501[]' id='answer-id-1277282' class='answer   answerof-326501 ' value='1277282'   \/><label for='answer-id-1277282' id='answer-label-1277282' class=' answer'><span>Protocol fuzzing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326501[]' id='answer-id-1277283' class='answer   answerof-326501 ' value='1277283'   \/><label for='answer-id-1277283' id='answer-label-1277283' class=' answer'><span>Virtual carrier attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326501[]' id='answer-id-1277284' class='answer   answerof-326501 ' value='1277284'   \/><label for='answer-id-1277284' id='answer-label-1277284' class=' answer'><span>CTS flood attack<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326501[]' id='answer-id-1277285' class='answer   answerof-326501 ' value='1277285'   \/><label for='answer-id-1277285' id='answer-label-1277285' class=' answer'><span>Zero day attack<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-93' style=';'><div id='questionWrap-93'  class='   watupro-question-id-326502'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>93. <\/span>What is some of the operation information that an 802.11k-2008Ccompliant client station may receive in the neighbor report from an 802.11k-2008Ccompliant access point (AP)? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_93' value='326502' \/><input type='hidden' id='answerType326502' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326502[]' id='answer-id-1277286' class='answer   answerof-326502 ' value='1277286'   \/><label for='answer-id-1277286' id='answer-label-1277286' class=' answer'><span>BSSID of neighbor AP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326502[]' id='answer-id-1277287' class='answer   answerof-326502 ' value='1277287'   \/><label for='answer-id-1277287' id='answer-label-1277287' class=' answer'><span>PHY types supported by neighbor AP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326502[]' id='answer-id-1277288' class='answer   answerof-326502 ' value='1277288'   \/><label for='answer-id-1277288' id='answer-label-1277288' class=' answer'><span>APSD support of neighbor AP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326502[]' id='answer-id-1277289' class='answer   answerof-326502 ' value='1277289'   \/><label for='answer-id-1277289' id='answer-label-1277289' class=' answer'><span>Channel number of neighbor AP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326502[]' id='answer-id-1277290' class='answer   answerof-326502 ' value='1277290'   \/><label for='answer-id-1277290' id='answer-label-1277290' class=' answer'><span>All of the above<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-94' style=';'><div id='questionWrap-94'  class='   watupro-question-id-326503'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>94. <\/span>What are the available form factors for network management server (NMS) solutions? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_94' value='326503' \/><input type='hidden' id='answerType326503' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326503[]' id='answer-id-1277291' class='answer   answerof-326503 ' value='1277291'   \/><label for='answer-id-1277291' id='answer-label-1277291' class=' answer'><span>Hardware appliance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326503[]' id='answer-id-1277292' class='answer   answerof-326503 ' value='1277292'   \/><label for='answer-id-1277292' id='answer-label-1277292' class=' answer'><span>Virtual appliance<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326503[]' id='answer-id-1277293' class='answer   answerof-326503 ' value='1277293'   \/><label for='answer-id-1277293' id='answer-label-1277293' class=' answer'><span>Software subscription service<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326503[]' id='answer-id-1277294' class='answer   answerof-326503 ' value='1277294'   \/><label for='answer-id-1277294' id='answer-label-1277294' class=' answer'><span>Integrated access point<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-95' style=';'><div id='questionWrap-95'  class='   watupro-question-id-326504'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>95. <\/span>The Wi-Fi Alliance is responsible for which of the following certification programs? (Choose all that apply.)<\/div><input type='hidden' name='question_id[]' id='qID_95' value='326504' \/><input type='hidden' id='answerType326504' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326504[]' id='answer-id-1277295' class='answer   answerof-326504 ' value='1277295'   \/><label for='answer-id-1277295' id='answer-label-1277295' class=' answer'><span>WPA2<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326504[]' id='answer-id-1277296' class='answer   answerof-326504 ' value='1277296'   \/><label for='answer-id-1277296' id='answer-label-1277296' class=' answer'><span>WEP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326504[]' id='answer-id-1277297' class='answer   answerof-326504 ' value='1277297'   \/><label for='answer-id-1277297' id='answer-label-1277297' class=' answer'><span>802.11-2012<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326504[]' id='answer-id-1277298' class='answer   answerof-326504 ' value='1277298'   \/><label for='answer-id-1277298' id='answer-label-1277298' class=' answer'><span>WMM<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-326504[]' id='answer-id-1277299' class='answer   answerof-326504 ' value='1277299'   \/><label for='answer-id-1277299' id='answer-label-1277299' class=' answer'><span>PSK<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-96' style=';'><div id='questionWrap-96'  class='   watupro-question-id-326505'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>96. <\/span>Which Layer 2 protocol is used for authentication in an 802.1X framework?<\/div><input type='hidden' name='question_id[]' id='qID_96' value='326505' \/><input type='hidden' id='answerType326505' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326505[]' id='answer-id-1277300' class='answer   answerof-326505 ' value='1277300'   \/><label for='answer-id-1277300' id='answer-label-1277300' class=' answer'><span>PAP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326505[]' id='answer-id-1277301' class='answer   answerof-326505 ' value='1277301'   \/><label for='answer-id-1277301' id='answer-label-1277301' class=' answer'><span>MS-CHAPv2<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326505[]' id='answer-id-1277302' class='answer   answerof-326505 ' value='1277302'   \/><label for='answer-id-1277302' id='answer-label-1277302' class=' answer'><span>EAP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326505[]' id='answer-id-1277303' class='answer   answerof-326505 ' value='1277303'   \/><label for='answer-id-1277303' id='answer-label-1277303' class=' answer'><span>CHAP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-326505[]' id='answer-id-1277304' class='answer   answerof-326505 ' value='1277304'   \/><label for='answer-id-1277304' id='answer-label-1277304' class=' answer'><span>MS-CHAP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div style='display:none' id='question-97'>\n\t<div class='question-content'>\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\" alt=\"Loading...\" title=\"Loading...\" \/>&nbsp;Loading...\t<\/div>\n<\/div>\n\n<br \/>\n\t\n\t\t\t<div class=\"watupro_buttons flex \" id=\"watuPROButtons8480\" >\n\t\t  <div id=\"prev-question\" style=\"display:none;\"><input type=\"button\" value=\"&lt; Previous\" onclick=\"WatuPRO.nextQuestion(event, 'previous');\"\/><\/div>\t\t  \t\t  \t\t   \n\t\t   \t  \t\t<div><input type=\"button\" name=\"action\" class=\"watupro-submit-button\" onclick=\"WatuPRO.submitResult(event)\" id=\"action-button\" value=\"View Results\"  \/>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t<input type=\"hidden\" name=\"quiz_id\" value=\"8480\" id=\"watuPROExamID\"\/>\n\t<input type=\"hidden\" name=\"start_time\" id=\"startTime\" value=\"2026-05-09 07:54:35\" \/>\n\t<input type=\"hidden\" name=\"start_timestamp\" id=\"startTimeStamp\" value=\"1778313275\" \/>\n\t<input type=\"hidden\" name=\"question_ids\" value=\"\" \/>\n\t<input type=\"hidden\" name=\"watupro_questions\" value=\"326410:1276838,1276839,1276840,1276841,1276842 | 326411:1276843,1276844,1276845,1276846 | 326412:1276847,1276848,1276849,1276850 | 326413:1276851,1276852,1276853,1276854,1276855,1276856 | 326414:1276857,1276858,1276859,1276860 | 326415:1276861,1276862,1276863,1276864 | 326416:1276865,1276866,1276867,1276868,1276869 | 326417:1276870,1276871,1276872,1276873 | 326418:1276874,1276875,1276876,1276877,1276878 | 326419:1276879,1276880,1276881,1276882,1276883 | 326420:1276884,1276885,1276886,1276887,1276888,1276889 | 326421:1276890,1276891,1276892,1276893 | 326422:1276894,1276895,1276896,1276897,1276898 | 326423:1276899,1276900,1276901,1276902 | 326424:1276903,1276904,1276905,1276906,1276907 | 326425:1276908,1276909,1276910,1276911,1276912 | 326426:1276913,1276914,1276915,1276916,1276917,1276918 | 326427:1276919,1276920,1276921,1276922,1276923,1276924,1276925 | 326428:1276926,1276927,1276928,1276929,1276930 | 326429:1276931,1276932,1276933,1276934,1276935,1276936 | 326430:1276937,1276938,1276939,1276940 | 326431:1276941,1276942,1276943,1276944 | 326432:1276945,1276946,1276947,1276948,1276949 | 326433:1276950,1276951,1276952,1276953,1276954,1276955 | 326434:1276956,1276957,1276958,1276959,1276960 | 326435:1276961,1276962,1276963,1276964,1276965,1276966,1276967 | 326436:1276968,1276969,1276970,1276971 | 326437:1276972,1276973,1276974,1276975,1276976 | 326438:1276977,1276978,1276979,1276980,1276981 | 326439:1276982,1276983,1276984,1276985,1276986 | 326440:1276987,1276988,1276989,1276990,1276991 | 326441:1276992,1276993,1276994,1276995,1276996 | 326442:1276997,1276998,1276999,1277000,1277001 | 326443:1277002,1277003,1277004,1277005,1277006 | 326444:1277007,1277008,1277009,1277010,1277011 | 326445:1277012,1277013,1277014,1277015,1277016 | 326446:1277017,1277018,1277019,1277020 | 326447:1277021,1277022,1277023,1277024,1277025,1277026 | 326448:1277027,1277028,1277029,1277030 | 326449:1277031,1277032,1277033,1277034 | 326450:1277035,1277036,1277037,1277038,1277039 | 326451:1277040,1277041,1277042,1277043 | 326452:1277044,1277045,1277046,1277047,1277048 | 326453:1277049,1277050,1277051,1277052 | 326454:1277053,1277054,1277055,1277056,1277057 | 326455:1277058,1277059,1277060,1277061,1277062 | 326456:1277063,1277064,1277065,1277066,1277067 | 326457:1277068,1277069,1277070,1277071,1277072 | 326458:1277073,1277074,1277075,1277076 | 326459:1277077,1277078,1277079,1277080,1277081 | 326460:1277082,1277083,1277084,1277085,1277086 | 326461:1277087,1277088,1277089,1277090 | 326462:1277091,1277092,1277093,1277094,1277095 | 326463:1277096,1277097,1277098,1277099 | 326464:1277100,1277101,1277102,1277103,1277104 | 326465:1277105,1277106,1277107,1277108,1277109 | 326466:1277110,1277111,1277112,1277113,1277114 | 326467:1277115,1277116,1277117,1277118 | 326468:1277119,1277120,1277121,1277122 | 326469:1277123,1277124,1277125,1277126,1277127 | 326470:1277128,1277129,1277130,1277131 | 326471:1277132,1277133,1277134,1277135 | 326472:1277136,1277137,1277138,1277139 | 326473:1277140,1277141,1277142,1277143,1277144,1277145 | 326474:1277146,1277147,1277148,1277149,1277150 | 326475:1277151,1277152,1277153,1277154,1277155 | 326476:1277156,1277157,1277158,1277159 | 326477:1277160,1277161,1277162,1277163,1277164,1277165 | 326478:1277166,1277167,1277168,1277169,1277170 | 326479:1277171,1277172,1277173,1277174,1277175 | 326480:1277176,1277177,1277178,1277179,1277180 | 326481:1277181,1277182,1277183,1277184,1277185 | 326482:1277186,1277187,1277188,1277189,1277190,1277191 | 326483:1277192,1277193,1277194,1277195,1277196 | 326484:1277197,1277198,1277199,1277200,1277201 | 326485:1277202,1277203,1277204,1277205,1277206 | 326486:1277207,1277208,1277209,1277210,1277211,1277212 | 326487:1277213,1277214,1277215,1277216 | 326488:1277217,1277218,1277219,1277220,1277221 | 326489:1277222,1277223,1277224,1277225,1277226,1277227 | 326490:1277228,1277229,1277230,1277231 | 326491:1277232,1277233,1277234,1277235 | 326492:1277236,1277237,1277238,1277239,1277240 | 326493:1277241,1277242,1277243,1277244 | 326494:1277245,1277246,1277247,1277248,1277249 | 326495:1277250,1277251,1277252,1277253,1277254,1277255 | 326496:1277256,1277257,1277258,1277259 | 326497:1277260,1277261,1277262,1277263,1277264 | 326498:1277265,1277266,1277267,1277268,1277269,1277270 | 326499:1277271,1277272,1277273,1277274 | 326500:1277275,1277276,1277277,1277278,1277279 | 326501:1277280,1277281,1277282,1277283,1277284,1277285 | 326502:1277286,1277287,1277288,1277289,1277290 | 326503:1277291,1277292,1277293,1277294 | 326504:1277295,1277296,1277297,1277298,1277299 | 326505:1277300,1277301,1277302,1277303,1277304\" \/>\n\t<input type=\"hidden\" name=\"no_ajax\" value=\"0\">\t\t\t<\/form>\n\t<p>&nbsp;<\/p>\n<\/div>\n\n<script type=\"text\/javascript\">\n\/\/jQuery(document).ready(function(){\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \t\nvar question_ids = \"326410,326411,326412,326413,326414,326415,326416,326417,326418,326419,326420,326421,326422,326423,326424,326425,326426,326427,326428,326429,326430,326431,326432,326433,326434,326435,326436,326437,326438,326439,326440,326441,326442,326443,326444,326445,326446,326447,326448,326449,326450,326451,326452,326453,326454,326455,326456,326457,326458,326459,326460,326461,326462,326463,326464,326465,326466,326467,326468,326469,326470,326471,326472,326473,326474,326475,326476,326477,326478,326479,326480,326481,326482,326483,326484,326485,326486,326487,326488,326489,326490,326491,326492,326493,326494,326495,326496,326497,326498,326499,326500,326501,326502,326503,326504,326505\";\nWatuPROSettings[8480] = {};\nWatuPRO.qArr = question_ids.split(',');\nWatuPRO.exam_id = 8480;\t    \nWatuPRO.post_id = 79103;\nWatuPRO.store_progress = 0;\nWatuPRO.curCatPage = 1;\nWatuPRO.requiredIDs=\"0\".split(\",\");\nWatuPRO.hAppID = \"0.37732100 1778313275\";\nvar url = \"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/show_exam.php\";\nWatuPRO.examMode = 1;\nWatuPRO.siteURL=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-admin\/admin-ajax.php\";\nWatuPRO.emailIsNotRequired = 0;\nWatuPROIntel.init(8480);\nWatuPRO.inCategoryPages=1;});    \t \n<\/script>\n<p>\u00a0<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[444,4825],"tags":[16902],"class_list":["post-79103","post","type-post","status-publish","format-standard","hentry","category-cwnp","category-cwsp-certification","tag-cwsp-207-dumps"],"_links":{"self":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/79103","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/comments?post=79103"}],"version-history":[{"count":2,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/79103\/revisions"}],"predecessor-version":[{"id":79106,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/79103\/revisions\/79106"}],"wp:attachment":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/media?parent=79103"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/categories?post=79103"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/tags?post=79103"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}