A WLAN protocol analyzer trace reveals the following sequence of frames (excluding the ACK
frames):
802.11 Probe Req and 802.11 Probe Rsp
802.11 Auth and then another 802.11 Auth
802.11 Assoc Req and 802.11 Assoc Rsp
EAPOL-KEY
EAPOL-KEY
EAPOL-KEY
EAPOL-KEY
What security mechanism is being used on the WLAN?
A
After completing the installation of a new overlay WIPS for the purpose of rogue detection and
security monitoring at your corporate headquarters, what baseline function MUST be performed in
order to identify the security threats?
B
WLAN protocol analyzers can read and record many wireless frame parameters. What parameter is
needed to physically locate rogue APs with a protocol analyzer?
E
When monitoring APs within a LAN using a Wireless Network Management System (WNMS), what
secure protocol may be used by the WNMS to issue configuration changes to APs?
D
What preventative measures are performed by a WIPS against intrusions?
A
What field in the RSN information element (IE) will indicate whether PSK- or Enterprise-based WPA
or WPA2 is in use?
C
What security vulnerability may result from a lack of staging, change management, and installation
procedures for WLAN infrastructure equipment?
D
What attack cannot be detected by a Wireless Intrusion Prevention System (WIPS)?
D
You are the WLAN administrator in your organization and you are required to monitor the network
and ensure all active WLANs are providing RSNs. You have a laptop protocol analyzer configured. In
what frame could you see the existence or non-existence of proper RSN configuration parameters for
each BSS through the RSN IE?
B
The following numbered items show some of the contents of each of the four frames exchanged
during the 4-way handshake.
Encrypted GTK sent
Confirmation of temporal key installation
ANonce sent from authenticator to supplicant
SNonce sent from supplicant to authenticator, MIC included
Arrange the frames in the correct sequence beginning with the start of the 4-way handshake.
B