Which of the following wireless authentication is easily prone to scam?
WPA - leap
WPA - PEAP
Ann Sales Manager, formed his company issued a smart phone in his office wireless network without entering a username / password combination. When you disconnect the wireless network, he tried to connect his personal tablet computer on the same wireless network, and could not be formed. Which of the following is the most likely cause?
The company uses the wireless MAC filter.
The company is the wireless SSID broadcast disabled.
The company uses WEP wireless.
The company uses WPA2 wireless.
After entering the following information SOHO wireless router, the mobile device user reports can not connect to the network: REGULATORY 0A: D1: FA. B1: 03: 37 DENY 01: 33: 7F: AB 10 AB Which of the following is to prevent the device to connect?
WPA2-PSK requires a supplicant on a mobile device.
Hardware address filtering prevents the device
TCP / IP port filtering is implemented in the router SOHO
IP address filtering is disabled for connecting the device.
A security analyst task is to secure a guest wireless network. They recommend the use of an authentication server, but the company told the funds are not available to set this up. Which of the following BEST allows the analyst to restrict user access to approved devices?
the placement of the antenna
The power level adjustment
Disable SSID broadcasting
If you do not know the MAC address of a Linux-based machine, you can use the command-line to find out it?