A. Endpoint security for travelling users connected to unsecure Wi-Fi hotspots B. Validating user identity when using 802.1X/EAP security C. Capturing and analyzing wireless network frames D. Managing access points that are connected to WLAN controllers Answer: A QUESTION: 64 After successfully connecting to the Wi-Fi network in your hotel room, you launch a web browser on your laptop. Instead of opening your homepage, it directs you to a hotel-branded page that asks for your name, room number, and a secret key. What has most likely happened? A. You are the victim of a phishing attack, should not provide the information, and should call the front desk for help. B. Every room in the hotel has its own access point, and entering the room number and key confirms connectivity to the correct AP. C. The access point is out of connections and you must enter your room number and code to be added to the hotel's Access Request Queue (ARQ) to obtain the next available connection. D. The hotel is using a captive portal to provide guest connectivity while keeping non-guest users off the wireless network. Answer: D QUESTION: 65 Given: In order to reduce travel-related expenses, your CFO has enacted a company policy that eliminates cellular data connectivity for traveling users. Many of your users must connect to the office network during travel, but you have security concerns about wireless hotspot usage. To address these concerns, what advice should you give to your traveling users with regard to wireless hotspot usage? (Choose 2) A. Only use hotspots that offer either WPA2-PSK or 802.1X/EAP user-based security.
You've reached the end of your free preview.
Want to read all 6 pages?
- Fall '20