1.
What are the interface statuses of a lightweight AP working in rogue-detection mode?
2.
What is a risk when initiating the containment of a rogue AP?
3.
Which method is used to shield the client from class 3 management attacks?
4.
Which protocol helps the administrator to determine whether a detected rogue AP is in the network of the organization?
5.
Which wireless client attempts to authenticate by using 802.1X?
6.
Which EAP protocol requires a certificate only on the server side?
7.
Which encryption algorithm does WPA use?
8.
Which statement about configuration of Layer 2 wireless user authentication on a Cisco WLC is true?
9.
Which statement describes a security weakness of a WPA2 with a PSK?
10.
Which two types of encryption does Windows support for WPA2 security for wireless connections? (Choose two.)