Question 1
In a WALN security, what authentication method always creates Layer2 dynamic encryption keys?
Question 2
You are the network administrator for ABC Company. Your manager has recently attended a wireless security seminar. The seminar speaker taught that a wireless network could be hidden from potential intruders if you disable the broadcasting of the SSID in Beacons and configured the access points not to respond to Probe Request frames that have a null SSID field.
Question 3
You are managing a wireless access point in autonomous mode using the Web based interface.
You capture traffic during this management task and notice that you can see the HTML code of the Web pages used for access point management. What error in administration could be the cause of this security concern?
Question 4
When a client moves to a new BSS within an ESS, what step is a part of the 802.11 reassociation process?
Question 5
An RF sigma sometimes bends as it passes through some material other than free space. What is the term that describes this behavior?
