CNL_CH_7
問題一覧
1
Evil twin
2
802.1X
3
Evil twin
4
Conduct a site survey
5
Heat maps
6
Segment the staff WiFi network from the environmental systems network.
7
WPA-EAP
8
Configuring access using WPA3, Enabling MAC filtering
9
Footprinting
10
RADIUS, WPA2-PSK
11
NIPS, WAF
12
SAE
13
Enable MAC filtering on the switches that support the wireless network., Scan the wireless network for rogue access points.
14
EAP
15
Enforce the use of a controlled trusted source of container images
16
Perform a site survey, Create a heat map
17
WPS
18
An external access point is engaging in an evil-twin attack.
19
Evil twin
20
Use a captive portal for user authentication., Authenticate users using OAuth for more resiliency
21
Devices with cellular communication capabilities bypass traditional network security controls.
22
WPA-EAP
23
WPS (not secure)
24
802.1X utilizing the current PKI infrastructure
25
Install a captive portal
26
WPA-PSK
27
Evil twin
28
Evil twin
29
Deploying a captive portal to capture visitors' MAC addresses and names
30
Configure the guest wireless network to be on a separate VLAN from the company's internal wireless network
31
EAP-FAST
32
Rogue access point
33
WPA2-Enterprise
34
Data exfiltration over a mobile hotspot
35
Bluesnarfing
36
802.1X
37
WAP placement
38
NFC
39
EAP-TLS
40
Identify rogue access points.
41
PEAP
42
Someone near the building is jamming the signal
43
WPA2
CNL_CH_1
CNL_CH_1
Son Cagrı · 3回閲覧 · 185問 · 2年前CNL_CH_1
CNL_CH_1
3回閲覧 • 185問 • 2年前CNL_CH_2
CNL_CH_2
Son Cagrı · 109問 · 2年前CNL_CH_2
CNL_CH_2
109問 • 2年前CNL_CH_3
CNL_CH_3
Son Cagrı · 90問 · 2年前CNL_CH_3
CNL_CH_3
90問 • 2年前CNL_CH_4
CNL_CH_4
Son Cagrı · 48問 · 2年前CNL_CH_4
CNL_CH_4
48問 • 2年前CNL_CH_5
CNL_CH_5
Son Cagrı · 83問 · 2年前CNL_CH_5
CNL_CH_5
83問 • 2年前CNL_CH_6
CNL_CH_6
Son Cagrı · 100問 · 2年前CNL_CH_6
CNL_CH_6
100問 • 2年前CNL_CH_8
CNL_CH_8
Son Cagrı · 66問 · 2年前CNL_CH_8
CNL_CH_8
66問 • 2年前CNL_CH_9
CNL_CH_9
Son Cagrı · 49問 · 2年前CNL_CH_9
CNL_CH_9
49問 • 2年前CNL_CH_10
CNL_CH_10
Son Cagrı · 75問 · 2年前CNL_CH_10
CNL_CH_10
75問 • 2年前CNL_CH_11
CNL_CH_11
Son Cagrı · 118問 · 2年前CNL_CH_11
CNL_CH_11
118問 • 2年前CNL_CH_12
CNL_CH_12
Son Cagrı · 124問 · 2年前CNL_CH_12
CNL_CH_12
124問 • 2年前CNL_CH_13
CNL_CH_13
Son Cagrı · 95問 · 2年前CNL_CH_13
CNL_CH_13
95問 • 2年前21 Mayis
21 Mayis
Son Cagrı · 69問 · 1年前21 Mayis
21 Mayis
69問 • 1年前20 Mayis -175-
20 Mayis -175-
Son Cagrı · 174問 · 1年前20 Mayis -175-
20 Mayis -175-
174問 • 1年前30 Mayis
30 Mayis
Son Cagrı · 209問 · 1年前30 Mayis
30 Mayis
209問 • 1年前A-1
A-1
Son Cagrı · 216問 · 1年前A-1
A-1
216問 • 1年前A-2
A-2
Son Cagrı · 184問 · 1年前A-2
A-2
184問 • 1年前A-3
A-3
Son Cagrı · 68問 · 1年前A-3
A-3
68問 • 1年前exam topics
exam topics
Son Cagrı · 306問 · 1年前exam topics
exam topics
306問 • 1年前pass4future
pass4future
Son Cagrı · 330問 · 1年前pass4future
pass4future
330問 • 1年前son 1
son 1
Son Cagrı · 349問 · 1年前son 1
son 1
349問 • 1年前son 2
son 2
Son Cagrı · 113問 · 1年前son 2
son 2
113問 • 1年前son 3
son 3
Son Cagrı · 63問 · 1年前son 3
son 3
63問 • 1年前問題一覧
1
Evil twin
2
802.1X
3
Evil twin
4
Conduct a site survey
5
Heat maps
6
Segment the staff WiFi network from the environmental systems network.
7
WPA-EAP
8
Configuring access using WPA3, Enabling MAC filtering
9
Footprinting
10
RADIUS, WPA2-PSK
11
NIPS, WAF
12
SAE
13
Enable MAC filtering on the switches that support the wireless network., Scan the wireless network for rogue access points.
14
EAP
15
Enforce the use of a controlled trusted source of container images
16
Perform a site survey, Create a heat map
17
WPS
18
An external access point is engaging in an evil-twin attack.
19
Evil twin
20
Use a captive portal for user authentication., Authenticate users using OAuth for more resiliency
21
Devices with cellular communication capabilities bypass traditional network security controls.
22
WPA-EAP
23
WPS (not secure)
24
802.1X utilizing the current PKI infrastructure
25
Install a captive portal
26
WPA-PSK
27
Evil twin
28
Evil twin
29
Deploying a captive portal to capture visitors' MAC addresses and names
30
Configure the guest wireless network to be on a separate VLAN from the company's internal wireless network
31
EAP-FAST
32
Rogue access point
33
WPA2-Enterprise
34
Data exfiltration over a mobile hotspot
35
Bluesnarfing
36
802.1X
37
WAP placement
38
NFC
39
EAP-TLS
40
Identify rogue access points.
41
PEAP
42
Someone near the building is jamming the signal
43
WPA2