Given: Your company has just completed installation of an IEEE 802.11 WLAN controller with 20
controller-based APs. The CSO has specified PEAPv0/EAP-MSCHAPv2 as the only authorized WLAN
authentication mechanism. Since an LDAP-compliant user database was already in use, a RADIUS server was
installed and is querying authentication requests to the LDAP server.
Where must the X.509 server certificate and private key be installed in this network?
What protocols allow a network administrator to securely manage the configuration of WLAN controllers and
access points? (Choose 2)
What is a primary criteria for a network to qualify as a Robust Security Network (RSN)?
Given: ABC Company has recently installed a WLAN controller and configured it to support
WPA2-Enterprise security. The administrator has configured a security profile on the WLAN controller for
each group within the company (Marketing, Sales, and Engineering).
How are authenticated users assigned to groups so that they receive the correct security profile within the
WLAN controller?
Given: ABC Company is an Internet Service Provider with thousands of customers. ABC’s customers are
given login credentials for network access when they become a customer. ABC uses an LDAP server as the
central user credential database. ABC is extending their service toexisting customers in some public access
areas and would like to use their existing database for authentication.
How can ABC Company use their existing user database for wireless user authentication as they implement a
large-scale WPA2-Enterprise WLAN security solution?
© Copyrights FreePDFQuestions 2026. All Rights Reserved
We use cookies to ensure that we give you the best experience on our website (FreePDFQuestions). If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the FreePDFQuestions.