A. The Pairwise Master Key (PMK) is shared by ail users
B. It uses X 509 certificates generated by a Certification Authority
C. The Pairwise Temporal Key (PTK) is specific to each session
D. It does not use the WPA 4-Way Handshake
A. Under a office desk
B. Horizontal, above a suspended ceiling
C. Vertical, at a wall
D. Horizontal, below a suspended ceiling
A. Key Confirmation Key (KCK)
B. Pairwise Temporal Key (PTK)
C. number used once (nonce)
D. Pairwise Master Key (PMK)
A. LACP is in a synchronizing process
B. The interface on the local switch is configured as static-LAG
C. LACP is working fine with no problems
D. LACP is not configured on the peer side
A. Wired Equivalent Privacy (WEP)
B. Multiple Pre-Shared Key (MPSK)
C. Temporal Key Integrity Protocol (TKIP)
D. Opportunistic Wireless Encryption (OWE)
A. After the captive portal authentication completes
B. After the WPA 4-Way Handshake is completed
C. After the firewall policies are applied to the session
D. After the client completes 802.11 association
A. The device OUI is B8-31-B5 and the device NIC serial number is 80-41-4F
B. The device OUI is B8-31 and the device NIC serial number is B5-80-41-4F
C. The device OUI is 80-41-4F and the device NIC serial number is B8-31-B5
D. The device OUI is B8-31-B5 and the device serial number is MD5 hash is 80-41-4F
A. 35 dBm
B. 15 dBm
C. 25 dBm
D. 45 dBm
A. connected
B. static
C. OSPF
D. local
A. No setup is required on the client.
B. MAC identifiers are hard to spoof.
C. It matches user names to MAC address.
D. MAC allow lists are easily maintained over time.