In an IEEE 802.11-compliant WLAN, when is the 802.1X Controlled Port placed into the unblocked state?
WLAN protocol analyzers can read and record many wireless frame parameters. What parameter is needed to physically locate rogue APs with a protocol analyzer?
What attack cannot be detected by a Wireless Intrusion Prevention System (WIPS)?
The Marketing department’s WLAN users need to reach their file and email server as well as the Internet, but should not have access to any other network resources. What single WLAN security feature should beimplemented to comply with these requirements?