Nortel Advanced Data Networking Technology
An employee wants to set up a wireless network at home, so that the employee can work
from anywhere in the house. They know that using the default security settings on the
WLAN would leave their network open to attack. They would like to avoid eavesdropping
passive network attacks. Which security procedure best provides authentication, encryption,
A. Enable 128-bit Wired Equivalent Privacy (WEP).
B. Enable Temporal key integrity protocol (TKIP).
C. Disable broadcast of the Service Set Identifier (SSID).
D. Limit logins to a single MAC address.
A customer is requesting help with deciding what authentication protocol they should use
with their Extensible Authentication Protocol over LAN (EAPoL) configuration. Their
environment contains the following: switches that support EAP-MD5, EAP-TLS, and
PEAP-MSCHAPv2 corporate workstations that run Microsoft Windows 2000 corporate
servers that run Microsoft Windows 2003 The solution should have the following
characteristics: user credentials should be username and password machine credentials
should be hostname and password authenticator credentials should be digital certificates a
single sign-on solution machine authentication should occur transparently using a random
password assigned to the computer in the domain user authentication should occur
transparently using the user credentials when the user logs into the computeruser
authentication should occur transparently using the userWhich Extensible Authentication
Protocol (EAP) authentication protocol should they select?
D. no supported authentication protocol supports all the requirements
Click on the Exhibit button. Workstation 1 wants to send traffic through the router to the
Internet. The host on 172.16.1.220 has been compromise