When used as part of a WLAN authentication solution, what is the role of LDAP?
What attack cannot be detected by a Wireless Intrusion Prevention System (WIPS)?
What elements should be addressed by a WLAN security policy? (Choose 2)
What protocols allow a network administrator to securely manage the configuration of WLAN controllers and access points? (Choose 2)
Given: A large enterprise is designing a secure, scalable, and manageable 802.11n WLAN that will support thousands of users. The enterprise will support both 802.1X/EAP-TTLS and PEAPv0/MSCHAPv2. Currently, the company is upgrading network servers as well and will replace their existing Microsoft IAS implementation with Microsoft NPS, querying Active Directory for user authentication.
For this organization, as they update their WLAN infrastructure, what WLAN controller feature will likely be least valuable?