What policy would help mitigate the impact of peer-to-peer attacks against wireless-enabled corporate laptop computers when the laptops are also used on public access networks such as wireless hot-spots?
As a part of a large organization’s security policy, how should a wireless security professional address the problem of rogue access points?
What EAP type supports using MS-CHAPv2, EAP-GTC or EAP-TLS for wireless client authentication?
What is the purpose of the Pairwise Transient Key (PTK) in IEEE 802.11 Authentication and Key Management?