exam questions

Exam 200-301 All Questions

View all questions & answers for the 200-301 exam

Exam 200-301 topic 1 question 253 discussion

Actual exam question from Cisco's 200-301
Question #: 253
Topic #: 1
[All 200-301 Questions]

An administrator must secure the WLC from receiving spoofed association requests. Which steps must be taken to configure the WLC to restrict the requests and force the user to wait 10 ms to retry an association request?

  • A. Enable MAC filtering and set the SA Query timeout to 10.
  • B. Enable 802.1x Layer 2 security and set the Comeback timer to 10.
  • C. Enable Security Association Teardown Protection and set the SA Query timeout to 10.
  • D. Enable the Protected Management Frame service and set the Comeback timer to 10.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
MrPOW
Highly Voted 3 years, 4 months ago
Has to be D based on.. https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/212576-configure-802-11w-management-frame-prote.html#anc8
upvoted 18 times
[Removed]
3 years, 2 months ago
Yes D is the best answer with 802.11w PMF with protection and validation via secure hash to verify signed frames with MIC IE from a BSSID in the network. The secure pmf command is used together with the association-comeback time to configure a portion of this setup. In addition helps more with capwap debugging for Cisco proprietary CCX/MFP messages between controller, APs, and devices. This method is supported on the newer WLCs. https://www.cisco.com/c/en/us/support/docs/smb/wireless/cisco-small-business-wireless-access-points/smb5442-frequently-asked-questions-about-management-frame-protection.html#q3 https://content.cisco.com/chapter.sjs?uri=/searchable/chapter/content/en/us/td/docs/wireless/controller/9800/config-guide/b_wl_16_10_cg/802-11w.html.xml
upvoted 4 times
[Removed]
3 years, 2 months ago
A is not as effective with hardening the controller and AP association requests at an enterprise level https://www.portnox.com/blog/network-security/the-truth-about-mac-spoofing/ B 802.1x is secure, encrypted and effective for client authentication especially with RADIUS config. However 802.1x/802.11x are not as specifically robust as the Protected Management Frame service mechanism and processes on WLC with 802.11w. C while Security Association is an excellent added protection with Association Comeback, this answer is wrong as the SA Query retry value is between 100 to 500 ms SA teardown protection is a mechanism to prevent replay attacks from tearing down the session of an existing client. It consists of an Association Comeback Time and an SA-Query procedure preventing spoofed association requests from disconnecting an already connected client. https://content.cisco.com/chapter.sjs?uri=/searchable/chapter/content/en/us/td/docs/wireless/controller/9800/config-guide/b_wl_16_10_cg/802-11w.html.xml
upvoted 5 times
...
...
...
orxan1492
Most Recent 1 month ago
Selected Answer: C
iT's C
upvoted 1 times
...
[Removed]
7 months, 3 weeks ago
Selected Answer: D
it´s D
upvoted 2 times
...
Kabir455
8 months ago
Option C is Correct Answer SA Teardown Protection Components: Association Comeback Time: The AP adds cryptographic protection to de-authentication and dissociation frames. This prevents them from being spoofed in a Denial-of-Service (DOS) attack. SA-Query Procedure: Prevents spoofed association requests from disconnecting an already connected client. When an AP receives an association request, it verifies the legitimacy before allowing the client to connect.
upvoted 1 times
...
Sh3444
11 months, 2 weeks ago
Selected Answer: D
You then need to specify the comeback timer and SA query timeout. The comeback timer specifies the time that an associated client must wait before the association can be tried again when first denied with a status code 30. SA query timeout specifies the amount of time the WLC waits for a response from the client for the query process. If there is no response from the client, its association is deleted from the controller. This is done as shown in the image. https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/212576-configure-802-11w-management-frame-prote.html
upvoted 1 times
...
MaxaMillion
1 year ago
Option D suggests enabling the "Protected Management Frame service" and setting the "Comeback timer to 10." However, this option is not relevant to the scenario described in the question, which is about securing the Wireless LAN Controller (WLC) from spoofed association requests and introducing a delay before retries. The "Protected Management Frame service" is typically used to secure management frames in a wireless network. It's not directly related to managing or restricting association requests from client devices or controlling the delay before they can retry association. Option C, on the other hand, specifically addresses the issue of securing the WLC against spoofed association requests by using the Security Association Teardown Protection and configuring the SA Query timeout to introduce a delay. This is the appropriate approach for mitigating spoofed association requests, and that's why option C is the correct answer.
upvoted 3 times
...
Stevens0103
1 year, 2 months ago
Selected Answer: C
SA teardown protection is a mechanism to prevent replay attacks from tearing down the session of an existing client. It consists of an Association Comeback Time and anSA-Query procedure preventing spoofed association requests from disconnecting an already connected client. If a client has a valid security association, and has negotiated 802.11w, the APshall reject another Association Request with status code 30. This status code stands for "Association request rejected temporarily; Try again later". The APshould not tear down or otherwise modify the state of the existing association until theSA-Query procedure determines that the original SA is invalid and shall include in the Association Response an Association Comeback Time information element, specifying a comeback time when the AP would be ready to accept an association with this client. https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-1/config-guide/b_wl_17_11_cg/802-11w.pdf
upvoted 2 times
Stevens0103
1 year, 2 months ago
I mean... D. Step 1 Choose Configuration > Tags & Profiles > WLANs. Step 2 Click Add to create WLANs. The Add WLAN page is displayed. Step 3 In the Security > Layer2 tab, navigate to the Protected Management Frame section. Step 4 Choose PMF as Disabled, Optional, or Required. By default, the PMF is disabled. If you choose PMF as Optional or Required, you get to view the following fields: • Association Comeback Timer—Enter a value between 1 and 10 secondsto configure 802.11w association comeback time. • SA Query Time—Enter a value between 100 to 500 (milliseconds). Thisisrequired for clientsto negotiate 802.11w PMF protection on a WLAN. Step 5 Click Save & Apply to Device.
upvoted 1 times
...
...
[Removed]
1 year, 3 months ago
Selected Answer: D
Configure 802.11w Management Frame Protection on WLC - Cisco "... Benefits of 802.11w Management Frame Protection ... AP Protection ... Included in the Association Response is an Association Comeback Time information element which specifies a comeback time when the AP is ready to accept an association with this STA. This way you can ensure that legitimate clients are not disassociated due to a spoofed association request. ..."
upvoted 2 times
...
[Removed]
1 year, 4 months ago
Selected Answer: D
Here is what Cisco says : "You then need to specify the comeback timer and SA query timeout. The comeback timer specifies the time that an associated client must wait before the association can be tried again..." https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/212576-configure-802-11w-management-frame-prote.html
upvoted 2 times
...
Vikramaditya_J
1 year, 6 months ago
Selected Answer: C
Security Association (SA) Teardown Protection is a mechanism in Cisco WLC that prevents replay attacks from tearing down the session of an existing client. It consists of an Association Comeback Time and an SA-Query procedure that prevents spoofed association requests from disconnecting an already connected client. Prior to the implementation of the 802.11w standard, if an AP received either an Association or Authentication request with a spoofed source address, it would tear down the existing association with the legitimate client. With SA Teardown Protection, the AP waits for a specified time before tearing down the existing association, allowing the legitimate client to re-associate with the AP.
upvoted 1 times
...
[Removed]
1 year, 9 months ago
I am not sure but i think C is correct. D is just a part of SA teardown https://www.hitchhikersguidetolearning.com/2017/09/17/security-association-sa-teardown-protection-part-1/
upvoted 1 times
...
Mahfuj_01
1 year, 11 months ago
Answer is C. Reference : https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/5700/software/release/ios_xe_33/11rkw_DeploymentGuide/b_802point11rkw_deployment_guide_cisco_ios_xe_release33/b_802point11rkw_deployment_guide_cisco_ios_xe_release33_chapter_0100.html
upvoted 1 times
...
splashy
2 years ago
Selected Answer: D
I checked with my netacad instructor after reading this https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/5700/software/release/ios_xe_33/11rkw_DeploymentGuide/b_802point11rkw_deployment_guide_cisco_ios_xe_release33/b_802point11rkw_deployment_guide_cisco_ios_xe_release33_chapter_0100.html association-comeback—Configures the 802.11w association. The range is from 1 through 20 seconds. saquery-retry-time ... The range is from 100 to 500 ms. The value must be specified in multiples of 100 milliseconds. I think the questions should say 10 seconds, 10ms does not fall into either possible range. So 10ms should not be possible. 10 seconds? --> comeback timer
upvoted 2 times
...
aizudin
2 years ago
Selected Answer: C
Infrastructure protection is added by adding a Security Association (SA) tear down protection mechanism consisting of an Association Comeback Time and an SA-Query procedure preventing spoofed association request from disconnecting an already connected client. association-comeback—Configures the 802.11w association. The range is from 1 through 20 seconds. https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/5700/software/release/ios_xe_33/11rkw_DeploymentGuide/b_802point11rkw_deployment_guide_cisco_ios_xe_release33/b_802point11rkw_deployment_guide_cisco_ios_xe_release33_chapter_0100.html
upvoted 2 times
...
PiotrMar
2 years, 1 month ago
it is "C" Security Association (SA) Teardown Protection SA teardown protection is a mechanism to prevent replay attacks from tearing down the session of an existing client. It consists of an Association Comeback Time and an SA-Query procedure preventing spoofed association requests from disconnecting an already connected client.
upvoted 2 times
...
[Removed]
2 years, 4 months ago
Ref: Configure 802.11w Management Frame Protection on WLC – Cisco “… Benefits of 802.11w Management Frame Protection … • AP Protection … When you use 802.11w MFP, if the STA is associated and has negotiated Management Frame Protection, the AP rejects the Association Request with return status code 30 Association request rejected temporarily; Try again later to the client. Included in the Association Response is an Association Comeback Time information element which specifies a comeback time when the AP would be ready to accept an association with this STA. This way you can ensure that legitimate clients are not disassociated due to a spoofed association request. …” A. Enable MAC filtering and set the SA Query timeout to 10. Wrong answer. B. Enable 802.1x Layer 2 security and set the Comeback timer to 10. Wrong answer. C. Enable Security Association Teardown Protection and set the SA Query timeout to 10. Wrong answer. D. Enable the Protected Management Frame service and set the Comeback timer to 10. Correct answer.
upvoted 2 times
...
ZUMY
2 years, 4 months ago
Selected Answer: D
Going with D: https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/212576-configure-802-11w-management-frame-prote.html#anc8
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago