최신CWNP CWSP Certified Wireless Security Professional - CWSP-206무료샘플문제
문제1
Which of the following protocols is used for authentication in an 802.1X framework?
Which of the following protocols is used for authentication in an 802.1X framework?
정답: A
문제2
Which of the following keys is derived from a preshared key and Extensible Authentication Protocol (EAP)?
Which of the following keys is derived from a preshared key and Extensible Authentication Protocol (EAP)?
정답: D
문제3
As the primary security engineer for a large corporate network, you have been asked to author a new security policy for the wireless network. While most client devices support 802.1X authentication, some legacy devices still only support passphrase/PSK-based security methods.
When writing the 802.11 security policy, what password-related items should be addressed?
As the primary security engineer for a large corporate network, you have been asked to author a new security policy for the wireless network. While most client devices support 802.1X authentication, some legacy devices still only support passphrase/PSK-based security methods.
When writing the 802.11 security policy, what password-related items should be addressed?
정답: E
문제4
What TKIP feature was introduced to counter the weak integrity check algorithm used in WEP?
What TKIP feature was introduced to counter the weak integrity check algorithm used in WEP?
정답: B
문제5
Which of the following is an intermediate network similar to RSN that supports legacy security such as WEP within the same BSS?
Which of the following is an intermediate network similar to RSN that supports legacy security such as WEP within the same BSS?
정답: B
문제6
Fred works primarily from home and public wireless hotspots rather than commuting to office. He frequently accesses the office network remotely from his Mac laptop using the local 802.11 WLAN. In this remote scenario, what single wireless security practice will provide the greatest security for Fred?
Fred works primarily from home and public wireless hotspots rather than commuting to office. He frequently accesses the office network remotely from his Mac laptop using the local 802.11 WLAN. In this remote scenario, what single wireless security practice will provide the greatest security for Fred?
정답: D
문제7
Which of the following DoS attacks affects mostly Windows computers by sending corrupt UDP packets?
Which of the following DoS attacks affects mostly Windows computers by sending corrupt UDP packets?
정답: D
문제8
You must implement 7 APs for a branch office location in your organizations. All APs will be autonomous and provide the same two SSIDs (CORP1879 and Guest).
Because each AP is managed directly through a web-based interface, what must be changed on every AP before enabling the WLANs to ensure proper staging procedures are followed?
You must implement 7 APs for a branch office location in your organizations. All APs will be autonomous and provide the same two SSIDs (CORP1879 and Guest).
Because each AP is managed directly through a web-based interface, what must be changed on every AP before enabling the WLANs to ensure proper staging procedures are followed?
정답: B
문제9
What policy would help mitigate the impact of peer-to-peer attacks against wireless-enabled corporate laptop computers when the laptops are also used on public access networks such as wireless hotspots?
What policy would help mitigate the impact of peer-to-peer attacks against wireless-enabled corporate laptop computers when the laptops are also used on public access networks such as wireless hotspots?
정답: D
문제10
Which of the following attacks is used to obtain a user's authentication credentials?
Which of the following attacks is used to obtain a user's authentication credentials?
정답: D