CWSP-206試験無料問題集「CWNP CWSP Certified Wireless Security Professional 認定」

Your client has a brand new laptop. He is trying to connect to his home network, which is using an older (802.11b) wireless router. The router is set for encryption but not MAC filtering. What is the most likely problem?

What TKIP feature was introduced to counter the weak integrity check algorithm used in WEP?

Which of the following keys are used by the public key infrastructure (PKI)? Each correct answer represents a complete solution. Choose all that apply.

What WLAN client device behavior is exploited by an attacker during a hijacking attack?

Which of the following attacks are considered as authentication attacks? Each correct answer represents a complete solution. Choose all that apply.

You work as a Network Administrator for Blue Well Inc. The company has a Windows Server
2008 domain based network. All client computers on the network run Windows Vista Ultimate.
Andy, a Finance Manager, uses Windows Mail to download his e-mails to his inbox. He complains that every now and then he gets mails asking for revealing personal or financial information. He wants that such mails are not shown to him.
Which of the following steps will you take to accomplish the task?

Peter works as a Network Administrator for the uCertify Inc. The company has a Windows-based network. All client computers run the Windows XP operating system. The employees of the company complain that suddenly all of the client computers have started working slowly. Peter finds that a malicious hacker is attempting to slow down the computers by flooding the network with a large number of requests. Which of the following attacks is being implemented by the malicious hacker?

Which of the following is an intermediate network similar to RSN that supports legacy security such as WEP within the same BSS?

Which of the following are the security measures that are needed to maintain the security of wireless LAN?
Each correct answer represents a complete solution. Choose all that apply.

正解:B,C,D 解答を投票する
Which of the following protocols is designed to provide more secure encryption than the weak wired encryption privacy?