CWSP-208試験無料問題集「CWNP Certified Wireless Security Professional (CWSP) 認定」

Given: Many corporations configure guest VLANs on their WLAN controllers that allow visitors to have Internet access only. The guest traffic is tunneled to the DMZ to prevent some security risks.
In this deployment, what risks are still associated with implementing the guest VLAN without any advanced traffic monitoring or filtering features enabled? (Choose 2)

解説: (GoShiken メンバーにのみ表示されます)
ABC Company has deployed a Single Channel Architecture (SCA) solution to help overcome some of the common problems with client roaming. In such a network, all APs are configured with the same channel and BSSID. PEAPv0/EAP-MSCHAPv2 is the only supported authentication mechanism.
As the Voice over Wi-Fi (STA-1) client moves throughout this network, what events are occurring?

解説: (GoShiken メンバーにのみ表示されます)
The IEEE 802.11 standard defined Open System authentication as consisting of two auth frames and two assoc frames. In a WPA2-Enterprise network, what process immediately follows the 802.11 association procedure?

解説: (GoShiken メンバーにのみ表示されます)
Which one of the following is a valid reason to avoid the use of EAP-MD5 in production WLANs?

解説: (GoShiken メンバーにのみ表示されます)
For a WIPS system to identify the location of a rogue WLAN device using location patterning (RF fingerprinting), what must be done as part of the WIPS installation?

解説: (GoShiken メンバーにのみ表示されます)
What protocols allow a network administrator to securely manage the configuration of WLAN controllers and access points? (Choose 2)

解説: (GoShiken メンバーにのみ表示されます)
In order to acquire credentials of a valid user on a public hot-spot network, what attacks may be conducted?
Choose the single completely correct answer.

解説: (GoShiken メンバーにのみ表示されます)
Given: Fred works primarily from home and public wireless hot-spots rather than commuting to the office. He frequently accesses the office network remotely from his Mac laptop using the local 802.11 WLAN.
In this remote scenario, what single wireless security practice will provide the greatest security for Fred?

解説: (GoShiken メンバーにのみ表示されます)
You perform a protocol capture using Wireshark and a compatible 802.11 adapter in Linux. When viewing the capture, you see an auth req frame and an auth rsp frame. Then you see an assoc req frame and an assoc rsp frame. Shortly after, you see DHCP communications and then ISAKMP protocol packets. What security solution is represented?

解説: (GoShiken メンバーにのみ表示されます)
A WLAN is implemented using WPA-Personal and MAC filtering.
To what common wireless network attacks is this network potentially vulnerable? (Choose 3)

正解:A,B,C 解答を投票する
解説: (GoShiken メンバーにのみ表示されます)