CWSP-208試験無料問題集「CWNP Certified Wireless Security Professional (CWSP) 認定」
Given: Many corporations configure guest VLANs on their WLAN controllers that allow visitors to have Internet access only. The guest traffic is tunneled to the DMZ to prevent some security risks.
In this deployment, what risks are still associated with implementing the guest VLAN without any advanced traffic monitoring or filtering features enabled? (Choose 2)
In this deployment, what risks are still associated with implementing the guest VLAN without any advanced traffic monitoring or filtering features enabled? (Choose 2)
正解:B,D
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
ABC Company has deployed a Single Channel Architecture (SCA) solution to help overcome some of the common problems with client roaming. In such a network, all APs are configured with the same channel and BSSID. PEAPv0/EAP-MSCHAPv2 is the only supported authentication mechanism.
As the Voice over Wi-Fi (STA-1) client moves throughout this network, what events are occurring?
As the Voice over Wi-Fi (STA-1) client moves throughout this network, what events are occurring?
正解:B
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
Given: Fred works primarily from home and public wireless hot-spots rather than commuting to the office. He frequently accesses the office network remotely from his Mac laptop using the local 802.11 WLAN.
In this remote scenario, what single wireless security practice will provide the greatest security for Fred?
In this remote scenario, what single wireless security practice will provide the greatest security for Fred?
正解:F
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)
You perform a protocol capture using Wireshark and a compatible 802.11 adapter in Linux. When viewing the capture, you see an auth req frame and an auth rsp frame. Then you see an assoc req frame and an assoc rsp frame. Shortly after, you see DHCP communications and then ISAKMP protocol packets. What security solution is represented?
正解:B
解答を投票する
解説: (GoShiken メンバーにのみ表示されます)