CWSP-206試験無料問題集「CWNP CWSP Certified Wireless Security Professional 認定」

What WLAN client device behavior is exploited by an attacker during a hijacking attack?

WLAN protocol analyzers can read and record many wireless frame parameters. What parameter is needed to physically locate rogue APs with a protocol analyzer?

Which of the following is the most secure protocol used for encryption in a wireless network?

Which of the following security levels are applied on the network to prevent unauthorized access?
Each correct answer represents a complete solution. Choose all that apply.

Your Company is receiving false and abusive e-mails from the e-mail address of your partner company. When you complain, the partner company tells you that they have never sent any such e-mails. Which of the following types of cyber crimes involves this form of network attack?

You need to set up a management system on your network.
Which of the following protocols will you use to manage your network?

You are setting up small offices for a major insurance carrier. The company policy states that all wireless configurations must fully implement the 802.11i standard. Based on this requirement, which encryption algorithm should you implement?

Joe's new laptop is experiencing difficulty connecting to ABC Company's 802.11 WLAN using
802.1X/EAP PEAPv0. The company's wireless network administrator assured Joe that his laptop was authorized in the WIPS management console for connectivity to ABC's network before it was given to him. The WIPS termination policy includes alarms for rogue stations, rogue APs, DoS attacks and unauthorized roaming. What is a likely reason that Joe cannot connect to the network?

When monitoring APs within a LAN using a Wireless Network Management System (WNMS), what secure protocol may be used by the WNMS to issue configuration changes to APs?

You are installing 6 APs on the outside of your facility. They will be mounted at a height of 6 feet.
What must you do to implement these APs in a secure manner beyond the normal indoor AP implementations? (Choose the single best answer.)