CWSP-206試験無料問題集「CWNP CWSP Certified Wireless Security Professional 認定」

Which of the following protocols uses separate control and data connections between the client and server applications?

Which of the following policies are considered as a good starting point while designing a wireless security policy document? Each correct answer represents a complete solution. Choose all that apply.

正解:A,B,D 解答を投票する
Which of the following is a wireless device that is created to allow a cracker to conduct a man-in- the-middle attack?

In the basic 4-way handshake used in secure 802.11 networks, what is the purpose of the ANonce and SNonce?

A large enterprise is designing a secure, scalable, and manageable 802.11n WLAN that will support thousands of users. The enterprise will support both 802.1X/ EAP-TTLS and PEAPv0/MSCHAPv2. Currently, the company is upgrading network servers as well and will replace their existing Microsoft IAS implementation with Microsoft NPS, querying Active Directory for user authentication. For this organization, as they update their WLAN infrastructure, what WLAN controller feature will likely be least valuable?

Which of the following are the security measures that are needed to maintain the security of wireless LAN?
Each correct answer represents a complete solution. Choose all that apply.

正解:B,C,D 解答を投票する
In a security penetration exercise, a WLAN consultant obtains the WEP key of XYZ Corporation's wireless network. Demonstrating the vulnerabilities of using WEP, the consultant uses a laptop running a software AP in an attempt to hijack the authorized user's connections. XYZ's legacy network is using 802.11n APs with 802.11b, 11g, and 11n client devices. With this setup, how can the consultant cause all of the authorized clients to establish Layer 2 connectivity with the software access point?

Which of the following is an infrastructure system that allows the secure exchange of data over an unsecured network?

XYZ Company has recently installed a controller-based WLAN and is using a RADIUS server to query authentication requests to an LDAP server. XYZ maintains user-based access policies and would like to use the RADIUS server to facilitate network authorization. What RADIUS feature could be used by XYZ to assign the proper network permissions to users during authentications?

Which of the following types of attacks entices a user to disclose personal information such as social security number, bank account details, or credit card number?