[2023年12月28日]CWSP-206問題集完全版問題、試験学習ガイド [Q45-Q64]

Share

[2023年12月28日]CWSP-206問題集完全版問題、試験学習ガイド

CWSP Certification無料認定試験材料GoShikenからの138問題


CWNP CWSP-206(CWSP Certified Wireless Security Professional)認定試験は、ワイヤレスネットワークを確保する際の知識とスキルを検証する尊敬される認定です。この認定は、ワイヤレステクノロジーを扱い、ワイヤレスセキュリティに関する専門知識を実証したいITプロフェッショナル向けに設計されています。 CWSP-206試験では、ワイヤレスネットワーク攻撃と脆弱性、セキュリティポリシーと手順、暗号化と認証プロトコルなど、幅広いトピックをカバーしています。


CWSP-206試験は、ベンダーの中立認証であり、特定の製品や技術に結び付けられていないことを意味します。これにより、特定のベンダーに縛られることなく、ワイヤレスセキュリティで知識とスキルを実証したいIT専門家にとって理想的な認定となります。この認定は、政府機関、企業、大学を含む世界中の多くの組織によって認められています。


CWSP-206 試験は、既に CWNA(Certified Wireless Network Administrator)認定を取得し、無線ネットワーク技術と概念について確固たる理解を持っている個人を対象にしています。試験は、候補者の無線セキュリティに関する知識とスキルを検証することを目的としており、また CWAP(Certified Wireless Analysis Professional)や CWNE(Certified Wireless Network Expert)などの高度な認定の足がかりとしても機能します。

 

質問 # 45
Which of the following security methods can be used to detect the DoS attack in order to enhance the security of the network?

  • A. WLAN controller
  • B. Protocol analyzer
  • C. WIPS
  • D. Spectrum analyzer

正解:C


質問 # 46
The IEEE 802.11 Pairwise Transient Key (PTK) is derived from what cryptographic element?

  • A. Group Temporal Key (GTK)
  • B. PeerKey (PK)
  • C. Group Master Key (GMK)
  • D. Phase Shift Key (PSK)
  • E. Pairwise Master Key (PMK)
  • F. Key Confirmation Key (KCK)

正解:E


質問 # 47
You are setting up small offices for a major insurance carrier. The company policy states that all wireless configurations must fully implement the 802.11i standard. Based on this requirement, which encryption algorithm should you implement?

  • A. PKI
  • B. WPA2
  • C. WEP
  • D. WPA

正解:B


質問 # 48
Which of the following types of attacks entices a user to disclose personal information such as social security number, bank account details, or credit card number?

  • A. Spoofing
  • B. Phishing
  • C. Password guessing attack
  • D. Replay attack

正解:B


質問 # 49
You are using a utility that takes input and generates random output. For example, you can provide the input of a known word as a secret word and then also provide another known word as salt input. When you process the input it generates a secret code which is a combination of letters and numbers with case sensitivity. For what is the described utility used?

  • A. Generating passwords for WLAN infrastructure equipment logins.
  • B. Generating GTKs for broadcast traffic encryption.
  • C. Generating dynamic session keys used for IPSec VPNs.
  • D. Generating PMKs that can be imported into 802.11 RSN-compatible devices.

正解:A


質問 # 50
Which one of the following is not a role defined in the 802.1X authentication procedures used in 802.11 and
802.3 networks for port-based authentication?

  • A. AAA Server
  • B. Supplicant
  • C. Authenticator
  • D. Authentication Server

正解:A


質問 # 51
Which of the following types of attacks come under the category of hacker attacks? Each correct answer represents a complete solution. Choose all that apply.

  • A. Password cracking
  • B. IP address spoofing
  • C. Smurf
  • D. Teardrop

正解:A、B


質問 # 52
Joe's new laptop is experiencing difficulty connecting to ABC Company's 802.11 WLAN using
802.1X/EAP PEAPv0. The company's wireless network administrator assured Joe that his laptop was authorized in the WIPS management console for connectivity to ABC's network before it was given to him. The WIPS termination policy includes alarms for rogue stations, rogue APs, DoS attacks and unauthorized roaming. What is a likely reason that Joe cannot connect to the network?

  • A. Joe disabled his laptop's integrated 802.11 radio and is using a personal PC card radio with a different chipset, drivers, and client utilities.
  • B. An ASLEAP attack has been detected on APs to which Joe's laptop was trying to associate. The WIPS responded by disabling the APs.
  • C. Joe's integrated 802.11 radio is sending multiple Probe Request frames on each channel.
  • D. Joe configured his 802.11 radio card to transmit at 100 mW to increase his SNR. The WIPS is detecting this much output power as a DoS attack.

正解:A


質問 # 53
What WLAN client device behavior is exploited by an attacker during a hijacking attack?

  • A. When the RF signal between a client and an access point is disrupted for more than a few seconds, the client device will attempt toassociate to an access point with better signal quality.
  • B. After the initial association and 4-way handshake, client stations and access points do not need to perform another 4-way handshake, even if connectivity is lost.
  • C. Client drivers scan for and connect to access point in the 2.4 GHz band before scanning the 5 GHz band.
  • D. As specifiedby the Wi-Fi Alliance, clients using Open System authentication must allow direct client-to-client connections, even in an infrastructure BSS.
  • E. When the RF signal between a client and an access point is lost, the client will not seek to reassociate with another access point until the 120 second hold down timer has expired.

正解:A


質問 # 54
Which of the following is a wireless device that is created to allow a cracker to conduct a man-in- the-middle attack?

  • A. WLAN controller
  • B. Protocol analyzer
  • C. Rogue access point
  • D. Lightweight Access Point

正解:C


質問 # 55
ABCHospital wishes to create a strong security policy as a first step in securing their 802.11 WLAN. Before creating the WLAN security policy, what should you ensure you possess?

  • A. Management support for the process.
  • B. End-user training manuals for the policies to be created.
  • C. Security policy generation software.
  • D. Awareness of the exact vendor devices being installed.

正解:A


質問 # 56
Which of the following encryption methods uses AES technology?

  • A. Dynamic WEP
  • B. Static WEP
  • C. CCMP
  • D. TKIP

正解:C


質問 # 57
Which of the following attacks on wireless LAN is performed to shut down the wireless network?

  • A. Jamming attack
  • B. Active attack
  • C. Passive attack
  • D. Man-in-the-middle attack

正解:A


質問 # 58
XYZ Hospital plans to improve the security and performance of their Voice over Wi-Fi implementation and will be upgrading to 802.11n phones with 802.1X/EAP authentication. XYZ would like to support fast secure roaming for the phones and will require the ability to troubleshoot reassociations that are delayed or dropped during inter-channel roaming. What portable solution would be recommended for XYZ to troubleshoot roaming problems?

  • A. WIPS sensor software installed on a laptop computer.
  • B. An autonomous AP mounted on a mobile cart and configured to operate in monitor mode.
  • C. Laptop-based protocol analyzer with multiple 802.11n adapters.
  • D. Spectrum analyzer software installed on a laptop computer.

正解:C


質問 # 59
Yousupport a coffee shop and have recently installed a free 802.11ac wireless hotspot for the benefit of your customers. You want to minimize legal risk in the event that the hotspot is used for illegal Internet activity.
What option specifies the best approach to minimize legal risk at this public hotspot while maintaining an open venue for customer Internet access?

  • A. Use a WIPS to monitor all traffic and deauthenticate malicious stations.
  • B. Configure WPA2-Enterprise security on the access point.
  • C. Require client STAs to have updated firewall and antivirus software.
  • D. Implement a captive portal with an acceptable use disclaimer.
  • E. Allow only trusted patrons to use the WLAN.
  • F. Block TCP port 25 and 80 outbound on the Internet router.

正解:D


質問 # 60
A WLAN consultant has just finished installing a WLAN controller with 15 controller-based APs.
Two SSIDs with separate VLANs are configured for this network, and both VLANs are configured to use the same RADIUS server. The SSIDs are configured as follows:
1. SSID Blue - VLAN 10 - Lightweight EAP (LEAP) authentication - CCMP
cipher suite
2. SSID Red - VLAN 20 - PEAPv0/EAP-TLS authentication - TKIP cipher
suite
The consultant's computer can successfully authenticate and browse the Internet when using the Blue SSID. The same computer cannot authenticate when using the Red SSID. What is a possible cause of the problem?

  • A. The TKIP cipher suite is not a valid option for PEAPv0 authentication.
  • B. The Red VLAN does not use server certificate, but the client requires one.
  • C. The consultant does not have a valid Kerberos ID on the Blue VLAN.
  • D. The client does not have a proper certificate installed for the tunneled authentication within the established TLS tunnel.

正解:D


質問 # 61
Which of the following protocols periodically verifies the identity of the client by using a three-way handshake?

  • A. EAP-TLS
  • B. CHAP
  • C. PAP
  • D. PPP

正解:B


質問 # 62
Which of the following encryption methods use the RC4 technology? Each correct answer represents a complete solution. Choose all that apply.

  • A. TKIP
  • B. Dynamic WEP
  • C. CCMP
  • D. Static WEP

正解:A、B、D


質問 # 63
Many computer users connect to the Internet at airports, which often have 802.11n access points with a captive portal forauthentication. While using an airport hotspot with this security solution, to what type of wireless attack is a user susceptible?

  • A. Management interface exploits
  • B. Wi-Fi phishing
  • C. IGMP snooping
  • D. UDP port redirection

正解:B


質問 # 64
......

CWSP-206試験の問題集簡単まとめ:https://www.goshiken.com/CWNP/CWSP-206-mondaishu.html