Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CWSP-206 Exam Dumps - CWSP Certified Wireless Security Professional

Question # 4

You are the WLAN administrator in your organization and you are required to monitor the network and ensure all active WLANs are providing RSNs. You have a laptop protocol analyzer configured. In what frame could you see the existence or non-existence of proper RSN configuration parameters for each BSS through the RSNIE?

A.

CTS

B.

Beacon

C.

RTS

D.

Data frames

E.

Probe request

Full Access
Question # 5

Which one of the following is not a role defined in the 802.1X authentication procedures used in 802.11 and 802.3 networks for port-based authentication?

A.

AAA Server

B.

Authentication Server

C.

Supplicant

D.

Authenticator

Full Access
Question # 6

For which one of the following purposes would aWIPS not be a good solution?

A.

Enforcing wireless network security policy.

B.

Detecting and defending against eavesdropping attacks.

C.

Performance monitoring and troubleshooting.

D.

Security monitoring and notification.

Full Access
Question # 7

What software and hardware tools are used in the processperformed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?

A.

A low-gain patch antenna and terminal emulation software

B.

MAC spoofing software and MAC DoS software

C.

RF jamming device and a wireless radio card

D.

A wireless workgroup bridge and a protocol analyzer

Full Access
Question # 8

Role-Based Access Control (RBAC) allows a WLAN administrator to perform what network function?

A.

Provide two or more user groups connected to the same SSID with different levels of network privileges.

B.

Allow access tospecific files and applications based on the user’s WMM access category.

C.

Allow simultaneous support for multiple EAP types on a single access point.

D.

Minimize traffic load on an AP by requiring mandatory admission control for use of the Voice access category.

Full Access
Question # 9

Many computer users connect to the Internet at airports, which often have 802.11n access points with a captive portal forauthentication. While using an airport hotspot with this security solution, to what type of wireless attack is a user susceptible?

A.

Wi-Fi phishing

B.

Management interface exploits

C.

UDP port redirection

D.

IGMP snooping

Full Access