New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following CWSP-206 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is CWSP-207

CWSP-206 Exam Dumps - CWSP Certified Wireless Security Professional

Go to page:
Question # 4

You are the WLAN administrator in your organization and you are required to monitor the network and ensure all active WLANs are providing RSNs. You have a laptop protocol analyzer configured. In what frame could you see the existence or non-existence of proper RSN configuration parameters for each BSS through the RSNIE?

A.

CTS

B.

Beacon

C.

RTS

D.

Data frames

E.

Probe request

Full Access
Question # 5

Which one of the following is not a role defined in the 802.1X authentication procedures used in 802.11 and 802.3 networks for port-based authentication?

A.

AAA Server

B.

Authentication Server

C.

Supplicant

D.

Authenticator

Full Access
Question # 6

For which one of the following purposes would aWIPS not be a good solution?

A.

Enforcing wireless network security policy.

B.

Detecting and defending against eavesdropping attacks.

C.

Performance monitoring and troubleshooting.

D.

Security monitoring and notification.

Full Access
Question # 7

What software and hardware tools are used in the processperformed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?

A.

A low-gain patch antenna and terminal emulation software

B.

MAC spoofing software and MAC DoS software

C.

RF jamming device and a wireless radio card

D.

A wireless workgroup bridge and a protocol analyzer

Full Access
Question # 8

Role-Based Access Control (RBAC) allows a WLAN administrator to perform what network function?

A.

Provide two or more user groups connected to the same SSID with different levels of network privileges.

B.

Allow access tospecific files and applications based on the user’s WMM access category.

C.

Allow simultaneous support for multiple EAP types on a single access point.

D.

Minimize traffic load on an AP by requiring mandatory admission control for use of the Voice access category.

Full Access
Go to page: