You perform a protocol capture using Wireshark and a compatible 802.11 adapter in Linux. When viewing the capture, you see an auth req frame and an auth rsp frame. Then you see an assoc req frame and an assoc rsp frame. Shortly after, you see DHCP communications and then ISAKMP protocol packets. What security solution is represented?
A. 802.1X/PEAPv0/MS-CHAPv2
B. 802.1X/EAP-TTLS
C. EAP-MD5
D. WPA2-Personal with AES-CCMP
E. Open 802.11 authentication with IPSec
正解:E
質問 2:
A Cisco Unified Wireless Network has an access point (AP) that provides a single point of management and reduces the security concern of a stolen access point.
Which type of access point has this characteristic?
A. Autonomous AP
B. Lightweight AP
C. LWAPP
D. Rouge AP
正解:B
質問 3:
In a security penetration exercise, a WLAN consultant obtains the WEP key of XYZ Corporation's wireless network. Demonstrating the vulnerabilities of using WEP, the consultant uses a laptop running a software AP in an attempt to hijack the authorized user's connections. XYZ's legacy network is using 802.11n APs with 802.11b, 11g, and 11n client devices. With this setup, how can the consultant cause all of the authorized clients to establish Layer 2 connectivity with the software access point?
A. If the consultant's software AP broadcasts Beacon frames that advertise 802.11g data rates that are faster rates than XYZ's current 802.11b data rates, all WLAN clients will reassociate to the faster AP.
B. When the RF signal between the clients and the authorized AP is temporarily disrupted and the consultant's software AP is using the same SSID on a different channel than the authorized AP, the clients will reassociate to the software AP.
C. All WLAN clients will reassociate to the consultant's software AP if the consultant's software AP provides the same SSID on any channel with a 10 dB SNR improvement over the authorized AP.
D. A higher SSID priority value configured in the Beacon frames of the consultant's software AP will take priority over the SSID in the authorized AP, causing the clients to reassociate.
正解:B
質問 4:
Which of the following attacks on wireless LAN is performed to shut down the wireless network?
A. Jamming attack
B. Active attack
C. Man-in-the-middle attack
D. Passive attack
正解:A
質問 5:
Your Company is receiving false and abusive e-mails from the e-mail address of your partner company. When you complain, the partner company tells you that they have never sent any such e-mails. Which of the following types of cyber crimes involves this form of network attack?
A. Cyber squatting
B. Spoofing
C. Cyber Stalking
D. Man-in-the-middle attack
正解:B
質問 6:
What software and hardware tools are used in the process performed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?
A. MAC spoofing software and MAC DoS software
B. A low-gain patch antenna and terminal emulation software
C. RF jamming device and a wireless radio card
D. A wireless workgroup bridge and a protocol analyzer
正解:C
質問 7:
You are the WLAN administrator in your organization and you are required to monitor the network and ensure all active WLANs are providing RSNs. You have a laptop protocol analyzer configured. In what frame could you see the existence or non-existence of proper RSN configuration parameters for each BSS through the RSN IE?
A. Beacon
B. Data frames
C. Probe request
D. CTS
E. RTS
正解:A
質問 8:
The Marketing department's WLAN users need to reach their file and email server as well as the Internet, but should not have access to any other network resources. What single WLAN security feature should be implemented to comply with these requirements?
A. Mutual authentication
B. RADIUS policy accounting
C. Captive portal
D. Role-based access control
E. Group authentication
正解:D
Hayashi -
試験に合格するために必須の基本知識がこのCWSP-206問題集一つでで短時間に修得できると思います。ありがとねPass4Testさん