Which of the following types of attacks entices a user to disclose personal information such as social security number, bank account details, or credit card number?
A. Phishing
B. Replay attack
C. Spoofing
D. Password guessing attack
正解:A
質問 2:
Which of the following would be the most help against Denial of Service (DOS) attacks?
A. Network surveys.
B. Honey pot
C. Stateful Packet Inspection (SPI) firewall
D. Packet filtering firewall
正解:C
質問 3:
Which of the following types of attacks come under the category of hacker attacks? Each correct answer represents a complete solution. Choose all that apply.
A. Teardrop
B. Smurf
C. Password cracking
D. IP address spoofing
正解:C,D
質問 4:
Which of the following policies are considered as a good starting point while designing a wireless security policy document? Each correct answer represents a complete solution. Choose all that apply.
A. Functional security policy
B. Rogue AP policy
C. General security policy
D. Protocol policy
正解:A,B,C
質問 5:
Which of the following is a passive device that cannot be detected by a wireless intrusion detection system (WIDS)?
A. Spectrum analyzer
B. Protocol analyzer
C. Rogue access point
D. MAC spoofing
正解:B
質問 6:
XYZ Hospital plans to improve the security and performance of their Voice over Wi-Fi implementation and will be upgrading to 802.11n phones with 802.1X/EAP authentication. XYZ would like to support fast secure roaming for the phones and will require the ability to troubleshoot reassociations that are delayed or dropped during inter-channel roaming. What portable solution would be recommended for XYZ to troubleshoot roaming problems?
A. An autonomous AP mounted on a mobile cart and configured to operate in monitor mode.
B. Laptop-based protocol analyzer with multiple 802.11n adapters.
C. Spectrum analyzer software installed on a laptop computer.
D. WIPS sensor software installed on a laptop computer.
正解:B
質問 7:
You support a coffee shop and have recently installed a free 802.11ac wireless hotspot for the benefit of your customers. You want to minimize legal risk in the event that the hotspot is used for illegal Internet activity. What option specifies the best approach to minimize legal risk at this public hotspot while maintaining an open venue for customer Internet access?
A. Configure WPA2-Enterprise security on the access point.
B. Require client STAs to have updated firewall and antivirus software.
C. Use a WIPS to monitor all traffic and deauthenticate malicious stations.
D. Block TCP port 25 and 80 outbound on the Internet router.
E. Implement a captive portal with an acceptable use disclaimer.
F. Allow only trusted patrons to use the WLAN.
正解:E
質問 8:
Which of the following keys are used by the symmetric key algorithm? Each correct answer represents a complete solution. Choose all that apply.
A. Public Key
B. Pairwise Transient Key
C. Group Temporal Key
D. Private Key
正解:D
塚本** -
最小限の対策で合格をめざすCWSP-206参考書だぜ試験ではどのように出題されているかを確認できますCWSP-206。