What policy would help mitigate the impact of peer-to-peer attacks against wireless-enabled corporate laptop computers when the laptops are also used on public access networks such as wireless hotspots?
A. Require Port Address Translation (PAT) on each laptop.
B. Require secure applications such as POP, HTTP, and SSH.
C. Require VPN software for connectivity to the corporate network.
D. Require WPA2-Enterprise as the minimal WLAN security solution.
正解:C
質問 2:
Which of the following keys are used by the public key infrastructure (PKI)? Each correct answer represents a complete solution. Choose all that apply.
A. Public Key
B. Pairwise Transient Key
C. Group Temporal Key
D. Private Key
正解:A,D
質問 3:
You are the WLAN administrator in your organization and you are required to monitor the network and ensure all active WLANs are providing RSNs. You have a laptop protocol analyzer configured. In what frame could you see the existence or non-existence of proper RSN configuration parameters for each BSS through the RSN IE?
A. Beacon
B. Data frames
C. Probe request
D. CTS
E. RTS
正解:A
質問 4:
You support a coffee shop and have recently installed a free 802.11ac wireless hotspot for the benefit of your customers. You want to minimize legal risk in the event that the hotspot is used for illegal Internet activity. What option specifies the best approach to minimize legal risk at this public hotspot while maintaining an open venue for customer Internet access?
A. Configure WPA2-Enterprise security on the access point.
B. Require client STAs to have updated firewall and antivirus software.
C. Use a WIPS to monitor all traffic and deauthenticate malicious stations.
D. Block TCP port 25 and 80 outbound on the Internet router.
E. Implement a captive portal with an acceptable use disclaimer.
F. Allow only trusted patrons to use the WLAN.
正解:E
質問 5:
As the primary security engineer for a large corporate network, you have been asked to author a new security policy for the wireless network. While most client devices support 802.1X authentication, some legacy devices still only support passphrase/PSK-based security methods.
When writing the 802.11 security policy, what password-related items should be addressed?
A. Password complexity should be maximized so that weak WEP IV attacks are prevented.
B. Static passwords should be changed on a regular basis to minimize the vulnerabilities of a PSK- based authentication.
C. EAP-TLS must be implemented in such scenarios.
D. MS-CHAPv2 passwords used with EAP/PEAPv0 should be stronger than typical WPA2-PSK passphrases.
E. Certificates should always be recommended instead of passwords for 802.11 client authentication.
正解:B
質問 6:
Which of the following components are typically required for securing a wireless 802.11 network?
Each correct answer represents a complete solution. Choose all that apply.
A. AAA
B. Network segmentation
C. Monitoring
D. Data confidentiality
正解:A,B,C,D
質問 7:
Which of the following security methods can be used to detect the DoS attack in order to enhance the security of the network?
A. Spectrum analyzer
B. Protocol analyzer
C. WLAN controller
D. WIPS
正解:D
質問 8:
Which of the following key types are defined in the 802.11i Authentication and Key Management (AKM)?
Each correct answer represents a complete solution. Choose all that apply.
A. Pairwise Transient Key (PTK)
B. Pairwise Master Key (PMK)
C. Group Master Key (GMK)
D. Group Temporal Key (GTK)
正解:A,B,C,D
Izumida -
口コミ通り、このCWSP-206問題集をマスターすれば合格できます。Pass4Testさんの商品はいつも信頼しております。