Which of the following are legacy authentication protocols used within the stronger EAP authentication protocols? Each correct answer represents a complete solution. Choose all that apply.
A. MS-CHAP
B. CHAP
C. PAP
D. PPTP
正解:A,B,C
質問 2:
Which of the following provides the best protection against a man-in-the-middle attack?
A. Strong password
B. Fiber-optic cable
C. Firewall
D. Strong encryption
正解:D
質問 3:
Which of the following is a type of malware that is secretly installed on the user's personal computer and collects users' information without their knowledge?
A. Adware
B. Spyware
C. Virus
D. Worm
正解:B
質問 4:
You are setting up small offices for a major insurance carrier. The company policy states that all wireless configurations must fully implement the 802.11i standard. Based on this requirement, which encryption algorithm should you implement?
A. WEP
B. PKI
C. WPA2
D. WPA
正解:C
質問 5:
Which of the following are secure infrastructure management protocols used in WLAN? Each correct answer represents a complete solution. Choose all that apply.
A. Telnet
B. HTTPS
C. SNMPv3
D. SCP
正解:B,C,D
質問 6:
Which of the following provides security by implementing authentication and encryption on Wireless LAN (WLAN)?
A. L2TP
B. WEP
C. IPSec
D. WAP
正解:B
質問 7:
You support a coffee shop and have recently installed a free 802.11ac wireless hotspot for the benefit of your customers. You want to minimize legal risk in the event that the hotspot is used for illegal Internet activity. What option specifies the best approach to minimize legal risk at this public hotspot while maintaining an open venue for customer Internet access?
A. Configure WPA2-Enterprise security on the access point.
B. Require client STAs to have updated firewall and antivirus software.
C. Use a WIPS to monitor all traffic and deauthenticate malicious stations.
D. Block TCP port 25 and 80 outbound on the Internet router.
E. Implement a captive portal with an acceptable use disclaimer.
F. Allow only trusted patrons to use the WLAN.
正解:E
質問 8:
You are the Administrator for a corporate network.
You are concerned about denial of service attacks.
Which of the following would be the most help against Denial of Service (DOS) attacks?
A. Network surveys.
B. Honey pot
C. Stateful Packet Inspection (SPI) firewall
D. Packet filtering firewall
正解:C
Sudou -
試験を受け、無事CWSP-206合格することが出来ました。前にもPass4TestにCWSP-205とかCWDP-305を買って全部合格したもん。ここ合格率高ぇな