최신 CWSP-206 무료덤프 - CWNP CWSP Certified Wireless Security Professional
Role-Based Access Control (RBAC) allows a WLAN administrator to perform what network function?
정답: C
You are installing 6 APs on the outside of your facility. They will be mounted at a height of 6 feet.
What must you do to implement these APs in a secure manner beyond the normal indoor AP implementations? (Choose the single best answer.)
What must you do to implement these APs in a secure manner beyond the normal indoor AP implementations? (Choose the single best answer.)
정답: C
Which of the following keys is derived from Group Master Key (GMK)?
정답: A
You must implement 7 APs for a branch office location in your organizations. All APs will be autonomous and provide the same two SSIDs (CORP1879 and Guest).
Because each AP is managed directly through a web-based interface, what must be changed on every AP before enabling the WLANs to ensure proper staging procedures are followed?
Because each AP is managed directly through a web-based interface, what must be changed on every AP before enabling the WLANs to ensure proper staging procedures are followed?
정답: C
You work as a network administrator for Web Perfect Inc. You configure both WPA and EAP authentications on a client computer in the company's wireless network.
Where will the encryption key be located during the active user session? Each correct answer represents a part of the solution. Choose two.
Where will the encryption key be located during the active user session? Each correct answer represents a part of the solution. Choose two.
정답: B,C
Which of the following are software applications designed to track a user's personal information with the intent to pass it on to third parties without the user's permission? Each correct answer represents a complete solution. Choose all that apply.
정답: A,C
You work as a Network Administrator for Blue Well Inc. The company has a Windows Server
2008 domain based network. All client computers on the network run Windows Vista Ultimate.
Andy, a Finance Manager, uses Windows Mail to download his e-mails to his inbox. He complains that every now and then he gets mails asking for revealing personal or financial information. He wants that such mails are not shown to him.
Which of the following steps will you take to accomplish the task?

2008 domain based network. All client computers on the network run Windows Vista Ultimate.
Andy, a Finance Manager, uses Windows Mail to download his e-mails to his inbox. He complains that every now and then he gets mails asking for revealing personal or financial information. He wants that such mails are not shown to him.
Which of the following steps will you take to accomplish the task?

정답: C
Which of the following is the most secure protocol used for encryption in a wireless network?
정답: C
Which of the following are the layers of physical security? Each correct answer represents a complete solution. Choose all that apply.
정답: A,C,D
ABC Company is deploying an IEEE 802.11-compliant wireless security solution using
802.1X/EAP authentication. According to company policy, the security solution must prevent an eavesdropper from decrypting data frames traversing a wireless connection. What security characteristic and/or component plays a role in preventing data decryption?
802.1X/EAP authentication. According to company policy, the security solution must prevent an eavesdropper from decrypting data frames traversing a wireless connection. What security characteristic and/or component plays a role in preventing data decryption?
정답: A