CWSP-206 無料問題集「CWNP CWSP Certified Wireless Security Professional」

Which of the following attacks are considered as authentication attacks? Each correct answer represents a complete solution. Choose all that apply.

正解:A、B 解答を投票する
The IEEE 802.11 Pairwise Transient Key (PTK) is derived from what cryptographic element?

Peter works as a Network Administrator for the uCertify Inc. The company has a Windows-based network. All client computers run the Windows XP operating system. The employees of the company complain that suddenly all of the client computers have started working slowly. Peter finds that a malicious hacker is attempting to slow down the computers by flooding the network with a large number of requests. Which of the following attacks is being implemented by the malicious hacker?

Which of the following attacks on wireless LAN is performed to shut down the wireless network?

Which of the following keys are used by the public key infrastructure (PKI)? Each correct answer represents a complete solution. Choose all that apply.

正解:A、B 解答を投票する
In the basic 4-way handshake used in secure 802.11 networks, what is the purpose of the ANonce and SNonce?

You are the WLAN administrator in your organization and you are required to monitor the network and ensure all active WLANs are providing RSNs. You have a laptop protocol analyzer configured. In what frame could you see the existence or non-existence of proper RSN configuration parameters for each BSS through the RSN IE?

XYZ Hospital plans to improve the security and performance of their Voice over Wi-Fi implementation and will be upgrading to 802.11n phones with 802.1X/EAP authentication. XYZ would like to support fast secure roaming for the phones and will require the ability to troubleshoot reassociations that are delayed or dropped during inter-channel roaming. What portable solution would be recommended for XYZ to troubleshoot roaming problems?

Which of the following are NOT steps in securing your wireless connection? Each correct answer represents a complete solution. Choose two.

正解:A、E 解答を投票する
The Aircrack-ng WLAN software tool can capture and transmit modified 802.11 frames over the wireless network. It comes pre-installed on Kali Linux and some other Linux distributions. Which one of the following would not be a suitable penetration testing action taken with this tool?

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡