あなたを合格させるCWSP-206試験問題集で使おう(更新された138問があります) [Q15-Q31]

Share

あなたを合格させるCWSP-206試験問題集で使おう(更新された138問があります)

CWSP-206試験問題集でCWNP練習テスト問題


CWNP CWSP-206(CWSP認定ワイヤレスセキュリティプロフェッショナル)認定試験は、ワイヤレスセキュリティに特化したITプロフェッショナルにとって優れた認定プログラムです。この認定試験は、幅広いトピックをカバーし、最新のワイヤレスセキュリティの標準とベストプラクティスに基づいています。CWSP-206認定試験に合格することは、候補者のワイヤレスセキュリティに関する専門知識を証明するものであり、IT業界でのキャリア展望を向上させることができます。


CWNP CWSP-206 (CWSP Certified Wireless Security Professional) Examは、ワイヤレスネットワークセキュリティの専門家が、ワイヤレスセキュリティの分野での専門知識とスキルを証明するために設計された認定試験です。この試験は、様々なセキュリティの脅威や脆弱性に対してワイヤレスネットワークを保護するために必要なスキルと知識に焦点を当てています。


CWSP-206(CWSP Certified Wireless Security Professional)認定試験は、無線ネットワークセキュリティの分野で高く評価されています。CWSP認定は、組織内の無線ネットワークのセキュリティに責任を持つITプロフェッショナルを対象に設計されています。試験では、安全な無線ネットワークを実装、管理、トラブルシューティングするために必要な知識とスキルをテストします。

 

質問 # 15
Many computer users connect to the Internet at airports, which often have 802.11n access points with a captive portal forauthentication. While using an airport hotspot with this security solution, to what type of wireless attack is a user susceptible?

  • A. IGMP snooping
  • B. Management interface exploits
  • C. UDP port redirection
  • D. Wi-Fi phishing

正解:D


質問 # 16
Which of the following are the three main intended goals of WEP encryption? Each correct answer represents a complete solution. Choose all that apply.

  • A. Confidentiality
  • B. Access control
  • C. Data integrity
  • D. Authentication

正解:A、B、C


質問 # 17
A networksecurity auditor is preparing to perform a comprehensive assessment of an 802.11ac network's security. What task should be performed at the beginning of the audit to maximize the auditor's ability to expose network vulnerabilities?

  • A. Identify the manufacturer of the wireless intrusion preventionsystem.
  • B. Identify the wireless security solution(s) currently in use.
  • C. Identify the IP subnet information for each network segment.
  • D. Identify the skill level of the wireless network security administrator(s).
  • E. Identify the manufacturer of the wireless infrastructure hardware.

正解:B


質問 # 18
After completing the installation of a new overlay WIPS for the purpose of rogue detection and security monitoring at your corporate headquarters, what baseline function MUST be performed in order to identify the security threats?

  • A. WLAN devices that are discovered must be classified (rogue, authorized, neighbor, etc.) and a WLAN policy must define how to classify new devices.
  • B. Upstream and downstream throughput thresholds must be specified to ensure that service-level agreements are being met.
  • C. Separate security profiles must be defined for network operation in different regulatory domains.
  • D. Authorized PEAP usernames must be added to the WIPS server's user database.

正解:A

解説:
Explanation/Reference:


質問 # 19
Which of the following actions will you perform to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

  • A. Configure the wireless network to use WEP encryption for the data transmitted over a wireless network.
  • B. Using group policies, configure the network to allow the wireless computers to connect to the ad hoc networks only.
  • C. Implement the IEEE 802.1X authentication for the wireless network.
  • D. Implement the open system authentication for the wireless network.
  • E. Using group policies, configure the network to allow the wireless computers to connect to the infrastructure networks only.

正解:A、C、E


質問 # 20
You work as a Network Administrator for Tech Perfect Inc. The company has a secure wireless network. Since the company's wireless network is so dynamic, it requires regular auditing to maintain proper security. For this reason, you are configuring NetStumbler as a wireless auditing tool. What services can NetStumbler provide? Each correct answer represents a complete solution. Choose all that apply.

  • A. Detection of unauthorized ("rogue") access points
  • B. Detection of causes of wireless interference
  • C. Verification of network configurations
  • D. Capturing and decoding of packets

正解:A、B、C


質問 # 21
What TKIP feature was introduced to counter the weak integrity check algorithm used in WEP?

  • A. 32-bit ICV (CRC-32)
  • B. Sequence counters
  • C. Michael
  • D. Block cipher support
  • E. RC5 stream cipher

正解:C


質問 # 22
Which of the following provides the best protection against a man-in-the-middle attack?

  • A. Fiber-optic cable
  • B. Firewall
  • C. Strong encryption
  • D. Strong password

正解:C


質問 # 23
Which of the following is an intermediate network similar to RSN that supports legacy security such as WEP within the same BSS?

  • A. WPA2
  • B. WPA
  • C. VPN
  • D. TSN

正解:D


質問 # 24
When using a tunneled EAP type, such as PEAP, what component is protected inside the TLS tunnel so that it is not sent in clear text across the wireless medium?

  • A. RADIUS shared secret
  • B. X.509 certificates
  • C. User credentials
  • D. Server credentials

正解:C


質問 # 25
Which of the following monitors program activities and modifies malicious activities on a system?

  • A. HIDS
  • B. NIDS
  • C. RADIUS
  • D. Back door

正解:A


質問 # 26
XYZ Company has recently installed a controller-based WLAN and is using a RADIUS server to query authentication requests to an LDAP server. XYZ maintains user-based access policies and would like to use the RADIUS server to facilitate network authorization. What RADIUS feature could be used by XYZ to assign the proper network permissions to users during authentications?

  • A. RADIUS can reassign a client's 802.11 association to a new SSID by referencing a username-to-SSID mapping table in the LDAP user database.
  • B. The RADIUS server can communicate with the DHCP server to issue the appropriate IP address and VLAN assignment to users.
  • C. The RADIUS server can support vendor-specific attributes in the ACCESS-ACCEPT response, which can be used for user policy assignment.
  • D. RADIUS can send a DO-NOT-AUTHORIZE demand to the authenticator to prevent the STA from gaining access to specific files, but may only employ this in relation to Linux servers.

正解:C


質問 # 27
A WLAN protocol analyzer trace reveals the following sequence of frames (excluding the ACK frames):
* 802.11 Probe Req and 802.11 Probe Rsp
* 802.11 Auth and then another 802.11 Auth
* 802.11 Assoc Req and 802.11 Assoc Rsp
* EAPOL-KEY
* EAPOL-KEY
* EAPOL-KEY
* EAPOL-KEY
What security mechanism is being used on the WLAN?

  • A. WEP-128
  • B. EAP-TLS
  • C. 802.1X/LEAP
  • D. WPA-Enterprise
  • E. WPA2-Personal

正解:E


質問 # 28
Your network implements an 802.1X/EAP-based wireless security solution. A WLAN controller is installed and manages seven APs. FreeRADIUS is used for the RADIUS server and is installed on a dedicated server named SRV21. One example client is a MacBook Pro with 8 GB RAM. What device functions as the
802.1X/EAP Authenticator?

  • A. SRV21
  • B. WLAN Controller/AP
  • C. MacBook Pro
  • D. RADIUS server

正解:B


質問 # 29
After completing the installation of a new overlay WIPS for the purpose of roguedetection and security monitoring at your corporate headquarters, what baseline function MUST be performed in order to identify the security threats?

  • A. WLAN devices that are discovered must be classified (rogue, authorized, neighbor, etc.) and a WLAN policy must define how to classify new devices.
  • B. Separate security profiles must be defined for network operation in different regulatory domains.
  • C. Authorized PEAP usernames must be added to the WIPS server's user database.
  • D. Upstream and downstream throughput thresholds must be specified to ensure that service-level agreements arebeing met.

正解:A


質問 # 30
Your client has a brand new laptop. He is trying to connect to his home network, which is using an older (802.11b) wireless router. The router is set for encryption but not MAC filtering. What is the most likely problem?

  • A. His physical address for the laptop is not in the router.
  • B. His laptop is using the WPA encryption protocol.
  • C. The laptop does not have a wireless NIC.
  • D. His laptop has a newer operating system that cannot communicate with the router.

正解:B


質問 # 31
......

あなたをお手軽に合格させるCWSP-206試験正確なPDF問題:https://www.jpntest.com/shiken/CWSP-206-mondaishu

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡