Latest CWSP-206 exam dumps with real CWNP questions and answers [Q63-Q77]

Rate this post

Latest CWSP-206 exam dumps with real CWNP questions and answers

CWSP-206 Exam in First Attempt Guaranteed

Q63. In order to acquire credentials of a valid user on a public hotspot network, what attacks may be conducted? Choose the single completely correct answer.

 
 
 
 
 

Q64. Which of the following encryption methods use the RC4 technology? Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

Q65. Your company has just completed installation of an IEEE 802.11 WLAN controller with 20 controller-based APs. The CSO has specified PEAPv0/EAP-MSCHAPv2 as the only authorized WLAN authentication mechanism. Since an LDAP-compliant user database was already in use, a RADIUS server was installed and is querying authentication requeststo the LDAP server. Where must the X.509 server certificate and private key be installed in this network?

 
 
 
 
 

Q66. A WLAN consultant has just finished installing a WLAN controller with 15 controller-based APs.
Two SSIDs with separate VLANs are configured for this network, and both VLANs are configured to use the same RADIUS server. The SSIDs are configured as follows:
1. SSID Blue – VLAN 10 – Lightweight EAP (LEAP) authentication – CCMP
cipher suite
2. SSID Red – VLAN 20 – PEAPv0/EAP-TLS authentication – TKIP cipher
suite
The consultant’s computer can successfully authenticate and browse the Internet when using the Blue SSID. The same computer cannot authenticate when using the Red SSID. What is a possible cause of the problem?

 
 
 
 

Q67. You manage a wireless network that services 200 wireless users. Your facility requires 20 access points, and you have installed an IEEE 802.11-compliant implementation of 802.1X/LEAP with AES-CCMPas an authentication and encryption solution. In this configuration, the wireless network is initially susceptible to what type of attack?

 
 
 
 
 

Q68. For a WIPS system to identify the location of a rogue WLAN device using location pattering (RF fingerprinting), what must be done as part of the WIPS installation?

 
 
 
 

Q69. What preventative measures are performed by a WIPS against intrusions?

 
 
 
 
 

Q70. Which of the following key types are defined in the 802.11i Authentication and Key Management (AKM)?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

Q71. Which of the following attacks on wireless LAN is performed to shut down the wireless network?

 
 
 
 

Q72. You work as a Network Administrator for Tech Perfect Inc. The company has a secure wireless network. Since the company’s wireless network is so dynamic, it requires regular auditing to maintain proper security. For this reason, you are configuring NetStumbler as a wireless auditing tool. What services can NetStumbler provide? Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

Q73. What field in the RSN information element (IE) will indicate whether PSK- or Enterprise-based WPA or WPA2 is in use?

 
 
 
 

Q74. XYZ Company has recently installed a controller-based WLAN and is using a RADIUS server to query authentication requests to an LDAP server. XYZ maintains user-based access policies and would like to use the RADIUS server to facilitate network authorization. What RADIUS feature could be used by XYZ to assign the proper network permissions to users during authentications?

 
 
 
 

Q75. Your Company is receiving false and abusive e-mails from the e-mail address of your partner company. When you complain, the partner company tells you that they have never sent any such e-mails. Which of the following types of cyber crimes involves this form of network attack?

 
 
 
 

Q76. While seeking the source of interference on channel 11 in your 802.11n WLAN running within 2.4 GHz, you notice a signal in the spectrum analyzer real time FFT display. The signal is characterized with the greatest strength utilizing only 1-2 megahertz of bandwidth and it does not use significantly more bandwidth until it has weakened by roughly 20 dB. At approximately -70 dB, it spreads across as much as 35 megahertz of bandwidth. What kind of signal is described?

 
 
 
 
 
 

Q77. What protocol, listed here, allows a network manager to securely administer the network?

 
 
 
 

Exam Sure Pass CWNP Certification with CWSP-206 exam questions: https://www.validexam.com/CWSP-206-latest-dumps.html

         

Leave a Reply

Your email address will not be published. Required fields are marked *

Enter the text from the image below