A Review Of Highest Quality CWSP-205 practice

Want to know Examcollection CWSP-205 Exam practice test features? Want to lear more about CWNA Certified Wireless Security Professional certification experience? Study Free CWNA CWSP-205 answers to Abreast of the times CWSP-205 questions at Examcollection. Gat a success with an absolute guarantee to pass CWNA CWSP-205 (Certified Wireless Security Professional) test on your first attempt.

2016 Dec CWSP-205 training

Q51. You are implementing a wireless LAN that will be used by point-of-sale (PoS) systems in a retail environment. Thirteen PoS computers will be installed. To what industry requirement should you ensure you adhere? 

A. ISA99 

B. HIPAA 

C. PCI-DSS 

D. Directive 8500.01 

Answer:


Q52. Given: The ABC Corporation currently utilizes an enterprise Public Key Infrastructure (PKI) to allow employees to securely access network resources with smart cards. The new wireless network will use WPA2-Enterprise as its primary authentication solution. You have been asked to recommend a Wi-Fi Alliance-tested EAP method. What solutions will require the least change in how users are currently authenticated and still integrate with their existing PKI? 

A. EAP-FAST 

B. EAP-TLS 

C. PEAPv0/EAP-MSCHAPv2 

D. LEAP 

E. PEAPv0/EAP-TLS 

F. EAP-TTLS/MSCHAPv2 

Answer:


Q53. When monitoring APs within a LAN using a Wireless Network Management System (WNMS), what secure protocol may be used by the WNMS to issue configuration changes to APs? 

A. IPSec/ESP 

B. TFTP 

C. 802.1X/EAP 

D. SNMPv3 

E. PPTP 

Answer:


Q54. You must locate non-compliant 802.11 devices. Which one of the following tools will you use and why? 

A. A spectrum analyzer, because it can show the energy footprint of a device using WPA differently from a device using WPA2. 

B. A spectrum analyzer, because it can decode the PHY preamble of a non-compliant device. C. A protocol analyzer, because it can be used to view the spectrum energy of non-compliant 

802.11 devices, which is always different from compliant devices. 

D. A protocol analyzer, because it can be used to report on security settings and regulatory or rule compliance 

Answer:


Q55. What is one advantage of using EAP-TTLS instead of EAP-TLS as an authentication mechanism in an 802.11 WLAN? 

A. EAP-TTLS sends encrypted supplicant credentials to the authentication server, but EAP-TLS uses unencrypted user credentials. 

B. EAP-TTLS supports client certificates, but EAP-TLS does not. 

C. EAP-TTLS does not require an authentication server, but EAP-TLS does. 

D. EAP-TTLS does not require the use of a certificate for each STA as authentication credentials, but EAP- TLS does. 

Answer:


Abreast of the times CWSP-205 exam guide:

Q56. You have been recently hired as the wireless network administrator for an organization spread across seven locations. They have deployed more than 100 APs, but they have not been managed in either an automated or manual process for more than 18 months. Given this length of time, what is one of the first things you should evaluate from a security perspective? 

A. The channel widths configured 

B. The channels in use 

C. The VLANs in use 

D. The firmware revision 

Answer:


Q57. What policy would help mitigate the impact of peer-to-peer attacks against wireless-enabled corporate laptop computers when the laptops are also used on public access networks such as wireless hot-spots? 

A.  Require Port Address Translation (PAT) on each laptop. 

B.  Require secure applications such as POP, HTTP, and SSH. 

C. Require VPN software for connectivity to the corporate network. 

D. Require WPA2-Enterprise as the minimal WLAN security solution. 

Answer:


Q58. After completing the installation of a new overlay WIPS for the purpose of rogue detection and security monitoring at your corporate headquarters, what baseline function MUST be performed in order to identify security threats? 

A. Authorized PEAP usernames must be added to the WIPS server's user database. 

B. WLAN devices that are discovered must be classified (rogue, authorized, neighbor, etc.) and a WLAN policy must define how to classify new devices. 

C. Separate security profiles must be defined for network operation in different regulatory domains D. Upstream and downstream throughput thresholds must be specified to ensure that service-level agreements are being met. 

Answer:


Q59. You are implementing an 802.11ac WLAN and a WIPS at the same time. You must choose between integrated and overlay WIPS solutions. Which of the following statements is true regarding integrated WIPS solutions? 

A. Integrated WIPS always perform better from a client throughput perspective because the same radio that performs the threat scanning also services the clients. 

B. Integrated WIPS use special sensors installed alongside the APs to scan for threats. 

C. Many integrated WIPS solutions that detect Voice over Wi-Fi traffic will cease scanning altogether to accommodate the latency sensitive client traffic. 

D. Integrated WIPS is always more expensive than overlay WIPS. 

Answer:


Q60. What drawbacks initially prevented the widespread acceptance and use of Opportunistic Key Caching (OKC)? 

A. Sharing cached keys between controllers during inter-controller roaming created vulnerabilities that exposed the keys to attackers. 

B. Because OKC is not defined by any standards or certification body, client support was delayed and sporadic early on. 

C. Key exchanges during fast roams required processor-intensive cryptography, which was prohibitive for legacy devices supporting only TKIP. 

D. The Wi-Fi Alliance continually delayed the creation of a client certification for OKC, even though it was defined by IEEE 802.11r. 

Answer:



see more CWSP-205 dumps