CWSP-205CiscoCertified Wireless Security Professional
QUESTION:107Given: Mary has just finished troubleshooting an 802.11g network performance problem usinga laptop-based WLAN protocol analyzer. The wireless network implements 802.1X/PEAP andthe client devices are authenticating properly. When Mary disables the WLAN protocolanalyzer, configures her laptop for PEAP authentication, and then tries to connect to thewireless network, she is unsuccessful. Before using the WLAN protocol analyzer, Mary'slaptop connected to the network without any problems. What statement indicates why Marycannot access the network from her laptop computer?C
View full document
QUESTION:108You are implementing a wireless LAN that will be used by point-of-sale (PoS) systems in aretail environment. Thirteen PoS computers will be installed. To what industry requirementshould you ensure you adhere?C
View full document
QUESTION:109Given: You view a protocol analyzer capture decode with the following protocol frames listedin the following order (excluding the ACK frames):1) 802.11 Probe Request and 802.11 Probe Response2) 802.11 Auth and another 802.11 Auth2) 802.11 Assoc Req and 802.11 Assoc Rsp43
4) EAPOL-Start5) EAP Request and EAP Response6) EAP Request and EAP Response7) EAP Request and EAP Response8) EAP Request and EAP Response9) EAP Request and EAP Response
Want to read all 8 pages?
Previewing 4 of 8 pages Upload your study docs or become a member.
Want to read all 8 pages?
Previewing 4 of 8 pages Upload your study docs or become a member.
End of preview
Want to read all 8 pages? Upload your study docs or become a member.