Certified-Wireless-Security-Professional-(CWSP-205).pdf -...

This preview shows page 1 - 4 out of 8 pages.

The preview shows page 3 - 4 out of 8 pages.
CWSP-205CiscoCertified Wireless Security Professional
QUESTION:107Given: Mary has just finished troubleshooting an 802.11g network performance problem usinga laptop-based WLAN protocol analyzer. The wireless network implements 802.1X/PEAP andthe client devices are authenticating properly. When Mary disables the WLAN protocolanalyzer, configures her laptop for PEAP authentication, and then tries to connect to thewireless network, she is unsuccessful. Before using the WLAN protocol analyzer, Mary'slaptop connected to the network without any problems. What statement indicates why Marycannot access the network from her laptop computer?C
QUESTION:108You are implementing a wireless LAN that will be used by point-of-sale (PoS) systems in aretail environment. Thirteen PoS computers will be installed. To what industry requirementshould you ensure you adhere?C
QUESTION:109Given: You view a protocol analyzer capture decode with the following protocol frames listedin the following order (excluding the ACK frames):1) 802.11 Probe Request and 802.11 Probe Response2) 802.11 Auth and another 802.11 Auth2) 802.11 Assoc Req and 802.11 Assoc Rsp43
4) EAPOL-Start5) EAP Request and EAP Response6) EAP Request and EAP Response7) EAP Request and EAP Response8) EAP Request and EAP Response9) EAP Request and EAP Response

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 8 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
N/A
Tags
AP, Wi Fi, IEEE 802 11

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture