Certified-Wireless-Security-Professional-(CWSP-205).pdf - Cisco CWSP-205 Certified Wireless Security Professional

Certified-Wireless-Security-Professional-(CWSP-205).pdf -...

This preview shows page 1 - 4 out of 8 pages.

CWSP-205 Cisco Certified Wireless Security Professional
Image of page 1
QUESTION: 107 Given: Mary has just finished troubleshooting an 802.11g network performance problem using a laptop-based WLAN protocol analyzer. The wireless network implements 802.1X/PEAP and the client devices are authenticating properly. When Mary disables the WLAN protocol analyzer, configures her laptop for PEAP authentication, and then tries to connect to the wireless network, she is unsuccessful. Before using the WLAN protocol analyzer, Mary's laptop connected to the network without any problems. What statement indicates why Mary cannot access the network from her laptop computer? A. The nearby WIPS sensor categorized Mary's protocol analyzer adapter as a threat and is performing a deauthentication flood against her computer. B. The PEAP client's certificate was voided when the protocol analysis software assumed control of the wireless adapter. C. The protocol analyzer's network interface card (NIC) drivers are still loaded and do not support the version of PEAP being used. D. Mary's supplicant software is using PEAPv0/EAP-MSCHAPv2, and the access point is using PEAPv1/EAP- GTC. Answer: C QUESTION: 108 You are implementing a wireless LAN that will be used by point-of-sale (PoS) systems in a retail environment. Thirteen PoS computers will be installed. To what industry requirement should you ensure you adhere? A. ISA99 B. HIPAA C. PCI-DSS D. Directive 8500.01 Answer: C QUESTION: 109 Given: You view a protocol analyzer capture decode with the following protocol frames listed in the following order (excluding the ACK frames): 1) 802.11 Probe Request and 802.11 Probe Response 2) 802.11 Auth and another 802.11 Auth 2) 802.11 Assoc Req and 802.11 Assoc Rsp 43
Image of page 2
4) EAPOL-Start 5) EAP Request and EAP Response 6) EAP Request and EAP Response 7) EAP Request and EAP Response 8) EAP Request and EAP Response 9) EAP Request and EAP Response 10) EAP Success 19) EAPOL-Key (4 frames in a row) What are you seeing in the capture file? (Choose 4) A. WPA2-Enterprise authentication B. WPA2-Personal authentication
Image of page 3
Image of page 4

You've reached the end of your free preview.

Want to read all 8 pages?

  • Fall '20
  • AP, Wi-Fi, IEEE 802.11

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture