PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 3

The following similar support their legacy networks such as WEP security RSN middle same BSS?


Options are :

  • None
  • WPA
  • WPA2
  • VPN
  • TSN

Answer :TSN

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 3

Your network administrator Company's technical perfection is a secure wireless network. Due to the company's wireless network it is so dynamic, it requires regular inspections to ensure safety. For this reason, you set up a wireless NetStumbler auditing tool. What services are you NetStumbler? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • By capturing and decoding package
  • Verify that the network structure
  • Possible causes for wireless interference detection
  • It allows for the detection ( "rogue") access point

Answer :Verify that the network structure Possible causes for wireless interference detection It allows for the detection ( "rogue") access point

Cisco Unified wireless network access point (AP), which provides a single level of safety and reduced theft management point of the base station. What type of access point has this feature?


Options are :

  • AutoNonemous AP
  • Lightweight AP
  • None
  • Khmer AP
  • LWAPP

Answer :Lightweight AP

Which of the following measures to do to accomplish the task? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • The wireless network WEP encryption of data transmitted using the wireless network.
  • Use Group Policy to configure the network, allowing wireless computers to connect to the network infrastructure only.
  • In order to enable the validation of a wireless network IEEE 802.1X authentication.
  • Use Group Policy setting allows a computer network to connect to a wireless ad-hoc networks.

Answer :The wireless network WEP encryption of data transmitted using the wireless network. Use Group Policy to configure the network, allowing wireless computers to connect to the network infrastructure only. In order to enable the validation of a wireless network IEEE 802.1X authentication.

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 5

Which of the following is above the background on your computer network layered communication network?


Options are :

  • WLAN
  • TSN
  • None
  • VPN
  • RSN

Answer :VPN

Which of the following protocols to ensure that all relevant information to the location of the client, including the right station?


Options are :

  • IAPP
  • MS-CHAP
  • None
  • PPP
  • CHAP

Answer :IAPP

Which of the following attack attract users into revealing personal information such as social security numbers, bank account information or credit card number?


Options are :

  • None
  • deceive
  • Replay attack
  • Password guessing attack
  • Phishing

Answer :Phishing

PW0-070 Certified Wireless Technology Specialist Exam Set 6

Your network administrator to configure the perfect Networks WPA and end customers to check the company's EAP-based wireless network to work properly. When the encryption key is placed in the active user sessions? Each correct answer presents part of the solution. Choose two.


Options are :

  • Distributed to all workstations in the network
  • customer
  • Associated Press
  • driver

Answer :customer Associated Press

Which of the following protocol is used to ensure that the VPN connection? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • TLS
  • L2TP
  • Safety
  • SSL

Answer :L2TP Safety

Your client has a new laptop. He tried to use the old connection (802.11) wireless home network router. The router is set as encrypted, but absent in the filtered MAC. What is the most likely problem?


Options are :

  • His laptop using WPA encryption protocol.
  • Physical address his laptop without a router.
  • None
  • The laptop does Nonet have a wireless network card.
  • Nonetebook computer is the operating system update, which can Nonet communicate with the router.

Answer :His laptop using WPA encryption protocol.

PW0-070 Certified Wireless Technology Specialist Exam Set 5

Which of the following is secretly installed on the user's own computer and collects information about the user does Nonet kNonew a type of malicious software?


Options are :

  • insect
  • Spyware
  • virus
  • Adware
  • None

Answer :Spyware

Which of the following two values ??using the protocol for message digest (MD5) hash function calculation and comparison?


Options are :

  • PEAP
  • None
  • EAP
  • EAP-TLS
  • CHAP

Answer :CHAP

Which of the following is already created, so a hacker, the wireless device middleman attacks?


Options are :

  • None
  • Lightweight Access Point
  • Rogue access point
  • Protocol Analyzer
  • WLAN controller

Answer :Rogue access point

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 5

In which a single manual configuration, a static encryption security protocol used by the WAP client and the shared key?


Options are :

  • L2TP
  • WPA
  • None
  • WEP
  • Safety

Answer :WEP

Which of the following attack falls into category 2 layer denial of service attack? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Spoofing attack
  • Password cracking
  • RF jamming attack
  • SYN Flood attacks

Answer :Spoofing attack SYN Flood attacks

Which of the following keys are used for public key infrastructure (PKI)? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Pairwise transient key
  • Group temporal key
  • Private key
  • Public Key

Answer :Private key Public Key

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 2

Which of the following PEAP user authentication can Nonet be used to encrypt? Each correct answer presents a complete solution. Choose two.


Options are :

  • MS-CHAP v2 of
  • GTC
  • RC4
  • rake

Answer :MS-CHAP v2 of GTC

Which in 802.11i authentication and key management (AKM) defines the following main types? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • A pairwise master key (the PMK)
  • Pairwise Transient Key (PTK)
  • Group temporal key (GTK)
  • Group master key (the GMK)

Answer :A pairwise master key (the PMK) Pairwise Transient Key (PTK) Group temporal key (GTK) Group master key (the GMK)

Which of the following is designed to detect forgery and bit-flipping attacks against WEP to use?


Options are :

  • Cyclic Redundancy Check (CRC)
  • None
  • Initialization vector (IV)
  • Message Authentication Code (MAC)
  • Message integrity (MIC)

Answer :Message integrity (MIC)

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 2

Which of the following are security access control techNonelogy, allow or deny access to certain network equipment network?


Options are :

  • Packet filtering
  • MAC address filtering
  • Route Filtering
  • Access Filter
  • None

Answer :MAC address filtering

Which of the following protocol using the client and server applications separate control and data connections?


Options are :

  • None
  • SMTP
  • SCP
  • HTTP
  • FTP

Answer :FTP

Which of the following is to secure data to an unsecured network infrastructure?


Options are :

  • PKI
  • None
  • GTK
  • PTK
  • PMK

Answer :PKI

PW0-070 Certified Wireless Technology Specialist Exam Set 6

Work your network administrator for technical perfection company's wireless LAN. Management wants to prevent local area networks and other data resources from a network of wireless devices from unauthorized access. what are you going to do?


Options are :

  • Implementation of access control lists.
  • In order to achieve a firewall.
  • Implement WIPS.
  • None
  • Undertake dynamic NAT.

Answer :Implement WIPS.

Which of the following components, which generally require secure 802.11 wireless network? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Strong encryption
  • Authenticate
  • division
  • Accessibility

Answer :Strong encryption Authenticate division

It is intended to track a user's personal information, the purpose is to pass it to third parties without your permission The following is a software application? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Spyware
  • Zombies
  • Stealware
  • Adware

Answer :Spyware Adware

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 5

Which of the following is safe for road maintenance agreement WLAN? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Remote Login
  • The SNMPv3
  • SCP
  • HTTPS

Answer :The SNMPv3 SCP HTTPS

Which of the following keys are derived from the pairwise master key (PMK)?


Options are :

  • None
  • Public Key
  • Group temporal key
  • Private key
  • Pairwise transient key

Answer :Pairwise transient key

Which of the following is the most secure protocol is used to encrypt wireless network?


Options are :

  • WPA
  • Safety
  • WEP
  • WPA2
  • None

Answer :WPA2

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 4

What is rejected (DoS) attack on the following services to help the most?


Options are :

  • None
  • A jar of honey
  • Network Research.
  • Stateful packet inspection (SPI) firewall
  • Firewall package

Answer :Stateful packet inspection (SPI) firewall

Which of the following pre-shared key is derived from, and Extensible Authentication Protocol (EAP)?


Options are :

  • None
  • Group temporal key
  • Pairwise transient key
  • PMK
  • Private key

Answer :PMK

You are the administrator of the enterprise network. Denial of service attack you care about. What is rejected (DoS) attack on the following services to help the most?


Options are :

  • None
  • Stateful packet inspection (SPI) firewall
  • Network Research.
  • Firewall package
  • A jar of honey

Answer :Stateful packet inspection (SPI) firewall

PW0-070 Certified Wireless Technology Specialist Exam Set 3

Which of the following security methods can be used to detect DoS attacks, in order to improve the security of the network?


Options are :

  • WLAN controller
  • Spectrum Analyzer
  • None
  • WIPS
  • Protocol Analyzer

Answer :WIPS

Which of the following policies are considered to design a wireless security policy document a good starting point? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • public security
  • Agreement Policy
  • AP illegal policy
  • Functional Safety

Answer :public security AP illegal policy Functional Safety

Which of the following is a safety device management protocol? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • HTTPS
  • SSH
  • HTTP
  • The SNMPv3

Answer :HTTPS SSH The SNMPv3

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 5

Following which the VPN is an important feature is what? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • encryption
  • Package
  • Authenticate
  • Data integrity

Answer :encryption Package Authenticate Data integrity

Use within the scope of the following authentication protocol 802.1X?


Options are :

  • Safety
  • EAP
  • None
  • TKIP
  • L2TP

Answer :EAP

Network based - Your NetTech with your network administrator Co., Ltd. The company is a Windows 2003 work. The company has a main office and several branch offices. You have to concentrate on the administrative authorities. That's why you Remote Authentication Dial Service (RADIUS) server. Each office proved Routing and Remote Access server. You delete the default remote access policies to secure communications, and take all the time required dial-up communications using a 40-bit encryption. What do you do to achieve this goal? Each correct answer presents part of the solution. Choose two.


Options are :

  • Set the level of encryption of basic remote access policy.
  • Set Remote Access Policy encryption level is Nonet encrypted.
  • Creating each branch of the remote access policy routing and remote access servers.
  • Create a RADIUS remote access policy.

Answer :Set the level of encryption of basic remote access policy. Create a RADIUS remote access policy.

PW0-070 Certified Wireless Technology Specialist Exam Set 2

Which of the following with Wired Equivalent Privacy (WEP) attack / techNonelogy-related? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Phishing
  • Decoy
  • Attack bit exchange
  • Low key

Answer :Attack bit exchange Low key

Which of the following is a safety device network activity of malicious or harmful behavior monitoring in?


Options are :

  • IDS
  • as a
  • None
  • IPS
  • WEP

Answer :IPS

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 1

That is to manage the wireless LAN infrastructure equipment to support authentication and encryption protocols for? (Choose three.)


Options are :

  • POP3 / SSL
  • HTTPS
  • The SNMPv3
  • SSH2

Answer :HTTPS The SNMPv3 SSH2

The AP and radio listeners off ARP packets to a wired network. The controller issued a warning, if the ARP query on wired LAN. AP work in space, if you perform this task?


Options are :

  • In monitor mode,
  • None
  • Rogue detection mode
  • Sniffer mode
  • Local Mode

Answer :Rogue detection mode

Administration requires extreme WLAN security, and create an update of the current WLAN security policy to outline safety procedures for all wireless networks within agency.Documentation program implementation to ensure that the need for a detailed written record of events organization, including details time / date type, location and physical attacks. What work is necessary to ensure compliance with the new security requirements document? (Choose three.)


Options are :

  • Usually custom WIPS security incident reports
  • Thorough re WIPS security incidents reported wireless intrusion prevention system B. Implementation
  • Assembly WIPS send all WLAN security events RADIUS
  • Failed to EAP-TLS client authentication attempt due to the incorrect password

Answer :Usually custom WIPS security incident reports Thorough re WIPS security incidents reported wireless intrusion prevention system B. Implementation Assembly WIPS send all WLAN security events RADIUS

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 2

Its encryption algorithm using two password buttons wireless data payload?


Options are :

  • RC5
  • d FLAT
  • None
  • RC4
  • 3DES

Answer :3DES

What is one way to achieve RADIUS VLAN assignment?


Options are :

  • VSA Access Control Lists
  • SSID assignment
  • Roaming Profiles
  • None
  • VLAN mapping matrix

Answer :SSID assignment

Taking into account: Enhanced confidentiality, data validation, and request a new standard 802.11i encryption key and revised in 2004 replay protection mechanisms. What determines the wireless components 802.11i- changed in 2004 to provide a new encryption key? (Choose three.)


Options are :

  • EAPOL handshake data
  • Group handshake
  • STAKey Handshake
  • 802.1X / EAP handshake
  • AES-CCMP handshake
  • 4-way handshake

Answer :Group handshake STAKey Handshake 4-way handshake

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 4

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions