PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 5

Victor want to use Wireless Zero Configuration (WZC) running Windows XP operating system using his computer to establish a wireless network. Which of the following is what his computer the most likely threats? Each correct answer presents a complete solution. Choose two.


Options are :

  • An attacker can use the Ping flood DoS attacks, if using WZC.
  • It does Nonet allow encryption and MAC filtering configuration. Information sent is Nonet a secure wireless network.
  • Good kNonewledge network can be observed using a wireless analyzer can be used to get.
  • September Victor computers connected to the network by an attacker to create a fake wireless network of high-power antenna to get her.

Answer :Good kNonewledge network can be observed using a wireless analyzer can be used to get. September Victor computers connected to the network by an attacker to create a fake wireless network of high-power antenna to get her.

Which of the following is used to obtain the user's authentication credentials attack?


Options are :

  • Teardrop attack
  • None
  • Shock brutal force
  • Phishing attacks
  • Bunker Attack

Answer :Shock brutal force

Which of the following tools John used to crack the wireless encryption key?


Options are :

  • Cain
  • None
  • AirSNonert
  • PsPasswd
  • Which of the following tools John used to crack the wireless encryption key?

Answer :AirSNonert

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 1

Which of the following attacks Adam?


Options are :

  • DoS attacks is a network or system crashes
  • None
  • DDoS attack, wherein the water supply network or system comprising
  • Middle attack
  • Reverse social engineering attacks

Answer :DoS attacks is a network or system crashes

Which of the following protocol is intended to provide more secure than the weak link in the privacy of encrypted encryption?


Options are :

  • None
  • TKIP
  • PEAP
  • CCMP
  • leap

Answer :TKIP

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 5

Which uses less symmetric encryption keys? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Pairwise transient key
  • None
  • Public Key
  • Private key
  • Group temporal key

Answer :Private key

John, malicious hackers, forcing it to stop flushing through the router to forward packets still a lot of open connections simultaneously, so all hosts behind the effective blocking. What John follow the attack on how to proceed?


Options are :

  • Replay attack
  • DoS attacks
  • Rainbow Attack
  • ARP spoofing
  • None

Answer :DoS attacks

Which by the IEEE 802.11 defines the following pre-RSNA security wireless security protocols?


Options are :

  • EAP
  • None
  • CCMP
  • WEP
  • TKIP

Answer :WEP

PW0-070 Certified Wireless Technology Specialist Exam Set 5

Which of the following attack can Nonet be blocked by a firewall? Each correct answer presents a complete solution. Check all that apply


Options are :

  • Phishing attacks
  • Ping floods
  • URL confused attack
  • Shoulder surfing attack

Answer :Phishing attacks URL confused attack Shoulder surfing attack

Which of the following is a legacy of a stronger authentication protocol EAP authentication protocols? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • CHAP
  • MS-CHAP
  • PPTP
  • PAP

Answer :CHAP MS-CHAP PAP

Which of the following is a social techNonelogy? Each correct answer presents a complete solution. Check all that apply


Options are :

  • Salami Attack
  • Phishing
  • Decoy
  • pretexting

Answer :Phishing Decoy pretexting

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 3

Which of the following is a stream and block ciphers and encryption products?


Options are :

  • rake
  • d FLAT
  • RC2
  • RC4
  • None

Answer :d FLAT

What are you going to take the following recommended safety?


Options are :

  • VPN
  • SSL
  • None
  • HTTP
  • S / MIME

Answer :SSL

Which of the following is a computer network that is used to prevent unauthorized Internet users from accessing private networks connected to the part of the Internet?


Options are :

  • Party wall
  • None
  • Intrusion detection system
  • Protocol Analyzer
  • Wired Equivalent Privacy

Answer :Party wall

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 2

What is less agreement from time to time to check the use of three-way handshake identity of the client?


Options are :

  • EAP-TLS
  • PPP
  • CHAP
  • PAP
  • None

Answer :CHAP

One of the following protocols using the Internet Hypertext Transfer Protocol (HTTP) and Transmission Control Protocol (TCP) layer of software between the layers?


Options are :

  • TFTP
  • SCP
  • SSL
  • HTTPS
  • None

Answer :SSL

Below it is a network protocol that provides a centralized connection authentication, authorization, and accounting (AAA) management and use of computers to the network?


Options are :

  • None
  • Safety
  • rain
  • HTTP
  • SSL

Answer :rain

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 5

It is certified following wireless network security solutions, is defined by the user can connect to a wireless access point in the process on the central server, so that all hosts are properly authenticated?


Options are :

  • The IEEE 802.1x
  • Wired Equivalent Privacy (WEP)
  • RFID Dial In User Service (RADIUS)
  • WPA 2 (WPA2)
  • None

Answer :The IEEE 802.1x

Your company receives false and harmful emails from your partner's e-mail address. When you complain, partner companies say they never send such messages. Which of the following is associated with this type of cybercrime cyber attacks?


Options are :

  • Middle attack
  • deceive
  • Cybersquatting
  • Internet Stalking
  • None

Answer :deceive

Peter acts as a network administrator uCertify Co., Ltd. The company is a Windows-based network. Windows XP operating system to run on all client computers. Employees complained that, all of a sudden all of the client computer is beginning to work. Peter pointed out that a malicious hacker trying to computers on the network have a large number of requests flood mitigation. Which of the following ongoing attacks by malicious hackers?


Options are :

  • Middle attack
  • SQL injection attacks
  • Buffer overflow attacks
  • Denial of Service (DoS)
  • None

Answer :Denial of Service (DoS)

PW0-070 Certified Wireless Technology Specialist Exam Set 3

Which of the following public key encryption protocol used to authenticate the remote computer?


Options are :

  • SSH
  • Remote Login
  • SSL
  • SCP
  • None

Answer :SSH

You work with your network administrator uCertify company, you need to provide secure communication between the company's server and client computers. Which of the following protocol, using the management communication safely?


Options are :

  • TCP
  • SSL
  • HTTP
  • TLS

Answer :SSL TLS

Which supports the following security protocols Wi-Fi Protected Access (WPA) through?


Options are :

  • None
  • TKIP
  • CCMP
  • PEAP
  • leap

Answer :TKIP

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 3

Which of the following methods can be used to detect rogue access points, in order to improve the security of the network? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Wireless sniffing tools
  • All the hidden SSID AP
  • When the controlled access point list
  • Installation WIPS

Answer :Wireless sniffing tools When the controlled access point list Installation WIPS

Below which it is Nonet detected by the wireless intrusion detection system (WIDS) passive devices?


Options are :

  • None
  • Protocol Analyzer
  • MAC spoofing
  • Spectrum Analyzer
  • Rogue access point

Answer :Protocol Analyzer

Which of the following is considered to be attacked certified attack? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Eavesdropper attack
  • Denial of Service (DoS)
  • Middle attack
  • Harassment attacks

Answer :Eavesdropper attack Middle attack

PW0-070 Certified Wireless Technology Specialist Exam Set 3

Web development company wants to be wireless contractor, who has to work on various projects. The approval process takes time. So, instead of waiting, he made your wireless router to connect to a network port to his department. What makes this a security risk?


Options are :

  • This aversion to detect network intrusions.
  • Nonething, increase the wireless access point is a common task, and Nonet a safety hazard.
  • This may increase network traffic and slow down network performance.
  • Unauthorized WAP is how a hacker to get access to the network.
  • None

Answer :Unauthorized WAP is how a hacker to get access to the network.

Your network administrator Lang Company has a network of work-based Windows Server 2008 domain. All client computers on a network of Windows Vista Ultimate. Andy, who is a financial manager, use Windows Mail can download e-mail in his inbox. Nonew, she complained that each and then he got the e-mail be required to disclose personal or financial information. He hoped that these messages do Nonet show him.Which following steps, you would get it done?


Options are :

  • Remove the domain of such a mailing list Safe Senders.
  • Set in Windows Mail in a phishing filter. Junk E-mail folder file to determine the switch to receive such messages.
  • None
  • In Internet Explorer 7.0 configuration phishing filter. Specify all phishing mail filters.
  • Such messages add domain Blocked Senders List.

Answer :Set in Windows Mail in a phishing filter. Junk E-mail folder file to determine the switch to receive such messages.

Which of the following ways to use RC4 encryption techNonelogy? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Dynamic WEP
  • Static WEP
  • TKIP
  • CCMP

Answer :Dynamic WEP Static WEP TKIP

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 4

Which of the following is an application protocol for querying and using a directory service data processing running on TCP / IP?


Options are :

  • None
  • HTTP
  • leap
  • RBAC
  • LDAP

Answer :LDAP

Which of the following types of filters to allow or restrict the flow of certain types of data packets to provide security?


Options are :

  • The MAC address filtering
  • Access Filter
  • None
  • Packet filtering
  • Route Filtering

Answer :Packet filtering

What tend to need less secure 802.11 wireless network components? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • AAA
  • Network segmentation
  • track
  • Data Privacy

Answer :AAA Network segmentation track Data Privacy

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 4

Your network administrator Company's technical perfection is a wireless local area network. Customer count presence online. You can check for errors and find a reason, DHCP server. Which of the following devices, you can configure the DHCP server?


Options are :

  • radius
  • The base station
  • None
  • guide
  • Wireless LAN Switch

Answer :guide

Which of the following is a computer and network security management to determine security vulnerabilities?


Options are :

  • None
  • EAP
  • as a
  • IDS
  • IPS

Answer :IDS

You are a major insurance company, the small office. The company's policy is that all wireless configuration must be 802.11i standard. Based on this requirement, its encryption algorithm should be implemented?


Options are :

  • WPA2
  • PKI
  • None
  • WPA
  • WEP

Answer :WPA2

PW0-070 Certified Wireless Technology Specialist Exam Set 3

Which of the following security measures are needed to maintain the security of your wireless LAN? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Firewall
  • WLAN controller
  • WIDS
  • WIPS

Answer :Firewall WIDS WIPS

Among them, the following IEEE 802.1X architecture is an important factor? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Authenticate
  • Extensible Authentication Protocol (EAP)
  • Authentication Server
  • Requester

Answer :Authenticate Authentication Server Requester

You have been hired to conduct penetration testing is the customer's network. You want to see the remote connection is vulnerable to eavesdropping or a session hijacking. What is a network tool, it will be your most useful?


Options are :

  • Performance Analyzer.
  • Protocol Analyzer
  • None
  • Port Scanner
  • Vulnerability Analysis

Answer :Protocol Analyzer

PW0-070 Certified Wireless Technology Specialist Exam Set 5

Which of the following is a wireless intrusion prevention system (WIPS) ingredients? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Requester
  • sensor
  • server
  • comfort

Answer :sensor server comfort

Which of the following three main objectives are what is expected WEP encryption? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Data integrity
  • Authenticate
  • Confidence
  • Access control

Answer :Data integrity Confidence Access control

Following which the denial of service attack (DoS) attack is an example? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Birthday attack
  • Smurf attack
  • Ping floods
  • Fraggle attack

Answer :Smurf attack Ping floods Fraggle attack

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 5

Which of the following keys are derived from the group master key (GMK)?


Options are :

  • Group temporal key
  • Public Key
  • None
  • Private key
  • Pairwise transient key

Answer :Group temporal key

Cisco Unified Wireless Network is AP, which does Nonet rely on a central network control device. What type of AP have this feature?


Options are :

  • Rogue AP
  • Lightweight AP
  • AutoNonemous AP
  • None
  • LWAPP

Answer :AutoNonemous AP

Which of the following is to provide a secure communications protocol wireless client and the wireless access point?


Options are :

  • Packet filtering
  • Party wall
  • Robust security network
  • None
  • Virtual Private Network

Answer :Robust security network

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 2

Which of the following levels of security to prevent unauthorized access to the network? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • MAC address filtering
  • Authenticate
  • Access Control Lists
  • Authorize

Answer :Authenticate Authorize

The following malicious activity on monitoring procedures and editing system which steps?


Options are :

  • NIDS
  • None
  • rain
  • The HID
  • back door

Answer :The HID

Which of the following is the physical layer of security? Each correct answer presents a complete solution. Check all that apply.


Options are :

  • Environmental Engineering
  • Video Surveillance
  • Intrusion detection system
  • Procedural law, access control

Answer :Environmental Engineering Intrusion detection system Procedural law, access control

PW0-204 Certified Wireless Security Expert (CWSP) Exam Set 2

You enter the Administrator techNonelogy the perfect company to work is a wireless local area network. You want to use the tool to the corporate network, which monitors the use of radio frequency wireless local area network, and Nonetifies the network detected rogue access points immediately. Which of the following tools will be used?


Options are :

  • Party wall
  • MFP
  • WIPS
  • None
  • NAT

Answer :WIPS

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions