CWNP Wireless LAN Certifications PW0-204시험덤프공부자료는 Pass4Test제품으로 가시면 자격증취득이 쉬워집니다. Pass4Test에서 출시한 CWNP Wireless LAN Certifications PW0-204덤프는 이미 사용한 분들에게 많은 호평을 받아왔습니다. 시험적중율 최고에 많은 공부가 되었다고 희소식을 전해올때마다 Pass4Test는 더욱 완벽한 CWNP Wireless LAN Certifications PW0-204시험덤프공부자료로 수정하고기 위해 최선을 다해왔습니다. 최고품질 CWNP Wireless LAN Certifications PW0-204덤프공부자료는 Pass4Test에서만 찾아볼수 있습니다.
NO.1 Your company is going to add wireless connectivity to the existing LAN. You have concerns
about the security of the wireless access and wish to implement encryption. Which of the following
would be the best choice for you to use?
A. PKI
B. DES
C. WAP
D. WEP
Answer: D
NO.2 Which of the following keys is derived from Group Master Key (GMK)?
A. Private Key
B. Group Temporal Key
C. Public Key
D. Pairwise Transient Key
Answer: B
NO.3 Role-based access control (RBAC) allows a WLAN administrator to perform that network
function?
A. Allows access to specific files and applications based on the user's WMM AC.
B. Provide admission control to VoWiFi clients on selected access points.
C. Allows one user group to access an internet gateway while denying internet access gateway to
another group
D. Provide differing levels of management access to a WLAN controller based on the user account.
E. Allow simultaneous support of multiple EAP types on a single Access point.
Answer: D
Explanation:
http://dnscoinc.com/bradfordidentity.pdf
NO.4 Which of the following is a passive device that cannot be detected by a wireless intrusion
detection system (WIDS)?
A. MAC spoofing
B. Spectrum analyzer
C. Protocol analyzer
D. Rogue access point
Answer: C
NO.5 As part of large organization's security policy how should a wireless security professional
address to problem of rogue access points?
A. Use a WPA-2 Enterprise complaint security solution with strong mutual authentication and
encryption.
B. Hide the SSID of legitimate APs on the network so that intruders cannot copy this parameter on
rogue APs.
C. All authorized APs should have there wired ports quarantined to specific VLAN for threat
neutralization and analysis.
D. A trained employee should install and monitor and WIPS rogue detection and response measures.
E. Conduct through mutual facility scans with spectrum analyzers to detect rogue AP RF signature.
Answer: D
NO.6 As a network administrator, you understand the mentality of most war drivers and have
implemented a very strong WLAN security solution. From your office window, you spot a war driver
in your parking lot using a Yagi antenna and a laptop in his car. You correctly assume that the war
driver is attempting to penetrate your WLAN. What should you do next?
A. Ignore the war driver. You have implemented a secure WLAN solution they cannotpenetrate.
B. Call the police and have the war driver apprehended. Press charges for violations ofregulatory
domainlaws.
C. Monitor the WIPS alerts and inform your organization's security personnel to ask the war driver to
vacate thepremises.
D. Implement a high-powered RF jamming device on all DSSS channels.
E. Approach the war driver and explain how his actions are illegal and unethical.
Answer: C
NO.7 Which of the following is a network security device that monitors network activities for
malicious or unwanted behavior?
A. IDS
B. IPS
C. WEP
D. ASA
Answer: B
NO.8 What is one method of implementing RADIUS-based VLAN assignment?
A. VSA access lists
B. SSID assignment
C. Roaming profiles
D. VLAN map matrix
Answer: B