IT인증,IT자격증,IT자격증시험,IT인증시험

http://www.pass4test.net/

CWNP Wireless LAN Certifications PW0-204시험덤프

CWNP Wireless LAN Certifications PW0-204시험덤프공부자료는 Pass4Test제품으로 가시면 자격증취득이 쉬워집니다. Pass4Test에서 출시한 CWNP Wireless LAN Certifications PW0-204덤프는 이미 사용한 분들에게 많은 호평을 받아왔습니다. 시험적중율 최고에 많은 공부가 되었다고 희소식을 전해올때마다 Pass4Test는 더욱 완벽한 CWNP Wireless LAN Certifications PW0-204시험덤프공부자료로 수정하고기 위해 최선을 다해왔습니다. 최고품질  CWNP Wireless LAN Certifications PW0-204덤프공부자료는 Pass4Test에서만 찾아볼수 있습니다.

 

NO.1 Your company is going to add wireless connectivity to the existing LAN. You have concerns

about the security of the wireless access and wish to implement encryption. Which of the following

would be the best choice for you to use?

A. PKI

B. DES

C. WAP

D. WEP

Answer: D


NO.2 Which of the following keys is derived from Group Master Key (GMK)?

A. Private Key

B. Group Temporal Key

C. Public Key

D. Pairwise Transient Key

Answer: B


NO.3 Role-based access control (RBAC) allows a WLAN administrator to perform that network

function?

A. Allows access to specific files and applications based on the user's WMM AC.

B. Provide admission control to VoWiFi clients on selected access points.

C. Allows one user group to access an internet gateway while denying internet access gateway to

another group

D. Provide differing levels of management access to a WLAN controller based on the user account.

E. Allow simultaneous support of multiple EAP types on a single Access point.

Answer: D

Explanation:

http://dnscoinc.com/bradfordidentity.pdf


NO.4 Which of the following is a passive device that cannot be detected by a wireless intrusion

detection system (WIDS)?

A. MAC spoofing

B. Spectrum analyzer

C. Protocol analyzer

D. Rogue access point

Answer: C


NO.5 As part of large organization's security policy how should a wireless security professional

address to problem of rogue access points?

A. Use a WPA-2 Enterprise complaint security solution with strong mutual authentication and

encryption.

B. Hide the SSID of legitimate APs on the network so that intruders cannot copy this parameter on

rogue APs.

C. All authorized APs should have there wired ports quarantined to specific VLAN for threat

neutralization and analysis.

D. A trained employee should install and monitor and WIPS rogue detection and response measures.

E. Conduct through mutual facility scans with spectrum analyzers to detect rogue AP RF signature.

Answer: D


NO.6 As a network administrator, you understand the mentality of most war drivers and have

implemented a very strong WLAN security solution. From your office window, you spot a war driver

in your parking lot using a Yagi antenna and a laptop in his car. You correctly assume that the war

driver is attempting to penetrate your WLAN. What should you do next?

A. Ignore the war driver. You have implemented a secure WLAN solution they cannotpenetrate.

B. Call the police and have the war driver apprehended. Press charges for violations ofregulatory

domainlaws.

C. Monitor the WIPS alerts and inform your organization's security personnel to ask the war driver to

vacate thepremises.

D. Implement a high-powered RF jamming device on all DSSS channels.

E. Approach the war driver and explain how his actions are illegal and unethical.

Answer: C


NO.7 Which of the following is a network security device that monitors network activities for

malicious or unwanted behavior?

A. IDS

B. IPS

C. WEP

D. ASA

Answer: B


NO.8 What is one method of implementing RADIUS-based VLAN assignment?

A. VSA access lists

B. SSID assignment

C. Roaming profiles

D. VLAN map matrix

Answer: B

 

Posted 2014/9/9 10:58:27  |  Category: CWNP  |  Tag: PW0-204시험덤프