{"id":4744,"date":"2019-12-13T08:15:50","date_gmt":"2019-12-13T08:15:50","guid":{"rendered":"https:\/\/www.dumpsbase.com\/freedumps\/?p=4744"},"modified":"2019-12-13T08:15:54","modified_gmt":"2019-12-13T08:15:54","slug":"new-certified-wireless-security-professional-cwsp-206-dumps","status":"publish","type":"post","link":"https:\/\/www.dumpsbase.com\/freedumps\/new-certified-wireless-security-professional-cwsp-206-dumps.html","title":{"rendered":"New Certified Wireless Security Professional CWSP-206 Dumps"},"content":{"rendered":"\n<p>A CWSP effectively uses appropriate tools and procedures to ensure the ongoing security of the network. Since CWSP-205 exam was replaced by CWSP-206 in September of 2019, CWSP-206 Certified Wireless Security Professional exam is the requirement for CWSP certification. To achieve your CWSP certification, New Certified Wireless Security Professional CWSP-206 Dumps is recommended as the preparation materials.\u00a0<\/p>\n<h2><span style=\"color: #800000;\">Free CWSP-206<\/span> Exam Dumps Also Is Available Online<\/h2>\n<script>\n  window.fbAsyncInit = function() {\n    FB.init({\n      appId            : '622169541470367',\n      autoLogAppEvents : true,\n      xfbml            : true,\n      version          : 'v3.1'\n    });\n  };\n\n  (function(d, s, id){\n     var js, fjs = d.getElementsByTagName(s)[0];\n     if (d.getElementById(id)) {return;}\n     js = d.createElement(s); js.id = id;\n     js.src = \"https:\/\/connect.facebook.net\/en_US\/sdk.js\";\n     fjs.parentNode.insertBefore(js, fjs);\n   }(document, 'script', 'facebook-jssdk'));\n<\/script><div id=\"watu_quiz\" class=\"quiz-area single-page-quiz\">\n<p><\/p><form action=\"\" method=\"post\" class=\"quiz-form \" id=\"quiz-2085\" >\n<div class='watu-question' id='question-1'><div class='question-content'><p><span class='watu_num'>1. <\/span>You have a Windows laptop computer with an integrated, dual-band, Wi-Fi compliant adapter. Your laptop computer has protocol analyzer software installed that is capable of capturing and decoding 802.11ac data.<br \/>\n<br \/>What statement best describes the likely ability to capture 802.11ac frames for security testing purposes?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='118345' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487718' \/><div class='watu-question-choice'><input type='radio' name='answer-118345[]' id='answer-id-487718' class='answer answer-1  answerof-118345' value='487718' \/>&nbsp;<label for='answer-id-487718' id='answer-label-487718' class=' answer label-1'><span class='answer'>Integrated 802.11ac adapters are not typically compatible with protocol analyzers in Windows laptops. It is often best to use a USB adapter or carefully select a laptop with an integrated adapter that will work.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487720' \/><div class='watu-question-choice'><input type='radio' name='answer-118345[]' id='answer-id-487720' class='answer answer-1  answerof-118345' value='487720' \/>&nbsp;<label for='answer-id-487720' id='answer-label-487720' class=' answer label-1'><span class='answer'>Laptops cannot be used to capture 802.11ac frames because they do not support MU-MIM<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487722' \/><div class='watu-question-choice'><input type='radio' name='answer-118345[]' id='answer-id-487722' class='answer answer-1  answerof-118345' value='487722' \/>&nbsp;<label for='answer-id-487722' id='answer-label-487722' class=' answer label-1'><span class='answer'>Only Wireshark can be used to capture 802.11ac frames as no other protocol analyzer has implemented the proper frame decodes.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487724' \/><div class='watu-question-choice'><input type='radio' name='answer-118345[]' id='answer-id-487724' class='answer answer-1  answerof-118345' value='487724' \/>&nbsp;<label for='answer-id-487724' id='answer-label-487724' class=' answer label-1'><span class='answer'>All integrated 802.11ac adapters will work with most protocol analyzers for frame capture, including the Radio Tap Header.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487726' \/><div class='watu-question-choice'><input type='radio' name='answer-118345[]' id='answer-id-487726' class='answer answer-1  answerof-118345' value='487726' \/>&nbsp;<label for='answer-id-487726' id='answer-label-487726' class=' answer label-1'><span class='answer'>The only method available to capture 802.11ac frames is to perform a remote capture with a compatible access point.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType1' value='radio' class=''><\/div><div class='watu-question' id='question-2'><div class='question-content'><p><span class='watu_num'>2. <\/span>In order to acquire credentials of a valid user on a public hotspot network, what attacks may be conducted? Choose the single completely correct answer.<\/p>\n<\/div><input type='hidden' name='question_id[]' value='118347' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487729' \/><div class='watu-question-choice'><input type='radio' name='answer-118347[]' id='answer-id-487729' class='answer answer-2  answerof-118347' value='487729' \/>&nbsp;<label for='answer-id-487729' id='answer-label-487729' class=' answer label-2'><span class='answer'>MAC denial of service and\/or physical theft<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487730' \/><div class='watu-question-choice'><input type='radio' name='answer-118347[]' id='answer-id-487730' class='answer answer-2  answerof-118347' value='487730' \/>&nbsp;<label for='answer-id-487730' id='answer-label-487730' class=' answer label-2'><span class='answer'>Social engineering and\/or eavesdropping<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487732' \/><div class='watu-question-choice'><input type='radio' name='answer-118347[]' id='answer-id-487732' class='answer answer-2  answerof-118347' value='487732' \/>&nbsp;<label for='answer-id-487732' id='answer-label-487732' class=' answer label-2'><span class='answer'>Authentication cracking and\/or RF DoS<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487734' \/><div class='watu-question-choice'><input type='radio' name='answer-118347[]' id='answer-id-487734' class='answer answer-2  answerof-118347' value='487734' \/>&nbsp;<label for='answer-id-487734' id='answer-label-487734' class=' answer label-2'><span class='answer'>Code injection and\/or XSS<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487736' \/><div class='watu-question-choice'><input type='radio' name='answer-118347[]' id='answer-id-487736' class='answer answer-2  answerof-118347' value='487736' \/>&nbsp;<label for='answer-id-487736' id='answer-label-487736' class=' answer label-2'><span class='answer'>RF DoS and\/or physical theft<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType2' value='radio' class=''><\/div><div class='watu-question' id='question-3'><div class='question-content'><p><span class='watu_num'>3. <\/span>What WLAN client device behavior is exploited by an attacker during a hijacking attack?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='118349' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487739' \/><div class='watu-question-choice'><input type='radio' name='answer-118349[]' id='answer-id-487739' class='answer answer-3  answerof-118349' value='487739' \/>&nbsp;<label for='answer-id-487739' id='answer-label-487739' class=' answer label-3'><span class='answer'>After the initial association and 4-way handshake, client stations and access points do not need to perform another 4-way handshake, even if connectivity is lost.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487741' \/><div class='watu-question-choice'><input type='radio' name='answer-118349[]' id='answer-id-487741' class='answer answer-3  answerof-118349' value='487741' \/>&nbsp;<label for='answer-id-487741' id='answer-label-487741' class=' answer label-3'><span class='answer'>Client drivers scan for and connect to access point in the 2.4 GHz band before scanning the 5 GHz band.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487742' \/><div class='watu-question-choice'><input type='radio' name='answer-118349[]' id='answer-id-487742' class='answer answer-3  answerof-118349' value='487742' \/>&nbsp;<label for='answer-id-487742' id='answer-label-487742' class=' answer label-3'><span class='answer'>When the RF signal between a client and an access point is disrupted for more than a few seconds, the client device will attempt to associate to an access point with better signal quality.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487744' \/><div class='watu-question-choice'><input type='radio' name='answer-118349[]' id='answer-id-487744' class='answer answer-3  answerof-118349' value='487744' \/>&nbsp;<label for='answer-id-487744' id='answer-label-487744' class=' answer label-3'><span class='answer'>When the RF signal between a client and an access point is lost, the client will not seek to reassociate with another access point until the 120 second hold down timer has expired.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487746' \/><div class='watu-question-choice'><input type='radio' name='answer-118349[]' id='answer-id-487746' class='answer answer-3  answerof-118349' value='487746' \/>&nbsp;<label for='answer-id-487746' id='answer-label-487746' class=' answer label-3'><span class='answer'>As specified by the Wi-Fi Alliance, clients using Open System authentication must allow direct client-to&shy;client connections, even in an infrastructure BS<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType3' value='radio' class=''><\/div><div class='watu-question' id='question-4'><div class='question-content'><p><span class='watu_num'>4. <\/span>What software and hardware tools are used in the process performed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='118351' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487749' \/><div class='watu-question-choice'><input type='radio' name='answer-118351[]' id='answer-id-487749' class='answer answer-4  answerof-118351' value='487749' \/>&nbsp;<label for='answer-id-487749' id='answer-label-487749' class=' answer label-4'><span class='answer'>A low-gain patch antenna and terminal emulation software<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487750' \/><div class='watu-question-choice'><input type='radio' name='answer-118351[]' id='answer-id-487750' class='answer answer-4  answerof-118351' value='487750' \/>&nbsp;<label for='answer-id-487750' id='answer-label-487750' class=' answer label-4'><span class='answer'>MAC spoofing software and MAC DoS software<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487752' \/><div class='watu-question-choice'><input type='radio' name='answer-118351[]' id='answer-id-487752' class='answer answer-4  answerof-118351' value='487752' \/>&nbsp;<label for='answer-id-487752' id='answer-label-487752' class=' answer label-4'><span class='answer'>RF jamming device and a wireless radio card<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487754' \/><div class='watu-question-choice'><input type='radio' name='answer-118351[]' id='answer-id-487754' class='answer answer-4  answerof-118351' value='487754' \/>&nbsp;<label for='answer-id-487754' id='answer-label-487754' class=' answer label-4'><span class='answer'>A wireless workgroup bridge and a protocol analyzer<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType4' value='radio' class=''><\/div><div class='watu-question' id='question-5'><div class='question-content'><p><span class='watu_num'>5. <\/span>Many computer users connect to the Internet at airports, which often have 802.11n access points with a captive portal for authentication.<br \/>\n<br \/>While using an airport hotspot with this security solution, to what type of wireless attack is a user susceptible?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='118353' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487757' \/><div class='watu-question-choice'><input type='radio' name='answer-118353[]' id='answer-id-487757' class='answer answer-5  answerof-118353' value='487757' \/>&nbsp;<label for='answer-id-487757' id='answer-label-487757' class=' answer label-5'><span class='answer'>Wi-Fi phishing<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487758' \/><div class='watu-question-choice'><input type='radio' name='answer-118353[]' id='answer-id-487758' class='answer answer-5  answerof-118353' value='487758' \/>&nbsp;<label for='answer-id-487758' id='answer-label-487758' class=' answer label-5'><span class='answer'>Management interface exploits<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487760' \/><div class='watu-question-choice'><input type='radio' name='answer-118353[]' id='answer-id-487760' class='answer answer-5  answerof-118353' value='487760' \/>&nbsp;<label for='answer-id-487760' id='answer-label-487760' class=' answer label-5'><span class='answer'>UDP port redirection<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487762' \/><div class='watu-question-choice'><input type='radio' name='answer-118353[]' id='answer-id-487762' class='answer answer-5  answerof-118353' value='487762' \/>&nbsp;<label for='answer-id-487762' id='answer-label-487762' class=' answer label-5'><span class='answer'>IGMP snooping<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType5' value='radio' class=''><\/div><div class='watu-question' id='question-6'><div class='question-content'><p><span class='watu_num'>6. <\/span>During 802.1X\/LEAP authentication, the username is passed across the wireless medium in clear text.<br \/>\n<br \/>From a security perspective, why is this significant?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='118355' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487765' \/><div class='watu-question-choice'><input type='radio' name='answer-118355[]' id='answer-id-487765' class='answer answer-6  answerof-118355' value='487765' \/>&nbsp;<label for='answer-id-487765' id='answer-label-487765' class=' answer label-6'><span class='answer'>The username can be looked up in a dictionary file that lists common username\/password combinations.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487767' \/><div class='watu-question-choice'><input type='radio' name='answer-118355[]' id='answer-id-487767' class='answer answer-6  answerof-118355' value='487767' \/>&nbsp;<label for='answer-id-487767' id='answer-label-487767' class=' answer label-6'><span class='answer'>The username is needed for Personal Access Credential (PAC) and<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487769' \/><div class='watu-question-choice'><input type='radio' name='answer-118355[]' id='answer-id-487769' class='answer answer-6  answerof-118355' value='487769' \/>&nbsp;<label for='answer-id-487769' id='answer-label-487769' class=' answer label-6'><span class='answer'>509 certificate validation.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487770' \/><div class='watu-question-choice'><input type='radio' name='answer-118355[]' id='answer-id-487770' class='answer answer-6  answerof-118355' value='487770' \/>&nbsp;<label for='answer-id-487770' id='answer-label-487770' class=' answer label-6'><span class='answer'>4-Way Handshake nonces are based on the username in WPA and WPA2 authentication.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487772' \/><div class='watu-question-choice'><input type='radio' name='answer-118355[]' id='answer-id-487772' class='answer answer-6  answerof-118355' value='487772' \/>&nbsp;<label for='answer-id-487772' id='answer-label-487772' class=' answer label-6'><span class='answer'>The username is an input to the LEAP challenge\/response hash that is exploited, so the username must be known to conduct authentication cracking.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType6' value='radio' class=''><\/div><div class='watu-question' id='question-7'><div class='question-content'><p><span class='watu_num'>7. <\/span>In XYZ\u2019s small business, two autonomous 802.11ac APs and 12 client devices are in use with WPA2&shy;Personal.<br \/>\n<br \/>What statement about the WLAN security of this company is true?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='118357' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487775' \/><div class='watu-question-choice'><input type='radio' name='answer-118357[]' id='answer-id-487775' class='answer answer-7  answerof-118357' value='487775' \/>&nbsp;<label for='answer-id-487775' id='answer-label-487775' class=' answer label-7'><span class='answer'>Intruders may obtain the passphrase with an offline dictionary attack and gain network access, but will be unable to decrypt the data traffic of other users.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487777' \/><div class='watu-question-choice'><input type='radio' name='answer-118357[]' id='answer-id-487777' class='answer answer-7  answerof-118357' value='487777' \/>&nbsp;<label for='answer-id-487777' id='answer-label-487777' class=' answer label-7'><span class='answer'>Because WPA2-Personal uses Open System authentication followed by a 4-Way Handshake, hijacking attacks are easily performed.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487778' \/><div class='watu-question-choice'><input type='radio' name='answer-118357[]' id='answer-id-487778' class='answer answer-7  answerof-118357' value='487778' \/>&nbsp;<label for='answer-id-487778' id='answer-label-487778' class=' answer label-7'><span class='answer'>A successful attack against all unicast traffic on the network would require a weak passphrase dictionary attack and the capture of the latest 4-Way Handshake for each client.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487780' \/><div class='watu-question-choice'><input type='radio' name='answer-118357[]' id='answer-id-487780' class='answer answer-7  answerof-118357' value='487780' \/>&nbsp;<label for='answer-id-487780' id='answer-label-487780' class=' answer label-7'><span class='answer'>An unauthorized wireless client device cannot associate, but can eavesdrop on some data because WPA2-Personal does not encrypt multicast or broadcast traffic.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487782' \/><div class='watu-question-choice'><input type='radio' name='answer-118357[]' id='answer-id-487782' class='answer answer-7  answerof-118357' value='487782' \/>&nbsp;<label for='answer-id-487782' id='answer-label-487782' class=' answer label-7'><span class='answer'>An unauthorized WLAN user with a protocol analyzer can decode data frames of authorized users if he captures the BSSID, client MAC address, and a user\u2019s 4-Way Handshake.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType7' value='radio' class=''><\/div><div class='watu-question' id='question-8'><div class='question-content'><p><span class='watu_num'>8. <\/span>The Aircrack-ng WLAN software tool can capture and transmit modified 802.11 frames over the wireless network. It comes pre-installed on Kali Linux and some other Linux distributions.<br \/>\n<br \/>Which one of the following would not be a suitable penetration testing action taken with this tool?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='118359' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487785' \/><div class='watu-question-choice'><input type='radio' name='answer-118359[]' id='answer-id-487785' class='answer answer-8  answerof-118359' value='487785' \/>&nbsp;<label for='answer-id-487785' id='answer-label-487785' class=' answer label-8'><span class='answer'>Auditing the configuration and functionality of a WIPS by simulating common attack sequences.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487787' \/><div class='watu-question-choice'><input type='radio' name='answer-118359[]' id='answer-id-487787' class='answer answer-8  answerof-118359' value='487787' \/>&nbsp;<label for='answer-id-487787' id='answer-label-487787' class=' answer label-8'><span class='answer'>Transmitting a deauthentication frame to disconnect a user from the A<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487788' \/><div class='watu-question-choice'><input type='radio' name='answer-118359[]' id='answer-id-487788' class='answer answer-8  answerof-118359' value='487788' \/>&nbsp;<label for='answer-id-487788' id='answer-label-487788' class=' answer label-8'><span class='answer'>Cracking the authentication or encryption processes implemented poorly in some WLANs.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487790' \/><div class='watu-question-choice'><input type='radio' name='answer-118359[]' id='answer-id-487790' class='answer answer-8  answerof-118359' value='487790' \/>&nbsp;<label for='answer-id-487790' id='answer-label-487790' class=' answer label-8'><span class='answer'>Probing the RADIUS server and authenticator to expose the RADIUS shared secret.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType8' value='radio' class=''><\/div><div class='watu-question' id='question-9'><div class='question-content'><p><span class='watu_num'>9. <\/span>You manage a wireless network that services 200 wireless users. Your facility requires 20 access points, and you have installed an IEEE 802.11-compliant implementation of 802.1X\/LEAP with AES-CCMP as an authentication and encryption solution.<br \/>\n<br \/>In this configuration, the wireless network is initially susceptible to what type of attack?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='118361' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487793' \/><div class='watu-question-choice'><input type='radio' name='answer-118361[]' id='answer-id-487793' class='answer answer-9  answerof-118361' value='487793' \/>&nbsp;<label for='answer-id-487793' id='answer-label-487793' class=' answer label-9'><span class='answer'>Offline dictionary attacks<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487795' \/><div class='watu-question-choice'><input type='radio' name='answer-118361[]' id='answer-id-487795' class='answer answer-9  answerof-118361' value='487795' \/>&nbsp;<label for='answer-id-487795' id='answer-label-487795' class=' answer label-9'><span class='answer'>Application eavesdropping<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487797' \/><div class='watu-question-choice'><input type='radio' name='answer-118361[]' id='answer-id-487797' class='answer answer-9  answerof-118361' value='487797' \/>&nbsp;<label for='answer-id-487797' id='answer-label-487797' class=' answer label-9'><span class='answer'>Session hijacking<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487798' \/><div class='watu-question-choice'><input type='radio' name='answer-118361[]' id='answer-id-487798' class='answer answer-9  answerof-118361' value='487798' \/>&nbsp;<label for='answer-id-487798' id='answer-label-487798' class=' answer label-9'><span class='answer'>Layer 3 peer-to-peer<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487800' \/><div class='watu-question-choice'><input type='radio' name='answer-118361[]' id='answer-id-487800' class='answer answer-9  answerof-118361' value='487800' \/>&nbsp;<label for='answer-id-487800' id='answer-label-487800' class=' answer label-9'><span class='answer'>Encryption cracking<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType9' value='radio' class=''><\/div><div class='watu-question' id='question-10'><div class='question-content'><p><span class='watu_num'>10. <\/span>ABC Corporation is evaluating the security solution for their existing WLAN. Two of their supported solutions include a PPTP VPN and 802.1X\/LEAP. They have used PPTP VPNs because of their wide support in server and desktop operating systems. While both PPTP and LEAP adhere to the minimum requirements of the corporate security policy, some individuals have raised concerns about MS-CHAPv2 (and similar) authentication and the known fact that MS-CHAPv2 has proven vulnerable in improper implementations.<br \/>\n<br \/>As a consultant, what do you tell ABC Corporation about implementing MS-CHAPv2 authentication?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='118363' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487804' \/><div class='watu-question-choice'><input type='radio' name='answer-118363[]' id='answer-id-487804' class='answer answer-10  answerof-118363' value='487804' \/>&nbsp;<label for='answer-id-487804' id='answer-label-487804' class=' answer label-10'><span class='answer'>MS-CHAPv2 is only appropriate for WLAN security when used inside a TLS-encrypted tunnel.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487805' \/><div class='watu-question-choice'><input type='radio' name='answer-118363[]' id='answer-id-487805' class='answer answer-10  answerof-118363' value='487805' \/>&nbsp;<label for='answer-id-487805' id='answer-label-487805' class=' answer label-10'><span class='answer'>When implemented with AES-CCMP encryption, MS-CHAPv2 is very secure.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487807' \/><div class='watu-question-choice'><input type='radio' name='answer-118363[]' id='answer-id-487807' class='answer answer-10  answerof-118363' value='487807' \/>&nbsp;<label for='answer-id-487807' id='answer-label-487807' class=' answer label-10'><span class='answer'>MS-CHAPv2 uses AES authentication, and is therefore secure.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487809' \/><div class='watu-question-choice'><input type='radio' name='answer-118363[]' id='answer-id-487809' class='answer answer-10  answerof-118363' value='487809' \/>&nbsp;<label for='answer-id-487809' id='answer-label-487809' class=' answer label-10'><span class='answer'>MS-CHAPv2 is compliant with WPA-Personal, but not WPA2-Enterprise.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487811' \/><div class='watu-question-choice'><input type='radio' name='answer-118363[]' id='answer-id-487811' class='answer answer-10  answerof-118363' value='487811' \/>&nbsp;<label for='answer-id-487811' id='answer-label-487811' class=' answer label-10'><span class='answer'>LEAP\u2019s use of MS-CHAPv2 is only secure when combined with WE<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType10' value='radio' class=''><\/div><div class='watu-question' id='question-11'><div class='question-content'><p><span class='watu_num'>11. <\/span>You perform a protocol capture using Wireshark and a compatible 802.11 adapter in Linux. When viewing the capture, you see an auth req frame and an auth rsp frame. Then you see an assoc req frame and an assoc rsp frame. Shortly after, you see DHCP communications and then ISAKMP protocol packets.<br \/>\n<br \/>What security solution is represented?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='118365' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487813' \/><div class='watu-question-choice'><input type='radio' name='answer-118365[]' id='answer-id-487813' class='answer answer-11  answerof-118365' value='487813' \/>&nbsp;<label for='answer-id-487813' id='answer-label-487813' class=' answer label-11'><span class='answer'>802.1X\/EAP-TTLS<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487815' \/><div class='watu-question-choice'><input type='radio' name='answer-118365[]' id='answer-id-487815' class='answer answer-11  answerof-118365' value='487815' \/>&nbsp;<label for='answer-id-487815' id='answer-label-487815' class=' answer label-11'><span class='answer'>WPA2-Personal with AES-CCMP<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487817' \/><div class='watu-question-choice'><input type='radio' name='answer-118365[]' id='answer-id-487817' class='answer answer-11  answerof-118365' value='487817' \/>&nbsp;<label for='answer-id-487817' id='answer-label-487817' class=' answer label-11'><span class='answer'>802.1X\/PEAPv0\/MS-CHAPv2<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487819' \/><div class='watu-question-choice'><input type='radio' name='answer-118365[]' id='answer-id-487819' class='answer answer-11  answerof-118365' value='487819' \/>&nbsp;<label for='answer-id-487819' id='answer-label-487819' class=' answer label-11'><span class='answer'>EAP-MD5<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487821' \/><div class='watu-question-choice'><input type='radio' name='answer-118365[]' id='answer-id-487821' class='answer answer-11  answerof-118365' value='487821' \/>&nbsp;<label for='answer-id-487821' id='answer-label-487821' class=' answer label-11'><span class='answer'>Open 802.11 authentication with IPSec<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType11' value='radio' class=''><\/div><div class='watu-question' id='question-12'><div class='question-content'><p><span class='watu_num'>12. <\/span>In a security penetration exercise, a WLAN consultant obtains the WEP key of XYZ Corporation\u2019s wireless network. Demonstrating the vulnerabilities of using WEP, the consultant uses a laptop running a software AP in an attempt to hijack the authorized user\u2019s connections. XYZ\u2019s legacy network is using 802.11n APs with 802.11b, 11g, and 11n client devices.<br \/>\n<br \/>With this setup, how can the consultant cause all of the authorized clients to establish Layer 2 connectivity with the software access point?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='118367' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487823' \/><div class='watu-question-choice'><input type='radio' name='answer-118367[]' id='answer-id-487823' class='answer answer-12  answerof-118367' value='487823' \/>&nbsp;<label for='answer-id-487823' id='answer-label-487823' class=' answer label-12'><span class='answer'>When the RF signal between the clients and the authorized AP is temporarily disrupted and the consultant\u2019s software AP is using the same SSID on a different channel than the authorized AP, the clients will reassociate to the software A<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487825' \/><div class='watu-question-choice'><input type='radio' name='answer-118367[]' id='answer-id-487825' class='answer answer-12  answerof-118367' value='487825' \/>&nbsp;<label for='answer-id-487825' id='answer-label-487825' class=' answer label-12'><span class='answer'>If the consultant\u2019s software AP broadcasts Beacon frames that advertise 802.11g data rates that are faster rates than XYZ\u2019s current 802.11b data rates, all WLAN clients will reassociate to the faster A<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487827' \/><div class='watu-question-choice'><input type='radio' name='answer-118367[]' id='answer-id-487827' class='answer answer-12  answerof-118367' value='487827' \/>&nbsp;<label for='answer-id-487827' id='answer-label-487827' class=' answer label-12'><span class='answer'>A higher SSID priority value configured in the Beacon frames of the consultant\u2019s software AP will take priority over the SSID in the authorized AP, causing the clients to reassociate.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487829' \/><div class='watu-question-choice'><input type='radio' name='answer-118367[]' id='answer-id-487829' class='answer answer-12  answerof-118367' value='487829' \/>&nbsp;<label for='answer-id-487829' id='answer-label-487829' class=' answer label-12'><span class='answer'>All WLAN clients will reassociate to the consultant\u2019s software AP if the consultant\u2019s software AP provides the same SSID on any channel with a 10 dB SNR improvement over the authorized A<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType12' value='radio' class=''><\/div><div class='watu-question' id='question-13'><div class='question-content'><p><span class='watu_num'>13. <\/span>As the primary security engineer for a large corporate network, you have been asked to author a new security policy for the wireless network. While most client devices support 802.1X authentication, some legacy devices still only support passphrase\/PSK-based security methods.<br \/>\n<br \/>When writing the 802.11 security policy, what password-related items should be addressed?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='118369' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487832' \/><div class='watu-question-choice'><input type='radio' name='answer-118369[]' id='answer-id-487832' class='answer answer-13  answerof-118369' value='487832' \/>&nbsp;<label for='answer-id-487832' id='answer-label-487832' class=' answer label-13'><span class='answer'>Certificates should always be recommended instead of passwords for 802.11 client authentication.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487834' \/><div class='watu-question-choice'><input type='radio' name='answer-118369[]' id='answer-id-487834' class='answer answer-13  answerof-118369' value='487834' \/>&nbsp;<label for='answer-id-487834' id='answer-label-487834' class=' answer label-13'><span class='answer'>Password complexity should be maximized so that weak WEP IV attacks are prevented.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487835' \/><div class='watu-question-choice'><input type='radio' name='answer-118369[]' id='answer-id-487835' class='answer answer-13  answerof-118369' value='487835' \/>&nbsp;<label for='answer-id-487835' id='answer-label-487835' class=' answer label-13'><span class='answer'>Static passwords should be changed on a regular basis to minimize the vulnerabilities of a PSK-based authentication.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487837' \/><div class='watu-question-choice'><input type='radio' name='answer-118369[]' id='answer-id-487837' class='answer answer-13  answerof-118369' value='487837' \/>&nbsp;<label for='answer-id-487837' id='answer-label-487837' class=' answer label-13'><span class='answer'>EAP-TLS must be implemented in such scenarios.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487839' \/><div class='watu-question-choice'><input type='radio' name='answer-118369[]' id='answer-id-487839' class='answer answer-13  answerof-118369' value='487839' \/>&nbsp;<label for='answer-id-487839' id='answer-label-487839' class=' answer label-13'><span class='answer'>MS-CHAPv2 passwords used with EAP\/PEAPv0 should be stronger than typical WPA2-PSK passphrases.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType13' value='radio' class=''><\/div><div class='watu-question' id='question-14'><div class='question-content'><p><span class='watu_num'>14. <\/span>ABC Hospital wishes to create a strong security policy as a first step in securing their 802.11 WLAN.<br \/>\n<br \/>Before creating the WLAN security policy, what should you ensure you possess?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='118371' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487842' \/><div class='watu-question-choice'><input type='radio' name='answer-118371[]' id='answer-id-487842' class='answer answer-14  answerof-118371' value='487842' \/>&nbsp;<label for='answer-id-487842' id='answer-label-487842' class=' answer label-14'><span class='answer'>Management support for the process.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487844' \/><div class='watu-question-choice'><input type='radio' name='answer-118371[]' id='answer-id-487844' class='answer answer-14  answerof-118371' value='487844' \/>&nbsp;<label for='answer-id-487844' id='answer-label-487844' class=' answer label-14'><span class='answer'>Security policy generation software.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487846' \/><div class='watu-question-choice'><input type='radio' name='answer-118371[]' id='answer-id-487846' class='answer answer-14  answerof-118371' value='487846' \/>&nbsp;<label for='answer-id-487846' id='answer-label-487846' class=' answer label-14'><span class='answer'>End-user training manuals for the policies to be created.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487847' \/><div class='watu-question-choice'><input type='radio' name='answer-118371[]' id='answer-id-487847' class='answer answer-14  answerof-118371' value='487847' \/>&nbsp;<label for='answer-id-487847' id='answer-label-487847' class=' answer label-14'><span class='answer'>Awareness of the exact vendor devices being installed.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType14' value='radio' class=''><\/div><div class='watu-question' id='question-15'><div class='question-content'><p><span class='watu_num'>15. <\/span>What policy would help mitigate the impact of peer-to-peer attacks against wireless-enabled corporate laptop computers when the laptops are also used on public access networks such as wireless hotspots?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='118373' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487850' \/><div class='watu-question-choice'><input type='radio' name='answer-118373[]' id='answer-id-487850' class='answer answer-15  answerof-118373' value='487850' \/>&nbsp;<label for='answer-id-487850' id='answer-label-487850' class=' answer label-15'><span class='answer'>Require Port Address Translation (PAT) on each laptop.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487852' \/><div class='watu-question-choice'><input type='radio' name='answer-118373[]' id='answer-id-487852' class='answer answer-15  answerof-118373' value='487852' \/>&nbsp;<label for='answer-id-487852' id='answer-label-487852' class=' answer label-15'><span class='answer'>Require secure applications such as POP, HTTP, and SS<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487854' \/><div class='watu-question-choice'><input type='radio' name='answer-118373[]' id='answer-id-487854' class='answer answer-15  answerof-118373' value='487854' \/>&nbsp;<label for='answer-id-487854' id='answer-label-487854' class=' answer label-15'><span class='answer'>Require VPN software for connectivity to the corporate network.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487856' \/><div class='watu-question-choice'><input type='radio' name='answer-118373[]' id='answer-id-487856' class='answer answer-15  answerof-118373' value='487856' \/>&nbsp;<label for='answer-id-487856' id='answer-label-487856' class=' answer label-15'><span class='answer'>Require WPA2-Enterprise as the minimal WLAN security solution.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType15' value='radio' class=''><\/div><div class='watu-question' id='question-16'><div class='question-content'><p><span class='watu_num'>16. <\/span>What EAP type supports using MS-CHAPv2, EAP-GTC or EAP-TLS for wireless client authentication?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='118375' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487858' \/><div class='watu-question-choice'><input type='radio' name='answer-118375[]' id='answer-id-487858' class='answer answer-16  answerof-118375' value='487858' \/>&nbsp;<label for='answer-id-487858' id='answer-label-487858' class=' answer label-16'><span class='answer'>EAP-GTC<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487860' \/><div class='watu-question-choice'><input type='radio' name='answer-118375[]' id='answer-id-487860' class='answer answer-16  answerof-118375' value='487860' \/>&nbsp;<label for='answer-id-487860' id='answer-label-487860' class=' answer label-16'><span class='answer'>PEAP<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487862' \/><div class='watu-question-choice'><input type='radio' name='answer-118375[]' id='answer-id-487862' class='answer answer-16  answerof-118375' value='487862' \/>&nbsp;<label for='answer-id-487862' id='answer-label-487862' class=' answer label-16'><span class='answer'>EAP-TTLS<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487864' \/><div class='watu-question-choice'><input type='radio' name='answer-118375[]' id='answer-id-487864' class='answer answer-16  answerof-118375' value='487864' \/>&nbsp;<label for='answer-id-487864' id='answer-label-487864' class=' answer label-16'><span class='answer'>LEAP<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487866' \/><div class='watu-question-choice'><input type='radio' name='answer-118375[]' id='answer-id-487866' class='answer answer-16  answerof-118375' value='487866' \/>&nbsp;<label for='answer-id-487866' id='answer-label-487866' class=' answer label-16'><span class='answer'>H-REAP<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType16' value='radio' class=''><\/div><div class='watu-question' id='question-17'><div class='question-content'><p><span class='watu_num'>17. <\/span>You must implement 7 APs for a branch office location in your organizations. All APs will be autonomous and provide the same two SSIDs (CORP1879 and Guest).<br \/>\n<br \/>Because each AP is managed directly through a web-based interface, what must be changed on every AP before enabling the WLANs to ensure proper staging procedures are followed?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='118376' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487868' \/><div class='watu-question-choice'><input type='radio' name='answer-118376[]' id='answer-id-487868' class='answer answer-17  answerof-118376' value='487868' \/>&nbsp;<label for='answer-id-487868' id='answer-label-487868' class=' answer label-17'><span class='answer'>Output power<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487870' \/><div class='watu-question-choice'><input type='radio' name='answer-118376[]' id='answer-id-487870' class='answer answer-17  answerof-118376' value='487870' \/>&nbsp;<label for='answer-id-487870' id='answer-label-487870' class=' answer label-17'><span class='answer'>Fragmentation threshold<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487872' \/><div class='watu-question-choice'><input type='radio' name='answer-118376[]' id='answer-id-487872' class='answer answer-17  answerof-118376' value='487872' \/>&nbsp;<label for='answer-id-487872' id='answer-label-487872' class=' answer label-17'><span class='answer'>Administrative password<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487874' \/><div class='watu-question-choice'><input type='radio' name='answer-118376[]' id='answer-id-487874' class='answer answer-17  answerof-118376' value='487874' \/>&nbsp;<label for='answer-id-487874' id='answer-label-487874' class=' answer label-17'><span class='answer'>Cell radius<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType17' value='radio' class=''><\/div><div class='watu-question' id='question-18'><div class='question-content'><p><span class='watu_num'>18. <\/span>You are installing 6 APs on the outside of your facility. They will be mounted at a height of 6 feet.<br \/>\n<br \/>What must you do to implement these APs in a secure manner beyond the normal indoor AP implementations? (Choose the single best answer.)<\/p>\n<\/div><input type='hidden' name='question_id[]' value='118378' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487876' \/><div class='watu-question-choice'><input type='radio' name='answer-118378[]' id='answer-id-487876' class='answer answer-18  answerof-118378' value='487876' \/>&nbsp;<label for='answer-id-487876' id='answer-label-487876' class=' answer label-18'><span class='answer'>Ensure proper physical and environmental security using outdoor ruggedized APs or enclosures.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487878' \/><div class='watu-question-choice'><input type='radio' name='answer-118378[]' id='answer-id-487878' class='answer answer-18  answerof-118378' value='487878' \/>&nbsp;<label for='answer-id-487878' id='answer-label-487878' class=' answer label-18'><span class='answer'>Use internal antennas.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487880' \/><div class='watu-question-choice'><input type='radio' name='answer-118378[]' id='answer-id-487880' class='answer answer-18  answerof-118378' value='487880' \/>&nbsp;<label for='answer-id-487880' id='answer-label-487880' class=' answer label-18'><span class='answer'>Use external antennas.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487882' \/><div class='watu-question-choice'><input type='radio' name='answer-118378[]' id='answer-id-487882' class='answer answer-18  answerof-118378' value='487882' \/>&nbsp;<label for='answer-id-487882' id='answer-label-487882' class=' answer label-18'><span class='answer'>Power the APs using Po<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType18' value='radio' class=''><\/div><div class='watu-question' id='question-19'><div class='question-content'><p><span class='watu_num'>19. <\/span>Fred works primarily from home and public wireless hotspots rather than commuting to office. He frequently accesses the office network remotely from his Mac laptop using the local 802.11 WLAN.<br \/>\n<br \/>In this remote scenario, what single wireless security practice will provide the greatest security for Fred?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='118380' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487885' \/><div class='watu-question-choice'><input type='radio' name='answer-118380[]' id='answer-id-487885' class='answer answer-19  answerof-118380' value='487885' \/>&nbsp;<label for='answer-id-487885' id='answer-label-487885' class=' answer label-19'><span class='answer'>Use enterprise WIPS on the corporate office network.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487886' \/><div class='watu-question-choice'><input type='radio' name='answer-118380[]' id='answer-id-487886' class='answer answer-19  answerof-118380' value='487886' \/>&nbsp;<label for='answer-id-487886' id='answer-label-487886' class=' answer label-19'><span class='answer'>Use 802.1X\/PEAPv0 to connect to the corporate office network from public hotspots.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487888' \/><div class='watu-question-choice'><input type='radio' name='answer-118380[]' id='answer-id-487888' class='answer answer-19  answerof-118380' value='487888' \/>&nbsp;<label for='answer-id-487888' id='answer-label-487888' class=' answer label-19'><span class='answer'>Use secure protocols, such as FTP, for remote file transfers.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487890' \/><div class='watu-question-choice'><input type='radio' name='answer-118380[]' id='answer-id-487890' class='answer answer-19  answerof-118380' value='487890' \/>&nbsp;<label for='answer-id-487890' id='answer-label-487890' class=' answer label-19'><span class='answer'>Use an IPSec VPN for connectivity to the office network.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487892' \/><div class='watu-question-choice'><input type='radio' name='answer-118380[]' id='answer-id-487892' class='answer answer-19  answerof-118380' value='487892' \/>&nbsp;<label for='answer-id-487892' id='answer-label-487892' class=' answer label-19'><span class='answer'>Use only HTTPS when agreeing to acceptable use terms on public networks.<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487894' \/><div class='watu-question-choice'><input type='radio' name='answer-118380[]' id='answer-id-487894' class='answer answer-19  answerof-118380' value='487894' \/>&nbsp;<label for='answer-id-487894' id='answer-label-487894' class=' answer label-19'><span class='answer'>Use WIPS sensor software on the laptop to monitor for risks and attacks.<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType19' value='radio' class=''><\/div><div class='watu-question' id='question-20'><div class='question-content'><p><span class='watu_num'>20. <\/span>Which one of the following is not a role defined in the 802.1X authentication procedures used in 802.11 and 802.3 networks for port-based authentication?<\/p>\n<\/div><input type='hidden' name='question_id[]' value='118383' \/><div class='watu-questions-wrap '><input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487897' \/><div class='watu-question-choice'><input type='radio' name='answer-118383[]' id='answer-id-487897' class='answer answer-20  answerof-118383' value='487897' \/>&nbsp;<label for='answer-id-487897' id='answer-label-487897' class=' answer label-20'><span class='answer'>AAA Server<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487899' \/><div class='watu-question-choice'><input type='radio' name='answer-118383[]' id='answer-id-487899' class='answer answer-20  answerof-118383' value='487899' \/>&nbsp;<label for='answer-id-487899' id='answer-label-487899' class=' answer label-20'><span class='answer'>Authentication Server<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487901' \/><div class='watu-question-choice'><input type='radio' name='answer-118383[]' id='answer-id-487901' class='answer answer-20  answerof-118383' value='487901' \/>&nbsp;<label for='answer-id-487901' id='answer-label-487901' class=' answer label-20'><span class='answer'>Supplicant<\/span><\/label><\/div>\n<input type='hidden' name='answer_ids[]' class='watu-answer-ids' value='487903' \/><div class='watu-question-choice'><input type='radio' name='answer-118383[]' id='answer-id-487903' class='answer answer-20  answerof-118383' value='487903' \/>&nbsp;<label for='answer-id-487903' id='answer-label-487903' class=' answer label-20'><span class='answer'>Authenticator<\/span><\/label><\/div>\n<\/div><input type='hidden' id='questionType20' value='radio' class=''><\/div><div style='display:none' id='question-21'><br \/><div class='question-content'><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watu\/loading.gif\" width=\"16\" height=\"16\" alt=\"Loading ...\" title=\"Loading ...\" \/>&nbsp;Loading &#8230;<\/div><\/div><br \/>\n<input type=\"button\" name=\"action\" onclick=\"Watu.submitResult()\" id=\"action-button\" value=\"Submit\"  class=\"watu-submit-button\" \/>\n<input type=\"hidden\" name=\"no_ajax\" value=\"0\"><input type=\"hidden\" name=\"quiz_id\" value=\"2085\" \/>\n<input type=\"hidden\" id=\"watuStartTime\" name=\"start_time\" value=\"2026-05-09 09:09:36\" \/>\n<\/form>\n<\/div>\n<div id=\"watu-loading-result\" style=\"display:none;\">\n\t<p align=\"center\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watu\/loading.gif\" width=\"16\" height=\"16\" alt=\"Loading\" title=\"Loading\" \/><\/p>\n<\/div>\t\n<script type=\"text\/javascript\">\nvar exam_id=0;\nvar question_ids='';\nvar watuURL='';\njQuery(function($){\nquestion_ids = \"118345,118347,118349,118351,118353,118355,118357,118359,118361,118363,118365,118367,118369,118371,118373,118375,118376,118378,118380,118383\";\nexam_id = 2085;\nWatu.exam_id = exam_id;\nWatu.qArr = question_ids.split(',');\nWatu.post_id = 4744;\nWatu.singlePage = '1';\nWatu.hAppID = \"0.74964600 1778317776\";\nwatuURL = \"https:\/\/www.dumpsbase.com\/freedumps\/wp-admin\/admin-ajax.php\";\nWatu.noAlertUnanswered = 0;\n});\n<\/script>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[444,4825],"tags":[7938,7939,7941,7940],"class_list":["post-4744","post","type-post","status-publish","format-standard","hentry","category-cwnp","category-cwsp-certification","tag-cwsp-206","tag-cwsp-206-dumps","tag-cwsp-206-exam-questions","tag-cwsp-206-free-dumps"],"_links":{"self":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/4744","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/comments?post=4744"}],"version-history":[{"count":1,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/4744\/revisions"}],"predecessor-version":[{"id":4746,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/4744\/revisions\/4746"}],"wp:attachment":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/media?parent=4744"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/categories?post=4744"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/tags?post=4744"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}