시험덤프
매달, 우리는 1000명 이상의 사람들이 시험 준비를 잘하고 시험을 잘 통과할 수 있도록 도와줍니다.
  / CWSP-208 덤프  / CWSP-208 문제 연습

CWNP CWSP-208 시험

Certified Wireless Security Professional (CWSP) 온라인 연습

최종 업데이트 시간: 2025년08월18일

당신은 온라인 연습 문제를 통해 CWNP CWSP-208 시험지식에 대해 자신이 어떻게 알고 있는지 파악한 후 시험 참가 신청 여부를 결정할 수 있다.

시험을 100% 합격하고 시험 준비 시간을 35% 절약하기를 바라며 CWSP-208 덤프 (최신 실제 시험 문제)를 사용 선택하여 현재 최신 119개의 시험 문제와 답을 포함하십시오.

 / 3

Question No : 1


When implementing a WPA2-Enterprise security solution, what protocol must the selected RADIUS server support?

정답:

Question No : 2


When used as part of a WLAN authentication solution, what is the role of LDAP?

정답:

Question No : 3


Given: You are using WEP as an encryption solution. You are using VLANs for network segregation.
Why can you not establish an RSNA?

정답:

Question No : 4


What disadvantage does EAP-TLS have when compared with PEAPv0 EAP/MSCHAPv2 as an 802.11 WLAN security solution?

정답:

Question No : 5


Given: ABC Company has 20 employees and only needs one access point to cover their entire facility. Ten of ABC Company’s employees have laptops with radio cards capable of only WPA security. The other ten employees have laptops with radio cards capable of WPA2 security. The network administrator wishes to secure all wireless communications (broadcast and unicast) for each laptop with its strongest supported security mechanism, but does not wish to implement a RADIUS/AAA server due to complexity.
What security implementation will allow the network administrator to achieve this goal?

정답:

Question No : 6


What wireless security protocol provides mutual authentication without using an X.509 certificate?

정답:

Question No : 7


Given: An 802.1X/EAP implementation includes an Active Directory domain controller running Windows Server 2012 and an AP from a major vendor. A Linux server is running RADIUS and it queries the domain controller for user credentials. A Windows client is accessing the network.
What device functions as the EAP Supplicant?

정답:

Question No : 8


In the IEEE 802.11-2012 standard, what is the purpose of the 802.1X Uncontrolled Port?

정답:

Question No : 9


What statement accurately describes the functionality of the IEEE 802.1X standard?

정답:

Question No : 10


Given: The ABC Corporation currently utilizes an enterprise Public Key Infrastructure (PKI) to allow employees to securely access network resources with smart cards. The new wireless network will use WPA2-Enterprise as its primary authentication solution. You have been asked to recommend a Wi-Fi Alliance-tested EAP method.
What solutions will require the least change in how users are currently authenticated and still integrate with their existing PKI?

정답:

Question No : 11


Given: ABC Corporation’s 802.11 WLAN is comprised of a redundant WLAN controller pair (N+1) and 30 access points implemented in 2004. ABC implemented WEP encryption with IPSec VPN technology to secure their wireless communication because it was the strongest security solution available at the time it was implemented. IT management has decided to upgrade the WLAN infrastructure and implement Voice over Wi-Fi and is concerned with security because most Voice over Wi-Fi phones do not support IPSec.
As the wireless network administrator, what new security solution would be best for protecting ABC’s data?

정답:

Question No : 12


You are using a protocol analyzer for random checks of activity on the WLAN. In the process, you notice two different EAP authentication processes. One process (STA1) used seven EAP frames (excluding ACK frames) before the 4-way handshake and the other (STA2) used 11 EAP frames (excluding ACK frames) before the 4-way handshake.
Which statement explains why the frame exchange from one STA required more frames than the frame exchange from another STA when both authentications were successful? (Choose the single most probable answer given a stable WLAN.)

정답:

Question No : 13


While performing a manual scan of your environment using a spectrum analyzer on a laptop computer, you notice a signal in the real time FFT view. The signal is characterized by having peak power centered on channel 11 with an approximate width of 20 MHz at its peak. The signal widens to approximately 40 MHz after it has weakened by about 30 dB.
What kind of signal is displayed in the spectrum analyzer?

정답:

Question No : 14


What wireless authentication technologies may build a TLS tunnel between the supplicant and the authentication server before passing client authentication credentials to the authentication server? (Choose 3)

정답:

Question No : 15


What is one advantage of using EAP-TTLS instead of EAP-TLS as an authentication mechanism in an 802.11 WLAN?

정답:

 / 3