Want to pass your Certified Wireless Security Professional CWSP-205 exam in the very first attempt? Try Pass2lead! It is equally effective for both starters and IT professionals.
VCE
You perform a protocol capture using Wireshark and a compatible 802.11 adapter in Linux. When viewing the capture, you see an auth req frame and an auth rsp frame. Then you see an assoc req frame and an assoc rsp frame. Shortly after, you see DHCP communications and then ISAKMP protocol packets. What security solution is represented?
A. 802.1X/EAP-TTLS
B. Open 802.11 authentication with IPSec
C. 802.1X/PEAPv0/MS-CHAPv2
D. WPA2-Personal with AES-CCMP
E. EAP-MD5
Which one of the following is a valid reason to avoid the use of EAP-MD5 in production WLANs?
A. It does not support the outer identity.
B. It is not a valid EAP type.
C. It does not support mutual authentication.
D. It does not support a RADIUS server.
Your organization required compliance reporting and forensics features in relation to the 802.11ac WLAN they have recently installed. These features are not built into the management system provided by the WLAN vendor. The existing WLAN is managed through a centralized management console provided by the AP vendor with distributed APs and multiple WLAN controllers configured through this console.
What kind of system should be installed to provide the required compliance reporting and forensics features?
A. WNMS
B. WIPS overlay
C. WIPS integrated
D. Cloud management platform