CWSP-206 Exam Question 41
Which of the following is an application protocol that is used to query and modify data using directory services running over TCP/IP?
CWSP-206 Exam Question 42
Which of the following are legacy authentication protocols used within the stronger EAP authentication protocols? Each correct answer represents a complete solution. Choose all that apply.
CWSP-206 Exam Question 43
Which of the following types of filtering allows or restricts the flow of specific types of packets to provide security?
CWSP-206 Exam Question 44
Which of the following is a networking protocol that provides centralized authentication, authorization, and accounting (AAA) management for computers to connect and use a network service?
CWSP-206 Exam Question 45
Which of the following components are normally required to secure wireless 802.11 networks?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
