CWSP-206 Exam Question 1

Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?
  • CWSP-206 Exam Question 2

    In order to acquire credentials of a valid user on a public hotspot network, what attacks may be conducted? Choose the single completely correct answer.
  • CWSP-206 Exam Question 3

    Which of the following monitors program activities and modifies malicious activities on a system?
  • CWSP-206 Exam Question 4

    A Web developer with your company wants to have wireless access for contractors that come in to work on various projects. The process of getting this approved takes time. So rather than wait, he has put his own wireless router attached to one of the network ports in his department.
    What security risk does this present?
  • CWSP-206 Exam Question 5

    As the primary security engineer for a large corporate network, you have been asked to author a new security policy for the wireless network. While most client devices support 802.1X authentication, some legacy devices still only support passphrase/PSK-based security methods.
    When writing the 802.11 security policy, what password-related items should be addressed?