CWSP-206 Exam Question 16

Which of the following are secure infrastructure management protocols used in WLAN? Each correct answer represents a complete solution. Choose all that apply.
  • CWSP-206 Exam Question 17

    Which of the following attacks is used to obtain a user's authentication credentials?
  • CWSP-206 Exam Question 18

    During 802.1X/LEAP authentication, the username is passed across the wireless medium in clear text. From a security perspective, why is this significant?
  • CWSP-206 Exam Question 19

    Role-Based Access Control (RBAC) allows a WLAN administrator to perform what network function?
  • CWSP-206 Exam Question 20

    What software and hardware tools are used in the process performed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?