CWSP-206 Exam Question 26
When monitoring APs within a LAN using a Wireless Network Management System (WNMS), what secure protocol may be used by the WNMS to issue configuration changes to APs?
CWSP-206 Exam Question 27
In XYZ's small business, two autonomous 802.11ac APs and 12 client devices are in use with WPA2-Personal. What statement about the WLAN security of this company is true?
CWSP-206 Exam Question 28
What security vulnerability may result from a lack of staging, change management, and installation procedures for WLAN infrastructure equipment?
CWSP-206 Exam Question 29
The IEEE 802.11 Pairwise Transient Key (PTK) is derived from what cryptographic element?
CWSP-206 Exam Question 30
You are setting up small offices for a major insurance carrier. The company policy states that all wireless configurations must fully implement the 802.11i standard. Based on this requirement, which encryption algorithm should you implement?
