CWSP-206 Exam Question 26

When monitoring APs within a LAN using a Wireless Network Management System (WNMS), what secure protocol may be used by the WNMS to issue configuration changes to APs?
  • CWSP-206 Exam Question 27

    In XYZ's small business, two autonomous 802.11ac APs and 12 client devices are in use with WPA2-Personal. What statement about the WLAN security of this company is true?
  • CWSP-206 Exam Question 28

    What security vulnerability may result from a lack of staging, change management, and installation procedures for WLAN infrastructure equipment?
  • CWSP-206 Exam Question 29

    The IEEE 802.11 Pairwise Transient Key (PTK) is derived from what cryptographic element?
  • CWSP-206 Exam Question 30

    You are setting up small offices for a major insurance carrier. The company policy states that all wireless configurations must fully implement the 802.11i standard. Based on this requirement, which encryption algorithm should you implement?