CWSP-206 Exam Question 31
Which of the following is a type of malware that is secretly installed on the user's personal computer and collects users' information without their knowledge?
CWSP-206 Exam Question 32
What EAP type supports using MS-CHAPv2, EAP-GTC or EAP-TLS for wireless client authentication?
CWSP-206 Exam Question 33
ABC Company has recently installed a WLAN controller and configured it to support WPA2- Enterprise security. The administrator has configured a security profile on the WLAN controller for each group within the company (Marketing, Sales, and Engineering). How are authenticated users assigned to groups so that they receive the correct security profile within the WLAN controller?
CWSP-206 Exam Question 34
Which of the following encryption methods use the RC4 technology? Each correct answer represents a complete solution. Choose all that apply.
CWSP-206 Exam Question 35
ABC Company is an Internet Service Provider with thousands of customers. ABC's customers are given login credentials for network access when they become a customer. ABC uses an LDAP server as the central user credential database. ABC is extending their service to existing customers in some public access areas and would like to use their existing database for authentication. How can ABC Company use their existing user database for wireless user authentication as they implement a large-scale WPA2-Enterprise WLAN security solution?
