Free CWSP-207 Exam Braindumps (page: 9)

Page 8 of 31

Given: ABC Hospital wishes to create a strong security policy as a first step in securing their 802.11 WLAN.

Before creating the WLAN security policy, what should you ensure you possess?

  1. Awareness of the exact vendor devices being installed
  2. Management support for the process
  3. End-user training manuals for the policies to be created
  4. Security policy generation software

Answer(s): B



What policy would help mitigate the impact of peer-to-peer attacks against wireless-enabled corporate laptop computers when the laptops are also used on public access networks such as wireless hot-spots?

  1. Require Port Address Translation (PAT) on each laptop.
  2. Require secure applications such as POP, HTTP, and SSH.
  3. Require VPN software for connectivity to the corporate network.
  4. Require WPA2-Enterprise as the minimal WLAN security solution.

Answer(s): C



What is one advantage of using EAP-TTLS instead of EAP-TLS as an authentication mechanism in an 802.11 WLAN?

  1. EAP-TTLS sends encrypted supplicant credentials to the authentication server, but EAP-TLS uses unencrypted user credentials.
  2. EAP-TTLS supports client certificates, but EAP-TLS does not.
  3. EAP-TTLS does not require an authentication server, but EAP-TLS does.
  4. EAP-TTLS does not require the use of a certificate for each STA as authentication credentials, but EAP-TLS does.

Answer(s): D



What wireless authentication technologies may build a TLS tunnel between the supplicant and the authentication server before passing client authentication credentials to the authentication server? (Choose 3)

  1. EAP-MD5
  2. EAP-TLS
  3. LEAP
  4. PEAPv0/MSCHAPv2
  5. EAP-TTLS

Answer(s): B,D,E






Post your Comments and Discuss CWNP CWSP-207 exam with other Community members:

CWSP-207 Exam Discussions & Posts