Sample Questions:-
Question: 1
In order to acquire credentials of a valid user on a public hotspot network, what attacks may be conducted? Choose the single completely correct answer.
A. MAC denial of service and/or physical theft
B. Social engineering and/or eavesdropping
C. Authentication cracking and/or RF DoS
D. Code injection and/or XSS
E. RF DoS and/or physical theft
Answer: B
Question: 2
What software and hardware tools are used in the process performed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?
A. A low-gain patch antenna and terminal emulation software
B. MAC spoofing software and MAC DoS software
C. RF jamming device and a wireless radio card
D. A wireless workgroup bridge and a protocol analyzer
Answer: C
Question: 3
Many computer users connect to the Internet at airports, which often have 802.11n access points with a captive portal for authentication. While using an airport hotspot with this security solution, to what type of wireless attack is a user susceptible?
A. Wi-Fi phishing
B. Management interface exploits
C. UDP port redirection
D. IGMP snooping
Answer: A
For More Information:-
Visit Now:-
https://www.dumpspass4sure.com/cwnp/cwsp-206-dumps.html
0 comments:
Post a Comment
Note: Only a member of this blog may post a comment.