Board logo

subject: Pw0-200 Exam [print this page]


Credit Towards Certification
Credit Towards Certification

Passing exam PW0-200 is a requirement of the CWSP certification.

Exam Description

This certification exam measures your ability to secure a wireless LAN and keep hackers out of your network.

* WLAN Discovery Techniques

* Intrusion and Attack Techniques

* 802.11 Protocol Analysis

* Wireless Intrusion Prevention Systems (WIPS) Implementation

* Layer 2 and 3 VPNs used over 802.11 networks

* Enterprise/SMB/SOHO/Public-Network Security design models

Exam Number: PW0-200

Availability: Register at Pearson VUE

Duration: 90 minutes

Questions: 60

Question Types: Multiple choice / multiple answer

Passing Score: 70% (80% for instructors)

Available Languages: English

1. What policies would prevent peer-to-peer attacks against wireless-enabled corporate laptop computers when the laptops are also used on public access networks such as wireless hotspots?

A. Require managed personal firewall software on each laptop.

B. Require secure applications such as POP3/SHTTPSand SSH2.

C. Require VPN software for connectivity to the corporate network.

D. Require WPA2-Enterprise as the minimal WLAN security solution.

E. Require Port Address Translation (PAT) on each laptop.

F. Require a managed wireless endpoint security agent on each laptop.

Answer: ABCF

2. What happens in a bit flipping attack against an IEEE 802.11 device?

A. An attacker captures an encrypted framemodifies the ciphertextmodifies the ICV to hide the change to the ciphertextand then transmits the frame to appear as if it is from the original source.

B. An attacker uses a non-linear Message Integrity Check (MIC) on his computer to form a wireless crossover connection with the target computer.

C. An attacker injects data into a wireless transmission that results in a memory access exception at the target system for the purpose of breaching security.

D. An attacker sends each frame with the first bit alternating between 0 and 1causing the target computer to disable encryption synchronization.

E. An attacker captures an encrypted authentication frameand then executes a cracking algorithm against each 0 and 1 in the frame. After the frame is crackedit is used to authenticate the attacker's computer.

Answer: A

3. Given: ABC Company has a WLAN controller with three access points15 client devicesand uses WPA2-Personal for WLAN security.

What statement about ABC Company's WLAN security is true?

A. Intruders may obtain the passphrase with an offline dictionary attack and gain network accessbut will be unable to decrypt data traffic.

B. Traffic injection attacks are possible because the transmitter lacks frame numbering.

C. An unauthorized wireless client device cannot associatebut can eavesdrop on some data because WPA2-Personal does not encrypt broadcast traffic.

D. An authorized WLAN user with a protocol analyzer can decode data frames of other authorized users if he captures that user's 4-Way Handshake.

E. Because WPA2-Personal uses Open System authentication followed by a 4-Way Handshakehijacking attacks are easily performed.

Answer: D

Testinside is your source for the CWNP PW0-200 exam. With our CWNP PW0-200 Exam Resources, you can be rest assured that you will Pass your CWNP PW0-200 Exam on Your First Try. With the complete collection of PW0-200 CWNP questions and answers, Testinside has assembled to take you through 120 Q&As to your CWNP PW0-200 Exam preparation, you will cover every field and category helping to ready you for your successful CWNP Certification.

All of our practice exams including the CWNP PW0-200 exam guarantee you success on your First Try. CWNP PW0-200 exam is a challenging PW0-200 exam, with our Testinside CWNP PW0-200 study guide, you can feel safe with our PW0-200 questions and answers that will help you in obtaining your successful completion of your CWNP PW0-200 exam.

Hot Exams:

220-701 CompTIA A+ Essentials (2009)

VCP-410 VMware Certified Professional on VI4

e20-820 CLARiiON Solutions Expert Exam for Technology Architects

by: testinside000032




welcome to loan (http://www.yloan.com/) Powered by Discuz! 5.5.0