CWNP Related Exams
CWSP-206 Exam

What software and hardware tools are used in the processperformed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?
In order to acquire credentials of a valid user on a public hotspot network, what attacks may be conducted? Choose thesingle completely correct answer.
ABC Company has recently installed a WLAN controller and configured it to support WPA2-Enterprise security. The administrator has configured a security profile on the WLAN controller for each groupwithin the company (Marketing, Sales, and Engineering). How are authenticated users assigned to groups so that they receive the correct security profile within the WLAN controller?