CWNP Related Exams
CWSP-208 Exam
What policy would help mitigate the impact of peer-to-peer attacks against wireless-enabled corporate laptop computers when the laptops are also used on public access networks such as wireless hot-spots?
The IEEE 802.11 Pairwise Transient Key (PTK) is derived from what cryptographic element?
After completing the installation of a new overlay WIPS for the purpose of rogue detection and security monitoring at your corporate headquarters, what baseline function MUST be performed in order to identify security threats?