CWNP Related Exams
CWSP-206 Exam

The IEEE 802.11 Pairwise Transient Key (PTK) is derived from what cryptographic element?
As the primary security engineer for a large corporate network, you have been asked to author a new securitypolicy for the wireless network. While most client devices support 802.1X authentication, some legacy devices still only support passphrase/PSK-based security methods. When writing the 802.11 security policy, what password-related items should be addressed?
In order to acquire credentials of a valid user on a public hotspot network, what attacks may be conducted? Choose thesingle completely correct answer.