CWNP Certified Wireless Security Professional (CWSP) CWSP-207 Question # 8 Topic 1 Discussion

CWNP Certified Wireless Security Professional (CWSP) CWSP-207 Question # 8 Topic 1 Discussion

CWSP-207 Exam Topic 1 Question 8 Discussion:
Question #: 8
Topic #: 1

Given: Many corporations configure guest VLANs on their WLAN controllers that allow visitors to have Internet access only. The guest traffic is tunneled to the DMZ to prevent some security risks.

In this deployment, what risks are still associated with implementing the guest VLAN without any advanced traffic monitoring or filtering features enabled? (Choose 2)


A.

Intruders can send spam to the Internet through the guest VLAN.


B.

Peer-to-peer attacks can still be conducted between guest users unless application-layer monitoring and filtering are implemented.


C.

Unauthorized users can perform Internet-based network attacks through the WLAN.


D.

Guest users can reconfigure AP radios servicing the guest VLAN unless unsecure network management protocols (e.g. Telnet, HTTP) are blocked.


E.

Once guest users are associated to the WLAN, they can capture 802.11 frames from the corporate VLANs.


Get Premium CWSP-207 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.