CWSP-205 Free Dumps Study Materials
Question 5: Given: Many corporations configure guest VLANs on their WLAN controllers that allow visitors
to have Internet access only. The guest traffic is tunneled to the DMZ to prevent some security risks.
In this deployment, what risks are still associated with implementing the guest VLAN without any
advanced traffic monitoring or filtering features enabled? (Choose 2)
A. Intruders can send spam to the Internet through the guest VLAN.
B. Peer-to-peer attacks can still be conducted between guest users unless application-layer
monitoring and filtering are implemented.
C. Unauthorized users can perform Internet-based network attacks through the WLAN.
D. Guest users can reconfigure AP radios servicing the guest VLAN unless unsecure network
management protocols (e.g. Telnet, HTTP) are blocked.
E. Once guest users are associated to the WLAN, they can capture 802.11 frames from the corporate
VLANs.
Correct Answer: A,C