Easter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

CWSP Certified Wireless Security Professional Question and Answers

CWSP Certified Wireless Security Professional

Last Update May 16, 2024
Total Questions : 60

We are offering FREE CWSP-206 CWNP exam questions. All you do is to just go and sign up. Give your details, prepare CWSP-206 free exam questions and then go for complete pool of CWSP Certified Wireless Security Professional test questions that will help you more.

CWSP-206 pdf

CWSP-206 PDF

$35  $99.99
CWSP-206 Engine

CWSP-206 Testing Engine

$42  $119.99
CWSP-206 PDF + Engine

CWSP-206 PDF + Testing Engine

$56  $159.99
Questions 1

Your network implements an 802.1X/EAP-based wireless security solution. A WLAN controller is installed and manages seven APs. FreeRADIUS is used for the RADIUS server and is installed on a dedicated server named SRV21. One example client is a MacBook Pro with 8 GB RAM. What device functions as the 802.1X/EAP Authenticator?

Options:

A.  

WLAN Controller/AP

B.  

MacBook Pro

C.  

SRV21

D.  

RADIUS server

Discussion 0
Questions 2

The Marketing department’s WLAN users need to reach their file and email server as well as the Internet, but should not have access to any other network resources. What single WLAN security feature should beimplemented to comply with these requirements?

Options:

A.  

RADIUS policy accounting

B.  

Group authentication

C.  

Role-based access control

D.  

Captive portal

E.  

Mutual authentication

Discussion 0
Questions 3

ABC Corporation is evaluating the security solution for their existing WLAN. Two of their supported solutions include a PPTP VPN and 802.1X/LEAP. They have used PPTP VPNs because of their widesupport in server and desktop operating systems. While both PPTP and LEAP adhere to the minimum requirements of the corporate security policy, some individuals have raised concerns about MS-CHAPv2 (and similar) authentication and the known fact that MS-CHAPv2 has proven vulnerable in improper implementations. As a consultant, what do you tell ABC Corporation about implementing MS-CHAPv2 authentication?

Options:

A.  

MS-CHAPv2 is only appropriate for WLAN security when used inside a TLS-encrypted tunnel.

B.  

When implemented with AES-CCMP encryption, MS-CHAPv2 is very secure.

C.  

MS-CHAPv2 uses AES authentication, and is therefore secure.

D.  

MS-CHAPv2 is compliant with WPA-Personal, but not WPA2-Enterprise.

E.  

LEAP’s use of MS-CHAPv2 is only secure when combined with WEP.

Discussion 0
Questions 4

What field in the RSN information element (IE) will indicate whether PSK- or Enterprise-based WPA or WPA2 is in use?

Options:

A.  

Group Cipher Suite

B.  

Pairwise Cipher Suite List

C.  

AKM Suite List

D.  

RSN Capabilities

Discussion 0
Questions 5

XYZ Hospital plans to improve the security and performance of their Voice over Wi-Fi implementation and will be upgrading to 802.11n phones with 802.1X/EAP authentication. XYZ would like to support fast secure roaming for the phones and will require the ability to troubleshoot reassociations that are delayed or dropped during inter-channel roaming. What portable solution would be recommended for XYZ to troubleshoot roaming problems?

Options:

A.  

Spectrum analyzer software installed on a laptop computer.

B.  

An autonomous AP mounted on a mobile cart and configured to operate in monitor mode.

C.  

Laptop-based protocol analyzer with multiple 802.11n adapters.

D.  

WIPS sensor software installed on a laptop computer.

Discussion 0
Questions 6

A networksecurity auditor is preparing to perform a comprehensive assessment of an 802.11ac network’s security. What task should be performed at the beginning of the audit to maximize the auditor’s ability to expose network vulnerabilities?

Options:

A.  

Identify the IP subnet information for each network segment.

B.  

Identify the manufacturer of the wireless infrastructure hardware.

C.  

Identify the skill level of the wireless network security administrator(s).

D.  

Identify the manufacturer of the wireless intrusion preventionsystem.

E.  

Identify the wireless security solution(s) currently in use.

Discussion 0
Questions 7

In XYZ’s small business, two autonomous 802.11ac APs and 12 client devices are in use with WPA2-Personal. What statement about the WLAN security of this company is true?

Options:

A.  

Intruders may obtain the passphrase with an offline dictionary attack and gain network access, but will be unable to decrypt the data traffic of other users.

B.  

Because WPA2-Personal uses Open System authentication followed by a 4-Way Handshake, hijacking attacks are easily performed.

C.  

A successful attack against all unicast traffic on the network would require a weak passphrase dictionary attack and the capture of the latest 4-Way Handshake for each client.

D.  

An unauthorized wireless client device cannot associate, but can eavesdrop on some data because WPA2-Personal does not encrypt multicast or broadcast traffic.

E.  

An unauthorized WLAN user with a protocol analyzer can decode dataframes of authorized users if he captures the BSSID, client MAC address, and a user’s 4-Way Handshake.

Discussion 0
Questions 8

XYZ Company has recently installed a controller-based WLAN and is using a RADIUS server to query authentication requests to an LDAP server. XYZ maintains user-based access policies and would like to use the RADIUS server to facilitate network authorization. What RADIUS feature could be used by XYZ to assign the proper network permissions to users during authentications?

Options:

A.  

RADIUS can reassign a client’s 802.11 association to a new SSID by referencing a username-to-SSID mapping table in the LDAP user database.

B.  

The RADIUS server can support vendor-specific attributes in the ACCESS-ACCEPT response, which can be used for user policy assignment.

C.  

The RADIUS server can communicate with the DHCP server to issue the appropriate IP address and VLAN assignment to users.

D.  

RADIUS can send a DO-NOT-AUTHORIZE demand to the authenticator to prevent the STA from gaining access to specific files, but may only employ this in relation to Linux servers.

Discussion 0
Questions 9

AWLAN consultant has just finished installing a WLAN controller with 15 controller-based APs. Two SSIDs with separate VLANs are configured for this network, and both VLANs are configured to use the same RADIUS server. The SSIDs are configured as follows:

The consultant’s computer can successfully authenticate and browse the Internet when using the Blue SSID. The same computer cannot authenticate when using the Red SSID. What is a possible cause of the problem?

Options:

A.  

The consultant does not have a valid Kerberos ID on the Blue VLAN.

B.  

The client does not have a proper certificate installed for the tunneled authentication within the established TLS tunnel.

C.  

The TKIP cipher suite is not a valid option for PEAPv0 authentication.

D.  

The Red VLAN does not use server certificate, but the client requires one.

Discussion 0