Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

Certified Wireless Security Professional (CWSP) Question and Answers

Certified Wireless Security Professional (CWSP)

Last Update Oct 2, 2025
Total Questions : 119

We are offering FREE CWSP-208 CWNP exam questions. All you do is to just go and sign up. Give your details, prepare CWSP-208 free exam questions and then go for complete pool of Certified Wireless Security Professional (CWSP) test questions that will help you more.

CWSP-208 pdf

CWSP-208 PDF

$42  $104.99
CWSP-208 Engine

CWSP-208 Testing Engine

$50  $124.99
CWSP-208 PDF + Engine

CWSP-208 PDF + Testing Engine

$66  $164.99
Questions 1

Given: AAA is an architectural framework used to provide three separate security components in a network. Listed below are three phrases that each describe one aspect of the AAA framework.

Option-1 — This AAA function is performed first and validates user identify prior to determining the network resources to which they will be granted access.

Option-2 — This function is used for monitoring and auditing purposes and includes the collection of data that identifies what a user has done while connected.

Option-3 — This function is used to designate permissions to a particular user.

What answer correctly pairs the AAA component with the descriptions provided above?

Options:

A.  

Option-1 – Access Control

Option-2 – Authorization

Option-3 – Accounting

B.  

Option-1 – Authentication

Option-2 – Accounting

Option-3 – Association

C.  

Option-1 – Authorization

Option-2 – Access Control

Option-3 – Association

D.  

Option-1 – Authentication

Option-2 – Accounting

Option-3 – Authorization

Discussion 0
Questions 2

What security benefits are provided by endpoint security solution software? (Choose 3)

Options:

A.  

Can prevent connections to networks with security settings that do not conform to company policy

B.  

Can collect statistics about a user’s network use and monitor network threats while they are connected

C.  

Can restrict client connections to networks with specific SSIDs and encryption types

D.  

Can be used to monitor for and prevent network attacks by nearby rogue clients or APs

Discussion 0
Questions 3

The IEEE 802.11 Pairwise Transient Key (PTK) is derived from what cryptographic element?

Options:

A.  

Phase Shift Key (PSK)

B.  

Group Master Key (GMK)

C.  

Pairwise Master Key (PMK)

D.  

Group Temporal Key (GTK)

E.  

PeerKey (PK)

F.  

Key Confirmation Key (KCK)

Discussion 0
Questions 4

What policy would help mitigate the impact of peer-to-peer attacks against wireless-enabled corporate laptop computers when the laptops are also used on public access networks such as wireless hot-spots?

Options:

A.  

Require Port Address Translation (PAT) on each laptop.

B.  

Require secure applications such as POP, HTTP, and SSH.

C.  

Require VPN software for connectivity to the corporate network.

D.  

Require WPA2-Enterprise as the minimal WLAN security solution.

Discussion 0
Questions 5

As the primary security engineer for a large corporate network, you have been asked to author a new security policy for the wireless network. While most client devices support 802.1X authentication, some legacy devices still only support passphrase/PSK-based security methods.

When writing the 802.11 security policy, what password-related items should be addressed?

Options:

A.  

MSCHAPv2 passwords used with EAP/PEAPv0 should be stronger than typical WPA2-PSK passphrases.

B.  

Password complexity should be maximized so that weak WEP IV attacks are prevented.

C.  

Static passwords should be changed on a regular basis to minimize the vulnerabilities of a PSK-based authentication.

D.  

Certificates should always be recommended instead of passwords for 802.11 client authentication.

E.  

EAP-TLS must be implemented in such scenarios.

Discussion 0
Questions 6

What elements should be addressed by a WLAN security policy? (Choose 2)

Options:

A.  

Enabling encryption to prevent MAC addresses from being sent in clear text

B.  

How to prevent non-IT employees from learning about and reading the user security policy

C.  

End-user training for password selection and acceptable network use

D.  

The exact passwords to be used for administration interfaces on infrastructure devices

E.  

Social engineering recognition and mitigation techniques

Discussion 0
Questions 7

In what deployment scenarios would it be desirable to enable peer-to-peer traffic blocking?

Options:

A.  

In home networks in which file and printer sharing is enabled

B.  

At public hot-spots in which many clients use diverse applications

C.  

In corporate Voice over Wi-Fi networks with push-to-talk multicast capabilities

D.  

In university environments using multicast video training sourced from professor’s laptops

Discussion 0
Questions 8

Given: ABC Hospital wishes to create a strong security policy as a first step in securing their 802.11 WLAN.

Before creating the WLAN security policy, what should you ensure you possess?

Options:

A.  

Awareness of the exact vendor devices being installed

B.  

Management support for the process

C.  

End-user training manuals for the policies to be created

D.  

Security policy generation software

Discussion 0
Questions 9

As a part of a large organization’s security policy, how should a wireless security professional address the problem of rogue access points?

Options:

A.  

Use a WPA2-Enterprise compliant security solution with strong mutual authentication and encryption for network access of corporate devices.

B.  

Hide the SSID of all legitimate APs on the network so that intruders cannot copy this parameter on rogue APs.

C.  

Conduct thorough manual facility scans with spectrum analyzers to detect rogue AP RF signatures.

D.  

A trained employee should install and configure a WIPS for rogue detection and response measures.

E.  

Enable port security on Ethernet switch ports with a maximum of only 3 MAC addresses on each port.

Discussion 0
Questions 10

Given: Mary has just finished troubleshooting an 802.11g network performance problem using a laptop-based WLAN protocol analyzer. The wireless network implements 802.1X/PEAP and the client devices are authenticating properly. When Mary disables the WLAN protocol analyzer, configures her laptop for PEAP authentication, and then tries to connect to the wireless network, she is unsuccessful. Before using the WLAN protocol analyzer, Mary’s laptop connected to the network without any problems.

What statement indicates why Mary cannot access the network from her laptop computer?

Options:

A.  

The nearby WIPS sensor categorized Mary’s protocol analyzer adapter as a threat and is performing a deauthentication flood against her computer.

B.  

The PEAP client’s certificate was voided when the protocol analysis software assumed control of the wireless adapter.

C.  

The protocol analyzer’s network interface card (NIC) drivers are still loaded and do not support the version of PEAP being used.

D.  

Mary’s supplicant software is using PEAPv0/EAP-MSCHAPv2, and the access point is using PEAPv1/EAP-GTC.

Discussion 0
Questions 11

Given: WLAN protocol analyzers can read and record many wireless frame parameters.

What parameter is needed to physically locate rogue APs with a protocol analyzer?

Options:

A.  

SSID

B.  

IP Address

C.  

BSSID

D.  

Signal strength

E.  

RSN IE

F.  

Noise floor

Discussion 0
Questions 12

Given: You view a protocol analyzer capture decode with the following protocol frames listed in the following order (excluding the ACK frames):

1) 802.11 Probe Request and 802.11 Probe Response

2) 802.11 Auth and another 802.11 Auth

2) 802.11 Assoc Req and 802.11 Assoc Rsp

4) EAPOL-Start

5) EAP Request and EAP Response

6) EAP Request and EAP Response

7) EAP Request and EAP Response

8) EAP Request and EAP Response

9) EAP Request and EAP Response

10) EAP Success

19) EAPOL-Key (4 frames in a row)

What are you seeing in the capture file? (Choose 4)

Options:

A.  

WPA2-Enterprise authentication

B.  

WPA2-Personal authentication

C.  

802.11 Open System authentication

D.  

802.1X with Dynamic WEP

E.  

Wi-Fi Protected Setup with PIN

F.  

Active Scanning

G.  

4-Way Handshake

Discussion 0
Questions 13

You are implementing an 802.11ac WLAN and a WIPS at the same time. You must choose between integrated and overlay WIPS solutions. Which of the following statements is true regarding integrated WIPS solutions?

Options:

A.  

Integrated WIPS always perform better from a client throughput perspective because the same radio that performs the threat scanning also services the clients.

B.  

Integrated WIPS use special sensors installed alongside the APs to scan for threats.

C.  

Many integrated WIPS solutions that detect Voice over Wi-Fi traffic will cease scanning altogether to accommodate the latency sensitive client traffic.

D.  

Integrated WIPS is always more expensive than overlay WIPS.

Discussion 0
Questions 14

You work as the security administrator for your organization. In relation to the WLAN, you are viewing a dashboard that shows security threat, policy compliance and rogue threat charts. What type of system is in view?

Options:

A.  

Wireshark Protocol Analyzer

B.  

Wireless VPN Management Systems

C.  

Wireless Intrusion Prevention System

D.  

Distributed RF Spectrum Analyzer

E.  

WLAN Emulation System

Discussion 0
Questions 15

Select the answer option that arranges the numbered events in the correct time sequence (first to last) for a client associating to a BSS using EAP-PEAPv0/MSCHAPv2.

1. Installation of PTK

2. Initiation of 4-way handshake

3. Open system authentication

4. 802.11 association

5. 802.1X controlled port is opened for data traffic

6. Client validates server certificate

7. AS validates client credentials

Options:

A.  

3—4—6—7—2—1—5

B.  

4—3—5—2—7—6—1

C.  

5—3—4—2—6—7—1

D.  

6—1—3—4—2—7—5

E.  

4—3—2—7—6—1—5

F.  

3—4—7—6—5—2—1

Discussion 0
Questions 16

What attack cannot be detected by a Wireless Intrusion Prevention System (WIPS)?

Options:

A.  

MAC Spoofing

B.  

Eavesdropping

C.  

Hot-spotter

D.  

Soft AP

E.  

Deauthentication flood

F.  

EAP flood

Discussion 0
Questions 17

Given: You have implemented strong authentication and encryption mechanisms for your enterprise 802.11 WLAN using 802.1X/EAP with AES-CCMP.

For users connecting within the headquarters office, what other security solution will provide continuous monitoring of both clients and APs with 802.11-specific tracking?

Options:

A.  

IPSec VPN client and server software

B.  

Internet firewall software

C.  

Wireless intrusion prevention system

D.  

WLAN endpoint agent software

E.  

RADIUS proxy server

Discussion 0
Questions 18

What 802.11 WLAN security problem is directly addressed by mutual authentication?

Options:

A.  

Wireless hijacking attacks

B.  

Weak password policies

C.  

MAC spoofing

D.  

Disassociation attacks

E.  

Offline dictionary attacks

F.  

Weak Initialization Vectors

Discussion 0
Questions 19

Wireless Intrusion Prevention Systems (WIPS) are used for what purposes? (Choose 3)

Options:

A.  

Performance monitoring and troubleshooting

B.  

Enforcing wireless network security policy

C.  

Detecting and defending against eavesdropping attacks

D.  

Security monitoring and notification

E.  

Preventing physical carrier sense attacks

F.  

Classifying wired client devices

Discussion 0
Questions 20

What type of WLAN attack is prevented with the use of a per-MPDU TKIP sequence counter (TSC)?

Options:

A.  

Weak-IV

B.  

Forgery

C.  

Replay

D.  

Bit-flipping

E.  

Session hijacking

Discussion 0
Questions 21

Given: Many computer users connect to the Internet at airports, which often have 802.11n access points with a captive portal for authentication.

While using an airport hot-spot with this security solution, to what type of wireless attack is a user susceptible? (Choose 2)

Options:

A.  

Man-in-the-Middle

B.  

Wi-Fi phishing

C.  

Management interface exploits

D.  

UDP port redirection

E.  

IGMP snooping

Discussion 0
Questions 22

A WLAN is implemented using WPA-Personal and MAC filtering.

To what common wireless network attacks is this network potentially vulnerable? (Choose 3)

Options:

A.  

Offline dictionary attacks

B.  

MAC Spoofing

C.  

ASLEAP

D.  

DoS

Discussion 0
Questions 23

What software and hardware tools are used together to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network? (Choose 2)

Options:

A.  

RF jamming device and a wireless radio card

B.  

A low-gain patch antenna and terminal emulation software

C.  

A wireless workgroup bridge and a protocol analyzer

D.  

DHCP server software and access point software

E.  

MAC spoofing software and MAC DoS software

Discussion 0
Questions 24

What WLAN client device behavior is exploited by an attacker during a hijacking attack?

Options:

A.  

When the RF signal between a client and an access point is disrupted for more than a few seconds, the client device will attempt to associate to an access point with better signal quality.

B.  

When the RF signal between a client and an access point is lost, the client will not seek to reassociate with another access point until the 120 second hold down timer has expired.

C.  

After the initial association and 4-way handshake, client stations and access points do not need to perform another 4-way handshake, even if connectivity is lost.

D.  

As specified by the Wi-Fi Alliance, clients using Open System authentication must allow direct client-to-client connections, even in an infrastructure BSS.

E.  

Client drivers scan for and connect to access points in the 2.4 GHz band before scanning the 5 GHz band.

Discussion 0
Questions 25

Given: John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website. The bank’s website uses the HTTPS protocol to protect sensitive account information. While John was using the hot-spot, a hacker was able to obtain John’s bank account user ID and password and exploit this information.

What likely scenario could have allowed the hacker to obtain John’s bank account user ID and password?

Options:

A.  

John's bank is using an expired X.509 certificate on their web server. The certificate is on John's Certificate Revocation List (CRL), causing the user ID and password to be sent unencrypted.

B.  

John uses the same username and password for banking that he does for email. John used a POP3 email client at the wireless hot-spot to check his email, and the user ID and password were not encrypted.

C.  

John accessed his corporate network with his IPSec VPN software at the wireless hot-spot. An IPSec VPN only encrypts data, so the user ID and password were sent in clear text. John uses the same username and password for banking that he does for his IPSec VPN software.

D.  

The bank’s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.

E.  

Before connecting to the bank’s website, John’s association to the AP was hijacked. The attacker intercepted the HTTPS public encryption key from the bank’s web server and has decrypted John’s login credentials in near real-time.

Discussion 0
Questions 26

Given: You manage a wireless network that services 200 wireless users. Your facility requires 20 access points, and you have installed an IEEE 802.11-compliant implementation of 802.1X/LEAP with AES-CCMP as an authentication and encryption solution.

In this configuration, the wireless network is initially susceptible to what type of attacks? (Choose 2)

Options:

A.  

Encryption cracking

B.  

Offline dictionary attacks

C.  

Layer 3 peer-to-peer

D.  

Application eavesdropping

E.  

Session hijacking

F.  

Layer 1 DoS

Discussion 0
Questions 27

In order to acquire credentials of a valid user on a public hot-spot network, what attacks may be conducted? Choose the single completely correct answer.

Options:

A.  

Social engineering and/or eavesdropping

B.  

RF DoS and/or physical theft

C.  

MAC denial of service and/or physical theft

D.  

Authentication cracking and/or RF DoS

E.  

Code injection and/or XSS

Discussion 0