Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

CWNP CWSP-206 CWSP Certified Wireless Security Professional Exam Practice Test

Page: 1 / 6
Total 60 questions

CWSP Certified Wireless Security Professional Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

The Marketing department’s WLAN users need to reach their file and email server as well as the Internet, but should not have access to any other network resources. What single WLAN security feature should beimplemented to comply with these requirements?

Options:

A.

RADIUS policy accounting

B.

Group authentication

C.

Role-based access control

D.

Captive portal

E.

Mutual authentication

Question 2

Joe’s new laptop is experiencing difficulty connecting to ABC Company’s 802.11 WLAN using 802.1X/EAP PEAPv0. The company’s wireless networkadministrator assured Joe that his laptop was authorized in the WIPS management console for connectivity to ABC’s network before it was given to him. The WIPS termination policy includes alarms for rogue stations, rogue APs, DoS attacks and unauthorized roaming. What is a likely reason that Joe cannot connect to the network?

Options:

A.

An ASLEAP attack has been detected on APs to which Joe’s laptop was trying to associate. The WIPS responded by disabling the APs.

B.

Joe configured his 802.11 radio card to transmit at 100 mW to increase his SNR. The WIPS is detecting this much output power as a DoS attack.

C.

Joe’s integrated 802.11 radio is sending multiple Probe Request frames on each channel.

D.

Joe disabled his laptop’s integrated 802.11 radio and is using a personal PC card radio with a different chipset, drivers, and client utilities.

Question 3

Role-Based Access Control (RBAC) allows a WLAN administrator to perform what network function?

Options:

A.

Provide two or more user groups connected to the same SSID with different levels of network privileges.

B.

Allow access tospecific files and applications based on the user’s WMM access category.

C.

Allow simultaneous support for multiple EAP types on a single access point.

D.

Minimize traffic load on an AP by requiring mandatory admission control for use of the Voice access category.

Question 4

Your company has just completed installation of an IEEE 802.11 WLAN controller with 20 controller-based APs. The CSO has specified PEAPv0/EAP-MSCHAPv2 as the only authorized WLAN authentication mechanism. Since an LDAP-compliant user database was already in use, a RADIUS server was installed and is querying authentication requeststo the LDAP server. Where must the X.509 server certificate and private key be installed in this network?

Options:

A.

Controller-based APs

B.

WLAN controller

C.

RADIUS server

D.

Supplicant devices

E.

LDAP server

Question 5

In the basic 4-way handshake used in secure 802.11 networks, what is the purpose of the ANonce and SNonce?

Options:

A.

They are added together and used as the GMK, fromwhich the GTK is derived.

B.

They are used to pad Message 1 and Message 2 so each frame contains the same number of bytes.

C.

The IEEE 802.11 standard requires that all encrypted frames contain a nonce to serve as a Message Integrity Check (MIC).

D.

They are input values used in the derivation of the Pairwise Transient Key.

Question 6

What TKIP feature was introduced to counter the weak integrity check algorithm used in WEP?

Options:

A.

RC5 stream cipher

B.

Block cipher support

C.

Sequence counters

D.

32-bit ICV (CRC-32)

E.

Michael

Question 7

When monitoring APs within a LAN using a Wireless Network Management System (WNMS), what secure protocol may be used bythe WNMS to issue configuration changes to APs?

Options:

A.

PPTP

B.

802.1X/EAP

C.

TFTP

D.

SNMPv3

E.

IPSec/ESP

Question 8

Your organization is using EAP as an authentication framework with a specific type that meets the requirements of your corporate policies. Which one of the following statements is true related to this implementation?

Options:

A.

The client STAs may communicate over the controlled port in order to authenticate as soon as the Open System authentication completes.

B.

The client STAs may communicate over the uncontrolled port in order to authenticate as soon as the Open System authentication completes.

C.

The client STAs may use a different, but complementary, EAP type than the AP STAs.

D.

The client will be the authenticator in this scenario.

Question 9

You manage a wireless network that services 200 wireless users. Your facility requires 20 access points, and you have installed an IEEE 802.11-compliant implementation of 802.1X/LEAP with AES-CCMPas an authentication and encryption solution. In this configuration, the wireless network is initially susceptible to what type of attack?

Options:

A.

Offline dictionary attacks

B.

Application eavesdropping

C.

Session hijacking

D.

Layer 3 peer-to-peer

E.

Encryption cracking

Page: 1 / 6
Total 60 questions