ExamGecko
Home / CWNP / CWSP-207 / List of questions
Ask Question

CWNP CWSP-207 Practice Test - Questions Answers

List of questions

Question 1

Report Export Collapse

What EAP type supports using MS-CHAPv2, EAP-GTC or EAP-TLS for wireless client authentication?

H-REAP
H-REAP
EAP-GTC
EAP-GTC
EAP-TTLS
EAP-TTLS
PEAP
PEAP
LEAP
LEAP
Suggested answer: D
asked 16/09/2024
Rik Ant
45 questions

Question 2

Report Export Collapse

Which of the following security attacks cannot be detected by a WIPS solution of any kind? (Choose 2)

Rogue APs
Rogue APs
DoS
DoS
Eavesdropping
Eavesdropping
Social engineering
Social engineering
Suggested answer: C, D
asked 16/09/2024
SoftwareONE Deutschland GmbH
31 questions

Question 3

Report Export Collapse

Wireless Intrusion Prevention Systems (WIPS) provide what network security services? (Choose 2)

Configuration distribution for autonomous APs
Configuration distribution for autonomous APs
Wireless vulnerability assessment
Wireless vulnerability assessment
Application-layer traffic inspection
Application-layer traffic inspection
Analysis and reporting of AP CPU utilization
Analysis and reporting of AP CPU utilization
Policy enforcement and compliance management
Policy enforcement and compliance management
Suggested answer: B, E
asked 16/09/2024
Sebrena Adkins
42 questions

Question 4

Report Export Collapse

In an effort to optimize WLAN performance, ABC Company has upgraded their WLAN infrastructure from 802.11a/g to 802.11n. 802.11a/g clients are still supported and are used throughout ABC's facility. ABC has always been highly security conscious, but due to budget limitations, they have not yet updated their overlay WIPS solution to 802.11n or 802.11ac.

Given ABC's deployment strategy, what security risks would not be detected by the 802.11a/g WIPS?

Hijacking attack performed by using a rogue 802.11n AP against an 802.11a client
Hijacking attack performed by using a rogue 802.11n AP against an 802.11a client
Rogue AP operating in Greenfield 40 MHz-only mode
Rogue AP operating in Greenfield 40 MHz-only mode
802.11a STA performing a deauthentication attack against 802.11n APs
802.11a STA performing a deauthentication attack against 802.11n APs
802.11n client spoofing the MAC address of an authorized 802.11n client
802.11n client spoofing the MAC address of an authorized 802.11n client
Suggested answer: B
asked 16/09/2024
Mohammedsaleh Ibrahim
42 questions

Question 5

Report Export Collapse

ABC Company requires the ability to identify and quickly locate rogue devices. ABC has chosen an overlay WIPS solution with sensors that use dipole antennas to perform this task. Use your knowledge of location tracking techniques to answer the question.

In what ways can this 802.11-based WIPS platform determine the location of rogue laptops or APs? (Choose 3)

Time Difference of Arrival (TDoA)
Time Difference of Arrival (TDoA)
Angle of Arrival (AoA)
Angle of Arrival (AoA)
Trilateration of RSSI measurements
Trilateration of RSSI measurements
GPS Positioning
GPS Positioning
RF Fingerprinting
RF Fingerprinting
Suggested answer: A, C, E
asked 16/09/2024
Sascha Mintenbeck
31 questions

Question 6

Report Export Collapse

Given: Your organization is using EAP as an authentication framework with a specific type that meets the requirements of your corporate policies.

Which one of the following statements is true related to this implementation?

The client will be the authenticator in this scenario.
The client will be the authenticator in this scenario.
The client STAs must use a different, but complementary, EAP type than the AP STAs.
The client STAs must use a different, but complementary, EAP type than the AP STAs.
The client STAs may communicate over the uncontrolled port in order to authenticate as soon as Open System authentication completes.
The client STAs may communicate over the uncontrolled port in order to authenticate as soon as Open System authentication completes.
The client STAs may communicate over the controlled port in order to authenticate as soon as the Open System authentication completes.
The client STAs may communicate over the controlled port in order to authenticate as soon as the Open System authentication completes.
Suggested answer: C
asked 16/09/2024
Rutger Pels
32 questions

Question 7

Report Export Collapse

Role-Based Access Control (RBAC) allows a WLAN administrator to perform what network function?

Minimize traffic load on an AP by requiring mandatory admission control for use of the Voice access category.
Minimize traffic load on an AP by requiring mandatory admission control for use of the Voice access category.
Allow access to specific files and applications based on the user's WMM access category.
Allow access to specific files and applications based on the user's WMM access category.
Provide two or more user groups connected to the same SSID with different levels of network privileges.
Provide two or more user groups connected to the same SSID with different levels of network privileges.
Allow simultaneous support for multiple EAP types on a single access point.
Allow simultaneous support for multiple EAP types on a single access point.
Suggested answer: C
asked 16/09/2024
Kevin Langthorne
39 questions

Question 8

Report Export Collapse

Given: ABC Company is deploying an IEEE 802.11-compliant wireless security solution using 802.1X/EAP authentication. According to company policy, the security solution must prevent an eavesdropper from decrypting data frames traversing a wireless connection.

What security characteristics and/or components play a role in preventing data decryption? (Choose 2)

Multi-factor authentication
Multi-factor authentication
4-Way Handshake
4-Way Handshake
PLCP Cyclic Redundancy Check (CRC)
PLCP Cyclic Redundancy Check (CRC)
Encrypted Passphrase Protocol (EPP)
Encrypted Passphrase Protocol (EPP)
Integrity Check Value (ICV)
Integrity Check Value (ICV)
Group Temporal Keys
Group Temporal Keys
Suggested answer: B, F
asked 16/09/2024
Priyantha Perea
40 questions

Question 9

Report Export Collapse

An attack is under way on the network. The attack is preventing users from accessing resources required for business operations, but the attacker has not gained access to any files or data. What kind of attack is described?

Man-in-the-middle
Man-in-the-middle
Hijacking
Hijacking
ASLEAP
ASLEAP
DoS
DoS
Suggested answer: D
asked 16/09/2024
Emmanuel Aminu
46 questions

Question 10

Report Export Collapse

Given: WLAN attacks are typically conducted by hackers to exploit a specific vulnerability within a network.

What statement correctly pairs the type of WLAN attack with the exploited vulnerability? (Choose 3)

Management interface exploit attacks are attacks that use social engineering to gain credentials from managers.
Management interface exploit attacks are attacks that use social engineering to gain credentials from managers.
Zero-day attacks are always authentication or encryption cracking attacks.
Zero-day attacks are always authentication or encryption cracking attacks.
RF DoS attacks prevent successful wireless communication on a specific frequency or frequency range.
RF DoS attacks prevent successful wireless communication on a specific frequency or frequency range.
Hijacking attacks interrupt a user's legitimate connection and introduce a new connection with an evil twin AP.
Hijacking attacks interrupt a user's legitimate connection and introduce a new connection with an evil twin AP.
Social engineering attacks are performed to collect sensitive information from unsuspecting users
Social engineering attacks are performed to collect sensitive information from unsuspecting users
Association flood attacks are Layer 3 DoS attacks performed against authenticated client stations
Association flood attacks are Layer 3 DoS attacks performed against authenticated client stations
Suggested answer: C, D, E
asked 16/09/2024
DAVID STAATZ
40 questions
Total 35 questions
Go to page: of 4
Search

Related questions