ExamGecko
Home / CWNP / CWSP-207 / List of questions
Ask Question

CWNP CWSP-207 Practice Test - Questions Answers

Add to Whishlist

List of questions

Question 1

Report Export Collapse

What EAP type supports using MS-CHAPv2, EAP-GTC or EAP-TLS for wireless client authentication?

H-REAP
H-REAP
EAP-GTC
EAP-GTC
EAP-TTLS
EAP-TTLS
PEAP
PEAP
LEAP
LEAP
Suggested answer: D
asked 16/09/2024
Rik Ant
50 questions

Question 2

Report Export Collapse

Which of the following security attacks cannot be detected by a WIPS solution of any kind? (Choose 2)

Rogue APs
Rogue APs
DoS
DoS
Eavesdropping
Eavesdropping
Social engineering
Social engineering
Suggested answer: C, D
asked 16/09/2024
SoftwareONE Deutschland GmbH
37 questions

Question 3

Report Export Collapse

Wireless Intrusion Prevention Systems (WIPS) provide what network security services? (Choose 2)

Configuration distribution for autonomous APs
Configuration distribution for autonomous APs
Wireless vulnerability assessment
Wireless vulnerability assessment
Application-layer traffic inspection
Application-layer traffic inspection
Analysis and reporting of AP CPU utilization
Analysis and reporting of AP CPU utilization
Policy enforcement and compliance management
Policy enforcement and compliance management
Suggested answer: B, E
asked 16/09/2024
Sebrena Adkins
45 questions

Question 4

Report Export Collapse

In an effort to optimize WLAN performance, ABC Company has upgraded their WLAN infrastructure from 802.11a/g to 802.11n. 802.11a/g clients are still supported and are used throughout ABC's facility. ABC has always been highly security conscious, but due to budget limitations, they have not yet updated their overlay WIPS solution to 802.11n or 802.11ac.

Given ABC's deployment strategy, what security risks would not be detected by the 802.11a/g WIPS?

Hijacking attack performed by using a rogue 802.11n AP against an 802.11a client
Hijacking attack performed by using a rogue 802.11n AP against an 802.11a client
Rogue AP operating in Greenfield 40 MHz-only mode
Rogue AP operating in Greenfield 40 MHz-only mode
802.11a STA performing a deauthentication attack against 802.11n APs
802.11a STA performing a deauthentication attack against 802.11n APs
802.11n client spoofing the MAC address of an authorized 802.11n client
802.11n client spoofing the MAC address of an authorized 802.11n client
Suggested answer: B
asked 16/09/2024
Mohammedsaleh Ibrahim
43 questions

Question 5

Report Export Collapse

ABC Company requires the ability to identify and quickly locate rogue devices. ABC has chosen an overlay WIPS solution with sensors that use dipole antennas to perform this task. Use your knowledge of location tracking techniques to answer the question.

In what ways can this 802.11-based WIPS platform determine the location of rogue laptops or APs? (Choose 3)

Time Difference of Arrival (TDoA)
Time Difference of Arrival (TDoA)
Angle of Arrival (AoA)
Angle of Arrival (AoA)
Trilateration of RSSI measurements
Trilateration of RSSI measurements
GPS Positioning
GPS Positioning
RF Fingerprinting
RF Fingerprinting
Suggested answer: A, C, E
asked 16/09/2024
Sascha Mintenbeck
36 questions

Question 6

Report Export Collapse

Given: Your organization is using EAP as an authentication framework with a specific type that meets the requirements of your corporate policies.

Which one of the following statements is true related to this implementation?

The client will be the authenticator in this scenario.
The client will be the authenticator in this scenario.
The client STAs must use a different, but complementary, EAP type than the AP STAs.
The client STAs must use a different, but complementary, EAP type than the AP STAs.
The client STAs may communicate over the uncontrolled port in order to authenticate as soon as Open System authentication completes.
The client STAs may communicate over the uncontrolled port in order to authenticate as soon as Open System authentication completes.
The client STAs may communicate over the controlled port in order to authenticate as soon as the Open System authentication completes.
The client STAs may communicate over the controlled port in order to authenticate as soon as the Open System authentication completes.
Suggested answer: C
asked 16/09/2024
Rutger Pels
37 questions

Question 7

Report Export Collapse

Role-Based Access Control (RBAC) allows a WLAN administrator to perform what network function?

Become a Premium Member for full access
  Unlock Premium Member

Question 8

Report Export Collapse

Given: ABC Company is deploying an IEEE 802.11-compliant wireless security solution using 802.1X/EAP authentication. According to company policy, the security solution must prevent an eavesdropper from decrypting data frames traversing a wireless connection.

What security characteristics and/or components play a role in preventing data decryption? (Choose 2)

Become a Premium Member for full access
  Unlock Premium Member

Question 9

Report Export Collapse

An attack is under way on the network. The attack is preventing users from accessing resources required for business operations, but the attacker has not gained access to any files or data. What kind of attack is described?

Become a Premium Member for full access
  Unlock Premium Member

Question 10

Report Export Collapse

Given: WLAN attacks are typically conducted by hackers to exploit a specific vulnerability within a network.

What statement correctly pairs the type of WLAN attack with the exploited vulnerability? (Choose 3)

Become a Premium Member for full access
  Unlock Premium Member
Total 35 questions
Go to page: of 4
Search

Related questions