ExamGecko
Home / CWNP / CWSP-207 / List of questions
Ask Question

CWNP CWSP-207 Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

Given: A large enterprise is designing a secure, scalable, and manageable 802.11n WLAN that will support thousands of users. The enterprise will support both 802.1X/EAP-TTLS and PEAPv0/MSCHAPv2. Currently, the company is upgrading network servers as well and will replace their existing Microsoft IAS implementation with Microsoft NPS, querying Active Directory for user authentication.

For this organization, as they update their WLAN infrastructure, what WLAN controller feature will likely be least valuable?

Become a Premium Member for full access
  Unlock Premium Member

Question 12

Report Export Collapse

What WLAN client device behavior is exploited by an attacker during a hijacking attack?

Become a Premium Member for full access
  Unlock Premium Member

Question 13

Report Export Collapse

Given: When the CCMP cipher suite is used for protection of data frames, 16 bytes of overhead are added to the Layer 2 frame. 8 of these bytes comprise the MIC.

What purpose does the encrypted MIC play in protecting the data frame?

Become a Premium Member for full access
  Unlock Premium Member

Question 14

Report Export Collapse

Given: XYZ Company has recently installed an 802.11ac WLAN. The company needs the ability to control access to network services, such as file shares, intranet web servers, and Internet access based on an employee's job responsibilities.

What WLAN security solution meets this requirement?

Become a Premium Member for full access
  Unlock Premium Member

Question 15

Report Export Collapse

Given: Your network includes a controller-based WLAN architecture with centralized data forwarding. The AP builds an encrypted tunnel to the WLAN controller. The WLAN controller is uplinked to the network via a trunked 1 Gbps Ethernet port supporting all necessary VLANs for management, control, and client traffic.

What processes can be used to force an authenticated WLAN client's data traffic into a specific VLAN as it exits the WLAN controller interface onto the wired uplink? (Choose 3)

Become a Premium Member for full access
  Unlock Premium Member

Question 16

Report Export Collapse

What is the purpose of the Pairwise Transient Key (PTK) in IEEE 802.11 Authentication and Key Management?

Become a Premium Member for full access
  Unlock Premium Member

Question 17

Report Export Collapse

What statements are true about 802.11-2012 Protected Management Frames? (Choose 2)

Become a Premium Member for full access
  Unlock Premium Member

Question 18

Report Export Collapse

A single AP is configured with three separate WLAN profiles, as follows:

1. SSID: ABCData -- BSSID: 00:11:22:00:1F:C3 -- VLAN 10 -- Security: PEAPv0/EAP-MSCHAPv2 with AES-CCMP -- 3 current clients

2. SSID: ABCVoice -- BSSID: 00:11:22:00:1F:C4 -- VLAN 60 -- Security: WPA2-Personal with AES-CCMP -- 2 current clients

3. SSID: Guest -- BSSID: 00:11:22:00:1F:C5 -- VLAN 90 -- Security: Open with captive portal authentication -- 3 current clients

Three STAs are connected to ABCData. Three STAs are connected to Guest. Two STAs are connected to ABCVoice.

How many unique GTKs and PTKs are currently in place in this scenario?

Become a Premium Member for full access
  Unlock Premium Member

Question 19

Report Export Collapse

Which one of the following is a valid reason to avoid the use of EAP-MD5 in production WLANs?

Become a Premium Member for full access
  Unlock Premium Member

Question 20

Report Export Collapse

Given: John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website. The bank's website uses the HTTPS protocol to protect sensitive account information. While John was using the hot-spot, a hacker was able to obtain John's bank account user ID and password and exploit this information.

What likely scenario could have allowed the hacker to obtain John's bank account user ID and password?

Become a Premium Member for full access
  Unlock Premium Member
Total 35 questions
Go to page: of 4
Search

Related questions