ExamGecko
Home / CWNP / CWSP-207 / List of questions
Ask Question

CWNP CWSP-207 Practice Test - Questions Answers, Page 3

Add to Whishlist

List of questions

Question 21

Report Export Collapse

What type of WLAN attack is prevented with the use of a per-MPDU TKIP sequence counter (TSC)?

Become a Premium Member for full access
  Unlock Premium Member

Question 22

Report Export Collapse

What 802.11 WLAN security problem is directly addressed by mutual authentication?

Become a Premium Member for full access
  Unlock Premium Member

Question 23

Report Export Collapse

ABC Company uses the wireless network for highly sensitive network traffic. For that reason, they intend to protect their network in all possible ways. They are continually researching new network threats and new preventative measures. They are interested in the security benefits of 802.11w, but would like to know its limitations.

What types of wireless attacks are protected by 802.11w? (Choose 2)

Become a Premium Member for full access
  Unlock Premium Member

Question 24

Report Export Collapse

You are configuring seven APs to prevent common security attacks. The APs are to be installed in a small business and to reduce costs, the company decided to install all consumer-grade wireless routers. The wireless routers will connect to a switch, which connects directly to the Internet connection providing 50 Mbps of Internet bandwidth that will be shared among 53 wireless clients and 17 wired clients.

To ensure the wireless network is as secure as possible from common attacks, what security measure can you implement given only the hardware referenced?

Become a Premium Member for full access
  Unlock Premium Member

Question 25

Report Export Collapse

A WLAN is implemented using WPA-Personal and MAC filtering.

To what common wireless network attacks is this network potentially vulnerable? (Choose 3)

Become a Premium Member for full access
  Unlock Premium Member

Question 26

Report Export Collapse

Given: You are using a Wireless Aggregator utility to combine multiple packet captures. One capture exists for each of channels 1, 6 and 11. What kind of troubleshooting are you likely performing with such a tool?

Become a Premium Member for full access
  Unlock Premium Member

Question 27

Report Export Collapse

Given: You have a Windows laptop computer with an integrated, dual-band, Wi-Fi compliant adapter. Your laptop computer has protocol analyzer software installed that is capable of capturing and decoding 802.11ac data.

What statement best describes the likely ability to capture 802.11ac frames for security testing purposes?

Become a Premium Member for full access
  Unlock Premium Member

Question 28

Report Export Collapse

In order to acquire credentials of a valid user on a public hot-spot network, what attacks may be conducted? Choose the single completely correct answer.

Become a Premium Member for full access
  Unlock Premium Member

Question 29

Report Export Collapse

Given: AAA is an architectural framework used to provide three separate security components in a network. Listed below are three phrases that each describe one aspect of the AAA framework.

Option-1 --- This AAA function is performed first and validates user identify prior to determining the network resources to which they will be granted access.

Option-2 --- This function is used for monitoring and auditing purposes and includes the collection of data that identifies what a user has done while connected.

Option-3 --- This function is used to designate permissions to a particular user.

What answer correctly pairs the AAA component with the descriptions provided above?

Become a Premium Member for full access
  Unlock Premium Member

Question 30

Report Export Collapse

You have an AP implemented that functions only using 802.11-2012 standard methods for the WLAN communications on the RF side and implementing multiple SSIDs and profiles on the management side configured as follows:

1. SSID: Guest -- VLAN 90 -- Security: Open with captive portal authentication -- 2 current clients

2. SSID: ABCData -- VLAN 10 -- Security: PEAPv0/EAP-MSCHAPv2 with AES-CCMP -- 5 current clients

3. SSID: ABCVoice -- VLAN 60 -- Security: WPA2-Personal -- 2 current clients

Two client STAs are connected to ABCData and can access a media server that requires authentication at the Application Layer and is used to stream multicast video streams to the clients.

What client stations possess the keys that are necessary to decrypt the multicast data packets carrying these videos?

Become a Premium Member for full access
  Unlock Premium Member
Total 35 questions
Go to page: of 4
Search

Related questions