ExamGecko
Home Home / CWNP / CWSP-207

CWNP CWSP-207 Practice Test - Questions Answers, Page 3

Question list
Search
Search

List of questions

Search

Related questions











What type of WLAN attack is prevented with the use of a per-MPDU TKIP sequence counter (TSC)?

A.
Weak-IV
A.
Weak-IV
Answers
B.
Forgery
B.
Forgery
Answers
C.
Replay
C.
Replay
Answers
D.
Bit-flipping
D.
Bit-flipping
Answers
E.
Session hijacking
E.
Session hijacking
Answers
Suggested answer: C

What 802.11 WLAN security problem is directly addressed by mutual authentication?

A.
Wireless hijacking attacks
A.
Wireless hijacking attacks
Answers
B.
Weak password policies
B.
Weak password policies
Answers
C.
MAC spoofing
C.
MAC spoofing
Answers
D.
Disassociation attacks
D.
Disassociation attacks
Answers
E.
Offline dictionary attacks
E.
Offline dictionary attacks
Answers
F.
Weak Initialization Vectors
F.
Weak Initialization Vectors
Answers
Suggested answer: A

ABC Company uses the wireless network for highly sensitive network traffic. For that reason, they intend to protect their network in all possible ways. They are continually researching new network threats and new preventative measures. They are interested in the security benefits of 802.11w, but would like to know its limitations.

What types of wireless attacks are protected by 802.11w? (Choose 2)

A.
RF DoS attacks
A.
RF DoS attacks
Answers
B.
Layer 2 Disassociation attacks
B.
Layer 2 Disassociation attacks
Answers
C.
Robust management frame replay attacks
C.
Robust management frame replay attacks
Answers
D.
Social engineering attacks
D.
Social engineering attacks
Answers
Suggested answer: B, C

You are configuring seven APs to prevent common security attacks. The APs are to be installed in a small business and to reduce costs, the company decided to install all consumer-grade wireless routers. The wireless routers will connect to a switch, which connects directly to the Internet connection providing 50 Mbps of Internet bandwidth that will be shared among 53 wireless clients and 17 wired clients.

To ensure the wireless network is as secure as possible from common attacks, what security measure can you implement given only the hardware referenced?

A.
WPA-Enterprise
A.
WPA-Enterprise
Answers
B.
802.1X/EAP-PEAP
B.
802.1X/EAP-PEAP
Answers
C.
WPA2-Enterprise
C.
WPA2-Enterprise
Answers
D.
WPA2-Personal
D.
WPA2-Personal
Answers
Suggested answer: D

A WLAN is implemented using WPA-Personal and MAC filtering.

To what common wireless network attacks is this network potentially vulnerable? (Choose 3)

A.
Offline dictionary attacks
A.
Offline dictionary attacks
Answers
B.
MAC Spoofing
B.
MAC Spoofing
Answers
C.
ASLEAP
C.
ASLEAP
Answers
D.
DoS
D.
DoS
Answers
Suggested answer: A, B, D

Given: You are using a Wireless Aggregator utility to combine multiple packet captures. One capture exists for each of channels 1, 6 and 11. What kind of troubleshooting are you likely performing with such a tool?

A.
Wireless adapter failure analysis.
A.
Wireless adapter failure analysis.
Answers
B.
Interference source location.
B.
Interference source location.
Answers
C.
Fast secure roaming problems.
C.
Fast secure roaming problems.
Answers
D.
Narrowband DoS attack detection.
D.
Narrowband DoS attack detection.
Answers
Suggested answer: C

Given: You have a Windows laptop computer with an integrated, dual-band, Wi-Fi compliant adapter. Your laptop computer has protocol analyzer software installed that is capable of capturing and decoding 802.11ac data.

What statement best describes the likely ability to capture 802.11ac frames for security testing purposes?

A.
All integrated 802.11ac adapters will work with most protocol analyzers for frame capture, including the Radio Tap Header.
A.
All integrated 802.11ac adapters will work with most protocol analyzers for frame capture, including the Radio Tap Header.
Answers
B.
Integrated 802.11ac adapters are not typically compatible with protocol analyzers in Windows laptops. It is often best to use a USB adapter or carefully select a laptop with an integrated adapter that will work.
B.
Integrated 802.11ac adapters are not typically compatible with protocol analyzers in Windows laptops. It is often best to use a USB adapter or carefully select a laptop with an integrated adapter that will work.
Answers
C.
Laptops cannot be used to capture 802.11ac frames because they do not support MU-MIMO.
C.
Laptops cannot be used to capture 802.11ac frames because they do not support MU-MIMO.
Answers
D.
Only Wireshark can be used to capture 802.11ac frames as no other protocol analyzer has implemented the proper frame decodes.
D.
Only Wireshark can be used to capture 802.11ac frames as no other protocol analyzer has implemented the proper frame decodes.
Answers
E.
The only method available to capture 802.11ac frames is to perform a remote capture with a compatible access point.
E.
The only method available to capture 802.11ac frames is to perform a remote capture with a compatible access point.
Answers
Suggested answer: B

In order to acquire credentials of a valid user on a public hot-spot network, what attacks may be conducted? Choose the single completely correct answer.

A.
Social engineering and/or eavesdropping
A.
Social engineering and/or eavesdropping
Answers
B.
RF DoS and/or physical theft
B.
RF DoS and/or physical theft
Answers
C.
MAC denial of service and/or physical theft
C.
MAC denial of service and/or physical theft
Answers
D.
Authentication cracking and/or RF DoS
D.
Authentication cracking and/or RF DoS
Answers
E.
Code injection and/or XSS
E.
Code injection and/or XSS
Answers
Suggested answer: A

Given: AAA is an architectural framework used to provide three separate security components in a network. Listed below are three phrases that each describe one aspect of the AAA framework.

Option-1 --- This AAA function is performed first and validates user identify prior to determining the network resources to which they will be granted access.

Option-2 --- This function is used for monitoring and auditing purposes and includes the collection of data that identifies what a user has done while connected.

Option-3 --- This function is used to designate permissions to a particular user.

What answer correctly pairs the AAA component with the descriptions provided above?

A.
Option-1 -- Access Control Option-2 -- Authorization Option-3 -- Accounting
A.
Option-1 -- Access Control Option-2 -- Authorization Option-3 -- Accounting
Answers
B.
Option-1 -- Authentication Option-2 -- Accounting Option-3 -- Association
B.
Option-1 -- Authentication Option-2 -- Accounting Option-3 -- Association
Answers
C.
Option-1 -- Authorization Option-2 -- Access Control Option-3 -- Association
C.
Option-1 -- Authorization Option-2 -- Access Control Option-3 -- Association
Answers
D.
Option-1 -- Authentication Option-2 -- Accounting Option-3 -- Authorization
D.
Option-1 -- Authentication Option-2 -- Accounting Option-3 -- Authorization
Answers
Suggested answer: D

You have an AP implemented that functions only using 802.11-2012 standard methods for the WLAN communications on the RF side and implementing multiple SSIDs and profiles on the management side configured as follows:

1. SSID: Guest -- VLAN 90 -- Security: Open with captive portal authentication -- 2 current clients

2. SSID: ABCData -- VLAN 10 -- Security: PEAPv0/EAP-MSCHAPv2 with AES-CCMP -- 5 current clients

3. SSID: ABCVoice -- VLAN 60 -- Security: WPA2-Personal -- 2 current clients

Two client STAs are connected to ABCData and can access a media server that requires authentication at the Application Layer and is used to stream multicast video streams to the clients.

What client stations possess the keys that are necessary to decrypt the multicast data packets carrying these videos?

A.
Only the members of the executive team that are part of the multicast group configured on the media server
A.
Only the members of the executive team that are part of the multicast group configured on the media server
Answers
B.
All clients that are associated to the AP using the ABCData SSID
B.
All clients that are associated to the AP using the ABCData SSID
Answers
C.
All clients that are associated to the AP using any SSID
C.
All clients that are associated to the AP using any SSID
Answers
D.
All clients that are associated to the AP with a shared GTK, which includes ABCData and ABCVoice.
D.
All clients that are associated to the AP with a shared GTK, which includes ABCData and ABCVoice.
Answers
Suggested answer: B
Total 35 questions
Go to page: of 4