ExamGecko
Home Home / CWNP / CWSP-207

CWNP CWSP-207 Practice Test - Questions Answers, Page 4

Question list
Search
Search

Related questions











Your organization required compliance reporting and forensics features in relation to the 802.11ac WLAN they have recently installed. These features are not built into the management system provided by the WLAN vendor. The existing WLAN is managed through a centralized management console provided by the AP vendor with distributed APs and multiple WLAN controllers configured through this console.

What kind of system should be installed to provide the required compliance reporting and forensics features?

A.
WNMS
A.
WNMS
Answers
B.
WIPS overlay
B.
WIPS overlay
Answers
C.
WIPS integrated
C.
WIPS integrated
Answers
D.
Cloud management platform
D.
Cloud management platform
Answers
Suggested answer: B

You are implementing an 802.11ac WLAN and a WIPS at the same time. You must choose between integrated and overlay WIPS solutions. Which of the following statements is true regarding integrated WIPS solutions?

A.
Integrated WIPS always perform better from a client throughput perspective because the same radio that performs the threat scanning also services the clients.
A.
Integrated WIPS always perform better from a client throughput perspective because the same radio that performs the threat scanning also services the clients.
Answers
B.
Integrated WIPS use special sensors installed alongside the APs to scan for threats.
B.
Integrated WIPS use special sensors installed alongside the APs to scan for threats.
Answers
C.
Many integrated WIPS solutions that detect Voice over Wi-Fi traffic will cease scanning altogether to accommodate the latency sensitive client traffic.
C.
Many integrated WIPS solutions that detect Voice over Wi-Fi traffic will cease scanning altogether to accommodate the latency sensitive client traffic.
Answers
D.
Integrated WIPS is always more expensive than overlay WIPS.
D.
Integrated WIPS is always more expensive than overlay WIPS.
Answers
Suggested answer: C

When used as part of a WLAN authentication solution, what is the role of LDAP?

A.
A data retrieval protocol used by an authentication service such as RADIUS
A.
A data retrieval protocol used by an authentication service such as RADIUS
Answers
B.
An IEEE X.500 standard compliant database that participates in the 802.1X port-based access control process
B.
An IEEE X.500 standard compliant database that participates in the 802.1X port-based access control process
Answers
C.
A SQL compliant authentication service capable of dynamic key generation and distribution
C.
A SQL compliant authentication service capable of dynamic key generation and distribution
Answers
D.
A role-based access control protocol for filtering data to/from authenticated stations.
D.
A role-based access control protocol for filtering data to/from authenticated stations.
Answers
E.
An Authentication Server (AS) that communicates directly with, and provides authentication for, the Supplicant.
E.
An Authentication Server (AS) that communicates directly with, and provides authentication for, the Supplicant.
Answers
Suggested answer: A

When implementing a WPA2-Enterprise security solution, what protocol must the selected RADIUS server support?

A.
LWAPP, GRE, or CAPWAP
A.
LWAPP, GRE, or CAPWAP
Answers
B.
IPSec/ESP
B.
IPSec/ESP
Answers
C.
EAP
C.
EAP
Answers
D.
CCMP and TKIP
D.
CCMP and TKIP
Answers
E.
LDAP
E.
LDAP
Answers
Suggested answer: C

Given: ABC Company is implementing a secure 802.11 WLAN at their headquarters (HQ) building in New York and at each of the 10 small, remote branch offices around the United States. 802.1X/EAP is ABC's preferred security solution, where possible. All access points (at the HQ building and all branch offices) connect to a single WLAN controller located at HQ. Each branch office has only a single AP and minimal IT resources.

What security best practices should be followed in this deployment scenario?

A.
An encrypted VPN should connect the WLAN controller and each remote controller-based AP, or each remote site should provide an encrypted VPN tunnel to HQ.
A.
An encrypted VPN should connect the WLAN controller and each remote controller-based AP, or each remote site should provide an encrypted VPN tunnel to HQ.
Answers
B.
APs at HQ and at each branch office should not broadcast the same SSID; instead each branch should have a unique ID for user accounting purposes.
B.
APs at HQ and at each branch office should not broadcast the same SSID; instead each branch should have a unique ID for user accounting purposes.
Answers
C.
RADIUS services should be provided at branch offices so that authentication server and supplicant credentials are not sent over the Internet.
C.
RADIUS services should be provided at branch offices so that authentication server and supplicant credentials are not sent over the Internet.
Answers
D.
Remote management of the WLAN controller via Telnet, SSH, HTTP, and HTTPS should be prohibited across the WAN link.
D.
Remote management of the WLAN controller via Telnet, SSH, HTTP, and HTTPS should be prohibited across the WAN link.
Answers
Suggested answer: A
Total 35 questions
Go to page: of 4