Download Certified Wireless Security Professional (CWSP).CWSP-205.Prep4Sure.2018-10-29.67q.vcex

Vendor: CWNP
Exam Code: CWSP-205
Exam Name: Certified Wireless Security Professional (CWSP)
Date: Oct 29, 2018
File Size: 63 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
Given: WLAN attacks are typically conducted by hackers to exploit a specific vulnerability within a network. 
What statement correctly pairs the type of WLAN attack with the exploited vulnerability? (Choose 3) 
  1. Management interface exploit attacks are attacks that use social engineering to gain credentials from managers.
  2. Zero-day attacks are always authentication or encryption cracking attacks.
  3. RF DoS attacks prevent successful wireless communication on a specific frequency or frequency range.
  4. Hijacking attacks interrupt a user’s legitimate connection and introduce a new connection with an evil twin AP.
  5. Social engineering attacks are performed to collect sensitive information from unsuspecting users
  6. Association flood attacks are Layer 3 DoS attacks performed against authenticated client stations
Correct answer: CDE
Question 2
Given: One of the security risks introduced by WPA2-Personal is an attack conducted by an authorized network user who knows the passphrase. In order to decrypt other users’ traffic, the attacker must obtain certain information from the 4-way handshake of the other users. 
In addition to knowing the Pairwise Master Key (PMK) and the supplicant’s address (SA), what other three inputs must be collected with a protocol analyzer to recreate encryption keys? (Choose 3)
  1. Authenticator nonce
  2. Supplicant nonce
  3. Authenticator address (BSSID)
  4. GTKSA 
  5. Authentication Server nonce
Correct answer: ABC
Question 3
What is a primary criteria for a network to qualify as a Robust Security Network (RSN)?
  1. Token cards must be used for authentication.
  2. Dynamic WEP-104 encryption must be enabled.
  3. WEP may not be used for encryption.
  4. WPA-Personal must be supported for authentication and encryption.
  5. WLAN controllers and APs must not support SSHv1.
Correct answer: C
Question 4
Given: You are using a Wireless Aggregator utility to combine multiple packet captures. One capture exists for each of channels 1, 6 and 11. What kind of troubleshooting are you likely performing with such a tool?
  1. Wireless adapter failure analysis.
  2. Interference source location.
  3. Fast secure roaming problems.
  4. Narrowband DoS attack detection.
Correct answer: C
Question 5
Which of the following security attacks cannot be detected by a WIPS solution of any kind? (Choose 2)
  1. Rogue APs
  2. DoS
  3. Eavesdropping
  4. Social engineering
Correct answer: CD
Question 6
Given: You have a Windows laptop computer with an integrated, dual-band, Wi-Fi compliant adapter. Your laptop computer has protocol analyzer software installed that is capable of capturing and decoding 802.11ac data. 
What statement best describes the likely ability to capture 802.11ac frames for security testing purposes?
  1. All integrated 802.11ac adapters will work with most protocol analyzers for frame capture, including the Radio Tap Header.
  2. Integrated 802.11ac adapters are not typically compatible with protocol analyzers in Windows laptops. It is often best to use a USB adapter or carefully select a laptop with an integrated adapter that will work.
  3. Laptops cannot be used to capture 802.11ac frames because they do not support MU-MIMO.
  4. Only Wireshark can be used to capture 802.11ac frames as no other protocol analyzer has implemented the proper frame decodes.
  5. The only method available to capture 802.11ac frames is to perform a remote capture with a compatible access point.
Correct answer: B
Question 7
In order to acquire credentials of a valid user on a public hot-spot network, what attacks may be conducted? Choose the single completely correct answer. 
  1. Social engineering and/or eavesdropping
  2. RF DoS and/or physical theft
  3. MAC denial of service and/or physical theft
  4. Authentication cracking and/or RF DoS
  5. Code injection and/or XSS
Correct answer: A
Question 8
Given: Many computer users connect to the Internet at airports, which often have 802.11n access points with a captive portal for authentication. 
While using an airport hot-spot with this security solution, to what type of wireless attack is a user susceptible? (Choose 2)
  1. Man-in-the-Middle 
  2. Wi-Fi phishing
  3. Management interface exploits
  4. UDP port redirection
  5. IGMP snooping
Correct answer: AB
Question 9
Given: During 802.1X/LEAP authentication, the username is passed across the wireless medium in clear text.
From a security perspective, why is this significant?
  1. The username is needed for Personal Access Credential (PAC) and X.509 certificate validation.
  2. The username is an input to the LEAP challenge/response hash that is exploited, so the username must be known to conduct authentication cracking.
  3. 4-Way Handshake nonces are based on the username in WPA and WPA2 authentication.
  4. The username can be looked up in a dictionary file that lists common username/password combinations.
Correct answer: B
Question 10
Given: In XYZ’s small business, two autonomous 802.11ac APs and 12 client devices are in use with WPA2-Personal. 
What statement about the WLAN security of this company is true?
  1. Intruders may obtain the passphrase with an offline dictionary attack and gain network access, but will be unable to decrypt the data traffic of other users.
  2. A successful attack against all unicast traffic on the network would require a weak passphrase dictionary attack and the capture of the latest 4-Way Handshake for each client.
  3. An unauthorized wireless client device cannot associate, but can eavesdrop on some data because WPA2-Personal does not encrypt multicast or broadcast traffic.
  4. An unauthorized WLAN user with a protocol analyzer can decode data frames of authorized users if he captures the BSSID, client MAC address, and a user’s 4-Way Handshake.
  5. Because WPA2-Personal uses Open System authentication followed by a 4-Way Handshake, hijacking attacks are easily performed.
Correct answer: B

Use VCE Exam Simulator to open VCE files


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!