Download Certified Wireless Security Professional (CWSP).CWSP-205.RealExams.2019-07-16.61q.vcex

Vendor: CWNP
Exam Code: CWSP-205
Exam Name: Certified Wireless Security Professional (CWSP)
Date: Jul 16, 2019
File Size: 45 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
An attack is under way on the network. The attack is preventing users from accessing resources required for business operations, but the attacker has not gained access to any files or data. What kind of attack is described?
  1. Man-in-the-middle
  2. Hijacking
  4. DoS
Correct answer: D
Question 2
Given: WLAN attacks are typically conducted by hackers to exploit a specific vulnerability within a network. 
What statement correctly pairs the type of WLAN attack with the exploited vulnerability? (Choose 3)
  1. Management interface exploit attacks are attacks that use social engineering to gain credentials from managers.
  2. Zero-day attacks are always authentication or encryption cracking attacks.
  3. RF DoS attacks prevent successful wireless communication on a specific frequency or frequency range.
  4. Hijacking attacks interrupt a user’s legitimate connection and introduce a new connection with an evil twin AP.
  5. Social engineering attacks are performed to collect sensitive information from unsuspecting users
  6. Association flood attacks are Layer 3 DoS attacks performed against authenticated client stations
Correct answer: CDE
Question 3
Given: One of the security risks introduced by WPA2-Personal is an attack conducted by an authorized network user who knows the passphrase. In order to decrypt other users’ traffic, the attacker must obtain certain information from the 4-way handshake of the other users.
In addition to knowing the Pairwise Master Key (PMK) and the supplicant’s address (SA), what other three inputs must be collected with a protocol analyzer to recreate encryption keys? (Choose 3)
  1. Authenticator nonce
  2. Supplicant nonce
  3. Authenticator address (BSSID)
  4. GTKSA
  5. Authentication Server nonce
Correct answer: ABC
Question 4
What is a primary criteria for a network to qualify as a Robust Security Network (RSN)?
  1. Token cards must be used for authentication.
  2. Dynamic WEP-104 encryption must be enabled.
  3. WEP may not be used for encryption.
  4. WPA-Personal must be supported for authentication and encryption.
  5. WLAN controllers and APs must not support SSHv1.
Correct answer: C
Question 5
Given: You are using a Wireless Aggregator utility to combine multiple packet captures. One capture exists for each of channels 1, 6 and 11. What kind of troubleshooting are you likely performing with such a tool?
  1. Wireless adapter failure analysis.
  2. Interference source location.
  3. Fast secure roaming problems.
  4. Narrowband DoS attack detection.
Correct answer: C
Question 6
Which of the following security attacks cannot be detected by a WIPS solution of any kind? (Choose 2)
  1. Rogue APs
  2. DoS
  3. Eavesdropping
  4. Social engineering
Correct answer: CD
Question 7
Given: You have a Windows laptop computer with an integrated, dual-band, Wi-Fi compliant adapter. Your laptop computer has protocol analyzer software installed that is capable of capturing and decoding 802.11ac data.
What statement best describes the likely ability to capture 802.11ac frames for security testing purposes?
  1. All integrated 802.11ac adapters will work with most protocol analyzers for frame capture, including the Radio Tap Header.
  2. Integrated 802.11ac adapters are not typically compatible with protocol analyzers in Windows laptops. It is often best to use a USB adapter or carefully select a laptop with an integrated adapter that will work.
  3. Laptops cannot be used to capture 802.11ac frames because they do not support MU-MIMO.
  4. Only Wireshark can be used to capture 802.11ac frames as no other protocol analyzer has implemented the proper frame decodes.
  5. The only method available to capture 802.11ac frames is to perform a remote capture with a compatible access point.
Correct answer: B
Question 8
In order to acquire credentials of a valid user on a public hot-spot network, what attacks may be conducted? Choose the single completely correct answer.
  1. Social engineering and/or eavesdropping
  2. RF DoS and/or physical theft
  3. MAC denial of service and/or physical theft
  4. Authentication cracking and/or RF DoS
  5. Code injection and/or XSS
Correct answer: A
Question 9
What WLAN client device behavior is exploited by an attacker during a hijacking attack?
  1. When the RF signal between a client and an access point is disrupted for more than a few seconds, the client device will attempt to associate to an access point with better signal quality.
  2. When the RF signal between a client and an access point is lost, the client will not seek to reassociate with another access point until the 120 second hold down timer has expired.
  3. After the initial association and 4-way handshake, client stations and access points do not need to perform another 4-way handshake, even if connectivity is lost.
  4. As specified by the Wi-Fi Alliance, clients using Open System authentication must allow direct client-to-client connections, even in an infrastructure BSS.
  5. Client drivers scan for and connect to access points in the 2.4 GHz band before scanning the 5 GHz band.
Correct answer: A
Question 10
What software and hardware tools are used together to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network? (Choose 2)
  1. RF jamming device and a wireless radio card
  2. A low-gain patch antenna and terminal emulation software
  3. A wireless workgroup bridge and a protocol analyzer
  4. DHCP server software and access point software
  5. MAC spoofing software and MAC DoS software
Correct answer: AD

Use VCE Exam Simulator to open VCE files


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!