Download CWSP Certified Wireless Security Professional.CWSP-206.Pass4Sure.2019-12-04.36q.vcex

Vendor: CWNP
Exam Code: CWSP-206
Exam Name: CWSP Certified Wireless Security Professional
Date: Dec 04, 2019
File Size: 28 KB
Downloads: 1

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
In order to acquire credentials of a valid user on a public hotspot network, what attacks may be conducted? Choose the single completely correct answer.
  1. MAC denial of service and/or physical theft
  2. Social engineering and/or eavesdropping
  3. Authentication cracking and/or RF DoS
  4. Code injection and/or XSS
  5. RF DoS and/or physical theft
Correct answer: B
Question 2
What WLAN client device behavior is exploited by an attacker during a hijacking attack?
  1. After the initial association and 4-way handshake, client stations and access points do not need to perform another 4-way handshake, even if connectivity is lost.
  2. Client drivers scan for and connect to access point in the 2.4 GHz band before scanning the 5 GHz band.
  3. When the RF signal between a client and an access point is disrupted for more than a few seconds, the client device will attempt to associate to an access point with better signal quality.
  4. When the RF signal between a client and an access point is lost, the client will not seek to reassociate with another access point until the 120 second hold down timer has expired.
  5. As specified by the Wi-Fi Alliance, clients using Open System authentication must allow direct client-to-client connections, even in an infrastructure BSS.
Correct answer: C
Question 3
What software and hardware tools are used in the process performed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?
  1. A low-gain patch antenna and terminal emulation software
  2. MAC spoofing software and MAC DoS software
  3. RF jamming device and a wireless radio card
  4. A wireless workgroup bridge and a protocol analyzer
Correct answer: C
Question 4
Many computer users connect to the Internet at airports, which often have 802.11n access points with a captive portal for authentication. While using an airport hotspot with this security solution, to what type of wireless attack is a user susceptible?
  1. Wi-Fi phishing
  2. Management interface exploits
  3. UDP port redirection
  4. IGMP snooping
Correct answer: A
Question 5
You manage a wireless network that services 200 wireless users. Your facility requires 20 access points, and you have installed an IEEE 802.11-compliant implementation of 802.1X/LEAP with AES-CCMP as an authentication and encryption solution. In this configuration, the wireless network is initially susceptible to what type of attack?
  1. Offline dictionary attacks
  2. Application eavesdropping
  3. Session hijacking
  4. Layer 3 peer-to-peer
  5. Encryption cracking
Correct answer: A
Question 6
ABC Corporation is evaluating the security solution for their existing WLAN. Two of their supported solutions include a PPTP VPN and 802.1X/LEAP. They have used PPTP VPNs because of their wide support in server and desktop operating systems. While both PPTP and LEAP adhere to the minimum requirements of the corporate security policy, some individuals have raised concerns about MS-CHAPv2 (and similar) authentication and the known fact that MS-CHAPv2 has proven vulnerable in improper implementations. As a consultant, what do you tell ABC Corporation about implementing MS-CHAPv2 authentication?
  1. MS-CHAPv2 is only appropriate for WLAN security when used inside a TLS-encrypted tunnel.
  2. When implemented with AES-CCMP encryption, MS-CHAPv2 is very secure.
  3. MS-CHAPv2 uses AES authentication, and is therefore secure.
  4. MS-CHAPv2 is compliant with WPA-Personal, but not WPA2-Enterprise.
  5. LEAP’s use of MS-CHAPv2 is only secure when combined with WEP.
Correct answer: A
Question 7
In a security penetration exercise, a WLAN consultant obtains the WEP key of XYZ Corporation’s wireless network. Demonstrating the vulnerabilities of using WEP, the consultant uses a laptop running a software AP in an attempt to hijack the authorized user’s connections. XYZ’s legacy network is using 802.11n APs with 802.11b, 11g, and 11n client devices. With this setup, how can the consultant cause all of the authorized clients to establish Layer 2 connectivity with the software access point?
  1. When the RF signal between the clients and the authorized AP is temporarily disrupted and the consultant’s software AP is using the same SSID on a different channel than the authorized AP, the clients will reassociate to the software AP.
  2. If the consultant’s software AP broadcasts Beacon frames that advertise 802.11g data rates that are faster rates than XYZ’s current 802.11b data rates, all WLAN clients will reassociate to the faster AP.
  3. A higher SSID priority value configured in the Beacon frames of the consultant’s software AP will take priority over the SSID in the authorized AP, causing the clients to reassociate.
  4. All WLAN clients will reassociate to the consultant’s software AP if the consultant’s software AP provides the same SSID on any channel with a 10 dB SNR improvement over the authorized AP.
Correct answer: A
Question 8
ABC Hospital wishes to create a strong security policy as a first step in securing their 802.11 WLAN. Before creating the WLAN security policy, what should you ensure you possess?
  1. Management support for the process.
  2. Security policy generation software.
  3. End-user training manuals for the policies to be created.
  4. Awareness of the exact vendor devices being installed.
Correct answer: A
Question 9
What EAP type supports using MS-CHAPv2, EAP-GTC or EAP-TLS for wireless client authentication?
  1. EAP-GTC
  2. PEAP
  3. EAP-TTLS
  4. LEAP
  5. H-REAP
Correct answer: B
Question 10
You must implement 7 APs for a branch office location in your organizations. All APs will be autonomous and provide the same two SSIDs (CORP1879 and Guest). 
Because each AP is managed directly through a web-based interface, what must be changed on every AP before enabling the WLANs to ensure proper staging procedures are followed?
  1. Output power
  2. Fragmentation threshold
  3. Administrative password
  4. Cell radius
Correct answer: C
Question 11
In order to acquire credentials of a valid user on a public hotspot network, what attacks may be conducted? Choose the single completely correct answer.
  1. MAC denial of service and/or physical theft
  2. Social engineering and/or eavesdropping
  3. Authentication cracking and/or RF DoS
  4. Code injection and/or XSS
  5. RF DoS and/or physical theft
Correct answer: B
Question 12
What WLAN client device behavior is exploited by an attacker during a hijacking attack?
  1. After the initial association and 4-way handshake, client stations and access points do not need to perform another 4-way handshake, even if connectivity is lost.
  2. Client drivers scan for and connect to access point in the 2.4 GHz band before scanning the 5 GHz band.
  3. When the RF signal between a client and an access point is disrupted for more than a few seconds, the client device will attempt to associate to an access point with better signal quality.
  4. When the RF signal between a client and an access point is lost, the client will not seek to reassociate with another access point until the 120 second hold down timer has expired.
  5. As specified by the Wi-Fi Alliance, clients using Open System authentication must allow direct client-to-client connections, even in an infrastructure BSS.
Correct answer: C
Question 13
What software and hardware tools are used in the process performed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?
  1. A low-gain patch antenna and terminal emulation software
  2. MAC spoofing software and MAC DoS software
  3. RF jamming device and a wireless radio card
  4. A wireless workgroup bridge and a protocol analyzer
Correct answer: C
Question 14
Many computer users connect to the Internet at airports, which often have 802.11n access points with a captive portal for authentication. While using an airport hotspot with this security solution, to what type of wireless attack is a user susceptible?
  1. Wi-Fi phishing
  2. Management interface exploits
  3. UDP port redirection
  4. IGMP snooping
Correct answer: A
Question 15
You manage a wireless network that services 200 wireless users. Your facility requires 20 access points, and you have installed an IEEE 802.11-compliant implementation of 802.1X/LEAP with AES-CCMP as an authentication and encryption solution. In this configuration, the wireless network is initially susceptible to what type of attack?
  1. Offline dictionary attacks
  2. Application eavesdropping
  3. Session hijacking
  4. Layer 3 peer-to-peer
  5. Encryption cracking
Correct answer: A
Question 16
ABC Corporation is evaluating the security solution for their existing WLAN. Two of their supported solutions include a PPTP VPN and 802.1X/LEAP. They have used PPTP VPNs because of their wide support in server and desktop operating systems. While both PPTP and LEAP adhere to the minimum requirements of the corporate security policy, some individuals have raised concerns about MS-CHAPv2 (and similar) authentication and the known fact that MS-CHAPv2 has proven vulnerable in improper implementations. As a consultant, what do you tell ABC Corporation about implementing MS-CHAPv2 authentication?
  1. MS-CHAPv2 is only appropriate for WLAN security when used inside a TLS-encrypted tunnel.
  2. When implemented with AES-CCMP encryption, MS-CHAPv2 is very secure.
  3. MS-CHAPv2 uses AES authentication, and is therefore secure.
  4. MS-CHAPv2 is compliant with WPA-Personal, but not WPA2-Enterprise.
  5. LEAP’s use of MS-CHAPv2 is only secure when combined with WEP.
Correct answer: A
Question 17
In a security penetration exercise, a WLAN consultant obtains the WEP key of XYZ Corporation’s wireless network. Demonstrating the vulnerabilities of using WEP, the consultant uses a laptop running a software AP in an attempt to hijack the authorized user’s connections. XYZ’s legacy network is using 802.11n APs with 802.11b, 11g, and 11n client devices. With this setup, how can the consultant cause all of the authorized clients to establish Layer 2 connectivity with the software access point?
  1. When the RF signal between the clients and the authorized AP is temporarily disrupted and the consultant’s software AP is using the same SSID on a different channel than the authorized AP, the clients will reassociate to the software AP.
  2. If the consultant’s software AP broadcasts Beacon frames that advertise 802.11g data rates that are faster rates than XYZ’s current 802.11b data rates, all WLAN clients will reassociate to the faster AP.
  3. A higher SSID priority value configured in the Beacon frames of the consultant’s software AP will take priority over the SSID in the authorized AP, causing the clients to reassociate.
  4. All WLAN clients will reassociate to the consultant’s software AP if the consultant’s software AP provides the same SSID on any channel with a 10 dB SNR improvement over the authorized AP.
Correct answer: A
Question 18
ABC Hospital wishes to create a strong security policy as a first step in securing their 802.11 WLAN. Before creating the WLAN security policy, what should you ensure you possess?
  1. Management support for the process.
  2. Security policy generation software.
  3. End-user training manuals for the policies to be created.
  4. Awareness of the exact vendor devices being installed.
Correct answer: A
Question 19
What EAP type supports using MS-CHAPv2, EAP-GTC or EAP-TLS for wireless client authentication?
  1. EAP-GTC
  2. PEAP
  3. EAP-TTLS
  4. LEAP
  5. H-REAP
Correct answer: B
Question 20
You must implement 7 APs for a branch office location in your organizations. All APs will be autonomous and provide the same two SSIDs (CORP1879 and Guest). 
Because each AP is managed directly through a web-based interface, what must be changed on every AP before enabling the WLANs to ensure proper staging procedures are followed?
  1. Output power
  2. Fragmentation threshold
  3. Administrative password
  4. Cell radius
Correct answer: C
Question 21
In order to acquire credentials of a valid user on a public hotspot network, what attacks may be conducted? Choose the single completely correct answer.
  1. MAC denial of service and/or physical theft
  2. Social engineering and/or eavesdropping
  3. Authentication cracking and/or RF DoS
  4. Code injection and/or XSS
  5. RF DoS and/or physical theft
Correct answer: B
Question 22
What WLAN client device behavior is exploited by an attacker during a hijacking attack?
  1. After the initial association and 4-way handshake, client stations and access points do not need to perform another 4-way handshake, even if connectivity is lost.
  2. Client drivers scan for and connect to access point in the 2.4 GHz band before scanning the 5 GHz band.
  3. When the RF signal between a client and an access point is disrupted for more than a few seconds, the client device will attempt to associate to an access point with better signal quality.
  4. When the RF signal between a client and an access point is lost, the client will not seek to reassociate with another access point until the 120 second hold down timer has expired.
  5. As specified by the Wi-Fi Alliance, clients using Open System authentication must allow direct client-to-client connections, even in an infrastructure BSS.
Correct answer: C
Question 23
What software and hardware tools are used in the process performed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?
  1. A low-gain patch antenna and terminal emulation software
  2. MAC spoofing software and MAC DoS software
  3. RF jamming device and a wireless radio card
  4. A wireless workgroup bridge and a protocol analyzer
Correct answer: C
Question 24
Many computer users connect to the Internet at airports, which often have 802.11n access points with a captive portal for authentication. While using an airport hotspot with this security solution, to what type of wireless attack is a user susceptible?
  1. Wi-Fi phishing
  2. Management interface exploits
  3. UDP port redirection
  4. IGMP snooping
Correct answer: A
Question 25
You manage a wireless network that services 200 wireless users. Your facility requires 20 access points, and you have installed an IEEE 802.11-compliant implementation of 802.1X/LEAP with AES-CCMP as an authentication and encryption solution. In this configuration, the wireless network is initially susceptible to what type of attack?
  1. Offline dictionary attacks
  2. Application eavesdropping
  3. Session hijacking
  4. Layer 3 peer-to-peer
  5. Encryption cracking
Correct answer: A
Question 26
ABC Corporation is evaluating the security solution for their existing WLAN. Two of their supported solutions include a PPTP VPN and 802.1X/LEAP. They have used PPTP VPNs because of their wide support in server and desktop operating systems. While both PPTP and LEAP adhere to the minimum requirements of the corporate security policy, some individuals have raised concerns about MS-CHAPv2 (and similar) authentication and the known fact that MS-CHAPv2 has proven vulnerable in improper implementations. As a consultant, what do you tell ABC Corporation about implementing MS-CHAPv2 authentication?
  1. MS-CHAPv2 is only appropriate for WLAN security when used inside a TLS-encrypted tunnel.
  2. When implemented with AES-CCMP encryption, MS-CHAPv2 is very secure.
  3. MS-CHAPv2 uses AES authentication, and is therefore secure.
  4. MS-CHAPv2 is compliant with WPA-Personal, but not WPA2-Enterprise.
  5. LEAP’s use of MS-CHAPv2 is only secure when combined with WEP.
Correct answer: A
Question 27
In a security penetration exercise, a WLAN consultant obtains the WEP key of XYZ Corporation’s wireless network. Demonstrating the vulnerabilities of using WEP, the consultant uses a laptop running a software AP in an attempt to hijack the authorized user’s connections. XYZ’s legacy network is using 802.11n APs with 802.11b, 11g, and 11n client devices. With this setup, how can the consultant cause all of the authorized clients to establish Layer 2 connectivity with the software access point?
  1. When the RF signal between the clients and the authorized AP is temporarily disrupted and the consultant’s software AP is using the same SSID on a different channel than the authorized AP, the clients will reassociate to the software AP.
  2. If the consultant’s software AP broadcasts Beacon frames that advertise 802.11g data rates that are faster rates than XYZ’s current 802.11b data rates, all WLAN clients will reassociate to the faster AP.
  3. A higher SSID priority value configured in the Beacon frames of the consultant’s software AP will take priority over the SSID in the authorized AP, causing the clients to reassociate.
  4. All WLAN clients will reassociate to the consultant’s software AP if the consultant’s software AP provides the same SSID on any channel with a 10 dB SNR improvement over the authorized AP.
Correct answer: A
Question 28
ABC Hospital wishes to create a strong security policy as a first step in securing their 802.11 WLAN. Before creating the WLAN security policy, what should you ensure you possess?
  1. Management support for the process.
  2. Security policy generation software.
  3. End-user training manuals for the policies to be created.
  4. Awareness of the exact vendor devices being installed.
Correct answer: A
Question 29
What EAP type supports using MS-CHAPv2, EAP-GTC or EAP-TLS for wireless client authentication?
  1. EAP-GTC
  2. PEAP
  3. EAP-TTLS
  4. LEAP
  5. H-REAP
Correct answer: B
Question 30
You must implement 7 APs for a branch office location in your organizations. All APs will be autonomous and provide the same two SSIDs (CORP1879 and Guest). 
Because each AP is managed directly through a web-based interface, what must be changed on every AP before enabling the WLANs to ensure proper staging procedures are followed?
  1. Output power
  2. Fragmentation threshold
  3. Administrative password
  4. Cell radius
Correct answer: C
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!