Download Certified Wireless Security Professional Exam.CWSP-207.ExamDumps.2024-06-13.35q.vcex

Vendor: CWNP
Exam Code: CWSP-207
Exam Name: Certified Wireless Security Professional Exam
Date: Jun 13, 2024
File Size: 26 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
What EAP type supports using MS-CHAPv2, EAP-GTC or EAP-TLS for wireless client authentication?
  1. H-REAP
  2. EAP-GTC
  3. EAP-TTLS
  4. PEAP
  5. LEAP
Correct answer: D
Question 2
Which of the following security attacks cannot be detected by a WIPS solution of any kind? (Choose 2)
  1. Rogue APs
  2. DoS
  3. Eavesdropping
  4. Social engineering
Correct answer: CD
Question 3
Wireless Intrusion Prevention Systems (WIPS) provide what network security services? (Choose 2)
  1. Configuration distribution for autonomous APs
  2. Wireless vulnerability assessment
  3. Application-layer traffic inspection
  4. Analysis and reporting of AP CPU utilization
  5. Policy enforcement and compliance management
Correct answer: BE
Question 4
In an effort to optimize WLAN performance, ABC Company has upgraded their WLAN infrastructure from 802.11a/g to 802.11n. 802.11a/g clients are still supported and are used throughout ABC's facility. ABC has always been highly security conscious, but due to budget limitations, they have not yet updated their overlay WIPS solution to 802.11n or 802.11ac.
Given ABC's deployment strategy, what security risks would not be detected by the 802.11a/g WIPS?
  1. Hijacking attack performed by using a rogue 802.11n AP against an 802.11a client
  2. Rogue AP operating in Greenfield 40 MHz-only mode
  3. 802.11a STA performing a deauthentication attack against 802.11n APs
  4. 802.11n client spoofing the MAC address of an authorized 802.11n client
Correct answer: B
Question 5
ABC Company requires the ability to identify and quickly locate rogue devices. ABC has chosen an overlay WIPS solution with sensors that use dipole antennas to perform this task. Use your knowledge of location tracking techniques to answer the question.
In what ways can this 802.11-based WIPS platform determine the location of rogue laptops or APs? (Choose 3)
  1. Time Difference of Arrival (TDoA)
  2. Angle of Arrival (AoA)
  3. Trilateration of RSSI measurements
  4. GPS Positioning
  5. RF Fingerprinting
Correct answer: ACE
Question 6
Given: Your organization is using EAP as an authentication framework with a specific type that meets the requirements of your corporate policies.
Which one of the following statements is true related to this implementation?
  1. The client will be the authenticator in this scenario.
  2. The client STAs must use a different, but complementary, EAP type than the AP STAs.
  3. The client STAs may communicate over the uncontrolled port in order to authenticate as soon as Open System authentication completes.
  4. The client STAs may communicate over the controlled port in order to authenticate as soon as the Open System authentication completes.
Correct answer: C
Question 7
Role-Based Access Control (RBAC) allows a WLAN administrator to perform what network function?
  1. Minimize traffic load on an AP by requiring mandatory admission control for use of the Voice access category.
  2. Allow access to specific files and applications based on the user's WMM access category.
  3. Provide two or more user groups connected to the same SSID with different levels of network privileges.
  4. Allow simultaneous support for multiple EAP types on a single access point.
Correct answer: C
Question 8
Given: ABC Company is deploying an IEEE 802.11-compliant wireless security solution using 802.1X/EAP authentication. According to company policy, the security solution must prevent an eavesdropper from decrypting data frames traversing a wireless connection.
What security characteristics and/or components play a role in preventing data decryption? (Choose 2)
  1. Multi-factor authentication
  2. 4-Way Handshake
  3. PLCP Cyclic Redundancy Check (CRC)
  4. Encrypted Passphrase Protocol (EPP)
  5. Integrity Check Value (ICV)
  6. Group Temporal Keys
Correct answer: BF
Question 9
An attack is under way on the network. The attack is preventing users from accessing resources required for business operations, but the attacker has not gained access to any files or data. What kind of attack is described?
  1. Man-in-the-middle
  2. Hijacking
  3. ASLEAP
  4. DoS
Correct answer: D
Question 10
Given: WLAN attacks are typically conducted by hackers to exploit a specific vulnerability within a network.
What statement correctly pairs the type of WLAN attack with the exploited vulnerability? (Choose 3)
  1. Management interface exploit attacks are attacks that use social engineering to gain credentials from managers.
  2. Zero-day attacks are always authentication or encryption cracking attacks.
  3. RF DoS attacks prevent successful wireless communication on a specific frequency or frequency range.
  4. Hijacking attacks interrupt a user's legitimate connection and introduce a new connection with an evil twin AP.
  5. Social engineering attacks are performed to collect sensitive information from unsuspecting users
  6. Association flood attacks are Layer 3 DoS attacks performed against authenticated client stations
Correct answer: CDE
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!