Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

CWNP CWSP-206 CWSP Certified Wireless Security Professional Exam Practice Test

Demo: 9 questions
Total 60 questions

CWSP Certified Wireless Security Professional Questions and Answers

Question 1

When monitoring APs within a LAN using a Wireless Network Management System (WNMS), what secure protocol may be used bythe WNMS to issue configuration changes to APs?

Options:

A.

PPTP

B.

802.1X/EAP

C.

TFTP

D.

SNMPv3

E.

IPSec/ESP

Question 2

The IEEE 802.11 standard defined Open System authentication as consisting of two auth frames and two assoc frames. In a WPA2-Enterprise network, what process immediately follows the 802.11 association procedure?

Options:

A.

802.1X/ EAPauthentication

B.

Group Key Handshake

C.

DHCP Discovery

D.

RADIUS shared secret lookup

E.

4-Way Handshake

F.

Passphrase-to-PSK mapping

Question 3

ABCHospital wishes to create a strong security policy as a first step in securing their 802.11 WLAN. Before creating the WLAN security policy, what should you ensure you possess?

Options:

A.

Management support for the process.

B.

Security policy generation software.

C.

End-user training manuals for the policies to be created.

D.

Awareness of the exact vendor devices being installed.

Question 4

You are using a utility that takes input and generates random output. For example, you can provide the input of a known word as a secret word and then also provide another known word as salt input. When you process the input it generates a secret code which is a combination of letters and numbers with case sensitivity. For what is the described utility used?

Options:

A.

Generating PMKs that can be imported into 802.11 RSN-compatible devices.

B.

Generating passwords for WLAN infrastructure equipment logins.

C.

Generating dynamic session keys used for IPSec VPNs.

D.

Generating GTKs for broadcast traffic encryption.

Question 5

The IEEE 802.11 Pairwise Transient Key (PTK) is derived from what cryptographic element?

Options:

A.

PeerKey (PK)

B.

Group Master Key (GMK)

C.

Key Confirmation Key (KCK)

D.

Pairwise Master Key (PMK)

E.

Phase Shift Key (PSK)

F.

Group Temporal Key (GTK)

Question 6

You are installing 6 APs on the outside of your facility. They will be mounted at a height of 6 feet. What must you do to implement these APs in a secure manner beyond the normal indoor APimplementations? (Choose the single best answer.)

Options:

A.

Ensure proper physical and environmental security using outdoor ruggedized APs or enclosures.

B.

Use internal antennas.

C.

Use external antennas.

D.

Power the APs using PoE.

Question 7

After completing the installation of a new overlay WIPS for the purpose of roguedetection and security monitoring at your corporate headquarters, what baseline function MUST be performed in order to identify the security threats?

Options:

A.

Separate security profiles must be defined for network operation in different regulatory domains.

B.

WLAN devices that are discovered must be classified (rogue, authorized, neighbor, etc.) and a WLAN policy must define how to classify new devices.

C.

Upstream and downstream throughput thresholds must be specified to ensure that service-level agreements arebeing met.

D.

Authorized PEAP usernames must be added to the WIPS server’s user database.

Question 8

For which one of the following purposes would aWIPS not be a good solution?

Options:

A.

Enforcing wireless network security policy.

B.

Detecting and defending against eavesdropping attacks.

C.

Performance monitoring and troubleshooting.

D.

Security monitoring and notification.

Question 9

In order to acquire credentials of a valid user on a public hotspot network, what attacks may be conducted? Choose thesingle completely correct answer.

Options:

A.

MAC denial of service and/or physical theft

B.

Social engineering and/or eavesdropping

C.

Authentication cracking and/or RF DoS

D.

Code injection and/or XSS

E.

RF DoS and/or physical theft

Demo: 9 questions
Total 60 questions