Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CWNP > CWSP > CWSP-206

CWSP-206 CWSP Certified Wireless Security Professional Question and Answers

Question # 4

The IEEE 802.11 standard defined Open System authentication as consisting of two auth frames and two assoc frames. In a WPA2-Enterprise network, what process immediately follows the 802.11 association procedure?

A.

802.1X/ EAPauthentication

B.

Group Key Handshake

C.

DHCP Discovery

D.

RADIUS shared secret lookup

E.

4-Way Handshake

F.

Passphrase-to-PSK mapping

Full Access
Question # 5

What policy would help mitigate the impact of peer-to-peer attacks against wireless-enabledcorporate laptop computers when the laptops are also used on public access networks such as wireless hotspots?

A.

Require Port Address Translation (PAT) on each laptop.

B.

Require secure applications such as POP, HTTP, and SSH.

C.

Require VPN software forconnectivity to the corporate network.

D.

Require WPA2-Enterprise as the minimal WLAN security solution.

Full Access
Question # 6

You must implement 7 APs for a branch office location in your organizations. All APs will be autonomous and provide the same two SSIDs (CORP1879and Guest).

Because each AP is managed directly through a web-based interface, what must be changed on every AP before enabling the WLANs to ensure proper staging procedures are followed?

A.

Output power

B.

Fragmentation threshold

C.

Administrative password

D.

Cell radius

Full Access
Question # 7

In a security penetration exercise, a WLAN consultant obtains the WEP key of XYZ Corporation’s wireless network. Demonstrating the vulnerabilities of using WEP, the consultant uses a laptop running asoftware AP in an attempt to hijack the authorized user’s connections. XYZ’s legacy network is using 802.11n APs with 802.11b, 11g, and 11n client devices. With this setup, how can the consultant cause all of the authorized clients to establish Layer 2 connectivity with the software access point?

A.

When the RF signal between the clients and the authorized AP is temporarily disrupted and the consultant’s software AP is using the same SSID on a different channel than the authorized AP, the clients will reassociate to the software AP.

B.

If the consultant’s software AP broadcasts Beacon frames that advertise 802.11g data rates that are faster rates than XYZ’s current 802.11b data rates, all WLAN clients will reassociate to the faster AP.

C.

A higher SSID priority value configured in the Beacon frames of the consultant’s software AP will take priority over the SSID in the authorized AP, causing the clients to reassociate.

D.

All WLAN clients will reassociate to the consultant’s software AP if the consultant’s software AP provides the same SSID on any channel with a 10 dB SNR improvement over the authorized AP.

Full Access
Question # 8

In the basic 4-way handshake used in secure 802.11 networks, what is the purpose of the ANonce and SNonce?

A.

They are added together and used as the GMK, fromwhich the GTK is derived.

B.

They are used to pad Message 1 and Message 2 so each frame contains the same number of bytes.

C.

The IEEE 802.11 standard requires that all encrypted frames contain a nonce to serve as a Message Integrity Check (MIC).

D.

They are input values used in the derivation of the Pairwise Transient Key.

Full Access
Question # 9

What software and hardware tools are used in the processperformed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?

A.

A low-gain patch antenna and terminal emulation software

B.

MAC spoofing software and MAC DoS software

C.

RF jamming device and a wireless radio card

D.

A wireless workgroup bridge and a protocol analyzer

Full Access