BASE
EXAM DUMPS
CWNP
CWSP-207
28% OFF Automatically For You
CWNP Wireless Security Professional (CWSP)
,1.What are of some of the common security capabilities often integrated within in
access points deployed in a distributed WLAN architecture?
A. Captive web portal
B. Firewall
C. Integrated RADIUS
D. WIPS
E. All of the above
Answer: E
2.In what deployment scenarios would it be desirable to enable peer-to-peer traffic
blocking?
A. In home networks in which file and printer sharing is enabled
25
B. At public hot-spots in which many clients use diverse applications
20
m
C. In corporate Voice over Wi-Fi networks with push-to-talk multicast capabilities
xa
E
D. In university environments using multicast video training sourced from professor's
07
laptops
-2
P
S
Answer: B
W
C
P
N
W
C
r
3.What are some of the purposes of the 4-Way Handshake? (Choose all that apply.)
ou
Y
A. Transfer the GTK to the supplicant.
r
fo
B. Derive a PTK from the PMK.
re
pa
C. Transfer the GMK to the supplicant.
re
-P
D. Confirm cipher suites.
)
02
Answer: ABD
8.
(V
ps
um
D
4.What kind of remote actions can an MDM administrator send to the mobile device
07
-2
over the Internet?
P
S
A. Configuration changes
W
C
B. Restrictions changes
id
al
V
C. Locking the device
D. Wiping the device
E. Application changes
F. All of the above
Answer: F
5.Given: You must implement 7 APs for a branch office location in your organization.
All APs will be autonomous and provide the same two SSIDs (CORP1879 and
Guest).
Because each AP is managed directly through a web-based interface, what must be
,changed on every AP before enabling the WLANs to ensure proper staging
procedures are followed?
A. Fragmentation threshold
B. Administrative password
C. Output power
D. Cell radius
Answer: B
6.When using the 802.1X/EAP framework for authentication in 802.11 WLANs, why is
the 802.1X Controlled Port still blocked after the 802.1X/EAP framework has
completed successfully?
A. The 802.1X Controlled Port is always blocked, but the Uncontrolled Port opens
25
after the EAP authentication process completes.
20
m
B. The 802.1X Controlled Port remains blocked until an IP address is requested and
xa
E
accepted by the Supplicant.
07
C. The 4-Way Handshake must be performed before the 802.1X Controlled Port
-2
P
S
changes to the unblocked state.
W
C
D. The 802.1X Controlled Port is blocked until Vender Specific Attributes (VSAs) are
P
N
W
exchanged inside a RADIUS packet between the Authenticator and Authentication
C
r
Server.
ou
Y
Answer: C
r
fo
re
pa
re
-P
7.As an auditor you have been asked to determine if the WLAN access points and
)
02
client devices have been configured with the proper encryption.
8.
(V
What should you use to answer this question for your customer? (Choose all that
ps
apply.)
um
D
A. Written corporate security policy
07
-2
B. WLAN protocol analyzer
P
S
C. Aircrack-ng
W
C
D. coWPAtty
id
al
V
E. Asleap
Answer: AB
8.Which RADIUS packets can be sent from a RADIUS server to an access point
when 802.1X/EAP is the deployed WLAN security solution? (Choose all that apply.)
A. RADIUS Access-Request
B. RADIUS Access-Challenge
C. RADIUS Access-Accept
D. RADIUS Access-Reject
Answer: BCD
, 9.What can happen when an intruder compromises the preshared key used during
WPA/WPA2-Personal authentication? (Choose all that apply.)
A. Decryption
B. Eavesdropping
C. Spoofing
D. Encryption cracking
E. Access to network resources
Answer: AE
10.What are some of the advantages of using SAE authentication over PSK
25
authentication? (Choose all that apply.)
20
m
A. Protects against brute-force dictionary attacks.
xa
E
B. Protects against forgery and replay attacks.
07
C. Protects against rogue APs and clients.
-2
P
S
D. PMKs cannot be compromised or regenerated.
W
C
E. PMKs are no longer needed.
P
N
W
Answer: ABD
C
r
ou
Y
r
fo
11.What protocols allow a network administrator to securely manage the configuration
re
pa
of WLAN controllers and access points? (Choose 2)
re
-P
A. SNMPv1
)
02
B. HTTPS
8.
(V
C. Telnet
ps
D. TFTP
um
D
E. FTP
07
-2
F. SSHv2
P
S
Answer: BF
W
C
id
al
V
12.What field in the RSN information element (IE) will indicate whether PSK- or
Enterprise-based WPA or WPA2 is in use?
A. AKM Suite List
B. Group Cipher Suite
C. RSN Capabilities
D. Pairwise Cipher Suite List
Answer: A
13.Which management protocols are often used between a network management