CWNP CWSP-207 CWNP Wireless Security Professional (CWSP) Online Training
CWNP CWSP-207 Online Training
The questions for CWSP-207 were last updated at Nov 19,2024.
- Exam Code: CWSP-207
- Exam Name: CWNP Wireless Security Professional (CWSP)
- Certification Provider: CWNP
- Latest update: Nov 19,2024
What are of some of the common security capabilities often integrated within in access points deployed in a distributed WLAN architecture?
- A . Captive web portal
- B . Firewall
- C . Integrated RADIUS
- D . WIPS
- E . All of the above
In what deployment scenarios would it be desirable to enable peer-to-peer traffic blocking?
- A . In home networks in which file and printer sharing is enabled
- B . At public hot-spots in which many clients use diverse applications
- C . In corporate Voice over Wi-Fi networks with push-to-talk multicast capabilities
- D . In university environments using multicast video training sourced from professor’s laptops
What are some of the purposes of the 4-Way Handshake? (Choose all that apply.)
- A . Transfer the GTK to the supplicant.
- B . Derive a PTK from the PMK.
- C . Transfer the GMK to the supplicant.
- D . Confirm cipher suites.
What kind of remote actions can an MDM administrator send to the mobile device over the Internet?
- A . Configuration changes
- B . Restrictions changes
- C . Locking the device
- D . Wiping the device
- E . Application changes
- F . All of the above
Given: You must implement 7 APs for a branch office location in your organization. All APs will be autonomous and provide the same two SSIDs (CORP1879 and Guest).
Because each AP is managed directly through a web-based interface, what must be changed on every AP before enabling the WLANs to ensure proper staging procedures are followed?
- A . Fragmentation threshold
- B . Administrative password
- C . Output power
- D . Cell radius
When using the 802.1X/EAP framework for authentication in 802.11 WLANs, why is the 802.1X Controlled Port still blocked after the 802.1X/EAP framework has completed successfully?
- A . The 802.1X Controlled Port is always blocked, but the Uncontrolled Port opens after the EAP authentication process completes.
- B . The 802.1X Controlled Port remains blocked until an IP address is requested and accepted by the Supplicant.
- C . The 4-Way Handshake must be performed before the 802.1X Controlled Port changes to the unblocked state.
- D . The 802.1X Controlled Port is blocked until Vender Specific Attributes (VSAs) are exchanged inside a RADIUS packet between the Authenticator and Authentication Server.
As an auditor you have been asked to determine if the WLAN access points and client devices have been configured with the proper encryption.
What should you use to answer this question for your customer? (Choose all that apply.)
- A . Written corporate security policy
- B . WLAN protocol analyzer
- C . Aircrack-ng
- D . coWPAtty
- E . Asleap
Which RADIUS packets can be sent from a RADIUS server to an access point when 802.1X/EAP is the deployed WLAN security solution? (Choose all that apply.)
- A . RADIUS Access-Request
- B . RADIUS Access-Challenge
- C . RADIUS Access-Accept
- D . RADIUS Access-Reject
What can happen when an intruder compromises the preshared key used during WPA/WPA2-Personal authentication? (Choose all that apply.)
- A . Decryption
- B . Eavesdropping
- C . Spoofing
- D . Encryption cracking
- E . Access to network resources
What are some of the advantages of using SAE authentication over PSK authentication? (Choose all that apply.)
- A . Protects against brute-force dictionary attacks.
- B . Protects against forgery and replay attacks.
- C . Protects against rogue APs and clients.
- D . PMKs cannot be compromised or regenerated.
- E . PMKs are no longer needed.