CWNP CWSP-207 CWNP Wireless Security Professional (CWSP) Online Training
CWNP CWSP-207 Online Training
The questions for CWSP-207 were last updated at Feb 16,2025.
- Exam Code: CWSP-207
- Exam Name: CWNP Wireless Security Professional (CWSP)
- Certification Provider: CWNP
- Latest update: Feb 16,2025
What protocols allow a network administrator to securely manage the configuration of WLAN controllers and access points? (Choose 2)
- A . SNMPv1
- B . HTTPS
- C . Telnet
- D . TFTP
- E . FTP
- F . SSHv2
What field in the RSN information element (IE) will indicate whether PSK- or Enterprise-based WPA or WPA2 is in use?
- A . AKM Suite List
- B . Group Cipher Suite
- C . RSN Capabilities
- D . Pairwise Cipher Suite List
Which management protocols are often used between a network management server (NMS) and remote access points for the purpose of monitoring a WLAN? (Choose all that apply.)
- A . IPsec
- B . GRE
- C . CAPWAP
- D . DTLS
- E . SNMP
What would be the intended purpose of simulating Layer 2 deauthentication attacks as part of a WLAN audit?
- A . Audit Layer 1
- B . Audit Layer 2
- C . Audit the wired infrastructure
- D . Audit the WIPS
The science of concealing plaintext and then revealing it is known as ___________, and the science of decrypting the ciphertext without knowledge of the key or cipher is known as ____________.
- A . encryption, decryption
- B . cryptanalysis, cryptology
- C . cryptology, cryptanalysis
- D . cryptography, cryptanalysis
- E . cryptography, steganography
Wireless Intrusion Prevention Systems (WIPS) provide what network security services? (Choose 2)
- A . Configuration distribution for autonomous APs
- B . Wireless vulnerability assessment
- C . Application-layer traffic inspection
- D . Analysis and reporting of AP CPU utilization
- E . Policy enforcement and compliance management
3DES has effective key sizes of how many bits? (Choose all that apply.)
- A . 56
- B . 64
- C . 112
- D . 128
- E . 168
- F . 192
What inputs are used by passphrase-PSK mapping to create a final 256-bit PSK during 802.11 PSK authentication? (Choose all that apply.)
- A . BSSID
- B . SNonce
- C . SSID
- D . Client MAC address
- E . AP MAC address
- F . Passphrase
- G . ANonce
A WIDS/WIPS consists of which of the following components? (Choose two.)
- A . WIDS/WIPS server
- B . Midspan injector
- C . Sensors
- D . MDM server
- E . SNMP server
Which encryption types can be used to encrypt and decrypt unicast traffic with the pairwise transient key (PTK) that is generated from a 4-Way Handshake? (Choose all that apply.)
- A . Temporal Key Integrity Protocol
- B . 3-DES
- C . Dynamic WEP
- D . CCMP
- E . Proprietary encryption
- F . Static WEP