Weekend Sale Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

CWNP CWSP-206 CWSP Certified Wireless Security Professional Exam Practice Test

Page: 1 / 6
Total 60 questions

CWSP Certified Wireless Security Professional Questions and Answers

Question 1

For a WIPS system to identify the location of a rogue WLAN device using location pattering (RF fingerprinting), what must be done as part of the WIPS installation?

Options:

A.

A location chipset (GPS) must be installed with it.

B.

At least six antennas must be installed in each sector.

C.

The RF environment must be sampled during an RF calibration process.

D.

All WIPS sensors must be installed as dual-purpose (AP/sensor) devices.

Question 2

The following numbered items show some of the contents of each of the four frames exchanged during the 4-way handshake.

  • Encrypted GTK sent
  • Confirmation of temporal key installation
  • ANonce sent from authenticator to supplicant
  • SNonce sent from supplicant to authenticator, MIC included

Arrange the frames in the correct sequence beginning with the start of the 4-way handshake.

Options:

A.

1, 2, 3, 4

B.

3, 4, 1, 2

C.

4, 3, 1, 2

D.

2, 3, 4, 1

Question 3

You must implement 7 APs for a branch office location in your organizations. All APs will be autonomous and provide the same two SSIDs (CORP1879and Guest).

Because each AP is managed directly through a web-based interface, what must be changed on every AP before enabling the WLANs to ensure proper staging procedures are followed?

Options:

A.

Output power

B.

Fragmentation threshold

C.

Administrative password

D.

Cell radius

Question 4

AWLAN consultant has just finished installing a WLAN controller with 15 controller-based APs. Two SSIDs with separate VLANs are configured for this network, and both VLANs are configured to use the same RADIUS server. The SSIDs are configured as follows:

The consultant’s computer can successfully authenticate and browse the Internet when using the Blue SSID. The same computer cannot authenticate when using the Red SSID. What is a possible cause of the problem?

Options:

A.

The consultant does not have a valid Kerberos ID on the Blue VLAN.

B.

The client does not have a proper certificate installed for the tunneled authentication within the established TLS tunnel.

C.

The TKIP cipher suite is not a valid option for PEAPv0 authentication.

D.

The Red VLAN does not use server certificate, but the client requires one.

Question 5

WLAN protocol analyzers can read and record many wireless frame parameters. What parameter is needed to physically locate rogue APs with a protocol analyzer?

Options:

A.

IP Address

B.

Noise floor

C.

RSN IE

D.

SSID

E.

Signal strength

F.

BSSID

Question 6

The Aircrack-ng WLAN software tool can capture and transmit modified 802.11 frames over the wirelessnetwork. It comes pre-installed on Kali Linux and some other Linux distributions. Which one of the following would not be a suitable penetration testing action taken with this tool?

Options:

A.

Auditing the configuration and functionality of a WIPS by simulating common attack sequences.

B.

Transmitting a deauthentication frame to disconnect a user from the AP.

C.

Cracking the authentication or encryption processes implemented poorly in some WLANs.

D.

Probing the RADIUS server and authenticator to expose the RADIUSshared secret.

Question 7

In a security penetration exercise, a WLAN consultant obtains the WEP key of XYZ Corporation’s wireless network. Demonstrating the vulnerabilities of using WEP, the consultant uses a laptop running asoftware AP in an attempt to hijack the authorized user’s connections. XYZ’s legacy network is using 802.11n APs with 802.11b, 11g, and 11n client devices. With this setup, how can the consultant cause all of the authorized clients to establish Layer 2 connectivity with the software access point?

Options:

A.

When the RF signal between the clients and the authorized AP is temporarily disrupted and the consultant’s software AP is using the same SSID on a different channel than the authorized AP, the clients will reassociate to the software AP.

B.

If the consultant’s software AP broadcasts Beacon frames that advertise 802.11g data rates that are faster rates than XYZ’s current 802.11b data rates, all WLAN clients will reassociate to the faster AP.

C.

A higher SSID priority value configured in the Beacon frames of the consultant’s software AP will take priority over the SSID in the authorized AP, causing the clients to reassociate.

D.

All WLAN clients will reassociate to the consultant’s software AP if the consultant’s software AP provides the same SSID on any channel with a 10 dB SNR improvement over the authorized AP.

Question 8

The IEEE 802.11 standard defined Open System authentication as consisting of two auth frames and two assoc frames. In a WPA2-Enterprise network, what process immediately follows the 802.11 association procedure?

Options:

A.

802.1X/ EAPauthentication

B.

Group Key Handshake

C.

DHCP Discovery

D.

RADIUS shared secret lookup

E.

4-Way Handshake

F.

Passphrase-to-PSK mapping

Question 9

Fred works primarily from home and public wireless hotspots rather than commuting to office. He frequently accesses the office network remotely from his Mac laptop using the local 802.11 WLAN. In this remote scenario, what single wirelesssecurity practice will provide the greatest security for Fred?

Options:

A.

Use enterprise WIPS on the corporate office network.

B.

Use 802.1X/PEAPv0 to connect to the corporate office network from public hotspots.

C.

Use secure protocols, such as FTP, for remote file transfers.

D.

Use an IPSec VPN for connectivity to the office network.

E.

Use only HTTPS when agreeing to acceptable use terms on public networks.

F.

Use WIPS sensor software on the laptop to monitor for risks and attacks.

Page: 1 / 6
Total 60 questions