Pass the CWNP CWSP CWSP-207 Questions and answers with CertsForce

Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions
Questions # 11:

When monitoring APs within a LAN using a Wireless Network Management System (WNMS), what secure protocol may be used by the WNMS to issue configuration changes to APs?

Options:

A.

IPSec/ESP


B.

TFTP


C.

802.1X/EAP


D.

SNMPv3


E.

PPTP


Expert Solution
Questions # 12:

Given: Mary has just finished troubleshooting an 802.11g network performance problem using a laptop-based WLAN protocol analyzer. The wireless network implements 802.1X/PEAP and the client devices are authenticating properly. When Mary disables the WLAN protocol analyzer, configures her laptop for PEAP authentication, and then tries to connect to the wireless network, she is unsuccessful. Before using the WLAN protocol analyzer, Mary’s laptop connected to the network without any problems.

What statement indicates why Mary cannot access the network from her laptop computer?

Options:

A.

The nearby WIPS sensor categorized Mary’s protocol analyzer adapter as a threat and is performing a deauthentication flood against her computer.


B.

The PEAP client’s certificate was voided when the protocol analysis software assumed control of the wireless adapter.


C.

The protocol analyzer’s network interface card (NIC) drivers are still loaded and do not support the version of PEAP being used.


D.

Mary’s supplicant software is using PEAPv0/EAP-MSCHAPv2, and the access point is using PEAPv1/EAP-GTC.


Expert Solution
Questions # 13:

What security vulnerabilities may result from a lack of staging, change management, and installation procedures for WLAN infrastructure equipment? (Choose 2)

Options:

A.

The WLAN system may be open to RF Denial-of-Service attacks


B.

WIPS may not classify authorized, rogue, and neighbor APs accurately


C.

Authentication cracking of 64-bit Hex WPA-Personal PSK


D.

Management interface exploits due to the use of default usernames and passwords for AP management


E.

AES-CCMP encryption keys may be decrypted


Expert Solution
Questions # 14:

You must locate non-compliant 802.11 devices. Which one of the following tools will you use and why?

Options:

A.

A spectrum analyzer, because it can show the energy footprint of a device using WPA differently from a device using WPA2.


B.

A spectrum analyzer, because it can decode the PHY preamble of a non-compliant device.


C.

A protocol analyzer, because it can be used to view the spectrum energy of non-compliant 802.11 devices, which is always different from compliant devices.


D.

A protocol analyzer, because it can be used to report on security settings and regulatory or rule compliance


Expert Solution
Questions # 15:

Given: WLAN protocol analyzers can read and record many wireless frame parameters.

What parameter is needed to physically locate rogue APs with a protocol analyzer?

Options:

A.

SSID


B.

IP Address


C.

BSSID


D.

Signal strength


E.

RSN IE


F.

Noise floor


Expert Solution
Questions # 16:

After completing the installation of a new overlay WIPS for the purpose of rogue detection and security monitoring at your corporate headquarters, what baseline function MUST be performed in order to identify security threats?

Options:

A.

Authorized PEAP usernames must be added to the WIPS server’s user database.


B.

WLAN devices that are discovered must be classified (rogue, authorized, neighbor, etc.) and a WLAN policy must define how to classify new devices.


C.

Separate security profiles must be defined for network operation in different regulatory domains


D.

Upstream and downstream throughput thresholds must be specified to ensure that service-level agreements are being met.


Expert Solution
Questions # 17:

In an effort to optimize WLAN performance, ABC Company has upgraded their WLAN infrastructure from 802.11a/g to 802.11n. 802.11a/g clients are still supported and are used throughout ABC’s facility. ABC has always been highly security conscious, but due to budget limitations, they have not yet updated their overlay WIPS solution to 802.11n or 802.11ac.

Given ABC’s deployment strategy, what security risks would not be detected by the 802.11a/g WIPS?

Options:

A.

Hijacking attack performed by using a rogue 802.11n AP against an 802.11a client


B.

Rogue AP operating in Greenfield 40 MHz-only mode


C.

802.11a STA performing a deauthentication attack against 802.11n APs


D.

802.11n client spoofing the MAC address of an authorized 802.11n client


Expert Solution
Questions # 18:

The following numbered items show some of the contents of each of the four frames exchanged during the 4-way handshake:

1. Encrypted GTK sent

2. Confirmation of temporal key installation

3. Anonce sent from authenticator to supplicant

4. Snonce sent from supplicant to authenticator, MIC included

Arrange the frames in the correct sequence beginning with the start of the 4-way handshake.

Options:

A.

2, 3, 4, 1


B.

1, 2, 3, 4


C.

4, 3, 1, 2


D.

3, 4, 1, 2


Expert Solution
Questions # 19:

An attack is under way on the network. The attack is preventing users from accessing resources required for business operations, but the attacker has not gained access to any files or data. What kind of attack is described?

Options:

A.

Man-in-the-middle


B.

Hijacking


C.

ASLEAP


D.

DoS


Expert Solution
Questions # 20:

Given: In a security penetration exercise, a WLAN consultant obtains the WEP key of XYZ Corporation’s wireless network. Demonstrating the vulnerabilities of using WEP, the consultant uses a laptop running a software AP in an attempt to hijack the authorized user’s connections. XYZ’s legacy network is using 802.11n APs with 802.11b, 11g, and 11n client devices.

With this setup, how can the consultant cause all of the authorized clients to establish Layer 2 connectivity with the software access point?

Options:

A.

All WLAN clients will reassociate to the consultant’s software AP if the consultant’s software AP provides the same SSID on any channel with a 10 dB SNR improvement over the authorized AP.


B.

A higher SSID priority value configured in the Beacon frames of the consultant’s software AP will take priority over the SSID in the authorized AP, causing the clients to reassociate.


C.

When the RF signal between the clients and the authorized AP is temporarily disrupted and the consultant’s software AP is using the same SSID on a different channel than the authorized AP, the clients will reassociate to the software AP.


D.

If the consultant’s software AP broadcasts Beacon frames that advertise 802.11g data rates that are faster rates than XYZ’s current 802.11b data rates, all WLAN clients will reassociate to the faster AP.


Expert Solution
Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions