Pass the CWNP CWSP CWSP-207 Questions and answers with CertsForce

Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions
Questions # 21:

You are configuring seven APs to prevent common security attacks. The APs are to be installed in a small business and to reduce costs, the company decided to install all consumer-grade wireless routers. The wireless routers will connect to a switch, which connects directly to the Internet connection providing 50 Mbps of Internet bandwidth that will be shared among 53 wireless clients and 17 wired clients.

To ensure the wireless network is as secure as possible from common attacks, what security measure can you implement given only the hardware referenced?

Options:

A.

WPA-Enterprise


B.

802.1X/EAP-PEAP


C.

WPA2-Enterprise


D.

WPA2-Personal


Expert Solution
Questions # 22:

Which of the following security attacks cannot be detected by a WIPS solution of any kind? (Choose 2)

Options:

A.

Rogue APs


B.

DoS


C.

Eavesdropping


D.

Social engineering


Expert Solution
Questions # 23:

What type of WLAN attack is prevented with the use of a per-MPDU TKIP sequence counter (TSC)?

Options:

A.

Weak-IV


B.

Forgery


C.

Replay


D.

Bit-flipping


E.

Session hijacking


Expert Solution
Questions # 24:

What software and hardware tools are used together to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network? (Choose 2)

Options:

A.

RF jamming device and a wireless radio card


B.

A low-gain patch antenna and terminal emulation software


C.

A wireless workgroup bridge and a protocol analyzer


D.

DHCP server software and access point software


E.

MAC spoofing software and MAC DoS software


Expert Solution
Questions # 25:

Given: You are using a Wireless Aggregator utility to combine multiple packet captures. One capture exists for each of channels 1, 6 and 11. What kind of troubleshooting are you likely performing with such a tool?

Options:

A.

Wireless adapter failure analysis.


B.

Interference source location.


C.

Fast secure roaming problems.


D.

Narrowband DoS attack detection.


Expert Solution
Questions # 26:

ABC Company uses the wireless network for highly sensitive network traffic. For that reason, they intend to protect their network in all possible ways. They are continually researching new network threats and new preventative measures. They are interested in the security benefits of 802.11w, but would like to know its limitations.

What types of wireless attacks are protected by 802.11w? (Choose 2)

Options:

A.

RF DoS attacks


B.

Layer 2 Disassociation attacks


C.

Robust management frame replay attacks


D.

Social engineering attacks


Expert Solution
Questions # 27:

What 802.11 WLAN security problem is directly addressed by mutual authentication?

Options:

A.

Wireless hijacking attacks


B.

Weak password policies


C.

MAC spoofing


D.

Disassociation attacks


E.

Offline dictionary attacks


F.

Weak Initialization Vectors


Expert Solution
Questions # 28:

As a part of a large organization’s security policy, how should a wireless security professional address the problem of rogue access points?

Options:

A.

Use a WPA2-Enterprise compliant security solution with strong mutual authentication and encryption for network access of corporate devices.


B.

Hide the SSID of all legitimate APs on the network so that intruders cannot copy this parameter on rogue APs.


C.

Conduct thorough manual facility scans with spectrum analyzers to detect rogue AP RF signatures.


D.

A trained employee should install and configure a WIPS for rogue detection and response measures.


E.

Enable port security on Ethernet switch ports with a maximum of only 3 MAC addresses on each port.


Expert Solution
Questions # 29:

What policy would help mitigate the impact of peer-to-peer attacks against wireless-enabled corporate laptop computers when the laptops are also used on public access networks such as wireless hot-spots?

Options:

A.

Require Port Address Translation (PAT) on each laptop.


B.

Require secure applications such as POP, HTTP, and SSH.


C.

Require VPN software for connectivity to the corporate network.


D.

Require WPA2-Enterprise as the minimal WLAN security solution.


Expert Solution
Questions # 30:

In what deployment scenarios would it be desirable to enable peer-to-peer traffic blocking?

Options:

A.

In home networks in which file and printer sharing is enabled


B.

At public hot-spots in which many clients use diverse applications


C.

In corporate Voice over Wi-Fi networks with push-to-talk multicast capabilities


D.

In university environments using multicast video training sourced from professor’s laptops


Expert Solution
Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions