Pass the CWNP CWSP CWSP-208 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

What policy would help mitigate the impact of peer-to-peer attacks against wireless-enabled corporate laptop computers when the laptops are also used on public access networks such as wireless hot-spots?

Options:

A.

Require Port Address Translation (PAT) on each laptop.


B.

Require secure applications such as POP, HTTP, and SSH.


C.

Require VPN software for connectivity to the corporate network.


D.

Require WPA2-Enterprise as the minimal WLAN security solution.


Questions # 2:

Given: ABC Hospital wishes to create a strong security policy as a first step in securing their 802.11 WLAN.

Before creating the WLAN security policy, what should you ensure you possess?

Options:

A.

Awareness of the exact vendor devices being installed


B.

Management support for the process


C.

End-user training manuals for the policies to be created


D.

Security policy generation software


Questions # 3:

In what deployment scenarios would it be desirable to enable peer-to-peer traffic blocking?

Options:

A.

In home networks in which file and printer sharing is enabled


B.

At public hot-spots in which many clients use diverse applications


C.

In corporate Voice over Wi-Fi networks with push-to-talk multicast capabilities


D.

In university environments using multicast video training sourced from professor’s laptops


Questions # 4:

What elements should be addressed by a WLAN security policy? (Choose 2)

Options:

A.

Enabling encryption to prevent MAC addresses from being sent in clear text


B.

How to prevent non-IT employees from learning about and reading the user security policy


C.

End-user training for password selection and acceptable network use


D.

The exact passwords to be used for administration interfaces on infrastructure devices


E.

Social engineering recognition and mitigation techniques


Questions # 5:

As a part of a large organization’s security policy, how should a wireless security professional address the problem of rogue access points?

Options:

A.

Use a WPA2-Enterprise compliant security solution with strong mutual authentication and encryption for network access of corporate devices.


B.

Hide the SSID of all legitimate APs on the network so that intruders cannot copy this parameter on rogue APs.


C.

Conduct thorough manual facility scans with spectrum analyzers to detect rogue AP RF signatures.


D.

A trained employee should install and configure a WIPS for rogue detection and response measures.


E.

Enable port security on Ethernet switch ports with a maximum of only 3 MAC addresses on each port.


Questions # 6:

As the primary security engineer for a large corporate network, you have been asked to author a new security policy for the wireless network. While most client devices support 802.1X authentication, some legacy devices still only support passphrase/PSK-based security methods.

When writing the 802.11 security policy, what password-related items should be addressed?

Options:

A.

MSCHAPv2 passwords used with EAP/PEAPv0 should be stronger than typical WPA2-PSK passphrases.


B.

Password complexity should be maximized so that weak WEP IV attacks are prevented.


C.

Static passwords should be changed on a regular basis to minimize the vulnerabilities of a PSK-based authentication.


D.

Certificates should always be recommended instead of passwords for 802.11 client authentication.


E.

EAP-TLS must be implemented in such scenarios.


Questions # 7:

What software and hardware tools are used together to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network? (Choose 2)

Options:

A.

RF jamming device and a wireless radio card


B.

A low-gain patch antenna and terminal emulation software


C.

A wireless workgroup bridge and a protocol analyzer


D.

DHCP server software and access point software


E.

MAC spoofing software and MAC DoS software


Questions # 8:

Given: John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website. The bank’s website uses the HTTPS protocol to protect sensitive account information. While John was using the hot-spot, a hacker was able to obtain John’s bank account user ID and password and exploit this information.

What likely scenario could have allowed the hacker to obtain John’s bank account user ID and password?

Options:

A.

John's bank is using an expired X.509 certificate on their web server. The certificate is on John's Certificate Revocation List (CRL), causing the user ID and password to be sent unencrypted.


B.

John uses the same username and password for banking that he does for email. John used a POP3 email client at the wireless hot-spot to check his email, and the user ID and password were not encrypted.


C.

John accessed his corporate network with his IPSec VPN software at the wireless hot-spot. An IPSec VPN only encrypts data, so the user ID and password were sent in clear text. John uses the same username and password for banking that he does for his IPSec VPN software.


D.

The bank’s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.


E.

Before connecting to the bank’s website, John’s association to the AP was hijacked. The attacker intercepted the HTTPS public encryption key from the bank’s web server and has decrypted John’s login credentials in near real-time.


Questions # 9:

Given: WLAN attacks are typically conducted by hackers to exploit a specific vulnerability within a network.

What statement correctly pairs the type of WLAN attack with the exploited vulnerability? (Choose 3)

Options:

A.

Management interface exploit attacks are attacks that use social engineering to gain credentials from managers.


B.

Zero-day attacks are always authentication or encryption cracking attacks.


C.

RF DoS attacks prevent successful wireless communication on a specific frequency or frequency range.


D.

Hijacking attacks interrupt a user’s legitimate connection and introduce a new connection with an evil twin AP.


E.

Social engineering attacks are performed to collect sensitive information from unsuspecting users


F.

Association flood attacks are Layer 3 DoS attacks performed against authenticated client stations


Questions # 10:

Given: A network security auditor is preparing to perform a comprehensive assessment of an 802.11ac network’s security.

What task should be performed at the beginning of the audit to maximize the auditor’s ability to expose network vulnerabilities?

Options:

A.

Identify the IP subnet information for each network segment.


B.

Identify the manufacturer of the wireless intrusion prevention system.


C.

Identify the skill level of the wireless network security administrator(s).


D.

Identify the manufacturer of the wireless infrastructure hardware.


E.

Identify the wireless security solution(s) currently in use.


Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions