Pass the CWNP CWSP CWSP-208 Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

What attack cannot be detected by a Wireless Intrusion Prevention System (WIPS)?

Options:

A.

MAC Spoofing


B.

Eavesdropping


C.

Hot-spotter


D.

Soft AP


E.

Deauthentication flood


F.

EAP flood


Expert Solution
Questions # 12:

In an effort to optimize WLAN performance, ABC Company has upgraded their WLAN infrastructure from 802.11a/g to 802.11n. 802.11a/g clients are still supported and are used throughout ABC’s facility. ABC has always been highly security conscious, but due to budget limitations, they have not yet updated their overlay WIPS solution to 802.11n or 802.11ac.

Given ABC’s deployment strategy, what security risks would not be detected by the 802.11a/g WIPS?

Options:

A.

Hijacking attack performed by using a rogue 802.11n AP against an 802.11a client


B.

Rogue AP operating in Greenfield 40 MHz-only mode


C.

802.11a STA performing a deauthentication attack against 802.11n APs


D.

802.11n client spoofing the MAC address of an authorized 802.11n client


Expert Solution
Questions # 13:

Given: You have implemented strong authentication and encryption mechanisms for your enterprise 802.11 WLAN using 802.1X/EAP with AES-CCMP.

For users connecting within the headquarters office, what other security solution will provide continuous monitoring of both clients and APs with 802.11-specific tracking?

Options:

A.

IPSec VPN client and server software


B.

Internet firewall software


C.

Wireless intrusion prevention system


D.

WLAN endpoint agent software


E.

RADIUS proxy server


Expert Solution
Questions # 14:

Given: You are the WLAN administrator in your organization and you are required to monitor the network and ensure all active WLANs are providing RSNs. You have a laptop protocol analyzer configured.

In what frame could you see the existence or non-existence of proper RSN configuration parameters for each BSS through the RSN IE?

Options:

A.

Probe request


B.

Beacon


C.

RTS


D.

CTS


E.

Data frames


Expert Solution
Questions # 15:

You are implementing an 802.11ac WLAN and a WIPS at the same time. You must choose between integrated and overlay WIPS solutions. Which of the following statements is true regarding integrated WIPS solutions?

Options:

A.

Integrated WIPS always perform better from a client throughput perspective because the same radio that performs the threat scanning also services the clients.


B.

Integrated WIPS use special sensors installed alongside the APs to scan for threats.


C.

Many integrated WIPS solutions that detect Voice over Wi-Fi traffic will cease scanning altogether to accommodate the latency sensitive client traffic.


D.

Integrated WIPS is always more expensive than overlay WIPS.


Expert Solution
Questions # 16:

For a WIPS system to identify the location of a rogue WLAN device using location patterning (RF fingerprinting), what must be done as part of the WIPS installation?

Options:

A.

All WIPS sensors must be installed as dual-purpose (AP/sensor) devices.


B.

A location chipset (GPS) must be installed with it.


C.

At least six antennas must be installed in each sensor.


D.

The RF environment must be sampled during an RF calibration process.


Expert Solution
Questions # 17:

What preventative measures are performed by a WIPS against intrusions?

Options:

A.

EAPoL Reject frame flood against a rogue AP


B.

Evil twin attack against a rogue AP


C.

Deauthentication attack against a classified neighbor AP


D.

ASLEAP attack against a rogue AP


E.

Uses SNMP to disable the switch port to which rogue APs connect


Expert Solution
Questions # 18:

Your organization required compliance reporting and forensics features in relation to the 802.11ac WLAN they have recently installed. These features are not built into the management system provided by the WLAN vendor. The existing WLAN is managed through a centralized management console provided by the AP vendor with distributed APs and multiple WLAN controllers configured through this console.

What kind of system should be installed to provide the required compliance reporting and forensics features?

Options:

A.

WNMS


B.

WIPS overlay


C.

WIPS integrated


D.

Cloud management platform


Expert Solution
Questions # 19:

What disadvantage does EAP-TLS have when compared with PEAPv0 EAP/MSCHAPv2 as an 802.11 WLAN security solution?

Options:

A.

Fast/secure roaming in an 802.11 RSN is significantly longer when EAP-TLS is in use.


B.

EAP-TLS does not protect the client's username and password inside an encrypted tunnel.


C.

EAP-TLS cannot establish a secure tunnel for internal EAP authentication.


D.

EAP-TLS is supported only by Cisco wireless infrastructure and client devices.


E.

EAP-TLS requires extensive PKI use to create X.509 certificates for both the server and all clients, which increases administrative overhead.


Expert Solution
Questions # 20:

Given: ABC Company is an Internet Service Provider with thousands of customers. ABC’s customers are given login credentials for network access when they become a customer. ABC uses an LDAP server as the central user credential database. ABC is extending their service to existing customers in some public access areas and would like to use their existing database for authentication.

How can ABC Company use their existing user database for wireless user authentication as they implement a large-scale WPA2-Enterprise WLAN security solution?

Options:

A.

Import all users from the LDAP server into a RADIUS server with an LDAP-to-RADIUS conversion tool.


B.

Implement an X.509 compliant Certificate Authority and enable SSL queries on the LDAP server.


C.

Mirror the LDAP server to a RADIUS database within a WLAN controller and perform daily backups to synchronize the user databases.


D.

Implement a RADIUS server and query user authentication requests through the LDAP server.


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions