Pass the CWNP CWSP CWSP-208 Questions and answers with CertsForce

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

Given: ABC Company secures their network with WPA2-Personal authentication and AES-CCMP encryption.

What part of the 802.11 frame is always protected from eavesdroppers by this type of security?

Options:

A.

All MSDU contents


B.

All MPDU contents


C.

All PPDU contents


D.

All PSDU contents


Expert Solution
Questions # 22:

While seeking the source of interference on channel 11 in your 802.11n WLAN running within 2.4 GHz, you notice a signal in the spectrum analyzer real time FFT display. The signal is characterized with the greatest strength utilizing only 1-2 megahertz of bandwidth and it does not use significantly more bandwidth until it has weakened by roughly 20 dB. At approximately -70 dB, it spreads across as much as 35 megahertz of bandwidth.

What kind of signal is described?

Options:

A.

A high-power, narrowband signal


B.

A 2.4 GHz WLAN transmission using transmit beam forming


C.

An HT-OFDM access point


D.

A frequency hopping wireless device in discovery mode


E.

A deauthentication flood from a WIPS blocking an AP


F.

A high-power ultra wideband (UWB) Bluetooth transmission


Expert Solution
Questions # 23:

Given: XYZ Company has recently installed an 802.11ac WLAN. The company needs the ability to control access to network services, such as file shares, intranet web servers, and Internet access based on an employee's job responsibilities.

What WLAN security solution meets this requirement?

Options:

A.

An autonomous AP system with MAC filters


B.

WPA2-Personal with support for LDAP queries


C.

A VPN server with multiple DHCP scopes


D.

A WLAN controller with RBAC features


E.

A WLAN router with wireless VLAN support


Expert Solution
Questions # 24:

When used as part of a WLAN authentication solution, what is the role of LDAP?

Options:

A.

A data retrieval protocol used by an authentication service such as RADIUS


B.

An IEEE X.500 standard compliant database that participates in the 802.1X port-based access control process


C.

A SQL compliant authentication service capable of dynamic key generation and distribution


D.

A role-based access control protocol for filtering data to/from authenticated stations.


E.

An Authentication Server (AS) that communicates directly with, and provides authentication for, the Supplicant.


Expert Solution
Questions # 25:

What wireless security protocol provides mutual authentication without using an X.509 certificate?

Options:

A.

EAP-FAST


B.

EAP-MD5


C.

EAP-TLS


D.

PEAPv0/EAP-MSCHAPv2


E.

EAP-TTLS


F.

PEAPv1/EAP-GTC


Expert Solution
Questions # 26:

What EAP type supports using MS-CHAPv2, EAP-GTC or EAP-TLS for wireless client authentication?

Options:

A.

H-REAP


B.

EAP-GTC


C.

EAP-TTLS


D.

PEAP


E.

LEAP


Expert Solution
Questions # 27:

Given: XYZ Company has recently installed a controller-based WLAN and is using a RADIUS server to query authentication requests to an LDAP server. XYZ maintains user-based access policies and would like to use the RADIUS server to facilitate network authorization.

What RADIUS features could be used by XYZ to assign the proper network permissions to users during authentication? (Choose 2)

Options:

A.

The RADIUS server can communicate with the DHCP server to issue the appropriate IP address and VLAN assignment to users.


B.

The RADIUS server can support vendor-specific attributes in the ACCESS-ACCEPT response, which can be used for user policy assignment.


C.

RADIUS can reassign a client’s 802.11 association to a new SSID by referencing a username-to-SSID mapping table in the LDAP user database.


D.

RADIUS can send a DO-NOT-AUTHORIZE demand to the authenticator to prevent the STA from gaining access to specific files, but may only employ this in relation to Linux servers.


E.

RADIUS attributes can be used to assign permission levels, such as read-only permission, to users of a particular network resource.


Expert Solution
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions