Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

CWSP-206 CWSP Certified Wireless Security Professional Questions and Answers

Questions 4

Your company has just completed installation of an IEEE 802.11 WLAN controller with 20 controller-based APs. The CSO has specified PEAPv0/EAP-MSCHAPv2 as the only authorized WLAN authentication mechanism. Since an LDAP-compliant user database was already in use, a RADIUS server was installed and is querying authentication requeststo the LDAP server. Where must the X.509 server certificate and private key be installed in this network?

Options:

A.

Controller-based APs

B.

WLAN controller

C.

RADIUS server

D.

Supplicant devices

E.

LDAP server

Buy Now
Questions 5

What protocol, listed here, allows a network manager to securely administer the network?

Options:

A.

TFTP

B.

Telnet

C.

HTTPS

D.

SNMPv2

Buy Now
Questions 6

You are the WLAN administrator in your organization and you are required to monitor the network and ensure all active WLANs are providing RSNs. You have a laptop protocol analyzer configured. In what frame could you see the existence or non-existence of proper RSN configuration parameters for each BSS through the RSNIE?

Options:

A.

CTS

B.

Beacon

C.

RTS

D.

Data frames

E.

Probe request

Buy Now
Questions 7

While seeking the source of interference on channel 11 in your 802.11n WLAN running within 2.4 GHz, you notice a signal in the spectrum analyzer real time FFT display. The signal is characterized with the greatest strength utilizing only 1-2 megahertz of bandwidth and it does not use significantly more bandwidth until it has weakened by roughly 20 dB. At approximately -70 dB, it spreads across as much as 35 megahertz of bandwidth. What kind of signal is described?

Options:

A.

A high-power ultra wideband (UWB) Bluetooth transmission.

B.

A 2.4 GHz WLAN transmission using transmit beam forming.

C.

A high-power, narrowband signal.

D.

A deauthentication flood from a WIPS blocking an AP.

E.

An HT-OFDM access point.

F.

A frequency hopping wireless device in discovery mode.

Buy Now
Questions 8

What attack cannot be detected by a Wireless Intrusion Prevention System (WIPS)?

Options:

A.

Deauthentication flood

B.

Soft AP

C.

EAP flood

D.

Eavesdropping

E.

MAC Spoofing

F.

Hotspotter

Buy Now
Questions 9

What WLAN client device behavior is exploited by an attacker during a hijacking attack?

Options:

A.

After the initial association and 4-way handshake, client stations and access points do not need to perform another 4-way handshake, even if connectivity is lost.

B.

Client drivers scan for and connect to access point in the 2.4 GHz band before scanning the 5 GHz band.

C.

When the RF signal between a client and an access point is disrupted for more than a few seconds, the client device will attempt toassociate to an access point with better signal quality.

D.

When the RF signal between a client and an access point is lost, the client will not seek to reassociate with another access point until the 120 second hold down timer has expired.

E.

As specifiedby the Wi-Fi Alliance, clients using Open System authentication must allow direct client-to-client connections, even in an infrastructure BSS.

Buy Now
Exam Code: CWSP-206
Exam Name: CWSP Certified Wireless Security Professional
Last Update: Apr 29, 2024
Questions: 60
CWSP-206 pdf

CWSP-206 PDF

$28  $80
CWSP-206 Engine

CWSP-206 Testing Engine

$33.25  $95
CWSP-206 PDF + Engine

CWSP-206 PDF + Testing Engine

$45.5  $130