Free Certified Wireless Security Professional Exam CWSP-207 Exam Practice Test
CWSP-207 Exam Features
In Just $59 You can Access
- All Official Question Types
- Interactive Web-Based Practice Test Software
- No Installation or 3rd Party Software Required
- Customize your practice sessions (Free Demo)
- 24/7 Customer Support
Total Questions: 119
-
Given: You view a protocol analyzer capture decode with the following protocol frames listed in the following order (excluding the ACK frames):
Answer: A, ,C, ,F, ,G Next Question -
Given: You have a Windows laptop computer with an integrated, dual-band, Wi-Fi compliant adapter. Your laptop computer has protocol analyzer software installed that is capable of capturing and decoding 802.11ac data.What statement best describes the likely ability to capture 802.11ac frames for security testing purposes?
Answer: B Next Question -
When monitoring APs within a LAN using a Wireless Network Management System (WNMS), what secure protocol may be used by the WNMS to issue configuration changes to APs?
Answer: D Next Question -
Given: XYZ Hospital plans to improve the security and performance of their Voice over Wi-Fi implementation and will be upgrading to 802.11n phones with 802.1X/EAP authentication. XYZ would like to support fast secure roaming for the phones and will require the ability to troubleshoot reassociations that are delayed or dropped during inter-channel roaming.What portable solution would be recommended for XYZ to troubleshoot roaming problems?
Answer: D Next Question -
An attack is under way on the network. The attack is preventing users from accessing resources required for business operations, but the attacker has not gained access to any files or data. What kind of attack is described?
Answer: D Next Question -
When using a tunneled EAP type, such as PEAP, what component is protected inside the TLS tunnel so that it is not sent in clear text across the wireless medium?
Answer: B Next Question -
Given: XYZ Company has recently installed a controller-based WLAN and is using a RADIUS server to query authentication requests to an LDAP server. XYZ maintains user-based access policies and would like to use the RADIUS server to facilitate network authorization.What RADIUS features could be used by XYZ to assign the proper network permissions to users during authentication? (Choose 2)
Answer: B, ,E Next Question -
You perform a protocol capture using Wireshark and a compatible 802.11 adapter in Linux. When viewing the capture, you see an auth req frame and an auth rsp frame. Then you see an assoc req frame and an assoc rsp frame. Shortly after, you see DHCP communications and then ISAKMP protocol packets. What security solution is represented?
Answer: B Next Question -
Given: During 802.1X/LEAP authentication, the username is passed across the wireless medium in clear text.From a security perspective, why is this significant?
Answer: B Next Question -
Given: ABC Company has a WLAN controller using WPA2-Enterprise with PEAPv0/MS-CHAPv2 and AES-CCMP to secure their corporate wireless data. They wish to implement a guest WLAN for guest users to have Internet access, but want to implement some security controls. The security requirements for the hot-spot include: Cannot access corporate network resourcesNetwork permissions are limited to Internet access All stations must be authenticatedWhat security controls would you suggest? (Choose the single best answer.)
Answer: D Next Question
Total Questions: 119
