Free Certified Wireless Security Professional Exam CWSP-207 Exam Practice Test

UNLOCK FULL
CWSP-207 Exam Features
In Just $59 You can Access
  • All Official Question Types
  • Interactive Web-Based Practice Test Software
  • No Installation or 3rd Party Software Required
  • Customize your practice sessions (Free Demo)
  • 24/7 Customer Support
Page: 1 / 24
Total Questions: 119
  • Given: ABC Company has a WLAN controller using WPA2-Enterprise with PEAPv0/MS-CHAPv2 and AES-CCMP to secure their corporate wireless data. They wish to implement a guest WLAN for guest users to have Internet access, but want to implement some security controls. The security requirements for the hot-spot include: Cannot access corporate network resourcesNetwork permissions are limited to Internet access All stations must be authenticatedWhat security controls would you suggest? (Choose the single best answer.)

    Answer: D Next Question
  • The IEEE 802.11 standard defined Open System authentication as consisting of two auth frames and two assoc frames. In a WPA2-Enterprise network, what process immediately follows the 802.11 association procedure?

    Answer: B Next Question
  • In the basic 4-way handshake used in secure 802.11 networks, what is the purpose of the ANonce and SNonce? (Choose 2)

    Answer: D, ,E Next Question
  • The IEEE 802.11 Pairwise Transient Key (PTK) is derived from what cryptographic element?

    Answer: C Next Question
  • Given: Many corporations configure guest VLANs on their WLAN controllers that allow visitors to have Internet access only. The guest traffic is tunneled to the DMZ to prevent some security risks.In this deployment, what risks are still associated with implementing the guest VLAN without any advanced traffic monitoring or filtering features enabled? (Choose 2)

    Answer: A, ,C Next Question
  • Given: ABC Company is deploying an IEEE 802.11-compliant wireless security solution using 802.1X/EAP authentication. According to company policy, the security solution must prevent an eavesdropper from decrypting data frames traversing a wireless connection.What security characteristics and/or components play a role in preventing data decryption? (Choose 2)

    Answer: B, ,F Next Question
  • Given: Your company has just completed installation of an IEEE 802.11 WLAN controller with 20 controller-based APs. The CSO has specified PEAPv0/EAP-MSCHAPv2 as the only authorized WLAN authentication mechanism. Since an LDAP-compliant user database was already in use, a RADIUS server was installed and is querying authentication requests to the LDAP server.Where must the X.509 server certificate and private key be installed in this network?

    Answer: E Next Question
  • Role-Based Access Control (RBAC) allows a WLAN administrator to perform what network function?

    Answer: C Next Question
  • When used as part of a WLAN authentication solution, what is the role of LDAP?

    Answer: A Next Question
  • Given: In XYZ’s small business, two autonomous 802.11ac APs and 12 client devices are in use with WPA2-Personal.What statement about the WLAN security of this company is true?

    Answer: B Next Question
Page: 1 / 24
Total Questions: 119