Free Certified Wireless Security Professional (CWSP) Exam CWSP-208 Exam Practice Test

UNLOCK FULL
CWSP-208 Exam Features
In Just $59 You can Access
  • All Official Question Types
  • Interactive Web-Based Practice Test Software
  • No Installation or 3rd Party Software Required
  • Customize your practice sessions (Free Demo)
  • 24/7 Customer Support
Page: 1 / 24
Total Questions: 119
  • Given: ABC Company secures their network with WPA2-Personal authentication and AES-CCMP encryption.What part of the 802.11 frame is always protected from eavesdroppers by this type of security?

    Answer: A Next Question
  • Given: ABC Hospital wishes to create a strong security policy as a first step in securing their 802.11 WLAN.Before creating the WLAN security policy, what should you ensure you possess?

    Answer: B Next Question
  • What elements should be addressed by a WLAN security policy? (Choose 2)

    Answer: C, ,E Next Question
  • Given: John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website. The bank’s website uses the HTTPS protocol to protect sensitive account information. While John was using the hot-spot, a hacker was able to obtain John’s bank account user ID and password and exploit this information.What likely scenario could have allowed the hacker to obtain John’s bank account user ID and password?

    Answer: B Next Question
  • The IEEE 802.11 standard defined Open System authentication as consisting of two auth frames and two assoc frames. In a WPA2-Enterprise network, what process immediately follows the 802.11 association procedure?

    Answer: B Next Question
  • Given: Fred works primarily from home and public wireless hot-spots rather than commuting to the office. He frequently accesses the office network remotely from his Mac laptop using the local 802.11 WLAN.In this remote scenario, what single wireless security practice will provide the greatest security for Fred?

    Answer: A Next Question
  • Given: The Marketing department’s WLAN users need to reach their file and email server as well as the Internet, but should not have access to any other network resources.What single WLAN security feature should be implemented to comply with these requirements?

    Answer: C Next Question
  • You are implementing an 802.11ac WLAN and a WIPS at the same time. You must choose between integrated and overlay WIPS solutions. Which of the following statements is true regarding integrated WIPS solutions?

    Answer: C Next Question
  • What protocols allow a network administrator to securely manage the configuration of WLAN controllers and access points? (Choose 2)

    Answer: B, ,F Next Question
  • Given: One of the security risks introduced by WPA2-Personal is an attack conducted by an authorized network user who knows the passphrase. In order to decrypt other users’ traffic, the attacker must obtain certain information from the 4-way handshake of the other users.In addition to knowing the Pairwise Master Key (PMK) and the supplicant’s address (SA), what other three inputs must be collected with a protocol analyzer to recreate encryption keys? (Choose 3)

    Answer: A, ,B, ,C Next Question
Page: 1 / 24
Total Questions: 119