Exam Details

  • Exam Code
    :CWSP-205
  • Exam Name
    :Certified Wireless Security Professional (CWSP)
  • Certification
    :CWSP
  • Vendor
    :CWNP
  • Total Questions
    :119 Q&As
  • Last Updated
    :May 06, 2024

CWNP CWSP CWSP-205 Questions & Answers

  • Question 101:

    Given: In XYZ's small business, two autonomous 802.11ac APs and 12 client devices are in use with WPA2-Personal.

    What statement about the WLAN security of this company is true?

    A. Intruders may obtain the passphrase with an offline dictionary attack and gain network access, but will be unable to decrypt the data traffic of other users.

    B. A successful attack against all unicast traffic on the network would require a weak passphrase dictionary attack and the capture of the latest 4-Way Handshake for each client.

    C. An unauthorized wireless client device cannot associate, but can eavesdrop on some data because WPA2-Personal does not encrypt multicast or broadcast traffic.

    D. An unauthorized WLAN user with a protocol analyzer can decode data frames of authorized users if he captures the BSSID, client MAC address, and a user's 4-Way Handshake.

    E. Because WPA2-Personal uses Open System authentication followed by a 4-Way Handshake, hijacking attacks are easily performed.

  • Question 102:

    Given: Many computer users connect to the Internet at airports, which often have 802.11n access points with a captive portal for authentication.

    While using an airport hot-spot with this security solution, to what type of wireless attack is a user susceptible? (Choose 2)

    A. Man-in-the-Middle

    B. Wi-Fi phishing

    C. Management interface exploits

    D. UDP port redirection

    E. IGMP snooping

  • Question 103:

    Given: During 802.1X/LEAP authentication, the username is passed across the wireless medium in clear text.

    From a security perspective, why is this significant?

    A. The username is needed for Personal Access Credential (PAC) and X.509 certificate validation.

    B. The username is an input to the LEAP challenge/response hash that is exploited, so the username must be known to conduct authentication cracking.

    C. 4-Way Handshake nonces are based on the username in WPA and WPA2 authentication.

    D. The username can be looked up in a dictionary file that lists common username/password combinations.

  • Question 104:

    What software and hardware tools are used together to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network? (Choose 2)

    A. RF jamming device and a wireless radio card

    B. A low-gain patch antenna and terminal emulation software

    C. A wireless workgroup bridge and a protocol analyzer

    D. DHCP server software and access point software

    E. MAC spoofing software and MAC DoS software

  • Question 105:

    What WLAN client device behavior is exploited by an attacker during a hijacking attack?

    A. When the RF signal between a client and an access point is disrupted for more than a few seconds, the client device will attempt to associate to an access point with better signal quality.

    B. When the RF signal between a client and an access point is lost, the client will not seek to reassociate with another access point until the 120 second hold down timer has expired.

    C. After the initial association and 4-way handshake, client stations and access points do not need to perform another 4-way handshake, even if connectivity is lost.

    D. As specified by the Wi-Fi Alliance, clients using Open System authentication must allow direct client-toclient connections, even in an infrastructure BSS.

    E. Client drivers scan for and connect to access points in the 2.4 GHz band before scanning the 5 GHz band.

  • Question 106:

    In order to acquire credentials of a valid user on a public hot-spot network, what attacks may be conducted? Choose the single completely correct answer.

    A. Social engineering and/or eavesdropping

    B. RF DoS and/or physical theft

    C. MAC denial of service and/or physical theft

    D. Authentication cracking and/or RF DoS

    E. Code injection and/or XSS

  • Question 107:

    Which of the following security attacks cannot be detected by a WIPS solution of any kind? (Choose 2)

    A. Rogue APs

    B. DoS

    C. Eavesdropping

    D. Social engineering

  • Question 108:

    Given: You have a Windows laptop computer with an integrated, dual-band, Wi-Fi compliant adapter. Your laptop computer has protocol analyzer software installed that is capable of capturing and decoding 802.11ac data.

    What statement best describes the likely ability to capture 802.11ac frames for security testing purposes?

    A. All integrated 802.11ac adapters will work with most protocol analyzers for frame capture, including the Radio Tap Header.

    B. Integrated 802.11ac adapters are not typically compatible with protocol analyzers in Windows laptops. It is often best to use a USB adapter or carefully select a laptop with an integrated adapter that will work.

    C. Laptops cannot be used to capture 802.11ac frames because they do not support MU-MIMO.

    D. Only Wireshark can be used to capture 802.11ac frames as no other protocol analyzer has implemented the proper frame decodes.

    E. The only method available to capture 802.11ac frames is to perform a remote capture with a compatible access point.

  • Question 109:

    Given: You are using a Wireless Aggregator utility to combine multiple packet captures. One capture exists for each of channels 1, 6 and 11. What kind of troubleshooting are you likely performing with such a tool?

    A. Wireless adapter failure analysis.

    B. Interference source location.

    C. Fast secure roaming problems.

    D. Narrowband DoS attack detection.

  • Question 110:

    What is a primary criteria for a network to qualify as a Robust Security Network (RSN)?

    A. Token cards must be used for authentication.

    B. Dynamic WEP-104 encryption must be enabled.

    C. WEP may not be used for encryption.

    D. WPA-Personal must be supported for authentication and encryption.

    E. WLAN controllers and APs must not support SSHv1.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CWNP exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CWSP-205 exam preparations and CWNP certification application, do not hesitate to visit our Vcedump.com to find your solutions here.