Exam Details

  • Exam Code
    :CWSP-205
  • Exam Name
    :Certified Wireless Security Professional (CWSP)
  • Certification
    :CWSP
  • Vendor
    :CWNP
  • Total Questions
    :119 Q&As
  • Last Updated
    :May 06, 2024

CWNP CWSP CWSP-205 Questions & Answers

  • Question 11:

    Given: You view a protocol analyzer capture decode with the following protocol frames listed in the following order (excluding the ACK frames):

    1) 802.11 Probe Request and 802.11 Probe Response 2) 802.11 Auth and another 802.11 Auth 2) 802.11 Assoc Req and 802.11 Assoc Rsp 4) EAPOL-Start 5) EAP Request and EAP Response 6) EAP Request and EAP Response 7) EAP Request and EAP Response 8) EAP Request and EAP Response 9) EAP Request and EAP Response 10) EAP Success 19) EAPOL-Key (4 frames in a row)

    What are you seeing in the capture file? (Choose 4)

    A. WPA2-Enterprise authentication

    B. WPA2-Personal authentication

    C. 802.11 Open System authentication

    D. 802.1X with Dynamic WEP

    E. Wi-Fi Protected Setup with PIN

    F. Active Scanning

    G. 4-Way Handshake

  • Question 12:

    Wireless Intrusion Prevention Systems (WIPS) provide what network security services? (Choose 2)

    A. Configuration distribution for autonomous APs

    B. Wireless vulnerability assessment

    C. Application-layer traffic inspection

    D. Analysis and reporting of AP CPU utilization

    E. Policy enforcement and compliance management

  • Question 13:

    Given: Mary has just finished troubleshooting an 802.11g network performance problem using a laptop-based WLAN protocol analyzer. The wireless network implements 802.1X/PEAP and the client devices are authenticating properly. When Mary disables the WLAN protocol analyzer, configures her laptop for PEAP authentication, and then tries to connect to the wireless network, she is unsuccessful. Before using the WLAN protocol analyzer, Mary's laptop connected to the network without any problems.

    What statement indicates why Mary cannot access the network from her laptop computer?

    A. The nearby WIPS sensor categorized Mary's protocol analyzer adapter as a threat and is performing a deauthentication flood against her computer.

    B. The PEAP client's certificate was voided when the protocol analysis software assumed control of the wireless adapter.

    C. The protocol analyzer's network interface card (NIC) drivers are still loaded and do not support the version of PEAP being used.

    D. Mary's supplicant software is using PEAPv0/EAP-MSCHAPv2, and the access point is using PEAPv1/ EAP-GTC.

  • Question 14:

    Given: A WLAN protocol analyzer trace reveals the following sequence of frames (excluding the ACK frames): 1) 802.11 Probe Req and 802.11 Probe Rsp 2) 802.11 Auth and then another 802.11 Auth 3) 802.11 Assoc Req and 802.11 Assoc Rsp 4) EAPOL-KEY 5) EAPOL-KEY 6) EAPOL-KEY 7) EAPOL-KEY

    What security mechanism is being used on the WLAN?

    A. WEP-128

    B. WPA2-Personal

    C. EAP-TLS

    D. WPA-Enterprise

    E. 802.1X/LEAP

  • Question 15:

    You work as the security administrator for your organization. In relation to the WLAN, you are viewing a dashboard that shows security threat, policy compliance and rogue threat charts. What type of system is in view?

    A. Wireshark Protocol Analyzer

    B. Wireless VPN Management Systems

    C. Wireless Intrusion Prevention System

    D. Distributed RF Spectrum Analyzer

    E. WLAN Emulation System

  • Question 16:

    After completing the installation of a new overlay WIPS for the purpose of rogue detection and security monitoring at your corporate headquarters, what baseline function MUST be performed in order to identify security threats?

    A. Authorized PEAP usernames must be added to the WIPS server's user database.

    B. WLAN devices that are discovered must be classified (rogue, authorized, neighbor, etc.) and a WLAN policy must define how to classify new devices.

    C. Separate security profiles must be defined for network operation in different regulatory domains

    D. Upstream and downstream throughput thresholds must be specified to ensure that service- level agreements are being met.

  • Question 17:

    Given: WLAN protocol analyzers can read and record many wireless frame parameters.

    What parameter is needed to physically locate rogue APs with a protocol analyzer?

    A. SSID

    B. IP Address

    C. BSSID

    D. Signal strength

    E. RSN IE

    F. Noise floor

  • Question 18:

    When monitoring APs within a LAN using a Wireless Network Management System (WNMS), what secure protocol may be used by the WNMS to issue configuration changes to APs?

    A. IPSec/ESP

    B. TFTP

    C. 802.1X/EAP

    D. SNMPv3

    E. PPTP

  • Question 19:

    What preventative measures are performed by a WIPS against intrusions?

    A. EAPoL Reject frame flood against a rogue AP

    B. Evil twin attack against a rogue AP

    C. Deauthentication attack against a classified neighbor AP

    D. ASLEAP attack against a rogue AP

    E. Uses SNMP to disable the switch port to which rogue APs connect

  • Question 20:

    What field in the RSN information element (IE) will indicate whether PSK- or Enterprise-based WPA or WPA2 is in use?

    A. AKM Suite List

    B. Group Cipher Suite

    C. RSN Capabilities

    D. Pairwise Cipher Suite List

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CWNP exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CWSP-205 exam preparations and CWNP certification application, do not hesitate to visit our Vcedump.com to find your solutions here.