Exam Details

  • Exam Code
    :CWSP-206
  • Exam Name
    :CWSP Certified Wireless Security Professional
  • Certification
    :CWSP
  • Vendor
    :CWNP
  • Total Questions
    :60 Q&As
  • Last Updated
    :May 14, 2024

CWNP CWSP CWSP-206 Questions & Answers

  • Question 11:

    Joe's new laptop is experiencing difficulty connecting to ABC Company's 802.11 WLAN using 802.1X/EAP PEAPv0. The company's wireless network administrator assured Joe that his laptop was authorized in the WIPS management console for connectivity to ABC's network before it was given to him. The WIPS termination policy includes alarms for rogue stations, rogue APs, DoS attacks and unauthorized roaming. What is a likely reason that Joe cannot connect to the network?

    A. An ASLEAP attack has been detected on APs to which Joe's laptop was trying to associate. The WIPS responded by disabling the APs.

    B. Joe configured his 802.11 radio card to transmit at 100 mW to increase his SNR. The WIPS is detecting this much output power as a DoS attack.

    C. Joe's integrated 802.11 radio is sending multiple Probe Request frames on each channel.

    D. Joe disabled his laptop's integrated 802.11 radio and is using a personal PC card radio with a different chipset, drivers, and client utilities.

  • Question 12:

    A network security auditor is preparing to perform a comprehensive assessment of an 802.11ac network's security. What task should be performed at the beginning of the audit to maximize the auditor's ability to expose network vulnerabilities?

    A. Identify the IP subnet information for each network segment.

    B. Identify the manufacturer of the wireless infrastructure hardware.

    C. Identify the skill level of the wireless network security administrator(s).

    D. Identify the manufacturer of the wireless intrusion prevention system.

    E. Identify the wireless security solution(s) currently in use.

  • Question 13:

    For a WIPS system to identify the location of a rogue WLAN device using location pattering (RF fingerprinting), what must be done as part of the WIPS installation?

    A. A location chipset (GPS) must be installed with it.

    B. At least six antennas must be installed in each sector.

    C. The RF environment must be sampled during an RF calibration process.

    D. All WIPS sensors must be installed as dual-purpose (AP/sensor) devices.

  • Question 14:

    For which one of the following purposes would a WIPS not be a good solution?

    A. Enforcing wireless network security policy.

    B. Detecting and defending against eavesdropping attacks.

    C. Performance monitoring and troubleshooting.

    D. Security monitoring and notification.

  • Question 15:

    The Marketing department's WLAN users need to reach their file and email server as well as the Internet, but should not have access to any other network resources. What single WLAN security feature should be implemented to comply with these requirements?

    A. RADIUS policy accounting

    B. Group authentication

    C. Role-based access control

    D. Captive portal

    E. Mutual authentication

  • Question 16:

    XYZ Hospital plans to improve the security and performance of their Voice over Wi-Fi implementation and will be upgrading to 802.11n phones with 802.1X/EAP authentication. XYZ would like to support fast secure roaming for the phones and will require the ability to troubleshoot reassociations that are delayed or dropped during inter-channel roaming. What portable solution would be recommended for XYZ to troubleshoot roaming problems?

    A. Spectrum analyzer software installed on a laptop computer.

    B. An autonomous AP mounted on a mobile cart and configured to operate in monitor mode.

    C. Laptop-based protocol analyzer with multiple 802.11n adapters.

    D. WIPS sensor software installed on a laptop computer.

  • Question 17:

    While seeking the source of interference on channel 11 in your 802.11n WLAN running within 2.4 GHz, you notice a signal in the spectrum analyzer real time FFT display. The signal is characterized with the greatest strength utilizing only 1-2 megahertz of bandwidth and it does not use significantly more bandwidth until it has weakened by roughly 20 dB. At approximately -70 dB, it spreads across as much as 35 megahertz of bandwidth. What kind of signal is described?

    A. A high-power ultra wideband (UWB) Bluetooth transmission.

    B. A 2.4 GHz WLAN transmission using transmit beam forming.

    C. A high-power, narrowband signal.

    D. A deauthentication flood from a WIPS blocking an AP.

    E. An HT-OFDM access point.

    F. A frequency hopping wireless device in discovery mode.

  • Question 18:

    Many corporations configure guest VLANs on their WLAN controllers that allow visitors to have Internet access only. The guest traffic is tunneled to the DMZ to prevent some security risks. In this deployment, what risk is still associated with implementing the guest VLAN without any advanced traffic monitoring or filtering feature enabled?

    A. Intruders can send spam to the Internet through the guest VLAN.

    B. Peer-to-peer attacks can still be conducted between guest users unless application-layer monitoring and filtering are implemented.

    C. Guest users can reconfigure AP radios servicing the guest VLAN unless unsecure network management protocols (e.g. Telnet, HTTP) are blocked.

    D. Once guest users are associated to the WLAN, they can capture 802.11 frames from the corporate VLANs.

  • Question 19:

    You are using a utility that takes input and generates random output. For example, you can provide the input of a known word as a secret word and then also provide another known word as salt input. When you process the input it generates a secret code which is a combination of letters and numbers with case sensitivity. For what is the described utility used?

    A. Generating PMKs that can be imported into 802.11 RSN-compatible devices.

    B. Generating passwords for WLAN infrastructure equipment logins.

    C. Generating dynamic session keys used for IPSec VPNs.

    D. Generating GTKs for broadcast traffic encryption.

  • Question 20:

    You support a coffee shop and have recently installed a free 802.11ac wireless hotspot for the benefit of your customers. You want to minimize legal risk in the event that the hotspot is used for illegal Internet activity. What option specifies the best approach to minimize legal risk at this public hotspot while maintaining an open venue for customer Internet access?

    A. Require client STAs to have updated firewall and antivirus software.

    B. Block TCP port 25 and 80 outbound on the Internet router.

    C. Use a WIPS to monitor all traffic and deauthenticate malicious stations.

    D. Implement a captive portal with an acceptable use disclaimer.

    E. Allow only trusted patrons to use the WLAN.

    F. Configure WPA2-Enterprise security on the access point.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CWNP exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CWSP-206 exam preparations and CWNP certification application, do not hesitate to visit our Vcedump.com to find your solutions here.