Exam Details

  • Exam Code
    :CWSP-206
  • Exam Name
    :CWSP Certified Wireless Security Professional
  • Certification
    :CWSP
  • Vendor
    :CWNP
  • Total Questions
    :60 Q&As
  • Last Updated
    :May 14, 2024

CWNP CWSP CWSP-206 Questions & Answers

  • Question 21:

    Your company has just completed installation of an IEEE 802.11 WLAN controller with 20 controller-based APs. The CSO has specified PEAPv0/EAP-MSCHAPv2 as the only authorized WLAN authentication mechanism. Since an LDAP- compliant user database was already in use, a RADIUS server was installed and is querying authentication requests to the LDAP server. Where must the X.509 server certificate and private key be installed in this network?

    A. Controller-based APs

    B. WLAN controller

    C. RADIUS server

    D. Supplicant devices

    E. LDAP server

  • Question 22:

    The IEEE 802.11 standard defined Open System authentication as consisting of two auth frames and two assoc frames. In a WPA2-Enterprise network, what process immediately follows the 802.11 association procedure?

    A. 802.1X/ EAP authentication

    B. Group Key Handshake

    C. DHCP Discovery

    D. RADIUS shared secret lookup

    E. 4-Way Handshake

    F. Passphrase-to-PSK mapping

  • Question 23:

    ABC Company has a WLAN controller using WPA2-Enterprise with PEAPv0/MS-CHAPv2 and AES-CCMP to secure their corporate wireless data. They wish to implement a guest WLAN for guest users to have Internet access, but want to implement some security controls. The security requirements for the hotspot include:

    Cannot access corporate network resources Network permissions are limited to Internet access All stations must be authenticated

    What security controls would you suggest? (Choose the single best answer.)

    A. Configure access control lists (ACLs) on the guest WLAN to control data types and destinations.

    B. Require guest users to authenticate via a captive portal HTTPS login page and place the guest WLAN and the corporate WLAN on different VLANs.

    C. Implement separate controllers for the corporate and guest WLANs.

    D. Use a WIPS to deauthenticate guest users when their station tries to associate with the corporate WLAN.

    E. Force all guest users to use a common VPN protocol to connect.

  • Question 24:

    The IEEE 802.11 Pairwise Transient Key (PTK) is derived from what cryptographic element?

    A. PeerKey (PK)

    B. Group Master Key (GMK)

    C. Key Confirmation Key (KCK)

    D. Pairwise Master Key (PMK)

    E. Phase Shift Key (PSK)

    F. Group Temporal Key (GTK)

  • Question 25:

    In the basic 4-way handshake used in secure 802.11 networks, what is the purpose of the ANonce and SNonce?

    A. They are added together and used as the GMK, from which the GTK is derived.

    B. They are used to pad Message 1 and Message 2 so each frame contains the same number of bytes.

    C. The IEEE 802.11 standard requires that all encrypted frames contain a nonce to serve as a Message Integrity Check (MIC).

    D. They are input values used in the derivation of the Pairwise Transient Key.

  • Question 26:

    ABC Company is deploying an IEEE 802.11-compliant wireless security solution using 802.1X/EAP authentication. According to company policy, the security solution must prevent an eavesdropper from decrypting data frames traversing a wireless connection. What security characteristic and/or component plays a role in preventing data decryption?

    A. 4-Way Handshake

    B. PLCP Cyclic Redundancy Check (CRC)

    C. Multi-factor authentication

    D. Encrypted Passphrase Protocol (EPP)

    E. Integrity Check Value (ICV)

  • Question 27:

    ABC Company has recently installed a WLAN controller and configured it to support WPA2-Enterprise security. The administrator has configured a security profile on the WLAN controller for each group within the company (Marketing, Sales, and Engineering). How are authenticated users assigned to groups so that they receive the correct security profile within the WLAN controller?

    A. The RADIUS server sends the list of authenticated users and groups to the WLAN controller as part of a 4-Way Handshake prior to user authentication.

    B. The WLAN controller polls the RADIUS server for a complete list of authenticated users and groups after each user authentication.

    C. The RADIUS server sends a group name return list attribute to the WLAN controller during every successful user authentication.

    D. The RADIUS server forwards the request for a group attribute to an LDAP database service, and LDAP sends the group attribute to the WLAN controller.

  • Question 28:

    ABC Company is an Internet Service Provider with thousands of customers. ABC's customers are given login credentials for network access when they become a customer. ABC uses an LDAP server as the central user credential database. ABC is extending their service to existing customers in some public access areas and would like to use their existing database for authentication. How can ABC Company use their existing user database for wireless user authentication as they implement a large-scale WPA2Enterprise WLAN security solution?

    A. Implement a RADIUS server and query user authentication requests through the LDAP server.

    B. Mirror the LDAP server to a RADIUS database within a WLAN controller and perform daily backups to synchronize the user databases.

    C. Import all users from the LDAP server into a RADIUS server with an LDAP-to-RADIUS conversion tool.

    D. Implement an X.509 compliant Certificate Authority and enable SSL queries on the LDAP server.

  • Question 29:

    ABC Company is implementing a secure 802.11 WLAN at their headquarters (HQ) building in New York and at each of the 10 small, remote branch offices around the United States. 802.1X/EAP is ABC's preferred security solution, where possible. All access points (at the HQ building and all branch offices) connect to a single WLAN controller located at HQ. Each branch office has only a single AP and minimal IT resources. What security best practices should be followed in this deployment scenario?

    A. Remote management of the WLAN controller via Telnet, SSH, HTTP, and HTTPS should be prohibited across the WAN link.

    B. RADIUS services should be provided at branch offices so that authentication server and suppliant credentials are not sent over the Internet.

    C. An encrypted VPN should connect the WLAN controller and each remote controller-based AP, or each remote site should provide an encrypted VPN tunnel to HQ.

    D. APs at HQ and at each branch office should not broadcast the same SSID; instead each branch should have a unique ID for user accounting purposes.

  • Question 30:

    A large enterprise is designing a secure, scalable, and manageable 802.11n WLAN that will support thousands of users. The enterprise will support both 802.1X/EAP-TTLS and PEAPv0/MSCHAPv2. Currently, the company is upgrading network servers as well and will replace their existing Microsoft IAS implementation with Microsoft NPS, querying Active Directory for user authentication. For this organization, as they update their WLAN infrastructure, what WLAN controller feature will likely be least valuable?

    A. SNMPv3 support

    B. 802.1Q VLAN trunking

    C. Internal RADIUS server

    D. WIPS support and integration

    E. WPA2-Enterprise authentication/encryption

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CWNP exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CWSP-206 exam preparations and CWNP certification application, do not hesitate to visit our Vcedump.com to find your solutions here.