CWNP CWSP-205 - Certified Wireless Security Professional (CWSP) Exam

Page:    1 / 24   
Total 119 questions

Given: During 802.1X/LEAP authentication, the username is passed across the wireless medium in clear text.
From a security perspective, why is this significant?

  • A. The username is needed for Personal Access Credential (PAC) and X.509 certificate validation.
  • B. The username is an input to the LEAP challenge/response hash that is exploited, so the username must be known to conduct authentication cracking.
  • C. 4-Way Handshake nonces are based on the username in WPA and WPA2 authentication.
  • D. The username can be looked up in a dictionary file that lists common username/password combinations.


Answer : B

Given: ABC Corporation is evaluating the security solution for their existing WLAN. Two of their supported solutions include a PPTP VPN and 802.1X/LEAP. They have used PPTP
VPNs because of their wide support in server and desktop operating systems. While both
PPTP and LEAP adhere to the minimum requirements of the corporate security policy, some individuals have raised concerns about MS-CHAPv2 (and similar) authentication and the known fact that MS-CHAPv2 has proven vulnerable in improper implementations.
As a consultant, what do you tell ABC Corporation about implementing MS-CHAPv2 authentication? (Choose 2)

  • A. MS-CHAPv2 is compliant with WPA-Personal, but not WPA2-Enterprise.
  • B. MS-CHAPv2 is subject to offline dictionary attacks.
  • C. LEAP’s use of MS-CHAPv2 is only secure when combined with WEP.
  • D. MS-CHAPv2 is only appropriate for WLAN security when used inside a TLS-encrypted tunnel.
  • E. MS-CHAPv2 uses AES authentication, and is therefore secure.
  • F. When implemented with AES-CCMP encryption, MS-CHAPv2 is very secure.


Answer : B,D

Given: One of the security risks introduced by WPA2-Personal is an attack conducted by an authorized network user who knows the passphrase. In order to decrypt other users traffic, the attacker must obtain certain information from the 4-way handshake of the other users.
In addition to knowing the Pairwise Master Key (PMK) and the supplicants address (SA), what other three inputs must be collected with a protocol analyzer to recreate encryption keys? (Choose 3)

  • A. Authenticator nonce
  • B. Supplicant nonce
  • C. Authenticator address (BSSID)
  • D. GTKSA
  • E. Authentication Server nonce


Answer : A,B,C

What software and hardware tools are used together to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network? (Choose 2)

  • A. RF jamming device and a wireless radio card
  • B. A low-gain patch antenna and terminal emulation software
  • C. A wireless workgroup bridge and a protocol analyzer
  • D. DHCP server software and access point software
  • E. MAC spoofing software and MAC DoS software


Answer : A,D

Given: Many computer users connect to the Internet at airports, which often have 802.11n access points with a captive portal for authentication.
While using an airport hot-spot with this security solution, to what type of wireless attack is a user susceptible? (Choose 2)

  • A. Man-in-the-Middle
  • B. Wi-Fi phishing
  • C. Management interface exploits
  • D. UDP port redirection
  • E. IGMP snooping


Answer : A,B

Page:    1 / 24   
Total 119 questions