CWNP CWSP-205 - Certified Wireless Security Professional (CWSP) Exam
Page: 2 / 24
Total 119 questions
Question #6 (Topic: Topic 1)
What is a primary criteria for a network to qualify as a Robust Security Network (RSN)?
A. Token cards must be used for authentication.
B. Dynamic WEP-104 encryption must be enabled.
C. WEP may not be used for encryption.
D. WPA-Personal must be supported for authentication and encryption.
E. WLAN controllers and APs must not support SSHv1.
Answer: C
Question #7 (Topic: Topic 1)
What type of WLAN attack is prevented with the use of a per-MPDU TKIP sequence
counter (TSC)?
counter (TSC)?
A. Weak-IV
B. Forgery
C. Replay
D. Bit-flipping
E. Session hijacking
Answer: C
Question #8 (Topic: Topic 1)
Given: You manage a wireless network that services 200 wireless users. Your facility
requires 20 access points, and you have installed an IEEE 802.11-compliant
implementation of 802.1X/LEAP with AES-CCMP as an authentication and encryption
solution.
In this configuration, the wireless network is initially susceptible to what type of attacks?
(Choose 2)
requires 20 access points, and you have installed an IEEE 802.11-compliant
implementation of 802.1X/LEAP with AES-CCMP as an authentication and encryption
solution.
In this configuration, the wireless network is initially susceptible to what type of attacks?
(Choose 2)
A. Encryption cracking
B. Offline dictionary attacks
C. Layer 3 peer-to-peer
D. Application eavesdropping
E. Session hijacking
F. Layer 1 DoS
Answer: B,F
Question #9 (Topic: Topic 1)
Which of the following security attacks cannot be detected by a WIPS solution of any kind?
(Choose 2)
(Choose 2)
A. Rogue APs
B. DoS
C. Eavesdropping
D. Social engineering
Answer: C,D
Question #10 (Topic: Topic 1)
Given: You are using a Wireless Aggregator utility to combine multiple packet captures.
One capture exists for each of channels 1, 6 and 11. What kind of troubleshooting are you
likely performing with such a tool?
One capture exists for each of channels 1, 6 and 11. What kind of troubleshooting are you
likely performing with such a tool?
A. Wireless adapter failure analysis.
B. Interference source location.
C. Fast secure roaming problems.
D. Narrowband DoS attack detection.
Answer: C