Certbus > CWNP > CWSP > CWSP-206 > CWSP-206 Online Practice Questions and Answers

CWSP-206 Online Practice Questions and Answers

Questions 4

What WLAN client device behavior is exploited by an attacker during a hijacking attack?

A. After the initial association and 4-way handshake, client stations and access points do not need to perform another 4-way handshake, even if connectivity is lost.

B. Client drivers scan for and connect to access point in the 2.4 GHz band before scanning the 5 GHz band.

C. When the RF signal between a client and an access point is disrupted for more than a few seconds, the client device will attempt to associate to an access point with better signal quality.

D. When the RF signal between a client and an access point is lost, the client will not seek to reassociate with another access point until the 120 second hold down timer has expired.

E. As specified by the Wi-Fi Alliance, clients using Open System authentication must allow direct client-toclient connections, even in an infrastructure BSS.

Browse 60 Q&As
Questions 5

The Aircrack-ng WLAN software tool can capture and transmit modified 802.11 frames over the wireless network. It comes pre-installed on Kali Linux and some other Linux distributions. Which one of the following would not be a suitable penetration testing action taken with this tool?

A. Auditing the configuration and functionality of a WIPS by simulating common attack sequences.

B. Transmitting a deauthentication frame to disconnect a user from the AP.

C. Cracking the authentication or encryption processes implemented poorly in some WLANs.

D. Probing the RADIUS server and authenticator to expose the RADIUS shared secret.

Browse 60 Q&As
Questions 6

Which one of the following is not a role defined in the 802.1X authentication procedures used in 802.11 and 802.3 networks for port-based authentication?

A. AAA Server

B. Authentication Server

C. Supplicant

D. Authenticator

Browse 60 Q&As
Questions 7

What TKIP feature was introduced to counter the weak integrity check algorithm used in WEP?

A. RC5 stream cipher

B. Block cipher support

C. Sequence counters

D. 32-bit ICV (CRC-32)

E. Michael

Browse 60 Q&As
Questions 8

Your network implements an 802.1X/EAP-based wireless security solution. A WLAN controller is installed and manages seven APs. FreeRADIUS is used for the RADIUS server and is installed on a dedicated server named SRV21. One example client is a MacBook Pro with 8 GB RAM. What device functions as the 802.1X/EAP Authenticator?

A. WLAN Controller/AP

B. MacBook Pro

C. SRV21

D. RADIUS server

Browse 60 Q&As
Questions 9

In an IEEE 802.11-compliant WLAN, when is the 802.1X Controlled Port placed into the unblocked state?

A. After EAP authentication is successful

B. After Open System authentication

C. After the 4-Way Handshake

D. After any Group Handshake

Browse 60 Q&As
Questions 10

ABC Company is an Internet Service Provider with thousands of customers. ABC's customers are given login credentials for network access when they become a customer. ABC uses an LDAP server as the central user credential database. ABC is extending their service to existing customers in some public access areas and would like to use their existing database for authentication. How can ABC Company use their existing user database for wireless user authentication as they implement a large-scale WPA2Enterprise WLAN security solution?

A. Implement a RADIUS server and query user authentication requests through the LDAP server.

B. Mirror the LDAP server to a RADIUS database within a WLAN controller and perform daily backups to synchronize the user databases.

C. Import all users from the LDAP server into a RADIUS server with an LDAP-to-RADIUS conversion tool.

D. Implement an X.509 compliant Certificate Authority and enable SSL queries on the LDAP server.

Browse 60 Q&As
Questions 11

For which one of the following purposes would a WIPS not be a good solution?

A. Enforcing wireless network security policy.

B. Detecting and defending against eavesdropping attacks.

C. Performance monitoring and troubleshooting.

D. Security monitoring and notification.

Browse 60 Q&As
Exam Code: CWSP-206
Exam Name: CWSP Certified Wireless Security Professional
Last Update: Apr 14, 2024
Questions: 60 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99