New Year Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dm70dm

Note! The CWSP-206 Exam is no longer available. Get in touch with our Live Chat or email us for more information about the CWSP-207 Exam.

CWSP-206 CWSP Certified Wireless Security Professional Questions and Answers

Questions 4

During 802.1X/LEAP authentication, the username is passed across the wireless medium in clear text. From a security perspective, why is this significant?

Options:

A.

The username can be looked up in a dictionary file that lists common username/password combinations.

B.

The username is needed for Personal Access Credential (PAC) and X.509 certificate validation.

C.

4-Way Handshake nonces are based on the username in WPA and WPA2 authentication.

D.

The username is an input to the LEAPchallenge/response hash that is exploited, so the username must be known to conduct authentication cracking.

Buy Now
Questions 5

What software and hardware tools are used in the processperformed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?

Options:

A.

A low-gain patch antenna and terminal emulation software

B.

MAC spoofing software and MAC DoS software

C.

RF jamming device and a wireless radio card

D.

A wireless workgroup bridge and a protocol analyzer

Buy Now
Questions 6

When using a tunneled EAP type, such as PEAP, what component is protected inside the TLS tunnel so that it is not sent in clear text across the wireless medium?

Options:

A.

Server credentials

B.

User credentials

C.

RADIUS shared secret

D.

X.509 certificates

Buy Now
Questions 7

What preventative measures are performed by a WIPS against intrusions?

Options:

A.

Uses SNMP to disable the switch port to which rogue APs connect.

B.

Evil twin attack against a rogue AP.

C.

EAPoL Reject frame flood against a rogue AP.

D.

Deauthentication attack against a classified neighbor AP.

E.

ASLEAP attack against a rogue AP.

Buy Now
Questions 8

ABC Company has recently installed a WLAN controller and configured it to support WPA2-Enterprise security. The administrator has configured a security profile on the WLAN controller for each groupwithin the company (Marketing, Sales, and Engineering). How are authenticated users assigned to groups so that they receive the correct security profile within the WLAN controller?

Options:

A.

The RADIUS server sends the list of authenticated users and groups to the WLAN controller as part of a 4-Way Handshake prior to user authentication.

B.

The WLAN controller polls the RADIUS server for a complete list of authenticated users and groups after each user authentication.

C.

The RADIUS server sends a group name return list attribute to the WLAN controller during every successful user authentication.

D.

The RADIUS server forwards the request for a group attribute to an LDAP database service, and LDAP sends the group attribute to the WLAN controller.

Buy Now
Questions 9

You perform a protocol capture using Wireshark and a compatible 802.11 adapter in Linux. When viewing the capture, you see an auth req frame and an auth rsp frame. Then you see an assoc req frame and an assocrsp frame. Shortly after, you see DHCP communications and then ISAKMP protocol packets. What security solution is represented?

Options:

A.

802.1X/EAP-TTLS

B.

WPA2-Personal with AES-CCMP

C.

802.1X/PEAPv0/MS-CHAPv2

D.

EAP-MD5

E.

Open 802.11 authentication with IPSec

Buy Now
Exam Code: CWSP-206
Exam Name: CWSP Certified Wireless Security Professional
Last Update: Apr 15, 2024
Questions: 60
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 27 Dec 2024