Valid CWSP (Wi-Fi Security) CWSP-205 Exam Questions

CWSP-205 CWSP® – Certified Wireless Security Professional exam is one of the top Wireless Networks Certifications. The CWSP certification is a professional level wireless LAN certification for the CWNP Program. Preparing for CWSP-205 exam for CWSP certification can measure your skills and knowledge with this professional-level certification and get on track toward ultimately earning your Certified Wireless Network Expert (CWNE) certification.

Valid CWSP-205 Exam Questions Offer Free Demo For Checking

1. 11 WLAN.

Before creating the WLAN security policy, what should you ensure you possess?

2. What policy would help mitigate the impact of peer-to-peer attacks against wireless-enabled corporate laptop computers when the laptops are also used on public access networks such as wireless hot-spots?

3. What is one advantage of using EAP-TTLS instead of EAP-TLS as an authentication mechanism in an 802.11 WLAN?

4. What wireless authentication technologies may build a TLS tunnel between the supplicant and the authentication server before passing client authentication credentials to the authentication server? (Choose 3)

5. While performing a manual scan of your environment using a spectrum analyzer on a laptop

computer, you notice a signal in the real time FFT view. The signal is characterized by having peak power centered on channel 11 with an approximate width of 20 MHz at its peak. The signal widens to approximately 40 MHz after it has weakened by about 30 dB.

What kind of signal is displayed in the spectrum analyzer?

6. You are using a protocol analyzer for random checks of activity on the WLAN. In the process, you notice two different EAP authentication processes. One process (STA1) used seven EAP frames (excluding ACK frames) before the 4-way handshake and the other (STA2) used 11 EAP frames (excluding ACK frames) before the 4-way handshake.

Which statement explains why the frame exchange from one STA required more frames than the frame exchange from another STA when both authentications were successful? (Choose the single most probable answer given a stable WLAN.)

7. Given: ABC Corporation’s 802.11 WLAN is comprised of a redundant WLAN controller pair (N+1) and 30 access points implemented in 2004. ABC implemented WEP encryption with IPSec VPN technology to secure their wireless communication because it was the strongest security solution available at the time it was implemented. IT management has decided to upgrade the WLAN infrastructure and implement Voice over Wi-Fi and is concerned with security because most Voice over Wi-Fi phones do not support IPSec.

As the wireless network administrator, what new security solution would be best for protecting ABC’s data?

8. Given: The ABC Corporation currently utilizes an enterprise Public Key Infrastructure (PKI) to allow employees to securely access network resources with smart cards. The new wireless network will use WPA2-Enterprise as its primary authentication solution. You have been asked to recommend a Wi-Fi Alliance-tested EAP method.

What solutions will require the least change in how users are currently authenticated and still integrate with their existing PKI?

9. What statement accurately describes the functionality of the IEEE 802.1X standard?

10. In the IEEE 802.11-2012 standard, what is the purpose of the 802.1X Uncontrolled Port?

11. Given: An 802.1X/EAP implementation includes an Active Directory domain controller running Windows Server 2012 and an AP from a major vendor. A Linux server is running RADIUS and it queries the domain controller for user credentials. A Windows client is accessing the network.

What device functions as the EAP Supplicant?

12. What wireless security protocol provides mutual authentication without using an X.509 certificate?

13. Given: ABC Company has 20 employees and only needs one access point to cover their entire facility. Ten of ABC Company’s employees have laptops with radio cards capable of only WPA security. The other ten employees have laptops with radio cards capable of WPA2 security. The network administrator wishes to secure all wireless communications (broadcast and unicast) for each laptop with its strongest supported security mechanism, but does not wish to implement a RADIUS/AAA server due to complexity.

What security implementation will allow the network administrator to achieve this goal?

14. 11 WLAN security solution?

15. Given: You are using WEP as an encryption solution. You are using VLANs for network segregation.

Why can you not establish an RSNA?

16. When used as part of a WLAN authentication solution, what is the role of LDAP?

17. When implementing a WPA2-Enterprise security solution, what protocol must the selected RADIUS server support?

18. Given: XYZ Company has recently installed an 802.11ac WLAN. The company needs the ability to control access to network services, such as file shares, intranet web servers, and Internet access based on an employee's job responsibilities.

What WLAN security solution meets this requirement?

19. Given: Your network includes a controller-based WLAN architecture with centralized data forwarding. The AP builds an encrypted tunnel to the WLAN controller. The WLAN controller is uplinked to the network via a trunked 1 Gbps Ethernet port supporting all necessary VLANs for management, control, and client traffic.

What processes can be used to force an authenticated WLAN client's data traffic into a specific VLAN as it exits the WLAN controller interface onto the wired uplink? (Choose 3)

20. What is the purpose of the Pairwise Transient Key (PTK) in IEEE 802.11 Authentication and Key Management?


 

Real CWNP CWS-100 Exam Dumps
CWNA-107 Certified Wireless Network Administrator (CWNA) practice exam questions

Add a Comment

Your email address will not be published. Required fields are marked *