{"id":116719,"date":"2025-12-30T07:33:25","date_gmt":"2025-12-30T07:33:25","guid":{"rendered":"https:\/\/www.dumpsbase.com\/freedumps\/?p=116719"},"modified":"2025-12-30T07:33:25","modified_gmt":"2025-12-30T07:33:25","slug":"cwnp-cwsp-208-dumps-v8-02-with-actual-exam-questions-pass-your-certified-wireless-security-professional-cwsp-certification-exam","status":"publish","type":"post","link":"https:\/\/www.dumpsbase.com\/freedumps\/cwnp-cwsp-208-dumps-v8-02-with-actual-exam-questions-pass-your-certified-wireless-security-professional-cwsp-certification-exam.html","title":{"rendered":"CWNP CWSP-208 Dumps (V8.02) with Actual Exam Questions &#8211; Pass Your Certified Wireless Security Professional (CWSP) Certification Exam"},"content":{"rendered":"<p>To earn your Certified Wireless Security Professional (CWSP) certification and perform <a href=\"https:\/\/www.dumpsbase.com\/cwnp.html\"><em><strong>WLAN<\/strong><\/em><\/a> security audits and compliance monitoring, you must pass the CWSP-208 exam, which was released in December of 2025. We offer trusted, valid CWSP-208 dumps (V8.02) to help you prepare. Our 119 practice questions and answers are based on actual exam skills and knowledge, giving you everything needed to pass the challenging CWSP-208 exam with flying colors. Download the CWSP-208 dumps (V8.02) from DumpsBase today and prepare with real questions from the Certified Wireless Security Professional (CWSP) exam.<\/p>\n<h2>Stat reading our <span style=\"background-color: #00ff00;\"><em>CWSP-208 free dumps below<\/em><\/span> to check the quality first:<\/h2>\n<script>\n\t  window.fbAsyncInit = function() {\n\t    FB.init({\n\t      appId            : '622169541470367',\n\t      autoLogAppEvents : true,\n\t      xfbml            : true,\n\t      version          : 'v3.1'\n\t    });\n\t  };\n\t\n\t  (function(d, s, id){\n\t     var js, fjs = d.getElementsByTagName(s)[0];\n\t     if (d.getElementById(id)) {return;}\n\t     js = d.createElement(s); js.id = id;\n\t     js.src = \"https:\/\/connect.facebook.net\/en_US\/sdk.js\";\n\t     fjs.parentNode.insertBefore(js, fjs);\n\t   }(document, 'script', 'facebook-jssdk'));\n\t<\/script><script type=\"text\/javascript\" >\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \nif(!window.jQuery) alert(\"The important jQuery library is not properly loaded in your site. Your WordPress theme is probably missing the essential wp_head() call. You can switch to another theme and you will see that the plugin works fine and this notice disappears. If you are still not sure what to do you can contact us for help.\");\n});\n<\/script>  \n  \n<div  id=\"watupro_quiz\" class=\"quiz-area single-page-quiz\">\n<p id=\"submittingExam10623\" style=\"display:none;text-align:center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\"><\/p>\n\n<div class=\"watupro-exam-description\" id=\"description-quiz-10623\"><\/div>\n\n<form action=\"\" method=\"post\" class=\"quiz-form\" id=\"quiz-10623\"  enctype=\"multipart\/form-data\" >\n<div class='watu-question ' id='question-1' style=';'><div id='questionWrap-1'  class='   watupro-question-id-420170'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>1. <\/span>Given: In a security penetration exercise, a WLAN consultant obtains the WEP key of XYZ Corporation\u2019s wireless network. Demonstrating the vulnerabilities of using WEP, the consultant uses a laptop running a software AP in an attempt to hijack the authorized user\u2019s connections. XYZ\u2019s legacy network is using 802.11n APs with 802.11b, 11g, and 11n client devices. <br \/>\r<br>With this setup, how can the consultant cause all of the authorized clients to establish Layer 2 connectivity with the software access point?<\/div><input type='hidden' name='question_id[]' id='qID_1' value='420170' \/><input type='hidden' id='answerType420170' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420170[]' id='answer-id-1627576' class='answer   answerof-420170 ' value='1627576'   \/><label for='answer-id-1627576' id='answer-label-1627576' class=' answer'><span>All WLAN clients will reassociate to the consultant\u2019s software AP if the consultant\u2019s software AP provides the same SSID on any channel with a 10 dB SNR improvement over the authorized A<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420170[]' id='answer-id-1627577' class='answer   answerof-420170 ' value='1627577'   \/><label for='answer-id-1627577' id='answer-label-1627577' class=' answer'><span>A higher SSID priority value configured in the Beacon frames of the consultant\u2019s software AP will take priority over the SSID in the authorized AP, causing the clients to reassociate.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420170[]' id='answer-id-1627578' class='answer   answerof-420170 ' value='1627578'   \/><label for='answer-id-1627578' id='answer-label-1627578' class=' answer'><span>When the RF signal between the clients and the authorized AP is temporarily disrupted and the consultant\u2019s software AP is using the same SSID on a different channel than the authorized AP, the clients will reassociate to the software A<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420170[]' id='answer-id-1627579' class='answer   answerof-420170 ' value='1627579'   \/><label for='answer-id-1627579' id='answer-label-1627579' class=' answer'><span>If the consultant\u2019s software AP broadcasts Beacon frames that advertise 802.11g data rates that are faster rates than XYZ\u2019s current 802.11b data rates, all WLAN clients will reassociate to the faster A<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-2' style=';'><div id='questionWrap-2'  class='   watupro-question-id-420171'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>2. <\/span>What is a primary criteria for a network to qualify as a Robust Security Network (RSN)?<\/div><input type='hidden' name='question_id[]' id='qID_2' value='420171' \/><input type='hidden' id='answerType420171' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420171[]' id='answer-id-1627580' class='answer   answerof-420171 ' value='1627580'   \/><label for='answer-id-1627580' id='answer-label-1627580' class=' answer'><span>Token cards must be used for authentication.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420171[]' id='answer-id-1627581' class='answer   answerof-420171 ' value='1627581'   \/><label for='answer-id-1627581' id='answer-label-1627581' class=' answer'><span>Dynamic WEP-104 encryption must be enabled.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420171[]' id='answer-id-1627582' class='answer   answerof-420171 ' value='1627582'   \/><label for='answer-id-1627582' id='answer-label-1627582' class=' answer'><span>WEP may not be used for encryption.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420171[]' id='answer-id-1627583' class='answer   answerof-420171 ' value='1627583'   \/><label for='answer-id-1627583' id='answer-label-1627583' class=' answer'><span>WPA-Personal must be supported for authentication and encryption.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420171[]' id='answer-id-1627584' class='answer   answerof-420171 ' value='1627584'   \/><label for='answer-id-1627584' id='answer-label-1627584' class=' answer'><span>WLAN controllers and APs must not support SSHv1.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-3' style=';'><div id='questionWrap-3'  class='   watupro-question-id-420172'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>3. <\/span>What WLAN client device behavior is exploited by an attacker during a hijacking attack?<\/div><input type='hidden' name='question_id[]' id='qID_3' value='420172' \/><input type='hidden' id='answerType420172' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420172[]' id='answer-id-1627585' class='answer   answerof-420172 ' value='1627585'   \/><label for='answer-id-1627585' id='answer-label-1627585' class=' answer'><span>When the RF signal between a client and an access point is disrupted for more than a few seconds, the client device will attempt to associate to an access point with better signal quality.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420172[]' id='answer-id-1627586' class='answer   answerof-420172 ' value='1627586'   \/><label for='answer-id-1627586' id='answer-label-1627586' class=' answer'><span>When the RF signal between a client and an access point is lost, the client will not seek to reassociate with another access point until the 120 second hold down timer has expired.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420172[]' id='answer-id-1627587' class='answer   answerof-420172 ' value='1627587'   \/><label for='answer-id-1627587' id='answer-label-1627587' class=' answer'><span>After the initial association and 4-way handshake, client stations and access points do not need to perform another 4-way handshake, even if connectivity is lost.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420172[]' id='answer-id-1627588' class='answer   answerof-420172 ' value='1627588'   \/><label for='answer-id-1627588' id='answer-label-1627588' class=' answer'><span>As specified by the Wi-Fi Alliance, clients using Open System authentication must allow direct client-to-client connections, even in an infrastructure BS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420172[]' id='answer-id-1627589' class='answer   answerof-420172 ' value='1627589'   \/><label for='answer-id-1627589' id='answer-label-1627589' class=' answer'><span>Client drivers scan for and connect to access points in the 2.4 GHz band before scanning the 5 GHz band.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-4' style=';'><div id='questionWrap-4'  class='   watupro-question-id-420173'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>4. <\/span>What type of WLAN attack is prevented with the use of a per-MPDU TKIP sequence counter (TSC)?<\/div><input type='hidden' name='question_id[]' id='qID_4' value='420173' \/><input type='hidden' id='answerType420173' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420173[]' id='answer-id-1627590' class='answer   answerof-420173 ' value='1627590'   \/><label for='answer-id-1627590' id='answer-label-1627590' class=' answer'><span>Weak-IV<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420173[]' id='answer-id-1627591' class='answer   answerof-420173 ' value='1627591'   \/><label for='answer-id-1627591' id='answer-label-1627591' class=' answer'><span>Forgery<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420173[]' id='answer-id-1627592' class='answer   answerof-420173 ' value='1627592'   \/><label for='answer-id-1627592' id='answer-label-1627592' class=' answer'><span>Replay<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420173[]' id='answer-id-1627593' class='answer   answerof-420173 ' value='1627593'   \/><label for='answer-id-1627593' id='answer-label-1627593' class=' answer'><span>Bit-flipping<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420173[]' id='answer-id-1627594' class='answer   answerof-420173 ' value='1627594'   \/><label for='answer-id-1627594' id='answer-label-1627594' class=' answer'><span>Session hijacking<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-5' style=';'><div id='questionWrap-5'  class='   watupro-question-id-420174'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>5. <\/span>Given: During 802.1X\/LEAP authentication, the username is passed across the wireless medium in clear text. <br \/>\r<br>From a security perspective, why is this significant?<\/div><input type='hidden' name='question_id[]' id='qID_5' value='420174' \/><input type='hidden' id='answerType420174' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420174[]' id='answer-id-1627595' class='answer   answerof-420174 ' value='1627595'   \/><label for='answer-id-1627595' id='answer-label-1627595' class=' answer'><span>The username is needed for Personal Access Credential (PAC) and<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420174[]' id='answer-id-1627596' class='answer   answerof-420174 ' value='1627596'   \/><label for='answer-id-1627596' id='answer-label-1627596' class=' answer'><span>509 certificate validation.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420174[]' id='answer-id-1627597' class='answer   answerof-420174 ' value='1627597'   \/><label for='answer-id-1627597' id='answer-label-1627597' class=' answer'><span>The username is an input to the LEAP challenge\/response hash that is exploited, so the username must be known to conduct authentication cracking.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420174[]' id='answer-id-1627598' class='answer   answerof-420174 ' value='1627598'   \/><label for='answer-id-1627598' id='answer-label-1627598' class=' answer'><span>4-Way Handshake nonces are based on the username in WPA and WPA2 authentication.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420174[]' id='answer-id-1627599' class='answer   answerof-420174 ' value='1627599'   \/><label for='answer-id-1627599' id='answer-label-1627599' class=' answer'><span>The username can be looked up in a dictionary file that lists common username\/password combinations.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-6' style=';'><div id='questionWrap-6'  class='   watupro-question-id-420175'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>6. <\/span>ABC Company uses the wireless network for highly sensitive network traffic. For that reason, they intend to protect their network in all possible ways. They are continually researching new network threats and new preventative measures. They are interested in the security benefits of 802.11w, but would like to know its limitations. <br \/>\r<br>What types of wireless attacks are protected by 802.11w? (Choose 2)<\/div><input type='hidden' name='question_id[]' id='qID_6' value='420175' \/><input type='hidden' id='answerType420175' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420175[]' id='answer-id-1627600' class='answer   answerof-420175 ' value='1627600'   \/><label for='answer-id-1627600' id='answer-label-1627600' class=' answer'><span>RF DoS attacks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420175[]' id='answer-id-1627601' class='answer   answerof-420175 ' value='1627601'   \/><label for='answer-id-1627601' id='answer-label-1627601' class=' answer'><span>Layer 2 Disassociation attacks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420175[]' id='answer-id-1627602' class='answer   answerof-420175 ' value='1627602'   \/><label for='answer-id-1627602' id='answer-label-1627602' class=' answer'><span>Robust management frame replay attacks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420175[]' id='answer-id-1627603' class='answer   answerof-420175 ' value='1627603'   \/><label for='answer-id-1627603' id='answer-label-1627603' class=' answer'><span>Social engineering attacks<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-7' style=';'><div id='questionWrap-7'  class='   watupro-question-id-420176'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>7. <\/span>What statement accurately describes the functionality of the IEEE 802.1X standard?<\/div><input type='hidden' name='question_id[]' id='qID_7' value='420176' \/><input type='hidden' id='answerType420176' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420176[]' id='answer-id-1627604' class='answer   answerof-420176 ' value='1627604'   \/><label for='answer-id-1627604' id='answer-label-1627604' class=' answer'><span>Port-based access control with EAP encapsulation over the LAN (EAPoL)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420176[]' id='answer-id-1627605' class='answer   answerof-420176 ' value='1627605'   \/><label for='answer-id-1627605' id='answer-label-1627605' class=' answer'><span>Port-based access control with dynamic encryption key management and distribution<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420176[]' id='answer-id-1627606' class='answer   answerof-420176 ' value='1627606'   \/><label for='answer-id-1627606' id='answer-label-1627606' class=' answer'><span>Port-based access control with support for authenticated-user VLANs only<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420176[]' id='answer-id-1627607' class='answer   answerof-420176 ' value='1627607'   \/><label for='answer-id-1627607' id='answer-label-1627607' class=' answer'><span>Port-based access control with mandatory support of AES-CCMP encryption<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420176[]' id='answer-id-1627608' class='answer   answerof-420176 ' value='1627608'   \/><label for='answer-id-1627608' id='answer-label-1627608' class=' answer'><span>Port-based access control, which allows three frame types to traverse the uncontrolled port: EAP, DHCP, and DN<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-8' style=';'><div id='questionWrap-8'  class='   watupro-question-id-420177'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>8. <\/span>What 802.11 WLAN security problem is directly addressed by mutual authentication?<\/div><input type='hidden' name='question_id[]' id='qID_8' value='420177' \/><input type='hidden' id='answerType420177' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420177[]' id='answer-id-1627609' class='answer   answerof-420177 ' value='1627609'   \/><label for='answer-id-1627609' id='answer-label-1627609' class=' answer'><span>Wireless hijacking attacks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420177[]' id='answer-id-1627610' class='answer   answerof-420177 ' value='1627610'   \/><label for='answer-id-1627610' id='answer-label-1627610' class=' answer'><span>Weak password policies<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420177[]' id='answer-id-1627611' class='answer   answerof-420177 ' value='1627611'   \/><label for='answer-id-1627611' id='answer-label-1627611' class=' answer'><span>MAC spoofing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420177[]' id='answer-id-1627612' class='answer   answerof-420177 ' value='1627612'   \/><label for='answer-id-1627612' id='answer-label-1627612' class=' answer'><span>Disassociation attacks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420177[]' id='answer-id-1627613' class='answer   answerof-420177 ' value='1627613'   \/><label for='answer-id-1627613' id='answer-label-1627613' class=' answer'><span>Offline dictionary attacks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420177[]' id='answer-id-1627614' class='answer   answerof-420177 ' value='1627614'   \/><label for='answer-id-1627614' id='answer-label-1627614' class=' answer'><span>Weak Initialization Vectors<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-9' style=';'><div id='questionWrap-9'  class='   watupro-question-id-420178'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>9. <\/span>Given: The Aircrack-ng WLAN software tool can capture and transmit modified 802.11 frames over the wireless network. It comes pre-installed on Kali Linux and some other Linux distributions. <br \/>\r<br>What are three uses for such a tool? (Choose 3)<\/div><input type='hidden' name='question_id[]' id='qID_9' value='420178' \/><input type='hidden' id='answerType420178' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420178[]' id='answer-id-1627615' class='answer   answerof-420178 ' value='1627615'   \/><label for='answer-id-1627615' id='answer-label-1627615' class=' answer'><span>Transmitting a deauthentication frame to disconnect a user from the A<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420178[]' id='answer-id-1627616' class='answer   answerof-420178 ' value='1627616'   \/><label for='answer-id-1627616' id='answer-label-1627616' class=' answer'><span>Auditing the configuration and functionality of a WIPS by simulating common attack sequences<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420178[]' id='answer-id-1627617' class='answer   answerof-420178 ' value='1627617'   \/><label for='answer-id-1627617' id='answer-label-1627617' class=' answer'><span>Probing the RADIUS server and authenticator to expose the RADIUS shared secret<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420178[]' id='answer-id-1627618' class='answer   answerof-420178 ' value='1627618'   \/><label for='answer-id-1627618' id='answer-label-1627618' class=' answer'><span>Cracking the authentication or encryption processes implemented poorly in some WLANs<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-10' style=';'><div id='questionWrap-10'  class='   watupro-question-id-420179'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>10. <\/span>Given: You manage a wireless network that services 200 wireless users. Your facility requires 20 access points, and you have installed an IEEE 802.11-compliant implementation of 802.1X\/LEAP with AES-CCMP as an authentication and encryption solution. <br \/>\r<br>In this configuration, the wireless network is initially susceptible to what type of attacks? (Choose 2)<\/div><input type='hidden' name='question_id[]' id='qID_10' value='420179' \/><input type='hidden' id='answerType420179' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420179[]' id='answer-id-1627619' class='answer   answerof-420179 ' value='1627619'   \/><label for='answer-id-1627619' id='answer-label-1627619' class=' answer'><span>Encryption cracking<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420179[]' id='answer-id-1627620' class='answer   answerof-420179 ' value='1627620'   \/><label for='answer-id-1627620' id='answer-label-1627620' class=' answer'><span>Offline dictionary attacks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420179[]' id='answer-id-1627621' class='answer   answerof-420179 ' value='1627621'   \/><label for='answer-id-1627621' id='answer-label-1627621' class=' answer'><span>Layer 3 peer-to-peer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420179[]' id='answer-id-1627622' class='answer   answerof-420179 ' value='1627622'   \/><label for='answer-id-1627622' id='answer-label-1627622' class=' answer'><span>Application eavesdropping<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420179[]' id='answer-id-1627623' class='answer   answerof-420179 ' value='1627623'   \/><label for='answer-id-1627623' id='answer-label-1627623' class=' answer'><span>Session hijacking<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420179[]' id='answer-id-1627624' class='answer   answerof-420179 ' value='1627624'   \/><label for='answer-id-1627624' id='answer-label-1627624' class=' answer'><span>Layer 1 DoS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-11' style=';'><div id='questionWrap-11'  class='   watupro-question-id-420180'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>11. <\/span>Given: The ABC Corporation currently utilizes an enterprise Public Key Infrastructure (PKI) to allow employees to securely access network resources with smart cards. The new wireless network will use WPA2-Enterprise as its primary authentication solution. You have been asked to recommend a Wi-Fi Alliance-tested EAP method. <br \/>\r<br>What solutions will require the least change in how users are currently authenticated and still integrate with their existing PKI?<\/div><input type='hidden' name='question_id[]' id='qID_11' value='420180' \/><input type='hidden' id='answerType420180' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420180[]' id='answer-id-1627625' class='answer   answerof-420180 ' value='1627625'   \/><label for='answer-id-1627625' id='answer-label-1627625' class=' answer'><span>EAP-FAST<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420180[]' id='answer-id-1627626' class='answer   answerof-420180 ' value='1627626'   \/><label for='answer-id-1627626' id='answer-label-1627626' class=' answer'><span>EAP-TLS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420180[]' id='answer-id-1627627' class='answer   answerof-420180 ' value='1627627'   \/><label for='answer-id-1627627' id='answer-label-1627627' class=' answer'><span>PEAPv0\/EAP-MSCHAPv2<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420180[]' id='answer-id-1627628' class='answer   answerof-420180 ' value='1627628'   \/><label for='answer-id-1627628' id='answer-label-1627628' class=' answer'><span>LEAP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420180[]' id='answer-id-1627629' class='answer   answerof-420180 ' value='1627629'   \/><label for='answer-id-1627629' id='answer-label-1627629' class=' answer'><span>PEAPv0\/EAP-TLS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420180[]' id='answer-id-1627630' class='answer   answerof-420180 ' value='1627630'   \/><label for='answer-id-1627630' id='answer-label-1627630' class=' answer'><span>EAP-TTLS\/MSCHAPv2<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-12' style=';'><div id='questionWrap-12'  class='   watupro-question-id-420181'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>12. <\/span>What is one advantage of using EAP-TTLS instead of EAP-TLS as an authentication mechanism in an 802.11 WLAN?<\/div><input type='hidden' name='question_id[]' id='qID_12' value='420181' \/><input type='hidden' id='answerType420181' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420181[]' id='answer-id-1627631' class='answer   answerof-420181 ' value='1627631'   \/><label for='answer-id-1627631' id='answer-label-1627631' class=' answer'><span>EAP-TTLS sends encrypted supplicant credentials to the authentication server, but EAP-TLS uses unencrypted user credentials.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420181[]' id='answer-id-1627632' class='answer   answerof-420181 ' value='1627632'   \/><label for='answer-id-1627632' id='answer-label-1627632' class=' answer'><span>EAP-TTLS supports client certificates, but EAP-TLS does not.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420181[]' id='answer-id-1627633' class='answer   answerof-420181 ' value='1627633'   \/><label for='answer-id-1627633' id='answer-label-1627633' class=' answer'><span>EAP-TTLS does not require an authentication server, but EAP-TLS does.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420181[]' id='answer-id-1627634' class='answer   answerof-420181 ' value='1627634'   \/><label for='answer-id-1627634' id='answer-label-1627634' class=' answer'><span>EAP-TTLS does not require the use of a certificate for each STA as authentication credentials, but EAP-TLS does.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-13' style=';'><div id='questionWrap-13'  class='   watupro-question-id-420182'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>13. <\/span>You are using a protocol analyzer for random checks of activity on the WLAN. In the process, you notice two different EAP authentication processes. One process (STA1) used seven EAP frames (excluding ACK frames) before the 4-way handshake and the other (STA2) used 11 EAP frames (excluding ACK frames) before the 4-way handshake. <br \/>\r<br>Which statement explains why the frame exchange from one STA required more frames than the frame exchange from another STA when both authentications were successful? (Choose the single most probable answer given a stable WLAN.)<\/div><input type='hidden' name='question_id[]' id='qID_13' value='420182' \/><input type='hidden' id='answerType420182' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420182[]' id='answer-id-1627635' class='answer   answerof-420182 ' value='1627635'   \/><label for='answer-id-1627635' id='answer-label-1627635' class=' answer'><span>STA1 and STA2 are using different cipher suites.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420182[]' id='answer-id-1627636' class='answer   answerof-420182 ' value='1627636'   \/><label for='answer-id-1627636' id='answer-label-1627636' class=' answer'><span>STA2 has retransmissions of EAP frames.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420182[]' id='answer-id-1627637' class='answer   answerof-420182 ' value='1627637'   \/><label for='answer-id-1627637' id='answer-label-1627637' class=' answer'><span>STA1 is a reassociation and STA2 is an initial association.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420182[]' id='answer-id-1627638' class='answer   answerof-420182 ' value='1627638'   \/><label for='answer-id-1627638' id='answer-label-1627638' class=' answer'><span>STA1 is a TSN, and STA2 is an RS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420182[]' id='answer-id-1627639' class='answer   answerof-420182 ' value='1627639'   \/><label for='answer-id-1627639' id='answer-label-1627639' class=' answer'><span>STA1 and STA2 are using different EAP types.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-14' style=';'><div id='questionWrap-14'  class='   watupro-question-id-420183'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>14. <\/span>In the IEEE 802.11-2012 standard, what is the purpose of the 802.1X Uncontrolled Port?<\/div><input type='hidden' name='question_id[]' id='qID_14' value='420183' \/><input type='hidden' id='answerType420183' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420183[]' id='answer-id-1627640' class='answer   answerof-420183 ' value='1627640'   \/><label for='answer-id-1627640' id='answer-label-1627640' class=' answer'><span>To allow only authentication frames to flow between the Supplicant and Authentication Server<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420183[]' id='answer-id-1627641' class='answer   answerof-420183 ' value='1627641'   \/><label for='answer-id-1627641' id='answer-label-1627641' class=' answer'><span>To block authentication traffic until the 4-Way Handshake completes<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420183[]' id='answer-id-1627642' class='answer   answerof-420183 ' value='1627642'   \/><label for='answer-id-1627642' id='answer-label-1627642' class=' answer'><span>To pass general data traffic after the completion of 802.11 authentication and key management<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420183[]' id='answer-id-1627643' class='answer   answerof-420183 ' value='1627643'   \/><label for='answer-id-1627643' id='answer-label-1627643' class=' answer'><span>To block unencrypted user traffic after a 4-Way Handshake completes<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-15' style=';'><div id='questionWrap-15'  class='   watupro-question-id-420184'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>15. <\/span>What disadvantage does EAP-TLS have when compared with PEAPv0 EAP\/MSCHAPv2 as an 802.11 WLAN security solution?<\/div><input type='hidden' name='question_id[]' id='qID_15' value='420184' \/><input type='hidden' id='answerType420184' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420184[]' id='answer-id-1627644' class='answer   answerof-420184 ' value='1627644'   \/><label for='answer-id-1627644' id='answer-label-1627644' class=' answer'><span>Fast\/secure roaming in an 802.11 RSN is significantly longer when EAP-TLS is in use.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420184[]' id='answer-id-1627645' class='answer   answerof-420184 ' value='1627645'   \/><label for='answer-id-1627645' id='answer-label-1627645' class=' answer'><span>EAP-TLS does not protect the client's username and password inside an encrypted tunnel.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420184[]' id='answer-id-1627646' class='answer   answerof-420184 ' value='1627646'   \/><label for='answer-id-1627646' id='answer-label-1627646' class=' answer'><span>EAP-TLS cannot establish a secure tunnel for internal EAP authentication.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420184[]' id='answer-id-1627647' class='answer   answerof-420184 ' value='1627647'   \/><label for='answer-id-1627647' id='answer-label-1627647' class=' answer'><span>EAP-TLS is supported only by Cisco wireless infrastructure and client devices.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420184[]' id='answer-id-1627648' class='answer   answerof-420184 ' value='1627648'   \/><label for='answer-id-1627648' id='answer-label-1627648' class=' answer'><span>EAP-TLS requires extensive PKI use to create<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420184[]' id='answer-id-1627649' class='answer   answerof-420184 ' value='1627649'   \/><label for='answer-id-1627649' id='answer-label-1627649' class=' answer'><span>509 certificates for both the server and all clients, which increases administrative overhead.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-16' style=';'><div id='questionWrap-16'  class='   watupro-question-id-420185'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>16. <\/span>What wireless security protocol provides mutual authentication without using an X.509 certificate?<\/div><input type='hidden' name='question_id[]' id='qID_16' value='420185' \/><input type='hidden' id='answerType420185' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420185[]' id='answer-id-1627650' class='answer   answerof-420185 ' value='1627650'   \/><label for='answer-id-1627650' id='answer-label-1627650' class=' answer'><span>EAP-FAST<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420185[]' id='answer-id-1627651' class='answer   answerof-420185 ' value='1627651'   \/><label for='answer-id-1627651' id='answer-label-1627651' class=' answer'><span>EAP-MD5<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420185[]' id='answer-id-1627652' class='answer   answerof-420185 ' value='1627652'   \/><label for='answer-id-1627652' id='answer-label-1627652' class=' answer'><span>EAP-TLS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420185[]' id='answer-id-1627653' class='answer   answerof-420185 ' value='1627653'   \/><label for='answer-id-1627653' id='answer-label-1627653' class=' answer'><span>PEAPv0\/EAP-MSCHAPv2<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420185[]' id='answer-id-1627654' class='answer   answerof-420185 ' value='1627654'   \/><label for='answer-id-1627654' id='answer-label-1627654' class=' answer'><span>EAP-TTLS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420185[]' id='answer-id-1627655' class='answer   answerof-420185 ' value='1627655'   \/><label for='answer-id-1627655' id='answer-label-1627655' class=' answer'><span>PEAPv1\/EAP-GTC<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-17' style=';'><div id='questionWrap-17'  class='   watupro-question-id-420186'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>17. <\/span>When implementing a WPA2-Enterprise security solution, what protocol must the selected RADIUS server support?<\/div><input type='hidden' name='question_id[]' id='qID_17' value='420186' \/><input type='hidden' id='answerType420186' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420186[]' id='answer-id-1627656' class='answer   answerof-420186 ' value='1627656'   \/><label for='answer-id-1627656' id='answer-label-1627656' class=' answer'><span>LWAPP, GRE, or CAPWAP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420186[]' id='answer-id-1627657' class='answer   answerof-420186 ' value='1627657'   \/><label for='answer-id-1627657' id='answer-label-1627657' class=' answer'><span>IPSec\/ESP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420186[]' id='answer-id-1627658' class='answer   answerof-420186 ' value='1627658'   \/><label for='answer-id-1627658' id='answer-label-1627658' class=' answer'><span>EAP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420186[]' id='answer-id-1627659' class='answer   answerof-420186 ' value='1627659'   \/><label for='answer-id-1627659' id='answer-label-1627659' class=' answer'><span>CCMP and TKIP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420186[]' id='answer-id-1627660' class='answer   answerof-420186 ' value='1627660'   \/><label for='answer-id-1627660' id='answer-label-1627660' class=' answer'><span>LDAP<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-18' style=';'><div id='questionWrap-18'  class='   watupro-question-id-420187'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>18. <\/span>What elements should be addressed by a WLAN security policy? (Choose 2)<\/div><input type='hidden' name='question_id[]' id='qID_18' value='420187' \/><input type='hidden' id='answerType420187' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420187[]' id='answer-id-1627661' class='answer   answerof-420187 ' value='1627661'   \/><label for='answer-id-1627661' id='answer-label-1627661' class=' answer'><span>Enabling encryption to prevent MAC addresses from being sent in clear text<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420187[]' id='answer-id-1627662' class='answer   answerof-420187 ' value='1627662'   \/><label for='answer-id-1627662' id='answer-label-1627662' class=' answer'><span>How to prevent non-IT employees from learning about and reading the user security policy<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420187[]' id='answer-id-1627663' class='answer   answerof-420187 ' value='1627663'   \/><label for='answer-id-1627663' id='answer-label-1627663' class=' answer'><span>End-user training for password selection and acceptable network use<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420187[]' id='answer-id-1627664' class='answer   answerof-420187 ' value='1627664'   \/><label for='answer-id-1627664' id='answer-label-1627664' class=' answer'><span>The exact passwords to be used for administration interfaces on infrastructure devices<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420187[]' id='answer-id-1627665' class='answer   answerof-420187 ' value='1627665'   \/><label for='answer-id-1627665' id='answer-label-1627665' class=' answer'><span>Social engineering recognition and mitigation techniques<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-19' style=';'><div id='questionWrap-19'  class='   watupro-question-id-420188'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>19. <\/span>Given: ABC Company has 20 employees and only needs one access point to cover their entire facility. Ten of ABC Company\u2019s employees have laptops with radio cards capable of only WPA security. The other ten employees have laptops with radio cards capable of WPA2 security. The network administrator wishes to secure all wireless communications (broadcast and unicast) for each laptop with its strongest supported security mechanism, but does not wish to implement a RADIUS\/AAA server due to complexity. <br \/>\r<br>What security implementation will allow the network administrator to achieve this goal?<\/div><input type='hidden' name='question_id[]' id='qID_19' value='420188' \/><input type='hidden' id='answerType420188' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420188[]' id='answer-id-1627666' class='answer   answerof-420188 ' value='1627666'   \/><label for='answer-id-1627666' id='answer-label-1627666' class=' answer'><span>Implement an SSID with WPA2-Personal that allows both AES-CCMP and TKIP clients to connect.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420188[]' id='answer-id-1627667' class='answer   answerof-420188 ' value='1627667'   \/><label for='answer-id-1627667' id='answer-label-1627667' class=' answer'><span>Implement an SSID with WPA-Personal that allows both AES-CCMP and TKIP clients to connect.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420188[]' id='answer-id-1627668' class='answer   answerof-420188 ' value='1627668'   \/><label for='answer-id-1627668' id='answer-label-1627668' class=' answer'><span>Implement two separate SSIDs on the AP\u2015one for WPA-Personal using TKIP and one for WPA2-Personal using AES-CCM<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420188[]' id='answer-id-1627669' class='answer   answerof-420188 ' value='1627669'   \/><label for='answer-id-1627669' id='answer-label-1627669' class=' answer'><span>Implement an SSID with WPA2-Personal that sends all broadcast traffic using AES-CCMP and unicast traffic using either TKIP or AES-CCM<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-20' style=';'><div id='questionWrap-20'  class='   watupro-question-id-420189'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>20. <\/span>As the primary security engineer for a large corporate network, you have been asked to author a new security policy for the wireless network. While most client devices support 802.1X authentication, some legacy devices still only support passphrase\/PSK-based security methods. <br \/>\r<br>When writing the 802.11 security policy, what password-related items should be addressed?<\/div><input type='hidden' name='question_id[]' id='qID_20' value='420189' \/><input type='hidden' id='answerType420189' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420189[]' id='answer-id-1627670' class='answer   answerof-420189 ' value='1627670'   \/><label for='answer-id-1627670' id='answer-label-1627670' class=' answer'><span>MSCHAPv2 passwords used with EAP\/PEAPv0 should be stronger than typical WPA2-PSK passphrases.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420189[]' id='answer-id-1627671' class='answer   answerof-420189 ' value='1627671'   \/><label for='answer-id-1627671' id='answer-label-1627671' class=' answer'><span>Password complexity should be maximized so that weak WEP IV attacks are prevented.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420189[]' id='answer-id-1627672' class='answer   answerof-420189 ' value='1627672'   \/><label for='answer-id-1627672' id='answer-label-1627672' class=' answer'><span>Static passwords should be changed on a regular basis to minimize the vulnerabilities of a PSK-based authentication.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420189[]' id='answer-id-1627673' class='answer   answerof-420189 ' value='1627673'   \/><label for='answer-id-1627673' id='answer-label-1627673' class=' answer'><span>Certificates should always be recommended instead of passwords for 802.11 client authentication.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420189[]' id='answer-id-1627674' class='answer   answerof-420189 ' value='1627674'   \/><label for='answer-id-1627674' id='answer-label-1627674' class=' answer'><span>EAP-TLS must be implemented in such scenarios.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-21' style=';'><div id='questionWrap-21'  class='   watupro-question-id-420190'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>21. <\/span>1.Given: John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website. The bank\u2019s website uses the HTTPS protocol to protect sensitive account information. While John was using the hot-spot, a hacker was able to obtain John\u2019s bank account user ID and password and exploit this information. <br \/>\r<br>What likely scenario could have allowed the hacker to obtain John\u2019s bank account user ID and password?<\/div><input type='hidden' name='question_id[]' id='qID_21' value='420190' \/><input type='hidden' id='answerType420190' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420190[]' id='answer-id-1627675' class='answer   answerof-420190 ' value='1627675'   \/><label for='answer-id-1627675' id='answer-label-1627675' class=' answer'><span>John's bank is using an expired<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420190[]' id='answer-id-1627676' class='answer   answerof-420190 ' value='1627676'   \/><label for='answer-id-1627676' id='answer-label-1627676' class=' answer'><span>509 certificate on their web server. The certificate is on John's Certificate Revocation List (CRL), causing the user ID and password to be sent unencrypted.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420190[]' id='answer-id-1627677' class='answer   answerof-420190 ' value='1627677'   \/><label for='answer-id-1627677' id='answer-label-1627677' class=' answer'><span>John uses the same username and password for banking that he does for email. John used a POP3 email client at the wireless hot-spot to check his email, and the user ID and password were not encrypted.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420190[]' id='answer-id-1627678' class='answer   answerof-420190 ' value='1627678'   \/><label for='answer-id-1627678' id='answer-label-1627678' class=' answer'><span>John accessed his corporate network with his IPSec VPN software at the wireless hot-spot. An IPSec VPN only encrypts data, so the user ID and password were sent in clear text. John uses the same username and password for banking that he does for his IPSec VPN software.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420190[]' id='answer-id-1627679' class='answer   answerof-420190 ' value='1627679'   \/><label for='answer-id-1627679' id='answer-label-1627679' class=' answer'><span>The bank\u2019s web server is using an<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420190[]' id='answer-id-1627680' class='answer   answerof-420190 ' value='1627680'   \/><label for='answer-id-1627680' id='answer-label-1627680' class=' answer'><span>509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420190[]' id='answer-id-1627681' class='answer   answerof-420190 ' value='1627681'   \/><label for='answer-id-1627681' id='answer-label-1627681' class=' answer'><span>Before connecting to the bank\u2019s website, John\u2019s association to the AP was hijacked. The attacker intercepted the HTTPS public encryption key from the bank\u2019s web server and has decrypted John\u2019s login credentials in near real-time.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-22' style=';'><div id='questionWrap-22'  class='   watupro-question-id-420191'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>22. <\/span>Which of the following security attacks cannot be detected by a WIPS solution of any kind? (Choose 2)<\/div><input type='hidden' name='question_id[]' id='qID_22' value='420191' \/><input type='hidden' id='answerType420191' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420191[]' id='answer-id-1627682' class='answer   answerof-420191 ' value='1627682'   \/><label for='answer-id-1627682' id='answer-label-1627682' class=' answer'><span>Rogue APs<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420191[]' id='answer-id-1627683' class='answer   answerof-420191 ' value='1627683'   \/><label for='answer-id-1627683' id='answer-label-1627683' class=' answer'><span>DoS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420191[]' id='answer-id-1627684' class='answer   answerof-420191 ' value='1627684'   \/><label for='answer-id-1627684' id='answer-label-1627684' class=' answer'><span>Eavesdropping<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420191[]' id='answer-id-1627685' class='answer   answerof-420191 ' value='1627685'   \/><label for='answer-id-1627685' id='answer-label-1627685' class=' answer'><span>Social engineering<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-23' style=';'><div id='questionWrap-23'  class='   watupro-question-id-420192'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>23. <\/span>In order to acquire credentials of a valid user on a public hot-spot network, what attacks may be conducted? Choose the single completely correct answer.<\/div><input type='hidden' name='question_id[]' id='qID_23' value='420192' \/><input type='hidden' id='answerType420192' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420192[]' id='answer-id-1627686' class='answer   answerof-420192 ' value='1627686'   \/><label for='answer-id-1627686' id='answer-label-1627686' class=' answer'><span>Social engineering and\/or eavesdropping<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420192[]' id='answer-id-1627687' class='answer   answerof-420192 ' value='1627687'   \/><label for='answer-id-1627687' id='answer-label-1627687' class=' answer'><span>RF DoS and\/or physical theft<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420192[]' id='answer-id-1627688' class='answer   answerof-420192 ' value='1627688'   \/><label for='answer-id-1627688' id='answer-label-1627688' class=' answer'><span>MAC denial of service and\/or physical theft<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420192[]' id='answer-id-1627689' class='answer   answerof-420192 ' value='1627689'   \/><label for='answer-id-1627689' id='answer-label-1627689' class=' answer'><span>Authentication cracking and\/or RF DoS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420192[]' id='answer-id-1627690' class='answer   answerof-420192 ' value='1627690'   \/><label for='answer-id-1627690' id='answer-label-1627690' class=' answer'><span>Code injection and\/or XSS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-24' style=';'><div id='questionWrap-24'  class='   watupro-question-id-420193'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>24. <\/span>What policy would help mitigate the impact of peer-to-peer attacks against wireless-enabled corporate laptop computers when the laptops are also used on public access networks such as wireless hot-spots?<\/div><input type='hidden' name='question_id[]' id='qID_24' value='420193' \/><input type='hidden' id='answerType420193' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420193[]' id='answer-id-1627691' class='answer   answerof-420193 ' value='1627691'   \/><label for='answer-id-1627691' id='answer-label-1627691' class=' answer'><span>Require Port Address Translation (PAT) on each laptop.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420193[]' id='answer-id-1627692' class='answer   answerof-420193 ' value='1627692'   \/><label for='answer-id-1627692' id='answer-label-1627692' class=' answer'><span>Require secure applications such as POP, HTTP, and SS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420193[]' id='answer-id-1627693' class='answer   answerof-420193 ' value='1627693'   \/><label for='answer-id-1627693' id='answer-label-1627693' class=' answer'><span>Require VPN software for connectivity to the corporate network.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420193[]' id='answer-id-1627694' class='answer   answerof-420193 ' value='1627694'   \/><label for='answer-id-1627694' id='answer-label-1627694' class=' answer'><span>Require WPA2-Enterprise as the minimal WLAN security solution.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-25' style=';'><div id='questionWrap-25'  class='   watupro-question-id-420194'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>25. <\/span>You are configuring seven APs to prevent common security attacks. The APs are to be installed in a <br \/>\r<br>small business and to reduce costs, the company decided to install all consumer-grade wireless routers. The wireless routers will connect to a switch, which connects directly to the Internet connection providing 50 Mbps of Internet bandwidth that will be shared among 53 wireless clients and 17 wired clients. <br \/>\r<br>To ensure the wireless network is as secure as possible from common attacks, what security measure can you implement given only the hardware referenced?<\/div><input type='hidden' name='question_id[]' id='qID_25' value='420194' \/><input type='hidden' id='answerType420194' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420194[]' id='answer-id-1627695' class='answer   answerof-420194 ' value='1627695'   \/><label for='answer-id-1627695' id='answer-label-1627695' class=' answer'><span>WPA-Enterprise<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420194[]' id='answer-id-1627696' class='answer   answerof-420194 ' value='1627696'   \/><label for='answer-id-1627696' id='answer-label-1627696' class=' answer'><span>802.1X\/EAP-PEAP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420194[]' id='answer-id-1627697' class='answer   answerof-420194 ' value='1627697'   \/><label for='answer-id-1627697' id='answer-label-1627697' class=' answer'><span>WPA2-Enterprise<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420194[]' id='answer-id-1627698' class='answer   answerof-420194 ' value='1627698'   \/><label for='answer-id-1627698' id='answer-label-1627698' class=' answer'><span>WPA2-Personal<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-26' style=';'><div id='questionWrap-26'  class='   watupro-question-id-420195'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>26. <\/span>Given: One of the security risks introduced by WPA2-Personal is an attack conducted by an authorized network user who knows the passphrase. In order to decrypt other users\u2019 traffic, the attacker must obtain certain information from the 4-way handshake of the other users. <br \/>\r<br>In addition to knowing the Pairwise Master Key (PMK) and the supplicant\u2019s address (SA), what other three inputs must be collected with a protocol analyzer to recreate encryption keys? (Choose 3)<\/div><input type='hidden' name='question_id[]' id='qID_26' value='420195' \/><input type='hidden' id='answerType420195' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420195[]' id='answer-id-1627699' class='answer   answerof-420195 ' value='1627699'   \/><label for='answer-id-1627699' id='answer-label-1627699' class=' answer'><span>Authenticator nonce<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420195[]' id='answer-id-1627700' class='answer   answerof-420195 ' value='1627700'   \/><label for='answer-id-1627700' id='answer-label-1627700' class=' answer'><span>Supplicant nonce<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420195[]' id='answer-id-1627701' class='answer   answerof-420195 ' value='1627701'   \/><label for='answer-id-1627701' id='answer-label-1627701' class=' answer'><span>Authenticator address (BSSID)<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420195[]' id='answer-id-1627702' class='answer   answerof-420195 ' value='1627702'   \/><label for='answer-id-1627702' id='answer-label-1627702' class=' answer'><span>GTKSA<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420195[]' id='answer-id-1627703' class='answer   answerof-420195 ' value='1627703'   \/><label for='answer-id-1627703' id='answer-label-1627703' class=' answer'><span>Authentication Server nonce<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-27' style=';'><div id='questionWrap-27'  class='   watupro-question-id-420196'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>27. <\/span>Given: ABC Hospital wishes to create a strong security policy as a first step in securing their 802.11 WLAN. <br \/>\r<br>Before creating the WLAN security policy, what should you ensure you possess?<\/div><input type='hidden' name='question_id[]' id='qID_27' value='420196' \/><input type='hidden' id='answerType420196' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420196[]' id='answer-id-1627704' class='answer   answerof-420196 ' value='1627704'   \/><label for='answer-id-1627704' id='answer-label-1627704' class=' answer'><span>Awareness of the exact vendor devices being installed<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420196[]' id='answer-id-1627705' class='answer   answerof-420196 ' value='1627705'   \/><label for='answer-id-1627705' id='answer-label-1627705' class=' answer'><span>Management support for the process<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420196[]' id='answer-id-1627706' class='answer   answerof-420196 ' value='1627706'   \/><label for='answer-id-1627706' id='answer-label-1627706' class=' answer'><span>End-user training manuals for the policies to be created<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420196[]' id='answer-id-1627707' class='answer   answerof-420196 ' value='1627707'   \/><label for='answer-id-1627707' id='answer-label-1627707' class=' answer'><span>Security policy generation software<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-28' style=';'><div id='questionWrap-28'  class='   watupro-question-id-420197'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>28. <\/span>When used as part of a WLAN authentication solution, what is the role of LDAP?<\/div><input type='hidden' name='question_id[]' id='qID_28' value='420197' \/><input type='hidden' id='answerType420197' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420197[]' id='answer-id-1627708' class='answer   answerof-420197 ' value='1627708'   \/><label for='answer-id-1627708' id='answer-label-1627708' class=' answer'><span>A data retrieval protocol used by an authentication service such as RADIUS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420197[]' id='answer-id-1627709' class='answer   answerof-420197 ' value='1627709'   \/><label for='answer-id-1627709' id='answer-label-1627709' class=' answer'><span>An IEEE<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420197[]' id='answer-id-1627710' class='answer   answerof-420197 ' value='1627710'   \/><label for='answer-id-1627710' id='answer-label-1627710' class=' answer'><span>500 standard compliant database that participates in the 802.1X port-based access control process<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420197[]' id='answer-id-1627711' class='answer   answerof-420197 ' value='1627711'   \/><label for='answer-id-1627711' id='answer-label-1627711' class=' answer'><span>A SQL compliant authentication service capable of dynamic key generation and distribution<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420197[]' id='answer-id-1627712' class='answer   answerof-420197 ' value='1627712'   \/><label for='answer-id-1627712' id='answer-label-1627712' class=' answer'><span>A role-based access control protocol for filtering data to\/from authenticated stations.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420197[]' id='answer-id-1627713' class='answer   answerof-420197 ' value='1627713'   \/><label for='answer-id-1627713' id='answer-label-1627713' class=' answer'><span>An Authentication Server (AS) that communicates directly with, and provides authentication for, the Supplicant.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-29' style=';'><div id='questionWrap-29'  class='   watupro-question-id-420198'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>29. <\/span>Given: ABC Corporation is evaluating the security solution for their existing WLAN. Two of their supported solutions include a PPTP VPN and 802.1X\/LEAP. They have used PPTP VPNs because of their wide support in server and desktop operating systems. While both PPTP and LEAP adhere to the minimum requirements of the corporate security policy, some individuals have raised concerns about MS-CHAPv2 (and similar) authentication and the known fact that MS-CHAPv2 has proven vulnerable in improper implementations. <br \/>\r<br>As a consultant, what do you tell ABC Corporation about implementing MS-CHAPv2 authentication? (Choose 2)<\/div><input type='hidden' name='question_id[]' id='qID_29' value='420198' \/><input type='hidden' id='answerType420198' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420198[]' id='answer-id-1627714' class='answer   answerof-420198 ' value='1627714'   \/><label for='answer-id-1627714' id='answer-label-1627714' class=' answer'><span>MS-CHAPv2 is compliant with WPA-Personal, but not WPA2-Enterprise.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420198[]' id='answer-id-1627715' class='answer   answerof-420198 ' value='1627715'   \/><label for='answer-id-1627715' id='answer-label-1627715' class=' answer'><span>MS-CHAPv2 is subject to offline dictionary attacks.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420198[]' id='answer-id-1627716' class='answer   answerof-420198 ' value='1627716'   \/><label for='answer-id-1627716' id='answer-label-1627716' class=' answer'><span>LEAP\u2019s use of MS-CHAPv2 is only secure when combined with WE<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420198[]' id='answer-id-1627717' class='answer   answerof-420198 ' value='1627717'   \/><label for='answer-id-1627717' id='answer-label-1627717' class=' answer'><span>MS-CHAPv2 is only appropriate for WLAN security when used inside a TLS-encrypted tunnel.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420198[]' id='answer-id-1627718' class='answer   answerof-420198 ' value='1627718'   \/><label for='answer-id-1627718' id='answer-label-1627718' class=' answer'><span>MS-CHAPv2 uses AES authentication, and is therefore secure.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420198[]' id='answer-id-1627719' class='answer   answerof-420198 ' value='1627719'   \/><label for='answer-id-1627719' id='answer-label-1627719' class=' answer'><span>When implemented with AES-CCMP encryption, MS-CHAPv2 is very secure.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-30' style=';'><div id='questionWrap-30'  class='   watupro-question-id-420199'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>30. <\/span>While performing a manual scan of your environment using a spectrum analyzer on a laptop computer, you notice a signal in the real time FFT view. The signal is characterized by having peak power centered on channel 11 with an approximate width of 20 MHz at its peak. The signal widens to approximately 40 MHz after it has weakened by about 30 dB. <br \/>\r<br>What kind of signal is displayed in the spectrum analyzer?<\/div><input type='hidden' name='question_id[]' id='qID_30' value='420199' \/><input type='hidden' id='answerType420199' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420199[]' id='answer-id-1627720' class='answer   answerof-420199 ' value='1627720'   \/><label for='answer-id-1627720' id='answer-label-1627720' class=' answer'><span>A frequency hopping device is being used as a signal jammer in 5 GHz<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420199[]' id='answer-id-1627721' class='answer   answerof-420199 ' value='1627721'   \/><label for='answer-id-1627721' id='answer-label-1627721' class=' answer'><span>A low-power wideband RF attack is in progress in 2.4 GHz, causing significant 802.11 interference<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420199[]' id='answer-id-1627722' class='answer   answerof-420199 ' value='1627722'   \/><label for='answer-id-1627722' id='answer-label-1627722' class=' answer'><span>An 802.11g AP operating normally in 2.4 GHz<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420199[]' id='answer-id-1627723' class='answer   answerof-420199 ' value='1627723'   \/><label for='answer-id-1627723' id='answer-label-1627723' class=' answer'><span>An 802.11a AP operating normally in 5 GHz<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-31' style=';'><div id='questionWrap-31'  class='   watupro-question-id-420200'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>31. <\/span>Given: Many computer users connect to the Internet at airports, which often have 802.11n access points with a captive portal for authentication. <br \/>\r<br>While using an airport hot-spot with this security solution, to what type of wireless attack is a user susceptible? (Choose 2)<\/div><input type='hidden' name='question_id[]' id='qID_31' value='420200' \/><input type='hidden' id='answerType420200' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420200[]' id='answer-id-1627724' class='answer   answerof-420200 ' value='1627724'   \/><label for='answer-id-1627724' id='answer-label-1627724' class=' answer'><span>Man-in-the-Middle<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420200[]' id='answer-id-1627725' class='answer   answerof-420200 ' value='1627725'   \/><label for='answer-id-1627725' id='answer-label-1627725' class=' answer'><span>Wi-Fi phishing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420200[]' id='answer-id-1627726' class='answer   answerof-420200 ' value='1627726'   \/><label for='answer-id-1627726' id='answer-label-1627726' class=' answer'><span>Management interface exploits<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420200[]' id='answer-id-1627727' class='answer   answerof-420200 ' value='1627727'   \/><label for='answer-id-1627727' id='answer-label-1627727' class=' answer'><span>UDP port redirection<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420200[]' id='answer-id-1627728' class='answer   answerof-420200 ' value='1627728'   \/><label for='answer-id-1627728' id='answer-label-1627728' class=' answer'><span>IGMP snooping<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-32' style=';'><div id='questionWrap-32'  class='   watupro-question-id-420201'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>32. <\/span>Given: ABC Corporation\u2019s 802.11 WLAN is comprised of a redundant WLAN controller pair (N+1) and 30 access points implemented in 2004. ABC implemented WEP encryption with IPSec VPN technology to secure their wireless communication because it was the strongest security solution available at the time it was implemented. IT management has decided to upgrade the WLAN infrastructure and implement Voice over Wi-Fi and is concerned with security because most Voice over Wi-Fi phones do not support IPSec. <br \/>\r<br>As the wireless network administrator, what new security solution would be best for protecting ABC\u2019s data?<\/div><input type='hidden' name='question_id[]' id='qID_32' value='420201' \/><input type='hidden' id='answerType420201' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420201[]' id='answer-id-1627729' class='answer   answerof-420201 ' value='1627729'   \/><label for='answer-id-1627729' id='answer-label-1627729' class=' answer'><span>Migrate corporate data clients to WPA-Enterprise and segment Voice over Wi-Fi phones by assigning them to a different frequency band.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420201[]' id='answer-id-1627730' class='answer   answerof-420201 ' value='1627730'   \/><label for='answer-id-1627730' id='answer-label-1627730' class=' answer'><span>Migrate corporate data and Voice over Wi-Fi devices to WPA2-Enterprise with fast secure roaming support, and segment Voice over Wi-Fi data on a separate VLA<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420201[]' id='answer-id-1627731' class='answer   answerof-420201 ' value='1627731'   \/><label for='answer-id-1627731' id='answer-label-1627731' class=' answer'><span>Migrate to a multi-factor security solution to replace IPSec; use WEP with MAC filtering, SSID hiding, stateful packet inspection, and VLAN segmentation.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420201[]' id='answer-id-1627732' class='answer   answerof-420201 ' value='1627732'   \/><label for='answer-id-1627732' id='answer-label-1627732' class=' answer'><span>Migrate all 802.11 data devices to WPA-Personal, and implement a secure DHCP server to allocate addresses from a segmented subnet for the Voice over Wi-Fi phones.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-33' style=';'><div id='questionWrap-33'  class='   watupro-question-id-420202'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>33. <\/span>Given: In XYZ\u2019s small business, two autonomous 802.11ac APs and 12 client devices are in use with WPA2-Personal. <br \/>\r<br>What statement about the WLAN security of this company is true?<\/div><input type='hidden' name='question_id[]' id='qID_33' value='420202' \/><input type='hidden' id='answerType420202' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420202[]' id='answer-id-1627733' class='answer   answerof-420202 ' value='1627733'   \/><label for='answer-id-1627733' id='answer-label-1627733' class=' answer'><span>Intruders may obtain the passphrase with an offline dictionary attack and gain network access, but will be unable to decrypt the data traffic of other users.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420202[]' id='answer-id-1627734' class='answer   answerof-420202 ' value='1627734'   \/><label for='answer-id-1627734' id='answer-label-1627734' class=' answer'><span>A successful attack against all unicast traffic on the network would require a weak passphrase dictionary attack and the capture of the latest 4-Way Handshake for each client.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420202[]' id='answer-id-1627735' class='answer   answerof-420202 ' value='1627735'   \/><label for='answer-id-1627735' id='answer-label-1627735' class=' answer'><span>An unauthorized wireless client device cannot associate, but can eavesdrop on some data because WPA2-Personal does not encrypt multicast or broadcast traffic.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420202[]' id='answer-id-1627736' class='answer   answerof-420202 ' value='1627736'   \/><label for='answer-id-1627736' id='answer-label-1627736' class=' answer'><span>An unauthorized WLAN user with a protocol analyzer can decode data frames of authorized users if he captures the BSSID, client MAC address, and a user\u2019s 4-Way Handshake.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420202[]' id='answer-id-1627737' class='answer   answerof-420202 ' value='1627737'   \/><label for='answer-id-1627737' id='answer-label-1627737' class=' answer'><span>Because WPA2-Personal uses Open System authentication followed by a 4-Way Handshake, hijacking attacks are easily performed.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-34' style=';'><div id='questionWrap-34'  class='   watupro-question-id-420203'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>34. <\/span>In what deployment scenarios would it be desirable to enable peer-to-peer traffic blocking?<\/div><input type='hidden' name='question_id[]' id='qID_34' value='420203' \/><input type='hidden' id='answerType420203' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420203[]' id='answer-id-1627738' class='answer   answerof-420203 ' value='1627738'   \/><label for='answer-id-1627738' id='answer-label-1627738' class=' answer'><span>In home networks in which file and printer sharing is enabled<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420203[]' id='answer-id-1627739' class='answer   answerof-420203 ' value='1627739'   \/><label for='answer-id-1627739' id='answer-label-1627739' class=' answer'><span>At public hot-spots in which many clients use diverse applications<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420203[]' id='answer-id-1627740' class='answer   answerof-420203 ' value='1627740'   \/><label for='answer-id-1627740' id='answer-label-1627740' class=' answer'><span>In corporate Voice over Wi-Fi networks with push-to-talk multicast capabilities<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420203[]' id='answer-id-1627741' class='answer   answerof-420203 ' value='1627741'   \/><label for='answer-id-1627741' id='answer-label-1627741' class=' answer'><span>In university environments using multicast video training sourced from professor\u2019s laptops<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-35' style=';'><div id='questionWrap-35'  class='   watupro-question-id-420204'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>35. <\/span>As a part of a large organization\u2019s security policy, how should a wireless security professional address the problem of rogue access points?<\/div><input type='hidden' name='question_id[]' id='qID_35' value='420204' \/><input type='hidden' id='answerType420204' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420204[]' id='answer-id-1627742' class='answer   answerof-420204 ' value='1627742'   \/><label for='answer-id-1627742' id='answer-label-1627742' class=' answer'><span>Use a WPA2-Enterprise compliant security solution with strong mutual authentication and encryption for network access of corporate devices.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420204[]' id='answer-id-1627743' class='answer   answerof-420204 ' value='1627743'   \/><label for='answer-id-1627743' id='answer-label-1627743' class=' answer'><span>Hide the SSID of all legitimate APs on the network so that intruders cannot copy this parameter on rogue APs.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420204[]' id='answer-id-1627744' class='answer   answerof-420204 ' value='1627744'   \/><label for='answer-id-1627744' id='answer-label-1627744' class=' answer'><span>Conduct thorough manual facility scans with spectrum analyzers to detect rogue AP RF signatures.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420204[]' id='answer-id-1627745' class='answer   answerof-420204 ' value='1627745'   \/><label for='answer-id-1627745' id='answer-label-1627745' class=' answer'><span>A trained employee should install and configure a WIPS for rogue detection and response measures.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420204[]' id='answer-id-1627746' class='answer   answerof-420204 ' value='1627746'   \/><label for='answer-id-1627746' id='answer-label-1627746' class=' answer'><span>Enable port security on Ethernet switch ports with a maximum of only 3 MAC addresses on each port.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-36' style=';'><div id='questionWrap-36'  class='   watupro-question-id-420205'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>36. <\/span>What wireless authentication technologies may build a TLS tunnel between the supplicant and the authentication server before passing client authentication credentials to the authentication server? (Choose 3)<\/div><input type='hidden' name='question_id[]' id='qID_36' value='420205' \/><input type='hidden' id='answerType420205' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420205[]' id='answer-id-1627747' class='answer   answerof-420205 ' value='1627747'   \/><label for='answer-id-1627747' id='answer-label-1627747' class=' answer'><span>EAP-MD5<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420205[]' id='answer-id-1627748' class='answer   answerof-420205 ' value='1627748'   \/><label for='answer-id-1627748' id='answer-label-1627748' class=' answer'><span>EAP-TLS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420205[]' id='answer-id-1627749' class='answer   answerof-420205 ' value='1627749'   \/><label for='answer-id-1627749' id='answer-label-1627749' class=' answer'><span>LEAP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420205[]' id='answer-id-1627750' class='answer   answerof-420205 ' value='1627750'   \/><label for='answer-id-1627750' id='answer-label-1627750' class=' answer'><span>PEAPv0\/MSCHAPv2<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420205[]' id='answer-id-1627751' class='answer   answerof-420205 ' value='1627751'   \/><label for='answer-id-1627751' id='answer-label-1627751' class=' answer'><span>EAP-TTLS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-37' style=';'><div id='questionWrap-37'  class='   watupro-question-id-420206'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>37. <\/span>An attack is under way on the network. The attack is preventing users from accessing resources required for business operations, but the attacker has not gained access to any files or data. <br \/>\r<br>What kind of attack is described?<\/div><input type='hidden' name='question_id[]' id='qID_37' value='420206' \/><input type='hidden' id='answerType420206' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420206[]' id='answer-id-1627752' class='answer   answerof-420206 ' value='1627752'   \/><label for='answer-id-1627752' id='answer-label-1627752' class=' answer'><span>Man-in-the-middle<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420206[]' id='answer-id-1627753' class='answer   answerof-420206 ' value='1627753'   \/><label for='answer-id-1627753' id='answer-label-1627753' class=' answer'><span>Hijacking<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420206[]' id='answer-id-1627754' class='answer   answerof-420206 ' value='1627754'   \/><label for='answer-id-1627754' id='answer-label-1627754' class=' answer'><span>ASLEAP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420206[]' id='answer-id-1627755' class='answer   answerof-420206 ' value='1627755'   \/><label for='answer-id-1627755' id='answer-label-1627755' class=' answer'><span>DoS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-38' style=';'><div id='questionWrap-38'  class='   watupro-question-id-420207'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>38. <\/span>You perform a protocol capture using Wireshark and a compatible 802.11 adapter in Linux. When viewing the capture, you see an auth req frame and an auth rsp frame. Then you see an assoc req frame and an assoc rsp frame. Shortly after, you see DHCP communications and then ISAKMP protocol packets. <br \/>\r<br>What security solution is represented?<\/div><input type='hidden' name='question_id[]' id='qID_38' value='420207' \/><input type='hidden' id='answerType420207' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420207[]' id='answer-id-1627756' class='answer   answerof-420207 ' value='1627756'   \/><label for='answer-id-1627756' id='answer-label-1627756' class=' answer'><span>802.1X\/EAP-TTLS<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420207[]' id='answer-id-1627757' class='answer   answerof-420207 ' value='1627757'   \/><label for='answer-id-1627757' id='answer-label-1627757' class=' answer'><span>Open 802.11 authentication with IPSec<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420207[]' id='answer-id-1627758' class='answer   answerof-420207 ' value='1627758'   \/><label for='answer-id-1627758' id='answer-label-1627758' class=' answer'><span>802.1X\/PEAPv0\/MS-CHAPv2<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420207[]' id='answer-id-1627759' class='answer   answerof-420207 ' value='1627759'   \/><label for='answer-id-1627759' id='answer-label-1627759' class=' answer'><span>WPA2-Personal with AES-CCMP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420207[]' id='answer-id-1627760' class='answer   answerof-420207 ' value='1627760'   \/><label for='answer-id-1627760' id='answer-label-1627760' class=' answer'><span>EAP-MD5<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-39' style=';'><div id='questionWrap-39'  class='   watupro-question-id-420208'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>39. <\/span>A WLAN is implemented using WPA-Personal and MAC filtering. <br \/>\r<br>To what common wireless network attacks is this network potentially vulnerable? (Choose 3)<\/div><input type='hidden' name='question_id[]' id='qID_39' value='420208' \/><input type='hidden' id='answerType420208' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420208[]' id='answer-id-1627761' class='answer   answerof-420208 ' value='1627761'   \/><label for='answer-id-1627761' id='answer-label-1627761' class=' answer'><span>Offline dictionary attacks<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420208[]' id='answer-id-1627762' class='answer   answerof-420208 ' value='1627762'   \/><label for='answer-id-1627762' id='answer-label-1627762' class=' answer'><span>MAC Spoofing<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420208[]' id='answer-id-1627763' class='answer   answerof-420208 ' value='1627763'   \/><label for='answer-id-1627763' id='answer-label-1627763' class=' answer'><span>ASLEAP<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420208[]' id='answer-id-1627764' class='answer   answerof-420208 ' value='1627764'   \/><label for='answer-id-1627764' id='answer-label-1627764' class=' answer'><span>DoS<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-40' style=';'><div id='questionWrap-40'  class='   watupro-question-id-420209'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>40. <\/span>Given: You have a Windows laptop computer with an integrated, dual-band, Wi-Fi compliant adapter. <br \/>\r<br>Your laptop computer has protocol analyzer software installed that is capable of capturing and decoding 802.11ac data. <br \/>\r<br>What statement best describes the likely ability to capture 802.11ac frames for security testing purposes?<\/div><input type='hidden' name='question_id[]' id='qID_40' value='420209' \/><input type='hidden' id='answerType420209' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420209[]' id='answer-id-1627765' class='answer   answerof-420209 ' value='1627765'   \/><label for='answer-id-1627765' id='answer-label-1627765' class=' answer'><span>All integrated 802.11ac adapters will work with most protocol analyzers for frame capture, including the Radio Tap Header.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420209[]' id='answer-id-1627766' class='answer   answerof-420209 ' value='1627766'   \/><label for='answer-id-1627766' id='answer-label-1627766' class=' answer'><span>Integrated 802.11ac adapters are not typically compatible with protocol analyzers in Windows laptops. It is often best to use a USB adapter or carefully select a laptop with an integrated adapter that will work.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420209[]' id='answer-id-1627767' class='answer   answerof-420209 ' value='1627767'   \/><label for='answer-id-1627767' id='answer-label-1627767' class=' answer'><span>Laptops cannot be used to capture 802.11ac frames because they do not support MU-MIM<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420209[]' id='answer-id-1627768' class='answer   answerof-420209 ' value='1627768'   \/><label for='answer-id-1627768' id='answer-label-1627768' class=' answer'><span>Only Wireshark can be used to capture 802.11ac frames as no other protocol analyzer has implemented the proper frame decodes.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420209[]' id='answer-id-1627769' class='answer   answerof-420209 ' value='1627769'   \/><label for='answer-id-1627769' id='answer-label-1627769' class=' answer'><span>The only method available to capture 802.11ac frames is to perform a remote capture with a compatible access point.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-41' style=';'><div id='questionWrap-41'  class='   watupro-question-id-420210'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>41. <\/span>Given: WLAN attacks are typically conducted by hackers to exploit a specific vulnerability within a network. <br \/>\r<br>What statement correctly pairs the type of WLAN attack with the exploited vulnerability? (Choose 3)<\/div><input type='hidden' name='question_id[]' id='qID_41' value='420210' \/><input type='hidden' id='answerType420210' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420210[]' id='answer-id-1627770' class='answer   answerof-420210 ' value='1627770'   \/><label for='answer-id-1627770' id='answer-label-1627770' class=' answer'><span>Management interface exploit attacks are attacks that use social engineering to gain credentials from managers.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420210[]' id='answer-id-1627771' class='answer   answerof-420210 ' value='1627771'   \/><label for='answer-id-1627771' id='answer-label-1627771' class=' answer'><span>Zero-day attacks are always authentication or encryption cracking attacks.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420210[]' id='answer-id-1627772' class='answer   answerof-420210 ' value='1627772'   \/><label for='answer-id-1627772' id='answer-label-1627772' class=' answer'><span>RF DoS attacks prevent successful wireless communication on a specific frequency or frequency range.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420210[]' id='answer-id-1627773' class='answer   answerof-420210 ' value='1627773'   \/><label for='answer-id-1627773' id='answer-label-1627773' class=' answer'><span>Hijacking attacks interrupt a user\u2019s legitimate connection and introduce a new connection with an evil twin A<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420210[]' id='answer-id-1627774' class='answer   answerof-420210 ' value='1627774'   \/><label for='answer-id-1627774' id='answer-label-1627774' class=' answer'><span>Social engineering attacks are performed to collect sensitive information from unsuspecting users<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420210[]' id='answer-id-1627775' class='answer   answerof-420210 ' value='1627775'   \/><label for='answer-id-1627775' id='answer-label-1627775' class=' answer'><span>Association flood attacks are Layer 3 DoS attacks performed against authenticated client stations<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-42' style=';'><div id='questionWrap-42'  class='   watupro-question-id-420211'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>42. <\/span>Given: You are using a Wireless Aggregator utility to combine multiple packet captures. One capture exists for each of channels 1, 6 and 11. <br \/>\r<br>What kind of troubleshooting are you likely performing with such a tool?<\/div><input type='hidden' name='question_id[]' id='qID_42' value='420211' \/><input type='hidden' id='answerType420211' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420211[]' id='answer-id-1627776' class='answer   answerof-420211 ' value='1627776'   \/><label for='answer-id-1627776' id='answer-label-1627776' class=' answer'><span>Wireless adapter failure analysis.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420211[]' id='answer-id-1627777' class='answer   answerof-420211 ' value='1627777'   \/><label for='answer-id-1627777' id='answer-label-1627777' class=' answer'><span>Interference source location.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420211[]' id='answer-id-1627778' class='answer   answerof-420211 ' value='1627778'   \/><label for='answer-id-1627778' id='answer-label-1627778' class=' answer'><span>Fast secure roaming problems.<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420211[]' id='answer-id-1627779' class='answer   answerof-420211 ' value='1627779'   \/><label for='answer-id-1627779' id='answer-label-1627779' class=' answer'><span>Narrowband DoS attack detection.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-43' style=';'><div id='questionWrap-43'  class='   watupro-question-id-420212'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>43. <\/span>Given: An 802.1X\/EAP implementation includes an Active Directory domain controller running Windows Server 2012 and an AP from a major vendor. A Linux server is running RADIUS and it queries the domain controller for user credentials. A Windows client is accessing the network. <br \/>\r<br>What device functions as the EAP Supplicant?<\/div><input type='hidden' name='question_id[]' id='qID_43' value='420212' \/><input type='hidden' id='answerType420212' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420212[]' id='answer-id-1627780' class='answer   answerof-420212 ' value='1627780'   \/><label for='answer-id-1627780' id='answer-label-1627780' class=' answer'><span>Linux server<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420212[]' id='answer-id-1627781' class='answer   answerof-420212 ' value='1627781'   \/><label for='answer-id-1627781' id='answer-label-1627781' class=' answer'><span>Windows client<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420212[]' id='answer-id-1627782' class='answer   answerof-420212 ' value='1627782'   \/><label for='answer-id-1627782' id='answer-label-1627782' class=' answer'><span>Access point<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420212[]' id='answer-id-1627783' class='answer   answerof-420212 ' value='1627783'   \/><label for='answer-id-1627783' id='answer-label-1627783' class=' answer'><span>Windows server<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420212[]' id='answer-id-1627784' class='answer   answerof-420212 ' value='1627784'   \/><label for='answer-id-1627784' id='answer-label-1627784' class=' answer'><span>An unlisted switch<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420212[]' id='answer-id-1627785' class='answer   answerof-420212 ' value='1627785'   \/><label for='answer-id-1627785' id='answer-label-1627785' class=' answer'><span>An unlisted WLAN controller<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-44' style=';'><div id='questionWrap-44'  class='   watupro-question-id-420213'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>44. <\/span>Given: You are using WEP as an encryption solution. You are using VLANs for network segregation. <br \/>\r<br>Why can you not establish an RSNA?<\/div><input type='hidden' name='question_id[]' id='qID_44' value='420213' \/><input type='hidden' id='answerType420213' value='radio'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420213[]' id='answer-id-1627786' class='answer   answerof-420213 ' value='1627786'   \/><label for='answer-id-1627786' id='answer-label-1627786' class=' answer'><span>RSNA connections require TKIP or CCM<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420213[]' id='answer-id-1627787' class='answer   answerof-420213 ' value='1627787'   \/><label for='answer-id-1627787' id='answer-label-1627787' class=' answer'><span>RSNA connections require BIP and do not support TKIP, CCMP or WE<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420213[]' id='answer-id-1627788' class='answer   answerof-420213 ' value='1627788'   \/><label for='answer-id-1627788' id='answer-label-1627788' class=' answer'><span>RSNA connections require CCMP and do not support TKIP or WE<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='radio' name='answer-420213[]' id='answer-id-1627789' class='answer   answerof-420213 ' value='1627789'   \/><label for='answer-id-1627789' id='answer-label-1627789' class=' answer'><span>RSNA connections do not work in conjunction with VLANs.<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div class='watu-question ' id='question-45' style=';'><div id='questionWrap-45'  class='   watupro-question-id-420214'>\n\t\t\t<div class='question-content'><div><span class='watupro_num'>45. <\/span>What software and hardware tools are used together to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network? (Choose 2)<\/div><input type='hidden' name='question_id[]' id='qID_45' value='420214' \/><input type='hidden' id='answerType420214' value='checkbox'><!-- end question-content--><\/div><div class='question-choices watupro-choices-columns '><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420214[]' id='answer-id-1627790' class='answer   answerof-420214 ' value='1627790'   \/><label for='answer-id-1627790' id='answer-label-1627790' class=' answer'><span>RF jamming device and a wireless radio card<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420214[]' id='answer-id-1627791' class='answer   answerof-420214 ' value='1627791'   \/><label for='answer-id-1627791' id='answer-label-1627791' class=' answer'><span>A low-gain patch antenna and terminal emulation software<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420214[]' id='answer-id-1627792' class='answer   answerof-420214 ' value='1627792'   \/><label for='answer-id-1627792' id='answer-label-1627792' class=' answer'><span>A wireless workgroup bridge and a protocol analyzer<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420214[]' id='answer-id-1627793' class='answer   answerof-420214 ' value='1627793'   \/><label for='answer-id-1627793' id='answer-label-1627793' class=' answer'><span>DHCP server software and access point software<\/span><\/label><\/div><div class='watupro-question-choice  ' dir='auto' ><input type='checkbox' name='answer-420214[]' id='answer-id-1627794' class='answer   answerof-420214 ' value='1627794'   \/><label for='answer-id-1627794' id='answer-label-1627794' class=' answer'><span>MAC spoofing software and MAC DoS software<\/span><\/label><\/div><!-- end question-choices--><\/div><!-- end questionWrap--><\/div><\/div><div style='display:none' id='question-46'>\n\t<div class='question-content'>\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/img\/loading.gif\" width=\"16\" height=\"16\" alt=\"Loading...\" title=\"Loading...\" \/>&nbsp;Loading...\t<\/div>\n<\/div>\n\n<br \/>\n\t\n\t\t\t<div class=\"watupro_buttons flex \" id=\"watuPROButtons10623\" >\n\t\t  <div id=\"prev-question\" style=\"display:none;\"><input type=\"button\" value=\"&lt; Previous\" onclick=\"WatuPRO.nextQuestion(event, 'previous');\"\/><\/div>\t\t  \t\t  \t\t   \n\t\t   \t  \t\t<div><input type=\"button\" name=\"action\" class=\"watupro-submit-button\" onclick=\"WatuPRO.submitResult(event)\" id=\"action-button\" value=\"View Results\"  \/>\n\t\t<\/div>\n\t\t<\/div>\n\t\t\n\t<input type=\"hidden\" name=\"quiz_id\" value=\"10623\" id=\"watuPROExamID\"\/>\n\t<input type=\"hidden\" name=\"start_time\" id=\"startTime\" value=\"2026-04-16 17:04:48\" \/>\n\t<input type=\"hidden\" name=\"start_timestamp\" id=\"startTimeStamp\" value=\"1776359088\" \/>\n\t<input type=\"hidden\" name=\"question_ids\" value=\"\" \/>\n\t<input type=\"hidden\" name=\"watupro_questions\" value=\"420170:1627576,1627577,1627578,1627579 | 420171:1627580,1627581,1627582,1627583,1627584 | 420172:1627585,1627586,1627587,1627588,1627589 | 420173:1627590,1627591,1627592,1627593,1627594 | 420174:1627595,1627596,1627597,1627598,1627599 | 420175:1627600,1627601,1627602,1627603 | 420176:1627604,1627605,1627606,1627607,1627608 | 420177:1627609,1627610,1627611,1627612,1627613,1627614 | 420178:1627615,1627616,1627617,1627618 | 420179:1627619,1627620,1627621,1627622,1627623,1627624 | 420180:1627625,1627626,1627627,1627628,1627629,1627630 | 420181:1627631,1627632,1627633,1627634 | 420182:1627635,1627636,1627637,1627638,1627639 | 420183:1627640,1627641,1627642,1627643 | 420184:1627644,1627645,1627646,1627647,1627648,1627649 | 420185:1627650,1627651,1627652,1627653,1627654,1627655 | 420186:1627656,1627657,1627658,1627659,1627660 | 420187:1627661,1627662,1627663,1627664,1627665 | 420188:1627666,1627667,1627668,1627669 | 420189:1627670,1627671,1627672,1627673,1627674 | 420190:1627675,1627676,1627677,1627678,1627679,1627680,1627681 | 420191:1627682,1627683,1627684,1627685 | 420192:1627686,1627687,1627688,1627689,1627690 | 420193:1627691,1627692,1627693,1627694 | 420194:1627695,1627696,1627697,1627698 | 420195:1627699,1627700,1627701,1627702,1627703 | 420196:1627704,1627705,1627706,1627707 | 420197:1627708,1627709,1627710,1627711,1627712,1627713 | 420198:1627714,1627715,1627716,1627717,1627718,1627719 | 420199:1627720,1627721,1627722,1627723 | 420200:1627724,1627725,1627726,1627727,1627728 | 420201:1627729,1627730,1627731,1627732 | 420202:1627733,1627734,1627735,1627736,1627737 | 420203:1627738,1627739,1627740,1627741 | 420204:1627742,1627743,1627744,1627745,1627746 | 420205:1627747,1627748,1627749,1627750,1627751 | 420206:1627752,1627753,1627754,1627755 | 420207:1627756,1627757,1627758,1627759,1627760 | 420208:1627761,1627762,1627763,1627764 | 420209:1627765,1627766,1627767,1627768,1627769 | 420210:1627770,1627771,1627772,1627773,1627774,1627775 | 420211:1627776,1627777,1627778,1627779 | 420212:1627780,1627781,1627782,1627783,1627784,1627785 | 420213:1627786,1627787,1627788,1627789 | 420214:1627790,1627791,1627792,1627793,1627794\" \/>\n\t<input type=\"hidden\" name=\"no_ajax\" value=\"0\">\t\t\t<\/form>\n\t<p>&nbsp;<\/p>\n<\/div>\n\n<script type=\"text\/javascript\">\n\/\/jQuery(document).ready(function(){\ndocument.addEventListener(\"DOMContentLoaded\", function(event) { \t\nvar question_ids = \"420170,420171,420172,420173,420174,420175,420176,420177,420178,420179,420180,420181,420182,420183,420184,420185,420186,420187,420188,420189,420190,420191,420192,420193,420194,420195,420196,420197,420198,420199,420200,420201,420202,420203,420204,420205,420206,420207,420208,420209,420210,420211,420212,420213,420214\";\nWatuPROSettings[10623] = {};\nWatuPRO.qArr = question_ids.split(',');\nWatuPRO.exam_id = 10623;\t    \nWatuPRO.post_id = 116719;\nWatuPRO.store_progress = 0;\nWatuPRO.curCatPage = 1;\nWatuPRO.requiredIDs=\"0\".split(\",\");\nWatuPRO.hAppID = \"0.27454000 1776359088\";\nvar url = \"https:\/\/www.dumpsbase.com\/freedumps\/wp-content\/plugins\/watupro\/show_exam.php\";\nWatuPRO.examMode = 1;\nWatuPRO.siteURL=\"https:\/\/www.dumpsbase.com\/freedumps\/wp-admin\/admin-ajax.php\";\nWatuPRO.emailIsNotRequired = 0;\nWatuPROIntel.init(10623);\nWatuPRO.inCategoryPages=1;});    \t \n<\/script>\n","protected":false},"excerpt":{"rendered":"<p>To earn your Certified Wireless Security Professional (CWSP) certification and perform WLAN security audits and compliance monitoring, you must pass the CWSP-208 exam, which was released in December of 2025. We offer trusted, valid CWSP-208 dumps (V8.02) to help you prepare. Our 119 practice questions and answers are based on actual exam skills and knowledge, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[444,4825],"tags":[20731,20732],"class_list":["post-116719","post","type-post","status-publish","format-standard","hentry","category-cwnp","category-cwsp-certification","tag-certified-wireless-security-professional-cwsp","tag-cwsp-208"],"_links":{"self":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/116719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/comments?post=116719"}],"version-history":[{"count":1,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/116719\/revisions"}],"predecessor-version":[{"id":116720,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/posts\/116719\/revisions\/116720"}],"wp:attachment":[{"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/media?parent=116719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/categories?post=116719"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dumpsbase.com\/freedumps\/wp-json\/wp\/v2\/tags?post=116719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}