Practice Free CWSP-207 Exam Online Questions
What are some extra restrictions that can be placed on a guest user other than those defined by the guest firewall policy? (Choose all that apply.)
- A . Encryption
- B . Web content filtering
- C . DHCP snooping
- D . Rate limiting
- E . Client isolation
Which RADIUS attribute is used to encapsulate EAP frames within RADIUS packets?
- A . (11) Filter-Id
- B . (26) Vendor-Specific
- C . (40) Acct-Status-Type
- D . (79) EAP-Message
- E . (80) Message-Authenticator
ABC Company requires the ability to identify and quickly locate rogue devices.
ABC has chosen an overlay WIPS solution with sensors that use dipole antennas to perform this task. Use your knowledge of location tracking techniques to answer the question.
In what ways can this 802.11-based WIPS platform determine the location of rogue laptops or APs? (Choose 3)
- A . Time Difference of Arrival (TDoA)
- B . Angle of Arrival (AoA)
- C . Trilateration of RSSI measurements
- D . GPS Positioning
- E . RF Fingerprinting
In the IEEE 802.11-2012 standard, what is the purpose of the 802.1X Uncontrolled Port?
- A . To allow only authentication frames to flow between the Supplicant and Authentication Server
- B . To block authentication traffic until the 4-Way Handshake completes
- C . To pass general data traffic after the completion of 802.11 authentication and key management
- D . To block unencrypted user traffic after a 4-Way Handshake completes
Which RADIUS attribute is used in RADIUS packets that traverse through a firewall via UDP port 1813?
- A . (11) Filter-Id
- B . (26) Vendor-Specific
- C . (40) Acct-Status-Type
- D . (79) EAP-Message
- E . (80) Message-Authenticator
Fred works primarily from home and public wireless hotspots rather than commuting to office. He frequently accesses the office network remotely from his Mac laptop using the local 802.11 WLAN.
In this remote scenario, what single wireless security practice will provide the greatest security for Fred?
- A . Use enterprise WIPS on the corporate office network
- B . Use 802.1X/PEAPv0 to connect to the corporate office network from public hotspots.
- C . Use secure protocols, such as FTP, for remote file transfers
- D . Use an IPSec VPN for connectivity to the office network
- E . Use only HTTPS when agreeing to acceptable use terms on public networks
- F . Use WIPS sensor software on the laptop to monitor for risks and attacks
Which of these Wi-Fi Alliance security certifications are intended for use only in a home office environment? (Choose all that apply.)
- A . WPA-Personal
- B . WPA-Enterprise
- C . WPA2-Personal
- D . WPA2-Enterprise
- E . WPS
Which of these Wi-Fi Alliance security certifications are intended for use only in a home office environment? (Choose all that apply.)
- A . WPA-Personal
- B . WPA-Enterprise
- C . WPA2-Personal
- D . WPA2-Enterprise
- E . WPS
Brooke is using an integrated WIDS/WIPS solution with APs as part-time sensors to protect against rogue APs. Brooke has deployed VoWiFi phones and wants to ensure maximum performance.
Which WIDS/WIPS configuration setting is advisable when APs function as part-time WIPS sensors?
- A . Disable spectrum analysis
- B . Disable rouge containment
- C . Suspend off-channel scanning based on QoS priority markings
- D . Suspend rogue containment
What protocol, listed here, allows a network manager to securely administer the network?
- A . TFTP
- B . Telnet
- C . HTTPS
- D . SNMPv2