Practice Free CWSP-207 Exam Online Questions
What EAP type supports using MS-CHAPv2, EAP-GTC or EAP-TLS for wireless client authentication?
- A . H-REAP
- B . EAP-GTC
- C . EAP-TTLS
- D . PEAP
- E . LEAP
Which of these encryption technologies have been cracked? (Choose all that apply.)
- A . 64-bit static WEP
- B . 128-bit Dynamic WEP
- C . CCMP/AES
- D . 128-bit static WEP
Given: You are the WLAN administrator in your organization and you are required to monitor the network and ensure all active WLANs are providing RSNs. You have a laptop protocol analyzer configured.
In what frame could you see the existence or non-existence of proper RSN configuration parameters for each BSS through the RSN IE?
- A . Probe request
- B . Beacon
- C . RTS
- D . CTS
- E . Data frames
Wireless Intrusion Prevention Systems (WIPS) provide what network security services? (Choose 2)
- A . Configuration distribution for autonomous APs
- B . Wireless vulnerability assessment
- C . Application-layer traffic inspection
- D . Analysis and reporting of AP CPU utilization
- E . Policy enforcement and compliance management
The management at the ACME Corporation has asked Bob to perform a WLAN security audit. Bob informs management that he will need to purchase a Yagi antenna for the audit.
What reasons should Bob give management to justify the purchase of the Yagi antenna? (Choose all that apply.)
- A . Attackers do not need physical access to the facility.
- B . Yagi antennas are used in high multipath areas.
- C . RF signals can be amplified from great distances.
- D . Yagi antennas are used for indoor audits.
- E . Spectrum analyzers require directional antennas.
The management at the ACME Corporation has asked Bob to perform a WLAN security audit. Bob informs management that he will need to purchase a Yagi antenna for the audit.
What reasons should Bob give management to justify the purchase of the Yagi antenna? (Choose all that apply.)
- A . Attackers do not need physical access to the facility.
- B . Yagi antennas are used in high multipath areas.
- C . RF signals can be amplified from great distances.
- D . Yagi antennas are used for indoor audits.
- E . Spectrum analyzers require directional antennas.
What components make up a distribution system? (Choose all that apply.)
- A . HR-DSSS
- B . DSS
- C . DSM
- D . DSSS
- E . WIDS
What wireless security protocol provides mutual authentication without using an X.509 certificate?
- A . EAP-FAST
- B . EAP-MD5
- C . EAP-TLS
- D . PEAPv0/EAP-MSCHAPv2
- E . EAP-TTLS
- F . PEAPv1/EAP-GTC
Given: Your network implements an 802.1X/EAP-based wireless security solution.
A WLAN controller is installed and manages seven APs. Free RADIUS is used for the RADIUS server and is installed on a dedicated server named SRV21. One example client is a MacBook Pro with 8 GB RAM.
What device functions as the 802.1X/EAP Authenticator?
- A . SRV21
- B . WLAN Controller/AP
- C . MacBook Pro
- D . RADIUS server
During a WLAN audit, you see an AP deployed in a common hallway of a multitenant building. This AP provides coverage to a small meeting room used by your customer.
It was deployed there to keep the small meeting room from looking cluttered and is using the appropriate authentication and encryption as defined by the written company security policy.
Is this AP a risk to the company’s network?
- A . Yes, it is not on company property.
- B . No, it is using required security settings.