Practice Free CWSP-207 Exam Online Questions
While seeking the source of interference on channel 11 in your 802.11n WLAN running within 2.4 GHz, you notice a signal in the spectrum analyzer real time FFT display.
The signal is characterized with the greatest strength utilizing only 1-2 megahertz of bandwidth and it does not use significantly more bandwidth until it has weakened by roughly 20 dB. At approximately -70 dB, it spreads across as much as 35 megahertz of bandwidth.
What kind of signal is described?
- A . A high-power, narrowband signal
- B . A 2.4 GHz WLAN transmission using transmit beam forming
- C . An HT-OFDM access point
- D . A frequency hopping wireless device in discovery mode
- E . A deauthentication flood from a WIPS blocking an AP
- F . A high-power ultra wideband (UWB) Bluetooth transmission
Given: ABC Hospital wishes to create a strong security policy as a first step in securing their 802.11 WLAN.
Before creating the WLAN security policy, what should you ensure you possess?
- A . Awareness of the exact vendor devices being installed
- B . Management support for the process
- C . End-user training manuals for the policies to be created
- D . Security policy generation software
An AP advertising an 802.1X/EAP employee SSID along with a guest SSID is considered to be operating what type of network device?
- A . Core
- B . Distribution
- C . Access
- D . Network layer
- E . Session layer
An AP advertising an 802.1X/EAP employee SSID along with a guest SSID is considered to be operating what type of network device?
- A . Core
- B . Distribution
- C . Access
- D . Network layer
- E . Session layer
Which hash algorithms can be used in the IKE authentication process? (Choose two.)
- A . Diffie-Hellman
- B . MS-CHAPv2
- C . MD5
- D . ISAKMP
- E . SHA-1
Given: You support a coffee shop and have recently installed a free 802.11ac wireless hot-spot for the benefit of your customers. You want to minimize legal risk in the event that the hot-spot is used for illegal Internet activity.
What option specifies the best approach to minimize legal risk at this public hot-spot while maintaining an open venue for customer Internet access?
- A . Configure WPA2-Enterprise security on the access point
- B . Block TCP port 25 and 80 outbound on the Internet router
- C . Require client STAs to have updated firewall and antivirus software
- D . Allow only trusted patrons to use the WLAN
- E . Use a WIPS to monitor all traffic and deauthenticate malicious stations
- F . Implement a captive portal with an acceptable use disclaimer
Which of these tools will best detect frequency hopping rogue devices? (Choose all that apply.)
- A . Standalone spectrum analyzer
- B . DSAS
- C . Distributed Layer 2 WIPS
- D . Mobile Layer 2 WIPS
- E . Layer 2 WIPS
Laura is attempting to diagnose a WLAN by using a packet analyzer to capture the exchange of frames and packets between a wireless client and the AP.
In the process of analyzing the packets, she sees two 802.11 authentication frames, two 802.11 association frames, and DHCP requests and responses, and then she begins to see encrypted data.
Which of the following could the client be using? (Choose all that apply.)
- A . Open System authentication
- B . Shared Key authentication
- C . 802.1X/EAP
- D . WEP
- E . IPsec
What protocols allow a network administrator to securely manage the configuration of WLAN controllers and access points? (Choose 2)
- A . SNMPv1
- B . HTTPS
- C . Telnet
- D . TFTP
- E . FTP
- F . SSHv2
What type of WLAN security is normally used to encrypt and provide data privacy for 802.11 traffic that traverses across mesh backhaul links?
- A . 802.1X/EAP
- B . SAE
- C . PSK
- D . IPsec
- E . VRRP