Practice Free CWSP-207 Exam Online Questions
Your organization required compliance reporting and forensics features in relation to the 802.11ac WLAN they have recently installed.
These features are not built into the management system provided by the WLAN vendor. The existing WLAN is managed through a centralized management console provided by the AP vendor with distributed APs and multiple WLAN controllers configured through this console.
What kind of system should be installed to provide the required compliance reporting and forensics features?
- A . WNMS
- B . WIPS overlay
- C . WIPS integrated
- D . Cloud management platform
When considering the 4-Way Handshake that is used to create dynamic encryption keys, what can be said about both 802.1X/EAP authentication and proprietary per-user/perdevice implementation of PSK authentication? (Choose all that apply.)
- A . 802.1X/EAP supplicants all use the same PMK.
- B . Clients that use per-user/per-device PSK authentication all use the same PMK.
- C . 802.1X/EAP supplicants all use a different PMK.
- D . Clients that use per-user/per-device PSK authentication all use a different PMK.
- E . Clients that use per-user/per-device PSK authentication all use the same PTK.
What are some the components within an MDM architecture? (Choose all that apply.)
- A . AP
- B . RADIUS
- C . BYOD
- D . APNs
- E . GCM
During the MDM enrollment process, what resources can a mobile client reach while quarantined inside a walled garden? (Choose all that apply.)
- A . SMTP
- B . DHCP
- C . DNS
- D . MDM server
- E . Exchange server
Which sublayer of the OSI model’s Data-Link layer is used for communication between 802.11 radios?
- A . LLC
- B . WPA
- C . MAC
- D . FSK
You work as the security administrator for your organization. In relation to the WLAN, you are viewing a dashboard that shows security threat, policy compliance and rogue threat charts.
What type of system is in view?
- A . Wireshark Protocol Analyzer
- B . Wireless VPN Management Systems
- C . Wireless Intrusion Prevention System
- D . Distributed RF Spectrum Analyzer
- E . WLAN Emulation System
Which of these attacks are wireless users susceptible to at a public-access hotspot? (Choose all that apply.)
- A . Wi-Fi phishing
- B . Happy AP attack
- C . Peer-to-peer attack
- D . Malicious eavesdropping
- E . 802.11 reverse ARP attack
- F . Man-in-the-middle
- G . Wireless hijacking
What are some the methods that can be used to provision a root certificate onto Wi-Fi clients that function as 802.1X supplicants? (Choose all that apply.)
- A . GPO
- B . RADIUS
- C . MDM
- D . APNs
- E . GCM
Which of the following encryption methods uses asymmetric communications?
- A . WEP
- B . TKIP
- C . Public key cryptography
- D . CCMP
Which of the following are the security measures that are needed to maintain the security of wireless LAN?
Each correct answer represents a complete solution. Choose all that apply.
- A . WIDS
- B . Firewalls
- C . WLAN controller
- D . WIPS