Practice Free CWSP-207 Exam Online Questions
Which technologies use the RC4 or ARC4 cipher? (Choose all that apply.)
- A . Static WEP
- B . Dynamic WEP
- C . PPTP
- D . L2TP
- E . MPPE
What type of WLAN attack is prevented with the use of a per-MPDU TKIP sequence counter (TSC)?
- A . Weak-IV
- B . Forgery
- C . Replay
- D . Bit-flipping
- E . Session hijacking
What type of WLAN attack is prevented with the use of a per-MPDU TKIP sequence counter (TSC)?
- A . Weak-IV
- B . Forgery
- C . Replay
- D . Bit-flipping
- E . Session hijacking
Given: You have a Windows laptop computer with an integrated, dual-band, Wi-Fi compliant adapter. Your laptop computer has protocol analyzer software installed that is capable of capturing and decoding 802.11ac data.
What statement best describes the likely ability to capture 802.11ac frames for security testing purposes?
- A . All integrated 802.11ac adapters will work with most protocol analyzers for frame capture, including the Radio Tap Header.
- B . Integrated 802.11ac adapters are not typically compatible with protocol analyzers in Windows laptops. It is often best to use a USB adapter or carefully select a laptop with an integrated adapter that will work.
- C . Laptops cannot be used to capture 802.11ac frames because they do not support MUCWSP- MIMO.
- D . Only Wireshark can be used to capture 802.11ac frames as no other protocol analyzer has implemented the proper frame decodes.
- E . The only method available to capture 802.11ac frames is to perform a remote capture with a compatible access point.
The network administrator of the WonderPuppy Coffee Company calls up the support hotline for his WLAN vendor and informs the support personnel that the WLAN is broken.
The support personnel ask the customer a series of questions so that they can isolate and identify the cause of a potential problem.
What are some common Troubleshooting 101 questions? (Choose all that apply.)
- A . When is the problem happening?
- B . What is your favorite color?
- C . What is your quest?
- D . Does the problem reoccur or did it just happen once?
- E . Did you make any changes recently?
Which authentication and key management (AKM) methods can also support fast BSS transition (FT)? (Choose all that apply.)
- A . MAC authentication
- B . 802.1X/EAP authentication
- C . Open system authentication
- D . SAE authentication
- E . PSK authentication
Which of these types of EAP require a server-side certificate to create an encrypted TLS tunnel?
- A . EAP-TTLS
- B . EAP-PEAPv0 (EAP-MSCHAPv2)
- C . EAP-PEAPv0 (EAP-TLS)
- D . EAP-FAST
- E . EAP-PEAPv1 (EAP-GTC)
- F . EAP-LEAP
At which layer of the OSI model does 802.11 technology operate?
- A . Session
- B . Network
- C . Physical
- D . Presentation
- E . Transport
Within an 802.1X infrastructure framework, what is the name of the device that communicates directly with a RADIUS server using the RADIUS protocol? (Choose all that apply.)
- A . Authenticator
- B . RADIUS ports
- C . Network access server
- D . LDAP integration
- E . RADIUS client
- F . Supplicant
Which of the following security attacks cannot be detected by a WIPS solution of any kind? (Choose 2)
- A . Rogue APs
- B . DoS
- C . Eavesdropping
- D . Social engineering