Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

CWSP-206 CWSP Certified Wireless Security Professional Questions and Answers

Questions 4

When monitoring APs within a LAN using a Wireless Network Management System (WNMS), what secure protocol may be used bythe WNMS to issue configuration changes to APs?

Options:

A.

PPTP

B.

802.1X/EAP

C.

TFTP

D.

SNMPv3

E.

IPSec/ESP

Buy Now
Questions 5

ABC Company has a WLAN controller using WPA2-Enterprise with PEAPv0/MS-CHAPv2 and AES-CCMP to secure their corporate wireless data. They wish to implement a guest WLAN for guest users to have Internet access, but want to implement some security controls. The security requirements for the hotspot include:

  • Cannot access corporate network resources
  • Network permissions are limited to Internet access
  • All stations must be authenticated

What security controls would you suggest? (Choose the single best answer.)

Options:

A.

Configure access control lists (ACLs) on the guest WLAN to control data types and destinations.

B.

Require guest users to authenticate via a captive portal HTTPS login page and place the guest WLAN and the corporate WLAN on different VLANs.

C.

Implement separate controllers for the corporate and guest WLANs.

D.

Use a WIPS to deauthenticate guest users when their station tries to associate with the corporate WLAN.

E.

Force all guest users to use a common VPN protocol to connect.

Buy Now
Questions 6

ABC Company isimplementing a secure 802.11 WLAN at their headquarters (HQ) building in New York and at each of the 10 small, remote branch offices around the United States. 802.1X/EAP is ABC’s preferred security solution, where possible. All access points (at the HQ building and all branch offices) connect to a single WLAN controller located at HQ. Each branch office has only a single AP and minimal IT resources. What security best practices should be followed in this deployment scenario?

Options:

A.

Remote management of the WLAN controller via Telnet, SSH, HTTP, and HTTPS should be prohibited across the WAN link.

B.

RADIUS services should be provided at branch offices so that authentication server and suppliant credentials are not sent over the Internet.

C.

An encrypted VPN should connect the WLAN controller and each remote controller-based AP, or each remote site should provide an encrypted VPN tunnel to HQ.

D.

APs at HQ and at each branch office should not broadcast the same SSID; instead each branch should have a unique ID foruser accounting purposes.

Buy Now
Questions 7

XYZ Company has recently installed a controller-based WLAN and is using a RADIUS server to query authentication requests to an LDAP server. XYZ maintains user-based access policies and would like to use the RADIUS server to facilitate network authorization. What RADIUS feature could be used by XYZ to assign the proper network permissions to users during authentications?

Options:

A.

RADIUS can reassign a client’s 802.11 association to a new SSID by referencing a username-to-SSID mapping table in the LDAP user database.

B.

The RADIUS server can support vendor-specific attributes in the ACCESS-ACCEPT response, which can be used for user policy assignment.

C.

The RADIUS server can communicate with the DHCP server to issue the appropriate IP address and VLAN assignment to users.

D.

RADIUS can send a DO-NOT-AUTHORIZE demand to the authenticator to prevent the STA from gaining access to specific files, but may only employ this in relation to Linux servers.

Buy Now
Questions 8

ABC Company is an Internet Service Provider with thousands of customers. ABC’s customers are given login credentials for network access when they become a customer. ABC uses an LDAP server as the central user credential database. ABC is extending their service to existing customers in some public access areas and would like to use their existing database for authentication. How can ABC Company use their existing user database for wireless user authentication as they implement a large-scale WPA2-Enterprise WLAN security solution?

Options:

A.

Implement a RADIUS server and query user authentication requests through the LDAP server.

B.

Mirror the LDAP server to a RADIUS database within a WLAN controller and perform daily backups to synchronize the user databases.

C.

Import all users from the LDAP server into a RADIUS server with an LDAP-to-RADIUS conversion tool.

D.

Implement an X.509 compliant Certificate Authority and enable SSL queries on the LDAPserver.

Buy Now
Questions 9

While seeking the source of interference on channel 11 in your 802.11n WLAN running within 2.4 GHz, you notice a signal in the spectrum analyzer real time FFT display. The signal is characterized with the greatest strength utilizing only 1-2 megahertz of bandwidth and it does not use significantly more bandwidth until it has weakened by roughly 20 dB. At approximately -70 dB, it spreads across as much as 35 megahertz of bandwidth. What kind of signal is described?

Options:

A.

A high-power ultra wideband (UWB) Bluetooth transmission.

B.

A 2.4 GHz WLAN transmission using transmit beam forming.

C.

A high-power, narrowband signal.

D.

A deauthentication flood from a WIPS blocking an AP.

E.

An HT-OFDM access point.

F.

A frequency hopping wireless device in discovery mode.

Buy Now
Exam Code: CWSP-206
Exam Name: CWSP Certified Wireless Security Professional
Last Update: Apr 30, 2024
Questions: 60

PDF + Testing Engine

$130

Testing Engine

$95

PDF (Q&A)

$80