CWNP CWSP-205 Exam Practice Questions (P. 2)
- Full Access (119 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #6
A WLAN is implemented using WPA-Personal and MAC filtering.
To what common wireless network attacks is this network potentially vulnerable? (Choose 3)
To what common wireless network attacks is this network potentially vulnerable? (Choose 3)
send
light_mode
delete
Question #7
An attack is under way on the network. The attack is preventing users from accessing resources required for business operations, but the attacker has not gained access to any files or data. What kind of attack is described?
send
light_mode
delete
Question #8
Given: WLAN attacks are typically conducted by hackers to exploit a specific vulnerability within a network.
What statement correctly pairs the type of WLAN attack with the exploited vulnerability? (Choose 3)
What statement correctly pairs the type of WLAN attack with the exploited vulnerability? (Choose 3)
- AManagement interface exploit attacks are attacks that use social engineering to gain credentials from managers.
- BZero-day attacks are always authentication or encryption cracking attacks.
- CRF DoS attacks prevent successful wireless communication on a specific frequency or frequency range.
- DHijacking attacks interrupt a user’s legitimate connection and introduce a new connection with an evil twin AP.
- ESocial engineering attacks are performed to collect sensitive information from unsuspecting users
- FAssociation flood attacks are Layer 3 DoS attacks performed against authenticated client stations
Correct Answer:
CDE
CDE
send
light_mode
delete
Question #9
Given: One of the security risks introduced by WPA2-Personal is an attack conducted by an authorized network user who knows the passphrase. In order to decrypt other users traffic, the attacker must obtain certain information from the 4-way handshake of the other users.
In addition to knowing the Pairwise Master Key (PMK) and the supplicants address (SA), what other three inputs must be collected with a protocol analyzer to recreate encryption keys? (Choose 3)
In addition to knowing the Pairwise Master Key (PMK) and the supplicants address (SA), what other three inputs must be collected with a protocol analyzer to recreate encryption keys? (Choose 3)
- AAuthenticator nonce
- BSupplicant nonce
- CAuthenticator address (BSSID)
- DGTKSA
- EAuthentication Server nonce
Correct Answer:
ABC
ABC
send
light_mode
delete
Question #10
What is a primary criteria for a network to qualify as a Robust Security Network (RSN)?
- AToken cards must be used for authentication.
- BDynamic WEP-104 encryption must be enabled.
- CWEP may not be used for encryption.
- DWPA-Personal must be supported for authentication and encryption.
- EWLAN controllers and APs must not support SSHv1.
Correct Answer:
C
C
send
light_mode
delete
All Pages