CWNP CWSP-205 Exam Practice Questions (P. 3)
- Full Access (119 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
Given: You are using a Wireless Aggregator utility to combine multiple packet captures. One capture exists for each of channels 1, 6 and 11. What kind of troubleshooting are you likely performing with such a tool?
- AWireless adapter failure analysis.
- BInterference source location.
- CFast secure roaming problems.
- DNarrowband DoS attack detection.
Correct Answer:
C
C
send
light_mode
delete
Question #12
Which of the following security attacks cannot be detected by a WIPS solution of any kind? (Choose 2)
send
light_mode
delete
Question #13
Given: You have a Windows laptop computer with an integrated, dual-band, Wi-Fi compliant adapter. Your laptop computer has protocol analyzer software installed that is capable of capturing and decoding 802.11ac data.
What statement best describes the likely ability to capture 802.11ac frames for security testing purposes?
What statement best describes the likely ability to capture 802.11ac frames for security testing purposes?
- AAll integrated 802.11ac adapters will work with most protocol analyzers for frame capture, including the Radio Tap Header.
- BIntegrated 802.11ac adapters are not typically compatible with protocol analyzers in Windows laptops. It is often best to use a USB adapter or carefully select a laptop with an integrated adapter that will work.
- CLaptops cannot be used to capture 802.11ac frames because they do not support MU-MIMO.
- DOnly Wireshark can be used to capture 802.11ac frames as no other protocol analyzer has implemented the proper frame decodes.
- EThe only method available to capture 802.11ac frames is to perform a remote capture with a compatible access point.
Correct Answer:
B
B
send
light_mode
delete
Question #14
In order to acquire credentials of a valid user on a public hot-spot network, what attacks may be conducted? Choose the single completely correct answer.
- ASocial engineering and/or eavesdropping
- BRF DoS and/or physical theft
- CMAC denial of service and/or physical theft
- DAuthentication cracking and/or RF DoS
- ECode injection and/or XSS
Correct Answer:
A
A
send
light_mode
delete
Question #15
What WLAN client device behavior is exploited by an attacker during a hijacking attack?
- AWhen the RF signal between a client and an access point is disrupted for more than a few seconds, the client device will attempt to associate to an access point with better signal quality.
- BWhen the RF signal between a client and an access point is lost, the client will not seek to reassociate with another access point until the 120 second hold down timer has expired.
- CAfter the initial association and 4-way handshake, client stations and access points do not need to perform another 4-way handshake, even if connectivity is lost.
- DAs specified by the Wi-Fi Alliance, clients using Open System authentication must allow direct client-to-client connections, even in an infrastructure BSS.
- EClient drivers scan for and connect to access points in the 2.4 GHz band before scanning the 5 GHz band.
Correct Answer:
A
A
send
light_mode
delete
All Pages