CWNP CWSP-205 Exam Practice Questions (P. 4)
- Full Access (119 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #16
What software and hardware tools are used together to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?
(Choose 2)
(Choose 2)
- ARF jamming device and a wireless radio card
- BA low-gain patch antenna and terminal emulation software
- CA wireless workgroup bridge and a protocol analyzer
- DDHCP server software and access point software
- EMAC spoofing software and MAC DoS software
Correct Answer:
AD
AD
send
light_mode
delete
Question #17
Given: Many computer users connect to the Internet at airports, which often have 802.11n access points with a captive portal for authentication.
While using an airport hot-spot with this security solution, to what type of wireless attack is a user susceptible? (Choose 2)
While using an airport hot-spot with this security solution, to what type of wireless attack is a user susceptible? (Choose 2)
- AMan-in-the-Middle
- BWi-Fi phishing
- CManagement interface exploits
- DUDP port redirection
- EIGMP snooping
Correct Answer:
AB
AB
send
light_mode
delete
Question #18
Given: During 802.1X/LEAP authentication, the username is passed across the wireless medium in clear text.
From a security perspective, why is this significant?
From a security perspective, why is this significant?
- AThe username is needed for Personal Access Credential (PAC) and X.509 certificate validation.
- BThe username is an input to the LEAP challenge/response hash that is exploited, so the username must be known to conduct authentication cracking.
- C4-Way Handshake nonces are based on the username in WPA and WPA2 authentication.
- DThe username can be looked up in a dictionary file that lists common username/password combinations.
Correct Answer:
B
B
send
light_mode
delete
Question #19
Given: In XYZs small business, two autonomous 802.11ac APs and 12 client devices are in use with WPA2-Personal.
What statement about the WLAN security of this company is true?
What statement about the WLAN security of this company is true?
- AIntruders may obtain the passphrase with an offline dictionary attack and gain network access, but will be unable to decrypt the data traffic of other users.
- BA successful attack against all unicast traffic on the network would require a weak passphrase dictionary attack and the capture of the latest 4-Way Handshake for each client.
- CAn unauthorized wireless client device cannot associate, but can eavesdrop on some data because WPA2-Personal does not encrypt multicast or broadcast traffic.
- DAn unauthorized WLAN user with a protocol analyzer can decode data frames of authorized users if he captures the BSSID, client MAC address, and a users 4-Way Handshake.
- EBecause WPA2-Personal uses Open System authentication followed by a 4-Way Handshake, hijacking attacks are easily performed.
Correct Answer:
B
B
send
light_mode
delete
Question #20
Given: The Aircrack-ng WLAN software tool can capture and transmit modified 802.11 frames over the wireless network. It comes pre-installed on Kali Linux and some other Linux distributions.
What are three uses for such a tool? (Choose 3)
What are three uses for such a tool? (Choose 3)
- ATransmitting a deauthentication frame to disconnect a user from the AP.
- BAuditing the configuration and functionality of a WIPS by simulating common attack sequences
- CProbing the RADIUS server and authenticator to expose the RADIUS shared secret
- DCracking the authentication or encryption processes implemented poorly in some WLANs
Correct Answer:
ABD
ABD
send
light_mode
delete
All Pages