CWNP CWSP-205 Exam Practice Questions (P. 5)
- Full Access (119 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #21
Given: You manage a wireless network that services 200 wireless users. Your facility requires 20 access points, and you have installed an IEEE 802.11-compliant implementation of 802.1X/LEAP with AES-CCMP as an authentication and encryption solution.
In this configuration, the wireless network is initially susceptible to what type of attacks? (Choose 2)
In this configuration, the wireless network is initially susceptible to what type of attacks? (Choose 2)
- AEncryption cracking
- BOffline dictionary attacks
- CLayer 3 peer-to-peer
- DApplication eavesdropping
- ESession hijacking
- FLayer 1 DoS
Correct Answer:
BF
BF
send
light_mode
delete
Question #22
Given: ABC Corporation is evaluating the security solution for their existing WLAN. Two of their supported solutions include a PPTP VPN and 802.1X/LEAP. They have used PPTP VPNs because of their wide support in server and desktop operating systems. While both PPTP and LEAP adhere to the minimum requirements of the corporate security policy, some individuals have raised concerns about MS-CHAPv2 (and similar) authentication and the known fact that MS-CHAPv2 has proven vulnerable in improper implementations.
As a consultant, what do you tell ABC Corporation about implementing MS-CHAPv2 authentication? (Choose 2)
As a consultant, what do you tell ABC Corporation about implementing MS-CHAPv2 authentication? (Choose 2)
- AMS-CHAPv2 is compliant with WPA-Personal, but not WPA2-Enterprise.
- BMS-CHAPv2 is subject to offline dictionary attacks.
- CLEAP’s use of MS-CHAPv2 is only secure when combined with WEP.
- DMS-CHAPv2 is only appropriate for WLAN security when used inside a TLS-encrypted tunnel.
- EMS-CHAPv2 uses AES authentication, and is therefore secure.
- FWhen implemented with AES-CCMP encryption, MS-CHAPv2 is very secure.
Correct Answer:
BD
BD
send
light_mode
delete
Question #23
You perform a protocol capture using Wireshark and a compatible 802.11 adapter in Linux. When viewing the capture, you see an auth req frame and an auth rsp frame. Then you see an assoc req frame and an assoc rsp frame. Shortly after, you see DHCP communications and then ISAKMP protocol packets. What security solution is represented?
- A802.1X/EAP-TTLS
- BOpen 802.11 authentication with IPSec
- C802.1X/PEAPv0/MS-CHAPv2
- DWPA2-Personal with AES-CCMP
- EEAP-MD5
Correct Answer:
B
B
send
light_mode
delete
Question #24
Given: In a security penetration exercise, a WLAN consultant obtains the WEP key of XYZ Corporations wireless network. Demonstrating the vulnerabilities of using WEP, the consultant uses a laptop running a software AP in an attempt to hijack the authorized users connections. XYZs legacy network is using 802.11n
APs with 802.11b, 11g, and 11n client devices.
With this setup, how can the consultant cause all of the authorized clients to establish Layer 2 connectivity with the software access point?
APs with 802.11b, 11g, and 11n client devices.
With this setup, how can the consultant cause all of the authorized clients to establish Layer 2 connectivity with the software access point?
- AAll WLAN clients will reassociate to the consultants software AP if the consultants software AP provides the same SSID on any channel with a 10 dB SNR improvement over the authorized AP.
- BA higher SSID priority value configured in the Beacon frames of the consultants software AP will take priority over the SSID in the authorized AP, causing the clients to reassociate.
- CWhen the RF signal between the clients and the authorized AP is temporarily disrupted and the consultants software AP is using the same SSID on a different channel than the authorized AP, the clients will reassociate to the software AP.
- DIf the consultant’s software AP broadcasts Beacon frames that advertise 802.11g data rates that are faster rates than XYZ’s current 802.11b data rates, all
Correct Answer:
C
C
send
light_mode
delete
Question #25
What elements should be addressed by a WLAN security policy? (Choose 2)
- AEnabling encryption to prevent MAC addresses from being sent in clear text
- BHow to prevent non-IT employees from learning about and reading the user security policy
- CEnd-user training for password selection and acceptable network use
- DThe exact passwords to be used for administration interfaces on infrastructure devices
- ESocial engineering recognition and mitigation techniques
Correct Answer:
CE
CE
send
light_mode
delete
All Pages