DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

CWSP?208 Exam Questions and Answers, Certified Wireless Security Professional | SPOTO

SPOTO's latest exam dumps on the homepage, with a 100% pass rate! SPOTO delivers authentic Cisco CCNA, CCNP study materials, CCIE Lab solutions, PMP, CISA, CISM, AWS, and Palo Alto exam dumps. Our comprehensive study materials are meticulously aligned with the latest exam objectives. With a proven track record, we have enabled thousands of candidates worldwide to pass their IT certifications on their first attempt. Over the past 20+ years, SPOTO has successfully placed numerous IT professionals in Fortune 500 companies.
Take other online exams

Question #1
Given: ABC Corporation is evaluating the security solution for their existing WLAN. Two of their supported solutions include a PPTP VPN and 802.1X/LEAP. They have used PPTP VPNs because of their wide support in server and desktop operating systems. While both PPTP and LEAP adhere to the minimum requirements of the corporate security policy, some individuals have raised concerns about MS-CHAPv2 (and similar) authentication and the known fact that MS-CHAPv2 has proven vulnerable in improper implementations. A
A. MS-CHAPv2 is compliant with WPA-Personal, but not WPA2-Enterprise
B. MS-CHAPv2 is subject to offline dictionary attacks
C. LEAP’s use of MS-CHAPv2 is only secure when combined with WEP
D. MS-CHAPv2 is only appropriate for WLAN security when used inside a TLS-encrypted tunnel
E. MS-CHAPv2 uses AES authentication, and is therefore secure
F. When implemented with AES-CCMP encryption, MS-CHAPv2 is very secure
View answer
Correct Answer: BD
Question #2
Given: You are using a Wireless Aggregator utility to combine multiple packet captures. One capture exists for each of channels 1, 6 and 11. What kind of troubleshooting are you likely performing with such a tool?
A. Wireless adapter failure analysis
B. Interference source location
C. Fast secure roaming problems
D. Narrowband DoS attack detection
View answer
Correct Answer: C
Question #3
Given: Many computer users connect to the Internet at airports, which often have 802.11n access points with a captive portal for authentication. While using an airport hot-spot with this security solution, to what type of wireless attack is a user susceptible? (Choose 2)
A. Man-in-the-Middle
B. Wi-Fi phishing
C. Management interface exploits
D. UDP port redirection
E. IGMP snooping
View answer
Correct Answer: AB
Question #4
ABC Company uses the wireless network for highly sensitive network traffic. For that reason, they intend to protect their network in all possible ways. They are continually researching new network threats and new preventative measures. They are interested in the security benefits of 802.11w, but would like to know its limitations. What types of wireless attacks are protected by 802.11w? (Choose 2)
A. RF DoS attacks
B. Layer 2 Disassociation attacks
C. Robust management frame replay attacks
D. Social engineering attacks
View answer
Correct Answer: BC
Question #5
What software and hardware tools are used together to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network? (Choose 2)
A. RF jamming device and a wireless radio card
B. A low-gain patch antenna and terminal emulation software
C. A wireless workgroup bridge and a protocol analyzer
D. DHCP server software and access point software
E. MAC spoofing software and MAC DoS software
View answer
Correct Answer: AD
Question #6
Given: During 802.1X/LEAP authentication, the username is passed across the wireless medium in clear text. From a security perspective, why is this significant?
A. The username is needed for Personal Access Credential (PAC) and X
B. The username is an input to the LEAP challenge/response hash that is exploited, so the username must be known to conduct authentication cracking
C. 4-Way Handshake nonces are based on the username in WPA and WPA2 authentication
D. The username can be looked up in a dictionary file that lists common username/password combinations
View answer
Correct Answer: B
Question #7
What 802.11 WLAN security problem is directly addressed by mutual authentication?
A. Wireless hijacking attacks
B. Weak password policies
C. MAC spoofing
D. Disassociation attacks
E. Offline dictionary attacks
F. Weak Initialization Vectors
View answer
Correct Answer: A
Question #8
Which of the following security attacks cannot be detected by a WIPS solution of any kind? (Choose 2)
A. Rogue APs
B. DoS
C. Eavesdropping
D. Social engineering
View answer
Correct Answer: CD
Question #9
Given: One of the security risks introduced by WPA2-Personal is an attack conducted by an authorized network user who knows the passphrase. In order to decrypt other users traffic, the attacker must obtain certain information from the 4-way handshake of the other users. In addition to knowing the Pairwise Master Key (PMK) and the supplicants address (SA), what other three inputs must be collected with a protocol analyzer to recreate encryption keys? (Choose 3)
A. Authenticator nonce
B. Supplicant nonce
C. Authenticator address (BSSID)
D. GTKSA
E. Authentication Server nonce
View answer
Correct Answer: ABC
Question #10
Given: John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website. The banks website uses the HTTPS protocol to protect sensitive account information. While John was using the hot-spot, a hacker was able to obtain Johns bank account user ID and password and exploit this information. What likely scenario could have allowed the hacker to obtain Johns bank account user ID and password?
A. John's bank is using an expired X
B. John uses the same username and password for banking that he does for email
C. John accessed his corporate network with his IPSec VPN software at the wireless hot-spot
D. The bank’s web server is using an X
E. Before connecting to the bank’s website, John’s association to the AP was hijacked
View answer
Correct Answer: B
Question #11
What type of WLAN attack is prevented with the use of a per-MPDU TKIP sequence counter (TSC)?
A. Weak-IV
B. Forgery
C. Replay
D. Bit-flipping
E. Session hijacking
View answer
Correct Answer: C
Question #12
Given: You manage a wireless network that services 200 wireless users. Your facility requires 20 access points, and you have installed an IEEE 802.11-compliant implementation of 802.1X/LEAP with AES-CCMP as an authentication and encryption solution. In this configuration, the wireless network is initially susceptible to what type of attacks? (Choose 2)
A. Encryption cracking
B. Offline dictionary attacks
C. Layer 3 peer-to-peer
D. Application eavesdropping
E. Session hijacking
F. Layer 1 DoS
View answer
Correct Answer: BF
Question #13
What type of WLAN attack is prevented with the use of a per-MPDU TKIP sequence counter (TSC)?
A. Weak-IV
B. Forgery
C. Replay
D. Bit-flipping
E. Session hijacking
View answer
Correct Answer: C
Question #14
What is a primary criteria for a network to qualify as a Robust Security Network (RSN)?
A. Token cards must be used for authentication
B. Dynamic WEP-104 encryption must be enabled
C. WEP may not be used for encryption
D. WPA-Personal must be supported for authentication and encryption
E. WLAN controllers and APs must not support SSHv1
View answer
Correct Answer: C

View The Updated CWNP Exam Questions

SPOTO Provides 100% Real CWNP Exam Questions for You to Pass Your CWNP Exam!

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: