Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

CWSP-208 Certified Wireless Security Professional (CWSP) is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

CWSP-208 Practice Questions

Certified Wireless Security Professional (CWSP)

Last Update 6 hours ago
Total Questions : 119

Dive into our fully updated and stable CWSP-208 practice test platform, featuring all the latest CWSP exam questions added this week. Our preparation tool is more than just a CWNP study aid; it's a strategic advantage.

Our free CWSP practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about CWSP-208. Use this test to pinpoint which areas you need to focus your study on.

CWSP-208 PDF

CWSP-208 PDF (Printable)
$43.75
$124.99

CWSP-208 Testing Engine

CWSP-208 PDF (Printable)
$50.75
$144.99

CWSP-208 PDF + Testing Engine

CWSP-208 PDF (Printable)
$63.7
$181.99
Question # 21

Given: A WLAN protocol analyzer trace reveals the following sequence of frames (excluding the ACK frames):

1) 802.11 Probe Req and 802.11 Probe Rsp

2) 802.11 Auth and then another 802.11 Auth

3) 802.11 Assoc Req and 802.11 Assoc Rsp

4) EAPOL-KEY

5) EAPOL-KEY

6) EAPOL-KEY

7) EAPOL-KEY

What security mechanism is being used on the WLAN?

Options:

A.  

WEP-128

B.  

WPA2-Personal

C.  

EAP-TLS

D.  

WPA-Enterprise

E.  

802.1X/LEAP

Discussion 0
Question # 22

You must locate non-compliant 802.11 devices. Which one of the following tools will you use and why?

Options:

A.  

A spectrum analyzer, because it can show the energy footprint of a device using WPA differently from a device using WPA2.

B.  

A spectrum analyzer, because it can decode the PHY preamble of a non-compliant device.

C.  

A protocol analyzer, because it can be used to view the spectrum energy of non-compliant 802.11 devices, which is always different from compliant devices.

D.  

A protocol analyzer, because it can be used to report on security settings and regulatory or rule compliance

Discussion 0
Question # 23

What field in the RSN information element (IE) will indicate whether PSK- or Enterprise-based WPA or WPA2 is in use?

Options:

A.  

AKM Suite List

B.  

Group Cipher Suite

C.  

RSN Capabilities

D.  

Pairwise Cipher Suite List

Discussion 0
Question # 24

In an effort to optimize WLAN performance, ABC Company has upgraded their WLAN infrastructure from 802.11a/g to 802.11n. 802.11a/g clients are still supported and are used throughout ABC’s facility. ABC has always been highly security conscious, but due to budget limitations, they have not yet updated their overlay WIPS solution to 802.11n or 802.11ac.

Given ABC’s deployment strategy, what security risks would not be detected by the 802.11a/g WIPS?

Options:

A.  

Hijacking attack performed by using a rogue 802.11n AP against an 802.11a client

B.  

Rogue AP operating in Greenfield 40 MHz-only mode

C.  

802.11a STA performing a deauthentication attack against 802.11n APs

D.  

802.11n client spoofing the MAC address of an authorized 802.11n client

Discussion 0
Question # 25

Given: XYZ Hospital plans to improve the security and performance of their Voice over Wi-Fi implementation and will be upgrading to 802.11n phones with 802.1X/EAP authentication. XYZ would like to support fast secure roaming for the phones and will require the ability to troubleshoot reassociations that are delayed or dropped during inter-channel roaming.

What portable solution would be recommended for XYZ to troubleshoot roaming problems?

Options:

A.  

WIPS sensor software installed on a laptop computer

B.  

Spectrum analyzer software installed on a laptop computer

C.  

An autonomous AP mounted on a mobile cart and configured to operate in monitor mode

D.  

Laptop-based protocol analyzer with multiple 802.11n adapters

Discussion 0
Question # 26

The following numbered items show some of the contents of each of the four frames exchanged during the 4-way handshake:

1. Encrypted GTK sent

2. Confirmation of temporal key installation

3. Anonce sent from authenticator to supplicant

4. Snonce sent from supplicant to authenticator, MIC included

Arrange the frames in the correct sequence beginning with the start of the 4-way handshake.

Options:

A.  

2, 3, 4, 1

B.  

1, 2, 3, 4

C.  

4, 3, 1, 2

D.  

3, 4, 1, 2

Discussion 0
Question # 27

You are implementing a wireless LAN that will be used by point-of-sale (PoS) systems in a retail environment. Thirteen PoS computers will be installed. To what industry requirement should you ensure you adhere?

Options:

A.  

ISA99

B.  

HIPAA

C.  

PCI-DSS

D.  

Directive 8500.01

Discussion 0
Question # 28

As the primary security engineer for a large corporate network, you have been asked to author a new security policy for the wireless network. While most client devices support 802.1X authentication, some legacy devices still only support passphrase/PSK-based security methods.

When writing the 802.11 security policy, what password-related items should be addressed?

Options:

A.  

MSCHAPv2 passwords used with EAP/PEAPv0 should be stronger than typical WPA2-PSK passphrases.

B.  

Password complexity should be maximized so that weak WEP IV attacks are prevented.

C.  

Static passwords should be changed on a regular basis to minimize the vulnerabilities of a PSK-based authentication.

D.  

Certificates should always be recommended instead of passwords for 802.11 client authentication.

E.  

EAP-TLS must be implemented in such scenarios.

Discussion 0
Question # 29

In what deployment scenarios would it be desirable to enable peer-to-peer traffic blocking?

Options:

A.  

In home networks in which file and printer sharing is enabled

B.  

At public hot-spots in which many clients use diverse applications

C.  

In corporate Voice over Wi-Fi networks with push-to-talk multicast capabilities

D.  

In university environments using multicast video training sourced from professor’s laptops

Discussion 0
Question # 30

What policy would help mitigate the impact of peer-to-peer attacks against wireless-enabled corporate laptop computers when the laptops are also used on public access networks such as wireless hot-spots?

Options:

A.  

Require Port Address Translation (PAT) on each laptop.

B.  

Require secure applications such as POP, HTTP, and SSH.

C.  

Require VPN software for connectivity to the corporate network.

D.  

Require WPA2-Enterprise as the minimal WLAN security solution.

Discussion 0
Get CWSP-208 dumps and pass your exam in 24 hours!

Free Exams Sample Questions