Top Quality of CWSP-205 exam topics materials and braindump for CWNA certification for IT professionals, Real Success Guaranteed with Updated CWSP-205 pdf dumps vce Materials. 100% PASS Certified Wireless Security Professional exam Today!
Q18. What statement is true regarding the nonces (ANonce and SNonce) used in the IEEE 802.11 4 Way Handshake?
A. Both nonces are used by the Supplicant and Authenticator in the derivation of a single PTK.
B. The Supplicant uses the SNonce to derive its unique PTK and the Authenticator uses the ANonce to derive its unique PTK, but the nonces are not shared.
C. Nonces are sent in EAPoL frames to indicate to the receiver that the sending station has installed and validated the encryption keys.
D. The nonces are created by combining the MAC addresses of the Supplicant, Authenticator, and Authentication Server into a mixing algorithm.
Answer: A
Q19. What statement accurately describes the functionality of the IEEE 802.1X standard?
A. Port-based access control with EAP encapsulation over the LAN (EAPoL)
B. Port-based access control with dynamic encryption key management and distribution
C. Port-based access control with support for authenticated-user VLANs only
D. Port-based access control with mandatory support of AES-CCMP encryption
E. Port-based access control, which allows three frame types to traverse the uncontrolled port: EAP, DHCP, and DNS.
Answer: A
Q20. Joe's new laptop is experiencing difficulty connecting to ABC Company's 802.11 WLAN using 802.1X/EAP PEAPv0. The company's wireless network administrator assured Joe that his laptop was authorized in the WIPS management console for connectivity to ABC's network before it was given to him. The WIPS termination policy includes alarms for rogue stations, roque APs, DoS attacks and unauthorized roaming. What is a likely reason that Joe cannot connect to the network?
A. Joe disabled his laptop's integrated 802.11 radio and is using a personal PC card radio with a different chipset, drivers, and client utilities.
B. Joe's integrated 802.11 radio is sending multiple Probe Request frames on each channel.
C. An ASLEAP attack has been detected on APs to which Joe's laptop was trying to associate. The WIPS responded by disabling the APs.
D. Joe configured his 802.11 radio card to transmit at 100 mW to increase his SNR. The WIPS is detecting this much output power as a DoS attack.
Answer: A
Q21. Given: WLAN protocol analyzers can read and record many wireless frame parameters. What parameter is needed to physically locate rogue APs with a protocol analyzer?
A. SSID
B. IP Address
C. BSSID
D. Signal strength
E. RSN IE
F. Noise floor
Answer: D
Q22. Given: Mary has just finished troubleshooting an 802.11g network performance problem using a laptop-based WLAN protocol analyzer. The wireless network implements 802.1X/PEAP and the client devices are authenticating properly. When Mary disables the WLAN protocol analyzer, configures her laptop for PEAP authentication, and then tries to connect to the wireless network, she is unsuccessful. Before using the WLAN protocol analyzer, Mary's laptop connected to the network without any problems. What statement indicates why Mary cannot access the network from her laptop computer?
A. The nearby WIPS sensor categorized Mary's protocol analyzer adapter as a threat and is performing a deauthentication flood against her computer.
B. The PEAP client's certificate was voided when the protocol analysis software assumed control of the wireless adapter.
C. The protocol analyzer's network interface card (NIC) drivers are still loaded and do not support the version of PEAP being used.
D. Mary's supplicant software is using PEAPv0/EAP-MSCHAPv2, and the access point is using PEAPv1/EAP- GTC.
Answer: C
Q23. Given: ABC Company is an Internet Service Provider with thousands of customers. ABC's customers are given login credentials for network access when they become a customer. ABC uses an LDAP server as the central user credential database. ABC is extending their service to existing customers in some public access areas and would like to use their existing database for authentication. How can ABC Company use their existing user database for wireless user authentication as they implement a large-scale WPA2-Enterprise WLAN security solution?
A. Import all users from the LDAP server into a RADIUS server with an LDAP-to-RADIUS conversion tool.
B. Implement an X.509 compliant Certificate Authority and enable SSL queries on the LDAP server.
C. Mirror the LDAP server to a RADIUS database within a WLAN controller and perform daily backups to synchronize the user databases.
D. Implement a RADIUS server and query user authentication requests through the LDAP server.
Answer: D
Q24. Given: You view a protocol analyzer capture decode with the following protocol frames listed in the following order (excluding the ACK frames): 1) 802.11 Probe Request and 802.11 Probe Response 2) 802.11 Auth and another 802.11 Auth 2) 802.11 Assoc Req and 802.11 Assoc Rsp 4) EAPOL-Start 5) EAP Request and EAP Response 6) EAP Request and EAP Response 7) EAP Request and EAP Response 8) EAP Request and EAP Response 9) EAP Request and EAP Response 10) EAP Success 19) EAPOL-Key (4 frames in a row) What are you seeing in the capture file? (Choose 4)
A. WPA2-Enterprise authentication
B. WPA2-Personal authentication
C. 802.11 Open System authentication
D. 802.1X with Dynamic WEP
E. Wi-Fi Protected Setup with PIN
F. Active Scanning
G. 4-Way Handshake
Answer: A,C, F, G
Q25. Given: A large enterprise is designing a secure, scalable, and manageable 802.11n WLAN that will support thousands of users. The enterprise will support both 802.1X/EAP-TTLS and PEAPv0/MSCHAPv2. Currently, the company is upgrading network servers as well and will replace their existing Microsoft IAS implementation with Microsoft NPS, querying Active Directory for user authentication. For this organization, as they update their WLAN infrastructure, what WLAN controller feature will likely be least valuable?
A. WPA2-Enterprise authentication/encryption
B. Internal RADIUS server
C. WIPS support and integration
D. 802.1Q VLAN trunking
E. SNMPv3 support
Answer: B
Q26. ABC Company uses the wireless network for highly sensitive network traffic. For that reason, they intend to protect their network in all possible ways. They are continually researching new network threats and new preventative measures. They are interested in the security benefits of 802.11w, but would like to know its limitations. What types of wireless attacks are protected by 802.11w? (Choose 2)
A. RF DoS attacks
B. Layer 2 Disassociation attacks
C. Robust management frame replay attacks
D. Social engineering attacks
Answer: B, C
Q27. You work as the security administrator for your organization. In relation to the WLAN, you are viewing a dashboard that shows security threat, policy compliance and rogue threat charts.
What type of system is in view?
A. Wireshark Protocol Analyzer
B. Wireless VPN Management Systems
C. Wireless Intrusion Prevention System
D. Distributed RF Spectrum Analyzer
E. WLAN Emulation System
Answer: C
Q28. Given: You are the WLAN administrator in your organization and you are required to monitor the network and ensure all active WLANs are providing RSNs. You have a laptop protocol analyzer configured. In what frame could you see the existence or non-existence of proper RSN configuration parameters for each BSS through the RSN IE?
A. Probe request
B. Beacon
C. RTS
D. CTS
E. Data frames
Answer: B
Q29. Given: When the CCMP cipher suite is used for protection of data frames, 16 bytes of overhead are added to the Layer 2 frame. 8 of these bytes comprise the MIC. What purpose does the encrypted MIC play in protecting the data frame?
A. The MIC is used as a first layer of validation to ensure that the wireless receiver does not incorrectly process corrupted signals.
B. The MIC provides for a cryptographic integrity check against the data payload to ensure that it matches the original transmitted data.
C. The MIC is a hash computation performed by the receiver against the MAC header to detect replay attacks prior to processing the encrypted payload.
D. The MIC is a random value generated during the 4-way handshake and is used for key mixing to enhance the strength of the derived PTK.
Answer: B
Q30. When using a tunneled EAP type, such as PEAP, what component is protected inside the TLS tunnel so that it is not sent in clear text across the wireless medium?
A. X.509 certificates
B. User credentials
C. Server credentials
D. RADIUS shared secret
Answer: B
Q31. Given: Your network implements an 802.1X/EAP-based wireless security solution. A WLAN controller is installed and manages seven APs. FreeRADIUS is used for the RADIUS server and is installed on a dedicated server named SRV21. One example client is a MacBook Pro with 8 GB RAM. What device functions as the 802.1X/EAP Authenticator?
A. SRV21
B. WLAN Controller/AP
C. MacBook Pro
D. RADIUS server
Answer: B
Q32. You perform a protocol capture using Wireshark and a compatible 802.11 adapter in Linux. When viewing the capture, you see an auth req frame and an auth rsp frame. Then you see an assoc req frame and an assoc rsp frame. Shortly after, you see DHCP communications and then ISAKMP protocol packets. What security solution is represented?
A. 802.1X/EAP-TTLS
B. Open 802.11 authentication with IPSec
C. 802.1X/PEAPv0/MS-CHAPv2
D. WPA2-Personal with AES-CCMP
E. EAP-MD5
Answer: B
Q33. What field in the RSN information element (IE) will indicate whether PSK- or Enterprise-based WPA or WPA2 is in use?
A. AKM Suite List
B. Group Cipher Suite
C. RSN Capabilities
D. Pairwise Cipher Suite List
Answer: A
Q34. While seeking the source of interference on channel 11 in your 802.11n WLAN running within
2.4 GHz, you notice a signal in the spectrum analyzer real time FFT display. The signal is characterized with the greatest strength utilizing only 1-2 megahertz of bandwidth and it does not use significantly more bandwidth until it has weakened by roughly 20 dB. At approximately -70 dB, it spreads across as much as 35 megahertz of bandwidth. What kind of signal is described?
A. A high-power, narrowband signal
B. A 2.4 GHz WLAN transmission using transmit beam forming
C. An HT-OFDM access point
D. A frequency hopping wireless device in discovery mode
E. A deauthentication flood from a WIPS blocking an AP
F. A high-power ultra wideband (UWB) Bluetooth transmission
Answer: A