Pinpoint of CWSP-205 practice materials and interactive bootcamp for CWNA certification for IT professionals, Real Success Guaranteed with Updated CWSP-205 pdf dumps vce Materials. 100% PASS Certified Wireless Security Professional exam Today!

2021 Nov CWSP-205 free question

Q31. Given: You have implemented strong authentication and encryption mechanisms for your enterprise 802.11 WLAN using 802.1X/EAP with AES-CCMP. For users connecting within the headquarters office, what other security solution will provide continuous monitoring of both clients and APs with 802.11-specific tracking? 

A. IPSec VPN client and server software 

B. Internet firewall software 

C. Wireless intrusion prevention system 

D. WLAN endpoint agent software 

E. RADIUS proxy server 

Answer:


Q32. The IEEE 802.11 standard defined Open System authentication as consisting of two auth frames  and two assoc frames. In a WPA2-Enterprise network, what process immediately follows the 802.11 association procedure? 

A. Group Key Handshake 

B. 802.1X/EAP authentication 

C. DHCP Discovery 

D. 4-Way Handshake 

E. Passphrase-to-PSK mapping 

F. RADIUS shared secret lookup 

Answer:


Q33. Given: AAA is an architectural framework used to provide three separate security components in a network. Listed below are three phrases that each describe one aspect of the AAA framework. Option-1 --This AAA function is performed first and validates user identify prior to determining the network resources to which they will be granted access. Option-2 --This function is used for monitoring and auditing purposes and includes the collection of data that identifies what a user has done while connected. Option-3 -- This function is used to designate permissions to a particular user. What answer correctly pairs the AAA component with the descriptions provided above? 

A. Option-1 Access Control Option-2 Authorization Option-3 Accounting 

B. Option-1 Authentication Option-2 Accounting Option-3 Association 

C. Option-1 Authorization Option-2 Access Control Option-3 Association 

D. Option-1 Authentication Option-2 Accounting Option-3 Authorization 

Answer:


Q34. When implementing a WPA2-Enterprise security solution, what protocol must the selected RADIUS server support? 

A. LWAPP, GRE, or CAPWAP 

B. IPSec/ESP 

C. EAP 

D. CCMP and TKIP 

E. LDAP 

Answer:


Q35. Given: ABC Company has a WLAN controller using WPA2-Enterprise with PEAPv0/MS- CHAPv2 and AES- CCMP to secure their corporate wireless data. They wish to implement a guest WLAN for guest users to have Internet access, but want to implement some security controls. The security requirements for the hot-spot include: 

Cannot access corporate network resources Network permissions are limited to Internet access 

All stations must be authenticated 

What security controls would you suggest? (Choose the single best answer.) 

A. Implement separate controllers for the corporate and guest WLANs. 

B. Use a WIPS to deauthenticate guest users when their station tries to associate with the corporate WLAN. 

C. Configure access control lists (ACLs) on the guest WLAN to control data types and destinations. 

D. Require guest users to authenticate via a captive portal HTTPS login page and place the guest WLAN and the corporate WLAN on different VLANs. 

E. Force all guest users to use a common VPN protocol to connect. 

Answer:


Renovate CWSP-205 exam question:

Q36. Given: You have a Windows laptop computer with an integrated, dual-band, Wi-Fi compliant adapter. Your laptop computer has protocol analyzer software installed that is capable of capturing and decoding 802.11ac data. What statement best describes the likely ability to capture 802.11ac frames for security testing purposes? 

A. All integrated 802.11ac adapters will work with most protocol analyzers for frame capture, including the Radio Tap Header. 

B. Integrated 802.11ac adapters are not typically compatible with protocol analyzers in Windows laptops. It is often best to use a USB adapter or carefully select a laptop with an integrated adapter that will work. 

C. Laptops cannot be used to capture 802.11ac frames because they do not support MU-MIMO. 

D. Only Wireshark can be used to capture 802.11ac frames as no other protocol analyzer has implemented the proper frame decodes. 

E. The only method available to capture 802.11ac frames is to perform a remote capture with a compatible access point. 

Answer:


Q37. Given: The Marketing department's WLAN users need to reach their file and email server as well as the Internet, but should not have access to any other network resources. What single WLAN security feature should be implemented to comply with these requirements? 

A. Mutual authentication 

B.  Captive portal 

C. Role-based access control 

D.  Group authentication 

E. RADIUS policy accounting 

Answer:


Q38. When monitoring APs within a LAN using a Wireless Network Management System (WNMS), what secure protocol may be used by the WNMS to issue configuration changes to APs? 

A. IPSec/ESP 

B. TFTP 

C. 802.1X/EAP 

D. SNMPv3 

E. PPTP 

Answer:


Q39. Given: WLAN attacks are typically conducted by hackers to exploit a specific vulnerability within a network. What statement correctly pairs the type of WLAN attack with the exploited vulnerability? (Choose 3) 

A. Management interface exploit attacks are attacks that use social engineering to gain credentials from managers. 

B. Zero-day attacks are always authentication or encryption cracking attacks. 

C. RF DoS attacks prevent successful wireless communication on a specific frequency or frequency range. 

D. Hijacking attacks interrupt a user's legitimate connection and introduce a new connection with an evil twin AP. 

E. Social engineering attacks are performed to collect sensitive information from unsuspecting users 

F. Association flood attacks are Layer 3 DoS attacks performed against authenticated client stations 

Answer: C, D, E 


Q40. In what deployment scenarios would it be desirable to enable peer-to-peer traffic blocking? 

A. In home networks in which file and printer sharing is enabled 

B. At public hot-spots in which many clients use diverse applications 

C. In corporate Voice over Wi-Fi networks with push-to-talk multicast capabilities 

D. In university environments using multicast video training sourced from professor's laptops 

Answer: