The benefit of Exambibles CWNA CWSP-205 exam products can be that they may enable the candidates to acquire certified in a shortest occasion and along with little funds. So it can be a clever decision for you to make. All of the CWNA CWNA practice questions and answers will be the fruits of our own dedicated professionals. These are sparing no attempts to provide you the particular high-quality and valued CWNA CWSP-205 training materials. Our own customers ahead of you really feel at ease whenever they employ the CWNA CWNA test engine. Nearly all of them get passed the specific exam with full confidence and get any high score. Exambible can be preferred by our customers because of the particular high appreciated accomplishment ratio. However, in case you unluckily get malfunction in the CWNA CWNA exam, it is possible to enjoy the particular full refund regarding purchasing service fees policy.

2021 Nov CWSP-205 free exam questions

Q11. Given: You are installing 6 APs on the outside of your facility. They will be mounted at a height of 6 feet. What must you do to implement these APs in a secure manner beyond the normal indoor AP implementations? (Choose the single best answer.) 

A.  User external antennas. 

B. Use internal antennas. 

C. Power the APs using PoE. 

D. Ensure proper physical and environmental security using outdoor ruggedized APs or enclosures. 

Answer:


Q12. Given: XYZ Hospital plans to improve the security and performance of their Voice over Wi-Fi implementation and will be upgrading to 802.11n phones with 802.1X/EAP authentication. 

XYZ would like to support fast secure roaming for the phones and will require the ability to troubleshoot reassociations that are delayed or dropped during inter-channel roaming. What portable solution would be recommended for XYZ to troubleshoot roaming problems? 

A. WIPS sensor software installed on a laptop computer 

B. Spectrum analyzer software installed on a laptop computer 

C. An autonomous AP mounted on a mobile cart and configured to operate in monitor mode 

D. Laptop-based protocol analyzer with multiple 802.11n adapters 

Answer:


Q13. You must support a TSN as you have older wireless equipment that will not support the required processing of AES encryption. Which one of the following technologies will you use on the network so that a TSN can be implemented that would not be required in a network compliant with 802.11-2012 non-deprecated technologies? 

A. WEP 

B. RC4 

C. CCMP 

D. WPA2 

Answer:


Q14. Given: You support a coffee shop and have recently installed a free 802.11ac wireless hot-spot for the benefit of your customers. You want to minimize legal risk in the event that the hot-spot is used for illegal Internet activity. What option specifies the best approach to minimize legal risk at this public hot-spot while maintaining an open venue for customer Internet access? 

A. Configure WPA2-Enterprise security on the access point 

B.  Block TCP port 25 and 80 outbound on the Internet router 

C. Require client STAs to have updated firewall and antivirus software 

D. Allow only trusted patrons to use the WLAN 

E.  Use a WIPS to monitor all traffic and deauthenticate malicious stations 

F. Implement a captive portal with an acceptable use disclaimer 

Answer:


Q15. Given: ABC Corporation's 802.11 WLAN is comprised of a redundant WLAN controller pair (N+1) and 30 access points implemented in 2004. ABC implemented WEP encryption with IPSec VPN technology to secure their wireless communication because it was the strongest security solution available at the time it was implemented. IT management has decided to upgrade the WLAN infrastructure and implement Voice over Wi- Fi and is concerned with security because most Voice over Wi-Fi phones do not support IPSec. As the wireless network administrator, what new security solution would be best for protecting ABC's data? 

A. Migrate corporate data clients to WPA-Enterprise and segment Voice over Wi-Fi phones by assigning them to a different frequency band. 

B. Migrate corporate data and Voice over Wi-Fi devices to WPA2-Enterprise with fast secure roaming support, and segment Voice over Wi-Fi data on a separate VLAN. 

C. Migrate to a multi-factor security solution to replace IPSec; use WEP with MAC filtering, SSID hiding, stateful packet inspection, and VLAN segmentation. 

D. Migrate all 802.11 data devices to WPA-Personal, and implement a secure DHCP server to allocate addresses from a segmented subnet for the Voice over Wi-Fi phones. 

Answer:


Improve CWSP-205 free practice questions:

Q16. You are implementing a wireless LAN that will be used by point-of-sale (PoS) systems in a retail environment. Thirteen PoS computers will be installed. To what industry requirement should you ensure you adhere? 

A. ISA99 

B. HIPAA 

C. PCI-DSS 

D. Directive 8500.01 

Answer:


Q17. What statement accurately describes the functionality of the IEEE 802.1X standard? 

A.  Port-based access control with EAP encapsulation over the LAN (EAPoL) 

B. Port-based access control with dynamic encryption key management and distribution 

C. Port-based access control with support for authenticated-user VLANs only 

D. Port-based access control with mandatory support of AES-CCMP encryption 

E. Port-based access control, which allows three frame types to traverse the uncontrolled port: EAP, DHCP, and DNS. 

Answer:


Q18. What field in the RSN information element (IE) will indicate whether PSK- or Enterprise-based WPA or WPA2 is in use? 

A. AKM Suite List 

B. Group Cipher Suite 

C. RSN Capabilities 

D. Pairwise Cipher Suite List 

Answer:


Q19. The following numbered items  show  some of the contents  of each of the four frames exchanged during the 4- way handshake: 

1. Encrypted GTK sent 

2. Confirmation of temporal key installation 

3. Anonce sent from authenticator to supplicant 

4. Snonce sent from supplicant to authenticator, MIC included 

Arrange the frames in the correct sequence beginning with the start of the 4-way handshake. 

A.2, 3, 4, 1 

B.1, 2,3, 4 

C.4, 3,1, 2 

D.3, 4, 1, 2 

Answer:


Q20. Given: Your company has just completed installation of an IEEE 802.11 WLAN controller with 20 controller- based APs. The CSO has specified PEAPv0/EAP-MSCHAPv2 as the only authorized WLAN authentication mechanism. Since an LDAP-compliant user database was already in use, a RADIUS server was installed and is querying authentication requests to the LDAP server. Where must the X.509 server certificate and private key be installed in this network? 

A. Supplicant devices 

B. LDAP server 

C. Controller-based APs 

D. WLAN controller 

E. RADIUS server 

Answer: