Audit CWSP-205 is regarded as the valued and also demanded review inside discipline. To feed the following exercise review CWSP-205 just isnt that easy though your guidance you are going to obvious CWSP-205 in a really earliest probability. The professionals who would like to always be skillful in their domains and still have any need to achieve in the optimum regarding capabilities and also good results they use various official certifications tests thats why. Training tests CWSP-205 tend to be actual accreditation in which ensure your current employers youre very skilled, skilled, and also consistent.
2021 Nov CWSP-205 exam cram
Q21. What type of WLAN attack is prevented with the use of a per-MPDU TKIP sequence counter (TSC)?
A. Weak-IV
B. Forgery
C. Replay
D. Bit-flipping
E. Session hijacking
Answer: C
Q22. Wireless Intrusion Prevention Systems (WIPS) provide what network security services?
(Choose 2)
A. Configuration distribution for autonomous APs
B. Wireless vulnerability assessment
C. Application-layer traffic inspection
D. Analysis and reporting of AP CPU utilization
E. Policy enforcement and compliance management
Answer: B, E
Q23. Given: You are the WLAN administrator in your organization and you are required to monitor the network and ensure all active WLANs are providing RSNs. You have a laptop protocol analyzer configured. In what frame could you see the existence or non-existence of proper RSN configuration parameters for each BSS through the RSN IE?
A. Probe request
B. Beacon
C. RTS
D. CTS
E. Data frames
Answer: B
Q24. What EAP type supports using MS-CHAPv2, EAP-GTC or EAP-TLS for wireless client authentication?
A. H-REAP
B. EAP-GTC
C. EAP-TTLS
D. PEAP
E. LEAP
Answer: D
Q25. Given: You are using a Wireless Aggregator utility to combine multiple packet captures. One capture exists for each of channels 1, 6 and 11. What kind of troubleshooting are you likely performing with such a tool?
A. Wireless adapter failure analysis.
B. Interference source location.
C. Fast secure roaming problems.
D. Narrowband DoS attack detection.
Answer: C
Abreast of the times CWSP-205 training:
Q26. Given: Your network implements an 802.1X/EAP-based wireless security solution. A WLAN controller is installed and manages seven APs. FreeRADIUS is used for the RADIUS server and is installed on a dedicated server named SRV21. One example client is a MacBook Pro with 8 GB RAM. What device functions as the 802.1X/EAP Authenticator?
A. SRV21
B. WLAN Controller/AP
C. MacBook Pro
D. RADIUS server
Answer: B
Q27. What statements are true about 802.11-2012 Protected Management Frames? (Choose 2)
A. 802.11w frame protection protects against some Layer 2 denial-of-service (DoS) attacks, but it cannot prevent all types of Layer 2 DoS attacks.
B. When frame protection is in use, the PHY preamble and header as well as the MAC header are encrypted with 256-or 512-bit AES.
C. Authentication, association, and acknowledgment frames are protected if management frame protection is enabled, but deauthentication and disassociation frames are not.
D. Management frame protection protects disassociation and deauthentication frames.
Answer: A, D
Q28. You have an AP implemented that functions only using 802.11-2012 standard methods for the WLAN communications on the RF side and implementing multiple SSIDs and profiles on the management side configured as follows:
1. SSID: Guest VLAN 90 Security: Open with captive portal authentication 2 current clients
2. SSID: ABCData VLAN 10 Security: PEAPv0/EAP-MSCHAPv2 with AES-CCMP 5 current clients
3. SSID: ABCVoice VLAN 60 Security: WPA2-Personal 2 current clients Two client STAs are connected to ABCData and can access a media server that requires authentication at the Application Layer and is used to stream multicast video streams to the clients. What client stations possess the keys that are necessary to decrypt the multicast data packets carrying these videos?
A. Only the members of the executive team that are part of the multicast group configured on the media server
B. All clients that are associated to the AP using the ABCData SSID
C. All clients that are associated to the AP using any SSID
D. All clients that are associated to the AP with a shared GTK, which includes ABCData and ABCVoice.
Answer: B
Q29. Given: You view a protocol analyzer capture decode with the following protocol frames listed in the following order (excluding the ACK frames): 1) 802.11 Probe Request and 802.11 Probe Response 2) 802.11 Auth and another 802.11 Auth 2) 802.11 Assoc Req and 802.11 Assoc Rsp 4) EAPOL-Start 5) EAP Request and EAP Response 6) EAP Request and EAP Response 7) EAP Request and EAP Response 8) EAP Request and EAP Response 9) EAP Request and EAP Response 10) EAP Success 19) EAPOL-Key (4 frames in a row) What are you seeing in the capture file? (Choose 4)
A. WPA2-Enterprise authentication
B. WPA2-Personal authentication
C. 802.11 Open System authentication
D. 802.1X with Dynamic WEP
E. Wi-Fi Protected Setup with PIN
F. Active Scanning
G. 4-Way Handshake
Answer: A,C, F, G
Q30. What disadvantage does EAP-TLS have when compared with PEAPv0 EAP/MSCHAPv2 as an
802.11 WLAN security solution?
A. Fast/secure roaming in an 802.11 RSN is significantly longer when EAP-TLS is in use.
B. EAP-TLS does not protect the client's username and password inside an encrypted tunnel.
C. EAP-TLS cannot establish a secure tunnel for internal EAP authentication.
D. EAP-TLS is supported only by Cisco wireless infrastructure and client devices.
E. EAP-TLS requires extensive PKI use to create X.509 certificates for both the server and all clients, which increases administrative overhead.
Answer: E