CWNP CWSP-206 Certified Wireless Security Professional (CWSP) Exam Practice Test

Page: 1 / 14
Total 60 questions
Question 1

A WLAN protocol analyzer trace reveals the following sequence of frames (excluding the ACK frames):

* 802.11 Probe Req and 802.11 Probe Rsp

* 802.11 Auth and then another 802.11 Auth

* 802.11 Assoc Req and 802.11 Assoc Rsp

* EAPOL-KEY

* EAPOL-KEY

* EAPOL-KEY

* EAPOL-KEY

What security mechanism is being used on the WLAN?



Answer : A


Question 2

After completing the installation of a new overlay WIPS for the purpose of rogue detection and security monitoring at your corporate headquarters, what baseline function MUST be performed in order to identify the security threats?



Answer : B


Question 3

WLAN protocol analyzers can read and record many wireless frame parameters. What parameter is needed to physically locate rogue APs with a protocol analyzer?



Answer : E


Question 4

When monitoring APs within a LAN using a Wireless Network Management System (WNMS), what secure protocol may be used by the WNMS to issue configuration changes to APs?



Answer : D


Question 5

What preventative measures are performed by a WIPS against intrusions?



Answer : A


Question 6

What field in the RSN information element (IE) will indicate whether PSK- or Enterprise-based WPA or WPA2 is in use?



Answer : C


Question 7

What security vulnerability may result from a lack of staging, change management, and installation procedures for WLAN infrastructure equipment?



Answer : D


Page:    1 / 14   
Total 60 questions