CWNP Certified Wireless Security Professional CWSP-207 Exam Practice Test

Page: 1 / 14
Total 119 questions
Question 1

Given: The Aircrack-ng WLAN software tool can capture and transmit modified 802.11 frames over the wireless network. It comes pre-installed on Kali Linux and some other Linux distributions.

What are three uses for such a tool? (Choose 3)



Answer : A, B, D


Question 2

Given: In XYZ's small business, two autonomous 802.11ac APs and 12 client devices are in use with WPA2-Personal.

What statement about the WLAN security of this company is true?



Answer : B


Question 3

What protocols allow a network administrator to securely manage the configuration of WLAN controllers and access points? (Choose 2)



Answer : B, F


Question 4

When using the 802.1X/EAP framework for authentication in 802.11 WLANs, why is the 802.1X Controlled Port still blocked after the 802.1X/EAP framework has completed successfully?



Answer : C


Question 5

Given: WLAN attacks are typically conducted by hackers to exploit a specific vulnerability within a network.

What statement correctly pairs the type of WLAN attack with the exploited vulnerability? (Choose 3)



Answer : C, D, E


Question 6

What is the purpose of the Pairwise Transient Key (PTK) in IEEE 802.11 Authentication and Key Management?



Answer : B


Question 7

A WLAN is implemented using WPA-Personal and MAC filtering.

To what common wireless network attacks is this network potentially vulnerable? (Choose 3)



Answer : A, B, D


Page:    1 / 14   
Total 119 questions