CWNP CWSP-207 Certified Wireless Security Professional Exam Practice Test

Page: 1 / 14
Total 119 questions
Question 1

Given: During 802.1X/LEAP authentication, the username is passed across the wireless medium in clear text.

From a security perspective, why is this significant?



Answer : B


Question 2

Which one of the following is a valid reason to avoid the use of EAP-MD5 in production WLANs?



Answer : C


Question 3

Given: You must implement 7 APs for a branch office location in your organization. All APs will be autonomous and provide the same two SSIDs (CORP1879 and Guest).

Because each AP is managed directly through a web-based interface, what must be changed on every AP before enabling the WLANs to ensure proper staging procedures are followed?



Answer : B


Question 4

Given: The Aircrack-ng WLAN software tool can capture and transmit modified 802.11 frames over the wireless network. It comes pre-installed on Kali Linux and some other Linux distributions.

What are three uses for such a tool? (Choose 3)



Answer : A, B, D


Question 5

What is the purpose of the Pairwise Transient Key (PTK) in IEEE 802.11 Authentication and Key Management?



Answer : B


Question 6

What is one advantage of using EAP-TTLS instead of EAP-TLS as an authentication mechanism in an 802.11 WLAN?



Answer : D


Question 7

When using a tunneled EAP type, such as PEAP, what component is protected inside the TLS tunnel so that it is not sent in clear text across the wireless medium?



Answer : B


Page:    1 / 14   
Total 119 questions