CWNP CWSP 206
Q: 1
What software and hardware tools are used in the process performed to hijack a wireless station
from the authorized wireless network onto an unauthorized wireless network?
Options
Q: 2
In an IEEE 802.11-compliant WLAN, when is the 802.1X Controlled Port placed into the unblocked
state?
Options
Q: 3
A large enterprise is designing a secure, scalable, and manageable 802.11n WLAN that will support
thousands of users. The enterprise will support both 802.1X/EAP-TTLS and PEAPv0/MSCHAPv2.
Currently, the company is upgrading network servers as well and will replace their existing Microsoft
IAS implementation with Microsoft NPS, querying Active Directory for user authentication. For this
organization, as they update their WLAN infrastructure, what WLAN controller feature will likely be
least valuable?
Options
Q: 4
The IEEE 802.11 standard defined Open System authentication as consisting of two auth frames and
two assoc frames. In a WPA2-Enterprise network, what process immediately follows the 802.11
association procedure?
Options
Q: 5
ABC Company has recently installed a WLAN controller and configured it to support WPA2-Enterprise
security. The administrator has configured a security profile on the WLAN controller for each group
within the company (Marketing, Sales, and Engineering). How are authenticated users assigned to
groups so that they receive the correct security profile within the WLAN controller?
Options
Q: 6
You perform a protocol capture using Wireshark and a compatible 802.11 adapter in Linux. When
viewing the capture, you see an auth req frame and an auth rsp frame. Then you see an assoc req
frame and an assoc rsp frame. Shortly after, you see DHCP communications and then ISAKMP
protocol packets. What security solution is represented?
Options
Q: 7
Many computer users connect to the Internet at airports, which often have 802.11n access points
with a captive portal for authentication. While using an airport hotspot with this security solution, to
what type of wireless attack is a user susceptible?
Options
Q: 8
You must implement 7 APs for a branch office location in your organizations. All APs will be
autonomous and provide the same two SSIDs (CORP1879 and Guest).
Because each AP is managed directly through a web-based interface, what must be changed on
every AP before enabling the WLANs to ensure proper staging procedures are followed?
Options
Q: 9
ABC Company has a WLAN controller using WPA2-Enterprise with PEAPv0/MS-CHAPv2 and AES- CCMP to secure their corporate wireless dat a. They wish to implement a guest WLAN for guest users to have Internet access, but want to implement some security controls. The security requirements for the hotspot include: • Cannot access corporate network resources • Network permissions are limited to Internet access • All stations must be authenticated What security controls would you suggest? (Choose the single best)
Options
Q: 10
You are installing 6 APs on the outside of your facility. They will be mounted at a height of 6 feet. What must you do to implement these APs in a secure manner beyond the normal indoor AP implementations? (Choose the single best answer)
Options
Question 1 of 10