CWNP CWSP 208
Q: 1
Given: ABC Company is implementing a secure 802.11 WLAN at their headquarters (HQ) building in
New York and at each of the 10 small, remote branch offices around the United States. 802.1X/EAP is
ABC’s preferred security solution, where possible. All access points (at the HQ building and all branch
offices) connect to a single WLAN controller located at HQ. Each branch office has only a single AP
and minimal IT resources.
What security best practices should be followed in this deployment scenario?
Options
Q: 2
You must support a TSN as you have older wireless equipment that will not support the required
processing of AES encryption. Which one of the following technologies will you use on the network
so that a TSN can be implemented that would not be required in a network compliant with 802.11-
2012 non-deprecated technologies?
Options
Q: 3
Given: The Marketing department’s WLAN users need to reach their file and email server as well as
the Internet, but should not have access to any other network resources.
What single WLAN security feature should be implemented to comply with these requirements?
Options
Q: 4
What policy would help mitigate the impact of peer-to-peer attacks against wireless-enabled
corporate laptop computers when the laptops are also used on public access networks such as
wireless hot-spots?
Options
Q: 5
Given: ABC Hospital wishes to create a strong security policy as a first step in securing their 802.11
WLAN.
Before creating the WLAN security policy, what should you ensure you possess?
Options
Q: 6
Select the answer option that arranges the numbered events in the correct time sequence (first to
last) for a client associating to a BSS using EAP-PEAPv0/MSCHAPv2.
1. Installation of PTK
2. Initiation of 4-way handshake
3. Open system authentication
4. 802.11 association
5. 802.1X controlled port is opened for data traffic
6. Client validates server certificate
7. AS validates client credentials
Options
Q: 7
Given: John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer
funds between his checking and savings accounts at his bank's website. The bank’s website uses the
HTTPS protocol to protect sensitive account information. While John was using the hot-spot, a hacker
was able to obtain John’s bank account user ID and password and exploit this information.
What likely scenario could have allowed the hacker to obtain John’s bank account user ID and
password?
Options
Q: 8
What are the three roles of the 802.1X framework, as defined by the 802.1X standard, that are performed by the client STA, the AP (or WLAN controller), and the RADIUS server? (Choose 3)
Options
Q: 9
What TKIP feature was introduced to counter the weak integrity check algorithm used in WEP?
Options
Q: 10
Given: ABC Company has recently installed a WLAN controller and configured it to support WPA2-
Enterprise security. The administrator has configured a security profile on the WLAN controller for
each group within the company (Marketing, Sales, and Engineering).
How are authenticated users assigned to groups so that they receive the correct security profile
within the WLAN controller?
Options
Question 1 of 10