New Certified Wireless Security Professional CWSP-206 Dumps

A CWSP effectively uses appropriate tools and procedures to ensure the ongoing security of the network. Since CWSP-205 exam was replaced by CWSP-206 in September of 2019, CWSP-206 Certified Wireless Security Professional exam is the requirement for CWSP certification. To achieve your CWSP certification, New Certified Wireless Security Professional CWSP-206 Dumps is recommended as the preparation materials. 

Free CWSP-206 Exam Dumps Also Is Available Online

1. You have a Windows laptop computer with an integrated, dual-band, Wi-Fi compliant adapter. Your laptop computer has protocol analyzer software installed that is capable of capturing and decoding 802.11ac data.

What statement best describes the likely ability to capture 802.11ac frames for security testing purposes?

 
 
 
 
 

2. In order to acquire credentials of a valid user on a public hotspot network, what attacks may be conducted? Choose the single completely correct answer.

 
 
 
 
 

3. What WLAN client device behavior is exploited by an attacker during a hijacking attack?

 
 
 
 
 

4. What software and hardware tools are used in the process performed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?

 
 
 
 

5. Many computer users connect to the Internet at airports, which often have 802.11n access points with a captive portal for authentication.

While using an airport hotspot with this security solution, to what type of wireless attack is a user susceptible?

 
 
 
 

6. During 802.1X/LEAP authentication, the username is passed across the wireless medium in clear text.

From a security perspective, why is this significant?

 
 
 
 
 

7. In XYZ’s small business, two autonomous 802.11ac APs and 12 client devices are in use with WPA2­Personal.

What statement about the WLAN security of this company is true?

 
 
 
 
 

8. The Aircrack-ng WLAN software tool can capture and transmit modified 802.11 frames over the wireless network. It comes pre-installed on Kali Linux and some other Linux distributions.

Which one of the following would not be a suitable penetration testing action taken with this tool?

 
 
 
 

9. You manage a wireless network that services 200 wireless users. Your facility requires 20 access points, and you have installed an IEEE 802.11-compliant implementation of 802.1X/LEAP with AES-CCMP as an authentication and encryption solution.

In this configuration, the wireless network is initially susceptible to what type of attack?

 
 
 
 
 

10. ABC Corporation is evaluating the security solution for their existing WLAN. Two of their supported solutions include a PPTP VPN and 802.1X/LEAP. They have used PPTP VPNs because of their wide support in server and desktop operating systems. While both PPTP and LEAP adhere to the minimum requirements of the corporate security policy, some individuals have raised concerns about MS-CHAPv2 (and similar) authentication and the known fact that MS-CHAPv2 has proven vulnerable in improper implementations.

As a consultant, what do you tell ABC Corporation about implementing MS-CHAPv2 authentication?

 
 
 
 
 

11. You perform a protocol capture using Wireshark and a compatible 802.11 adapter in Linux. When viewing the capture, you see an auth req frame and an auth rsp frame. Then you see an assoc req frame and an assoc rsp frame. Shortly after, you see DHCP communications and then ISAKMP protocol packets.

What security solution is represented?

 
 
 
 
 

12. In a security penetration exercise, a WLAN consultant obtains the WEP key of XYZ Corporation’s wireless network. Demonstrating the vulnerabilities of using WEP, the consultant uses a laptop running a software AP in an attempt to hijack the authorized user’s connections. XYZ’s legacy network is using 802.11n APs with 802.11b, 11g, and 11n client devices.

With this setup, how can the consultant cause all of the authorized clients to establish Layer 2 connectivity with the software access point?

 
 
 
 

13. As the primary security engineer for a large corporate network, you have been asked to author a new security policy for the wireless network. While most client devices support 802.1X authentication, some legacy devices still only support passphrase/PSK-based security methods.

When writing the 802.11 security policy, what password-related items should be addressed?

 
 
 
 
 

14. ABC Hospital wishes to create a strong security policy as a first step in securing their 802.11 WLAN.

Before creating the WLAN security policy, what should you ensure you possess?

 
 
 
 

15. What policy would help mitigate the impact of peer-to-peer attacks against wireless-enabled corporate laptop computers when the laptops are also used on public access networks such as wireless hotspots?

 
 
 
 

16. What EAP type supports using MS-CHAPv2, EAP-GTC or EAP-TLS for wireless client authentication?

 
 
 
 
 

17. You must implement 7 APs for a branch office location in your organizations. All APs will be autonomous and provide the same two SSIDs (CORP1879 and Guest).

Because each AP is managed directly through a web-based interface, what must be changed on every AP before enabling the WLANs to ensure proper staging procedures are followed?

 
 
 
 

18. You are installing 6 APs on the outside of your facility. They will be mounted at a height of 6 feet.

What must you do to implement these APs in a secure manner beyond the normal indoor AP implementations? (Choose the single best answer.)

 
 
 
 

19. Fred works primarily from home and public wireless hotspots rather than commuting to office. He frequently accesses the office network remotely from his Mac laptop using the local 802.11 WLAN.

In this remote scenario, what single wireless security practice will provide the greatest security for Fred?

 
 
 
 
 
 

20. Which one of the following is not a role defined in the 802.1X authentication procedures used in 802.11 and 802.3 networks for port-based authentication?

 
 
 
 

New Certified Wireless Network Administrator CWNA-108 Dumps
CWDP (Wi-Fi Design) CWDP-303 Study Guide

Add a Comment

Your email address will not be published. Required fields are marked *