PW0-204 Certified Wireless Security Professional (CWSP) Exam Set 4

Which of the following security protocols is required by Robust Security Network (RSN)?


Options are :

  • IPSec
  • SSL
  • SCP
  • CCMP

Answer : CCMP

Which of the following protocols ensures that all relevant information is delivered to the correct access point to which the client station is associated?


Options are :

  • CHAP
  • PPP
  • IAPP
  • MS-CHAP

Answer : IAPP

Which of the following is a security access control technique that allows or prevents specific network devices from accessing the network?


Options are :

  • MAC filtering
  • Packet filtering
  • Ingress filtering
  • Route filtering

Answer : MAC filtering

PW0-071 Certified Wireless Technology Specialist Sales Exam Set 2

Which of the following are software applications designed to track a user's personal information with the intent to pass it on to third parties without the user's permission?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Stealware
  • Adware
  • Spyware
  • Zombie

Answer : Adware Spyware

Which of the following is the most secure protocol used for encryption in a wireless network?


Options are :

  • IPSec
  • WPA2
  • WPA
  • WEP

Answer : WPA2

Which of the following types of attacks come under the category of hacker attacks?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • IP address spoofing
  • Teardrop
  • Smurf
  • Password cracking

Answer : IP address spoofing Password cracking

PW0-105 Certified Wireless Network Administrator CWNA Exam Set 3

Which of the following is a passive device that views the current content of the packet traveling on the network?


Options are :

  • WLAN controller
  • Rogue AP
  • Spectrum analyzer
  • Protocol analyzer

Answer : Protocol analyzer

Which of the following are the main components of a Wi-Fi Protected Setup (WPS) protocol architecture?Each correct answer represents a part of the solution. Choose all that apply.


Options are :

  • Enrollee
  • Supplicant
  • Authenticator
  • Registrar

Answer : Enrollee Authenticator Registrar

You work as a Network Administrator for SpyNet Inc. The company has a Windows-based network. You have been assigned the task of auditing the scheduled network security. After a regular audition, you suspect that the company is under attack by an intruder trying to gain access to the company's network resources. While analyzing the log files, you find that the IP address of the intruder belongs to a trusted partner company. Assuming this situation, which of the following attacks is the company being subjected to?


Options are :

  • Man-in-the-middle
  • Spoofing
  • Phreaking
  • CookieMonster

Answer : Spoofing

PW0-104 Wireless LAN Administration Certified Practice Exam Set 5

Your client has a brand new laptop. He is trying to connect to his home network, which is using an older (802.11b) wireless router. The router is set for encryption but not MAC filtering. What is the most likely problem?


Options are :

  • His laptop has a newer operating system that cannot communicate with the router.
  • His laptop is using the WPA encryption protocol.
  • The laptop does not have a wireless NIC.
  • His physical address for the laptop is not in the router.

Answer : His laptop is using the WPA encryption protocol.

Which of the following would be the most help against Denial of Service (DOS) attacks?


Options are :

  • Network surveys.
  • Packet filtering firewall
  • Stateful Packet Inspection (SPI) firewall
  • Honey pot

Answer : Stateful Packet Inspection (SPI) firewall

You work as a professional Computer Hacking Forensic Investigator. A project has been assigned to you to investigate the DoS attack on a computer network of SecureEnet Inc. Which of the following methods will you perform to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Sniff network traffic to the failing machine.
  • Look for core files or crash dumps on the affected systems.
  • Seize all computers and transfer them to the Forensic lab.
  • Look for unusual traffic on Internet connections and network segments.

Answer : Sniff network traffic to the failing machine. Look for core files or crash dumps on the affected systems. Look for unusual traffic on Internet connections and network segments.

PW0-104 Wireless LAN Administration Certified Practice Exam Set 3

You work as a Network Administrator for uCertify Inc. You need to set up a management system on your network. Which of the following protocols will you use to manage your network?


Options are :

  • IP
  • SNMP
  • HTTP
  • TCP

Answer : SNMP

Your company is going to add wireless connectivity to the existing LAN. You have concerns about the security of the wireless access and wish to implement encryption. Which of the following would be the best choice for you to use?


Options are :

  • DES
  • WAP
  • WEP
  • PKI

Answer : WEP

Which of the following is an infrastructure system that allows the secure exchange of data over an unsecured network?


Options are :

  • PTK
  • PKI
  • GTK
  • PMK

Answer : PKI

PW0-105 Certified Wireless Network Administrator CWNA Exam Set 3

Which of the following is an intermediate network similar to RSN that supports legacy security such as WEP within the same BSS?


Options are :

  • TSN
  • WPA2
  • VPN
  • WPA

Answer : TSN

Which of the following keys is derived by Pairwise Master Key (PMK)?


Options are :

  • Private Key
  • Group Temporal Key
  • Pairwise Transient Key
  • Public Key

Answer : Pairwise Transient Key

Which of the following features of a switch helps to protect network from MAC flood and MAC spoofing?


Options are :

  • Quality of Service (QoS)
  • Port security
  • Multi-Authentication
  • MAC Authentication Bypass

Answer : Port security

PW0-105 Certified Wireless Network Administrator Exam Set 1

Which of the following is a part of computer network that is used to prevent unauthorized Internet users from accessing private networks connected to the Internet?


Options are :

  • Protocol analyzer
  • Wired Equivalent Privacy
  • Firewall
  • Intrusion detection system

Answer : Firewall

PW0-104 Wireless LAN Administration Practice Exam Set 2

Which of the following stream ciphers is both a block cipher and a product cipher?


Options are :

  • RC4
  • RC2
  • AES
  • DES

Answer : DES

A Cisco Unified Wireless Network has an AP that does not rely on the central control device of the network. Which type of AP has this characteristic?


Options are :

  • Lightweight AP
  • Rogue AP
  • Autonomous AP
  • LWAPP

Answer : Autonomous AP

Which of the following wireless network security solutions refers to an authentication process in which a user can connect wireless access points to a centralized server to ensure that all hosts are properly authenticated?


Options are :

  • Wi-Fi Protected Access 2 (WPA2)
  • Wired Equivalent Privacy (WEP)
  • IEEE 802.1x
  • Remote Authentication Dial-In User Service (RADIUS)

Answer : IEEE 802.1x

CWNA-106 Certified Wireless Network Administrator Exam Set 2

Which of the following monitors program activities and modifies malicious activities on a system?


Options are :

  • HIDS
  • NIDS
  • Back door
  • RADIUS

Answer : HIDS

Which of the following will you recommend for providing security?


Options are :

  • VPN
  • S/MIME
  • HTTP
  • SSL

Answer : SSL

Which of the following protocols uses public-key cryptography to authenticate the remote computer?


Options are :

  • SCP
  • SSL
  • Telnet
  • SSH

Answer : SSH

PW0-204 Certified Wireless Security Professional (CWSP) Exam Set 1

Which of the following is a passive device that cannot be detected by a wireless intrusion detection system (WIDS)?


Options are :

  • Protocol analyzer
  • MAC spoofing
  • Spectrum analyzer
  • Rogue access point

Answer : Protocol analyzer

What WLAN client device behavior is exploited by an attacker during a hijacking attack?


Options are :

  • When the RF signal between a client and in an access point is disrupted for more than a few seconds, the client device will repeatedly attempt the reestablish both layer 2 and layer 3 connections.
  • When the RF signal between a client and an access point is lost, the client will seek to reassociate with another access point with a different SSID and stronger high quality signal.
  • Client drivers typically scan for a connect to access points in the 22.4GHz band before scanning the 5GHz band.
  • After the initial association and 4-way handshake, client stations and access points do not need to perform another 4-way handshake even if connectivity is lost.

Answer : When the RF signal between a client and in an access point is disrupted for more than a few seconds, the client device will repeatedly attempt the reestablish both layer 2 and layer 3 connections.

You have been hired to perform a penetration test on a client's network. You want to see if remote connections are susceptible to eavesdropping or perhaps session hijacking. Which network tool would be most helpful to you?


Options are :

  • Vulnerability analyzer
  • Protocol analyzer
  • Performance analyzer.
  • Port scanner

Answer : Protocol analyzer

PW0-104 Wireless LAN Administration Practice Exam Set 3

Which of the following types of attacks cannot be prevented by a firewall?Each correct answer represents a complete solution. Choose all that apply


Options are :

  • Ping flood attack
  • URL obfuscation attack
  • Shoulder surfing attack
  • Phishing attack

Answer : URL obfuscation attack Shoulder surfing attack Phishing attack

Which of the following works as a protocol for providing secure communications between wireless clients and wireless access points?


Options are :

  • Firewall
  • Packet filtering
  • Virtual Private Network
  • Robust Secure Network

Answer : Robust Secure Network

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions