PW0-204 Certified Wireless Security Professional (CWSP) Exam Set 5

Which of the following protocols is used to provide on-demand authentication within an ongoing data transmission?


Options are :

  • CHAP
  • PPTP
  • LEAP
  • EAP

Answer : CHAP

CWNA-106 Certified Wireless Network Administrator Exam Set 3

Which of the following is a type of security management for computers and networks in order to identify security breaches?


Options are :

  • EAP
  • ASA
  • IPS
  • IDS

Answer : IDS

Which of the following are the important components of the IEEE 802.1X architecture?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Supplicant
  • Authenticator
  • Authenticator server
  • Extensible Authentication Protocol (EAP)

Answer : Supplicant Authenticator Authenticator server

Your Company is receiving false and abusive e-mails from the e-mail address of your partner company. When you complain, the partner company tells you that they have never sent any such e-mails. Which of the following types of cyber crimes involves this form of network attack?


Options are :

  • Cyber squatting
  • Spoofing
  • Cyber Stalking
  • Man-in-the-middle attack

Answer : Spoofing

PW0-270 Certified Wireless Analysis Professional (CWAP) Exam Set 5

Which of the following security levels are applied on the network to prevent unauthorized access?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Authentication
  • Authorization
  • Access control lists
  • MAC filtering

Answer : Authentication Authorization

When used as portal of WLAN authentication solution, what is rule of LDAP?


Options are :

  • A data retrieval protocol used by an authentication server such as RADIUS.
  • A SQL complaint authentication service capable of encryption key generation and distribution.
  • AnX500 standard compliant database that participates in the 802.1X port-based access control process
  • An authentication server (AS) that communicates directly with, and provide authentication for supplicant.

Answer : An authentication server (AS) that communicates directly with, and provide authentication for supplicant.

Which of the following methods can be used to detect a rogue access point in order to enhance the security of the network? Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Install WIPS
  • Hide the SSID of all AP
  • Use of wireless sniffing tools
  • Check in the managed AP list

Answer : Install WIPS Use of wireless sniffing tools Check in the managed AP list

PW0-071 Certified Wireless Technology Specialist Sales Exam Set 3

John, a malicious hacker, forces a router to stop forwarding packets by flooding it with many open connections simultaneously so that all hosts behind it are effectively disabled. Which of the following attacks is John performing?


Options are :

  • Rainbow attack
  • DoS attack
  • ARP spoofing
  • Replay attack

Answer : DoS attack

Which of the following are the layers of physical security?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Procedural access control
  • Environmental design
  • Intrusion detection system
  • Video monitor

Answer : Procedural access control Environmental design Intrusion detection system

Which of the following tools is John using to crack the wireless encryption keys?


Options are :

  • Cain
  • AirSnort
  • Which of the following tools is John using to crack the wireless encryption keys?
  • PsPasswd

Answer : AirSnort

CWNA-106 Certified Wireless Network Administrator Exam Set 3

Which of the following methods are capable of operating in wireless networks? Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • EAP-TTLS
  • EAP-TLS
  • PEAP
  • LEAP

Answer : EAP-TTLS EAP-TLS LEAP

You work as a Network Administrator for Tech Perfect Inc. The company has a wireless LAN network. The clients present on the network are excluded. You check the error and find the reason that there is no DHCP server. Which of the following devices will you configure as a DHCP server?


Options are :

  • Wireless LAN switches
  • Access point
  • RADIUS Server
  • Controller

Answer : Controller

Select the answer option that arranges the numbered events in correct time sequence for a client associating to BSS using EAP-PEAPv0/MSCHAPv2. 1) Installation of PTK 2) Installation of 4-way handshake 3) 802.11 association 4) 802.1X uncontrolled port is opened for data traffic 5) Client validates server certificate


Options are :

  • 5-3-1-2-4
  • 3-4-2-1-5
  • 1-2-4-2-5
  • 5-3-4-2-1

Answer : 3-4-2-1-5

PW0-204 Certified Wireless Security Professional (CWSP) Exam Set 2

Which of the following is a common Windows authentication protocol used by the IEEE 802.1X security standard?


Options are :

  • RADIUS
  • SSL/TLS
  • TACACS
  • LDAP

Answer : RADIUS

Given: ABC Corporationís 802.11 WLAN is comprised of a redundant WLAN controller paid and 30-access points. ABC implemented WEP encryption with IPSec VPN technology to secure there wireless communication because it was the strongest security solution available at the time it was implemented. IT management has had decided to upgrade the WLAN infrastructure and implement VoWiFi and is connected with security because most VoWiFi phones do no support IPSec.As the wireless network administrator, what new security solution would be best for protecting ABCís data?


Options are :

  • Migrate corporate data and VoWiFi devices to WPA-2 Enterprise with OKC support, and segment VoWiFi data on separate VLAN.
  • Migrate to a new multi=factor security solution using WPA-2 personal, MAC filtering, SSID holding, stateful packet inspection and RBAC.
  • Migrate corporate data clients to WPA-2-Enterprise, and use the RADIUS server to implement MAC-base authentication of VoWiFi phones.
  • Migrate all 802.11 data and devices to WPA-personal, and implement a secure DHCP server to allocate addresses from a segment subnet for the VoWiFi phones.
  • Migrate corporate data clients to WPA-Enterprise and segment VoWiFi phone by assigning them to a different frequency band.

Answer : Migrate corporate data clients to WPA-2-Enterprise, and use the RADIUS server to implement MAC-base authentication of VoWiFi phones.

Which of the following protocols uses a program layer located between the Internet's Hypertext Transfer Protocol (HTTP) and Transport Control Protocol (TCP) layers?


Options are :

  • SCP
  • TFTP
  • SSL
  • HTTPS

Answer : SSL

PW0-204 Certified Wireless Security Professional (CWSP) Exam Set 5

Which of the following are legacy authentication protocols used within the stronger EAP authentication protocols? Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • MS-CHAP
  • PAP
  • CHAP
  • PPTP

Answer : MS-CHAP PAP CHAP

Which of the following wireless security protocols is defined in IEEE 802.11 pre-RSNA security?


Options are :

  • TKIP
  • EAP
  • WEP
  • CCMP

Answer : WEP

As part of large organizationís security policy how should a wireless security professional address to problem of rogue access points?


Options are :

  • A trained employee should install and monitor and WIPS rogue detection and response measures.
  • Use a WPA-2 Enterprise complaint security solution with strong mutual authentication and encryption.
  • All authorized APs should have there wired ports quarantined to specific VLAN for threat neutralization and analysis.
  • Hide the SSID of legitimate APs on the network so that intruders cannot copy this parameter on rogue APs.

Answer : A trained employee should install and monitor and WIPS rogue detection and response measures.

PW0-105 Certified Wireless Network Administrator CWNA Exam Set 4

Which of the following attacks are examples of Denial-of-service attacks (DoS)?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Ping flood attack
  • Birthday attack
  • Smurf attack
  • Fraggle attack

Answer : Ping flood attack Smurf attack Fraggle attack

Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?Each correct answer represents a complete solution. Choose two.


Options are :

  • Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access.
  • It will not allow the configuration of encryption and MAC filtering. Sending information is not secure on wireless network.
  • Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.
  • Attacker can use the Ping Flood DoS attack if WZC is used.

Answer : Information of probing for networks can be viewed using a wireless analyzer and may be used to gain access. Attacker by creating a fake wireless network with high power antenna cause Victor's computer to associate with his network to gain access.

You are setting up small offices for a major insurance carrier. The company policy states that all wireless configurations must fully implement the 802.11i standard. Based on this requirement, which encryption algorithm should you implement?


Options are :

  • WPA
  • WPA2
  • PKI
  • WEP

Answer : WPA2

CWNA-106 Certified Wireless Network Administrator Exam Set 3

Which of the following are the components of wireless intrusion prevention system (WIPS)?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Sensors
  • Server
  • Supplicant
  • Console

Answer : Sensors Server Console

Which of the following authentication processes are specified by the IEEE 802.11 standards? Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • RADIUS
  • Shared Key authentication
  • EAP
  • Open System authentication

Answer : Shared Key authentication Open System authentication

Which of the following security protocols is supported by Wi-Fi Protected Access (WPA)?


Options are :

  • CCMP
  • LEAP
  • TKIP
  • PEAP

Answer : TKIP

PW0-204 Certified Wireless Security Professional (CWSP) Exam Set 5

You work as a System Administrator for Tech Perfect Inc. The company has a wireless LAN network. You want to implement a tool in the company's network, which monitors the radio spectrum used by the wireless LAN network, and immediately alerts you whenever a rogue access point is detected in the network. Which of the following tools will you use?


Options are :

  • WIPS
  • MFP
  • Firewall
  • NAT

Answer : WIPS

Given: ABC corporation is selecting a security solution for there new WLAN. Two of there considered solutions PPTP VPN and 802.1XEAP. They have considered a PPTP VPN and because it is included with both server and desktop operating system. With both solutions are considered strong enough to adhere to corporate security police, the company is worried about security weakness of MS-CHAPv2 authentication.As a consultant what do you tell ABC Corporation about implementing MS-CHAPv2 authentication? (Choose 2)


Options are :

  • MS-CHAPv2 is only appropriate for WLAN security when used inside a TLS-encrypted tunnel.
  • MS-CHAPv2 is secure when implemented with AES-CCMP encryption.
  • MS-CHAPv2 is subject to offline dictionary attacks.
  • MS-CHAPv2 is only secure when combined with WEP.
  • MS-CHAPv2 uses anonymous differ-Helliman authentication, and therefore secure.
  • MS-CHAPv2 is complaint with WPA-personal, not WPA-2-Enterprise.

Answer : MS-CHAPv2 is only appropriate for WLAN security when used inside a TLS-encrypted tunnel. MS-CHAPv2 is subject to offline dictionary attacks.

Which of the following attacks are considered as authentication attacks?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Denial-of-Service (DoS) attack
  • Jamming attack
  • Man-in-the-middle attack
  • Eavesdropper attack

Answer : Man-in-the-middle attack Eavesdropper attack

CWNA-106 Certified Wireless Network Administrator Exam Set 1

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions