PW0-270 Certified Wireless Analysis Professional (CWAP) Exam Set 3

Given: ABC hospital wishes to create a strong security policy as a first step in securing there 802.11 WLAN What are the appropriate sections of a WLAN security policy? (Choose 3)


Options are :

  • End-user and administrator training
  • Physical security of the RF medium
  • Attack classification
  • SSID broadcasting regulations
  • Acceptable use of the network

Answer : End-user and administrator training Attack classification Acceptable use of the network

Given: You manage a wireless network that services 200 wireless users. Your facility requires 20 access points and you have installed an IEEE 802.1X LEAP with AES CCMP as an authentication and encryption solution.In this configuration the wireless network is initially susceptible to what type of attacks? (Choose 2)


Options are :

  • Man-in-the-middle
  • Eavesdropping
  • Offline dictionary
  • Session hijacking
  • Layer 1 DoS

Answer : Man-in-the-middle Offline dictionary

PW0-204 Certified Wireless Security Professional (CWSP) Exam Set 4

Role-based access control (RBAC) allows a WLAN administrator to perform that network function?


Options are :

  • Provide differing levels of management access to a WLAN controller based on the user account.
  • Allows access to specific files and applications based on the user’s WMM AC.
  • Provide admission control to VoWiFi clients on selected access points.
  • Allows one user group to access an internet gateway while denying internet access gateway to another group

Answer : Provide differing levels of management access to a WLAN controller based on the user account.

What one advantage of using EAP-TTLS instead of EAP-TLS as an authentication mechanism in 802.11WLAN?


Options are :

  • EAP-TTLS supports mutual authentication between supplicants and authentication servers.
  • EAP-TTLS does not require an authenticator server.
  • EAP-TTLS does not require the use of PKI.
  • EAP-TTLS sends encrypted supplicant credentials to the authentication server.

Answer : EAP-TTLS does not require the use of PKI.

Given: ABC company is implementing a secure 802.11WLAN at there head quarters building in New York and at each of the 10 small, remote branch offices around the country 802.1X/EAP is ABC’s preferred security solution. Where possible At all access points (at the headquarters building and all branch offices) connect to single WLAN controller located at the head quarters building, what additional security considerations should be made? (Choose 2)


Options are :

  • Remote WIPS sensors should be installed at the headquarters building and at all branch office to monitor and enforce wireless security.
  • RADIUS service should always be provided at branch offices so that user authentication is kept on the local network.
  • An encrypted connection between the WLAN controller and each controller-based AP should be used or all branch offices should be connected to the head quarters building a VPN.
  • Remote management via telnet, SSH, HTTP, HTTPs should be permitted across the WLAN link.

Answer : Remote WIPS sensors should be installed at the headquarters building and at all branch office to monitor and enforce wireless security. An encrypted connection between the WLAN controller and each controller-based AP should be used or all branch offices should be connected to the head quarters building a VPN.

PW0-104 Wireless LAN Administration Certified Practice Exam Set 1

Given: ABC company is developing an IEEE 802.11 complaint wireless security solution using 802.1X/EAP authentication. According to company policy the security should prevent an eavesdropper from decrypting data frames traversing a wireless connection. What security solution features play a role in adhering to this policy requirement? (Choose 2)


Options are :

  • Group temporal key
  • Encrypted passphrase
  • Multi-factor authentication
  • Integrity check value
  • Message integrity check (MIC)
  • 4-Way handshake

Answer : Group temporal key 4-Way handshake

802.11r introduces new frame exchange protocol to support key management during fast secure transitions. Two of the new exchange protocols are the Over-the –air protocol and the other-DS FT protocol.In what ways do these frames exchange protocols differ from each other?


Options are :

  • Over-the –air FT protocol is used during a layer 2 roam, while the over-the-DS FT protocol does not.
  • In Over-the –air protocol sends frames directly to new AP, while the other the DS FT protocol used the old AP to forward the frames to the New AP via the wired network.
  • Over-the –air FT protocol uses the 4 way handshake to establish encryption keys, while the over the DS ft protocol does not.
  • Over-the –air FT protocol is used during a layer 2 roam, while the over-the-DS FT protocol does not.

Answer : In Over-the –air protocol sends frames directly to new AP, while the other the DS FT protocol used the old AP to forward the frames to the New AP via the wired network.

What statement accurately describes the functions of the IEEE 802.1X standard?


Options are :

  • Port-based access control with permission for three frame types: EAP, DHCP, DNS.
  • Port-based access control with support for EAP authentication and AES-CCMP encryption only
  • Port-based access control with encryption key management and distribution
  • Port-based access control with support for authenticated-user VLANs only
  • Portbased access control with 802.3 and 802.11 LANs

Answer : Port-based access control with support for EAP authentication and AES-CCMP encryption only

PW0-105 Certified Wireless Network Administrator CWNA Exam Set 1

The following numbered items show the contents of the four frames exchanged during the 4-way handshake. 1) Encrypted GTK sent 2) Confirmation of temporal key installation 3) Announce sent from authenticator to supplicant, unprotected by MIC 4) Snonce sent from applicant to authenticator, protected by MIC. Arrange the frames in the correct sequence beginning with the start of the 4-way handshake


Options are :

  • 2, 3, 4, 1
  • 3, 4, 1, 2
  • 1, 2, 3, 4
  • 4, 3, 1, 2

Answer : 3, 4, 1, 2

Given: XYZ company has recently installed a controller based WLAN and is using a RADIUS server to proxy authenticate request to an LDAP server user based across controls and would like to use the RADIUS server to facilitate network authorization.What RADIUS features could be used by XYZ to assign the proper network permissions to users during authentication? (Choose 3)


Options are :

  • The RADIUS server can communicate with the DHCP server to issue the appropriate IP address and VLAN assignments to users.
  • According to database entries, RADIUS can reassign client 801.11assosiations to proper SSID by referring a user name to SSID mapping
  • RADIUS return list attributes can be used to assign permission level, such as read only permission, to users of particular network source.
  • The RADIUS server can support vendor-specific attributes in the ACCESS-ACCEPT response which can be used for ASL or firewall assignment.
  • RADIUS can send a VLAN assignment for each authorized user to the VLAN controller in a return list attribute.

Answer : The RADIUS server can communicate with the DHCP server to issue the appropriate IP address and VLAN assignments to users. The RADIUS server can support vendor-specific attributes in the ACCESS-ACCEPT response which can be used for ASL or firewall assignment. RADIUS can send a VLAN assignment for each authorized user to the VLAN controller in a return list attribute.

Given: Many corporations have guest VLANs configured on their WLAN controller that allow visitors to have wireless internet access only. What risks are associated with implementing the guest VLAN without any protocol filtering features enabled? (Choose 2)


Options are :

  • Unauthorized users can perform internet based network attacks through the WLAN.
  • Once guest users are associated to the WLAN, they can capture 802.11 frames from the corporate VLANs.
  • Intruders can send spam to the internet through the guest VLAN.
  • Peer-to-peer attacks between the guest users can not be prevented without protocol filtering.

Answer : Unauthorized users can perform internet based network attacks through the WLAN. Peer-to-peer attacks between the guest users can not be prevented without protocol filtering.

PW0-105 Certified Wireless Network Administrator Exam Set 3

When opportunistic key caching (OKC) is supported on the wireless network, what steps must occur before a successful roam is completed? (Choose 2)


Options are :

  • The AS must be queried for derivation of new PMK
  • EAP authentication must be conducted between the supplicant and AS
  • The authenticator must query the RADIUS server to validate the supplicant
  • New open system authentication must be performed E. Supplicant and authenticator must establish a new PTK

Answer : EAP authentication must be conducted between the supplicant and AS The authenticator must query the RADIUS server to validate the supplicant

Given: A new Access point is connected to an authorized network segment and is detected wirelessly by a WIPS.By what method does the WIPS apply a security classification to newly discovered AP?


Options are :

  • According to the location service profile
  • According to the site survey template
  • According to the SNMP MIB table
  • According to the RADIUS rectum attribute

Answer : According to the SNMP MIB table

In an effort to optimize WLAN performance ABC Company has already upgraded their infrastructure from 802 11b/g to 802 11n. ABC has always been highly security conscious but they are concerned with security threats introduced by incompatibilities between 802.11n and 802.11a/g in the past. ABC has performed manual and automated scans with products that were originally designed for use in 802 11a/g networks. Including laptopbased spectrum and protocol analyzers as well as an overlay 802 11a/g WIPS solution. ABC has sought your input to understand and respond to potential security threats. In ABC’s network environment, what type of devices would be capable of identifying rouge APs that use HT Greenfield 40 MHZ channels? (Choose 3)


Options are :

  • 802.11n WPS sensor with a single 2x2 radio
  • WIPS solution that is integrated in the company’s AP infrastructure
  • The company’s current laptop-based protocol analysis tools
  • The company’s current overlay WIPS solution

Answer : 802.11n WPS sensor with a single 2x2 radio WIPS solution that is integrated in the company’s AP infrastructure The company’s current laptop-based protocol analysis tools

PW0-204 Certified Wireless Security Professional (CWSP) Exam Set 1

What 802 11 WLAN security problem is addressed by 802.1X/EAP mutual authentication.


Options are :

  • Weak initialization vectors
  • Offline dictionary attacks
  • Weak password policies
  • MAC spoofing
  • Wireless hijacking attacks
  • Disassociation attacks

Answer : Wireless hijacking attacks

What security weakness is presented in pre-RSNA system using 802.1X with dynamic WEP?


Options are :

  • There is support for authentication of individual users
  • All version of EAP used with dynamic WEP pass the user name across the wireless medium in clear text.
  • The session key is crackable if enough traffic is transmitted using the key.
  • The session key is crackable if enough traffic is transmitted using the key.

Answer : The session key is crackable if enough traffic is transmitted using the key.

Given: The ABC corporation currently utilizes a public key infrastructure (PKI) to allow employees to securely access network resources using smart cards. The wireless network will use WPA2-Enterprise as its primary security solution. You have been hired to recommend a Wi-Fi alliance tested EAP method What solutions will require the least change in how users are currently authenticated and still integrate with there existing PKI?


Options are :

  • EAP-TLS
  • EAP-TTLS/MSCHAPv2
  • PEAPv0/EAP-MSCHAPv2
  • PEAPv0/EAP-TLS

Answer : PEAPv0/EAP-TLS

CWNA-106 Certified Wireless Network Administrator Exam Set 2

After RADIUS authentication


Options are :

  • X.509 certificates
  • EAPoL keys
  • Pairwise Master keys
  • User credentials

Answer : User credentials

Given: Jane Smith works primarily from home and public wireless hot spot rather than commuting to the office. She frequently accesses the office network frequently from her laptop using the 802.11 WLAN.To safeguard her data, what wireless security policy items should be implemented? (Choose 2)


Options are :

  • Use an IPSec VPN for connectivity to the office network.
  • Use an HTTPS captive portal for authent6ication at hot spots.
  • Use personal firewall software on her laptop.
  • Use secure protocols, such as FTP, for remote file transfer with encryption.
  • Use WIPS sensor software to monitor for risks.
  • Use 802.1X/PEAPv0 to connect to the corporate office network.

Answer : Use an IPSec VPN for connectivity to the office network. Use personal firewall software on her laptop.

After completing the installation of new overlay WIPS, what baseline function MUST be performed?


Options are :

  • Classify the authorized, neighbor, and rogue WLAN devices.
  • Configure specifications for upstream and down stream throughout thresholds.
  • Approved 802.1X/EAP methods need to be selected and confirmed
  • Configure profiles for operation among different regularity domains.

Answer : Classify the authorized, neighbor, and rogue WLAN devices.

PW0-204 Certified Wireless Security Professional (CWSP) Exam Set 4

Which of the following key types are defined in the 802.11i Authentication and Key Management (AKM)?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Pairwise Master Key (PMK)
  • Group Temporal Key (GTK)
  • Pairwise Transient Key (PTK)
  • Group Master Key (GMK)

Answer : Pairwise Master Key (PMK) Group Temporal Key (GTK) Pairwise Transient Key (PTK) Group Master Key (GMK)

PW0-105 Certified Wireless Network Administrator Exam Set 1

Which of the following actions will you perform to accomplish the task?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Configure the wireless network to use WEP encryption for the data transmitted over a wireless network.
  • Implement the IEEE 802.1X authentication for the wireless network.
  • Using group policies, configure the network to allow the wireless computers to connect to the ad hoc networks only.
  • Using group policies, configure the network to allow the wireless computers to connect to the infrastructure networks only.

Answer : Configure the wireless network to use WEP encryption for the data transmitted over a wireless network. Implement the IEEE 802.1X authentication for the wireless network. Using group policies, configure the network to allow the wireless computers to connect to the infrastructure networks only.

Which of the following DoS attacks affects mostly Windows computers by sending corrupt UDP packets?


Options are :

  • Bonk
  • Fraggle
  • Ping flood
  • Smurf

Answer : Bonk

Which of the following are important characteristics of VPNs?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Encryption
  • Data integrity
  • Authentication
  • Encapsulation

Answer : Encryption Data integrity Authentication Encapsulation

PW0-104 Wireless LAN Administration Practice Exam Set 4

Which of the following policies are considered as a good starting point while designing a wireless security policy document? Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Functional security policy
  • General security policy
  • Protocol policy
  • Rogue AP policy

Answer : Functional security policy General security policy Rogue AP policy

Which of the following types of filtering allows or restricts the flow of specific types of packets to provide security?


Options are :

  • Packet filtering
  • MAC address filtering
  • Ingress filtering
  • Route filtering

Answer : Packet filtering

A Web developer with your company wants to have wireless access for contractors that come in to work on various projects. The process of getting this approved takes time. So rather than wait, he has put his own wireless router attached to one of the network ports in his department. What security risk does this present?


Options are :

  • It is likely to increase network traffic and slow down network performance.
  • An unauthorized WAP is one way for hackers to get into a network.
  • None, adding a wireless access point is a common task and not a security risk.
  • This circumvents network intrusion detection.

Answer : An unauthorized WAP is one way for hackers to get into a network.

PW0-105 Certified Wireless Network Administrator CWNA Exam Set 3

Which of the following protocols periodically verifies the identity of the client by using a three-way handshake?


Options are :

  • CHAP
  • PAP
  • EAP-TLS
  • PPP

Answer : CHAP

Which of the following protocols is designed to provide more secure encryption than the weak wired encryption privacy?


Options are :

  • PEAP
  • TKIP
  • CCMP
  • LEAP

Answer : TKIP

Which of the following are social engineering techniques?Each correct answer represents a complete solution. Choose all that apply


Options are :

  • Pretexting
  • Salami attack
  • Phishing
  • Baiting

Answer : Pretexting Phishing Baiting

PW0-270 Certified Wireless Analysis Professional (CWAP) Exam Set 1

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions