Available Number of Questions: Maximum of
119 Questions
Exam Name: Certified Wireless Security Professional (CWSP)
Related Certification(s):
CWNP CWSP Certification
CWNP CWSP-208 Exam Topics - You’ll Be Tested in Actual Exam
The CWNP CWSP-208 exam is a comprehensive assessment designed to evaluate your expertise in wireless network security and management. It covers a broad range of topics, including wireless security protocols, authentication and encryption methods, network design considerations, site survey techniques, troubleshooting and optimization strategies, and emerging technologies. You'll delve into the intricacies of secure network access control, learning about different authentication mechanisms like 802.1X and EAP protocols. Understanding the latest encryption standards, such as WPA3, is crucial for ensuring data privacy. The exam also emphasizes the importance of network design, guiding you to create efficient and secure wireless architectures. Site survey skills are honed to ensure optimal network coverage and performance. Troubleshooting techniques are taught to identify and resolve common wireless issues effectively. Additionally, you'll explore emerging technologies like Wi-Fi 6 and IoT security, staying abreast of the latest advancements in the field. By mastering these topics, you'll be well-equipped to implement robust security measures, optimize network performance, and mitigate potential risks, ultimately contributing to the overall resilience and reliability of wireless networks.
CWNP CWSP-208 Exam Short Quiz
Attempt this CWNP CWSP-208 exam quiz to self-assess your preparation for the actual CWNP Certified Wireless Security Professional (CWSP) exam. CertBoosters also provides premium CWNP CWSP-208 exam questions to pass the CWNP Certified Wireless Security Professional (CWSP) exam in the shortest possible time. Be sure to try our free practice exam software for the CWNP CWSP-208 exam.
1of 0 questions |
CWNP CWSP-208 Exam Quiz
✓ 0 answered
🔖 0 bookmarked
CWNPCWSP-208
Q1:
In an effort to optimize WLAN performance, ABC Company has upgraded their WLAN infrastructure from 802.11a/g to 802.11n. 802.11a/g clients are still supported and are used throughout ABC's facility. ABC has always been highly security conscious, but due to budget limitations, they have not yet updated their overlay WIPS solution to 802.11n or 802.11ac.
Given ABC's deployment strategy, what security risks would not be detected by the 802.11a/g WIPS?
○
AHijacking attack performed by using a rogue 802.11n AP against an 802.11a client
○
BRogue AP operating in Greenfield 40 MHz-only mode
○
C802.11a STA performing a deauthentication attack against 802.11n APs
○
D802.11n client spoofing the MAC address of an authorized 802.11n client
CWNPCWSP-208
Q2:
Which one of the following is a valid reason to avoid the use of EAP-MD5 in production WLANs?
○
AIt does not support the outer identity.
○
BIt is not a valid EAP type.
○
CIt does not support mutual authentication.
○
DIt does not support a RADIUS server.
CWNPCWSP-208
Q3:
You are implementing a wireless LAN that will be used by point-of-sale (PoS) systems in a retail environment. Thirteen PoS computers will be installed. To what industry requirement should you ensure you adhere?
○
AISA99
○
BHIPAA
○
CPCI-DSS
○
DDirective 8500.01
CWNPCWSP-208
Q4:
Given: Your company has just completed installation of an IEEE 802.11 WLAN controller with 20 controller-based APs. The CSO has specified PEAPv0/EAP-MSCHAPv2 as the only authorized WLAN authentication mechanism. Since an LDAP-compliant user database was already in use, a RADIUS server was installed and is querying authentication requests to the LDAP server.
Where must the X.509 server certificate and private key be installed in this network?
○
ASupplicant devices
○
BLDAP server
○
CController-based APs
○
DWLAN controller
○
ERADIUS server
CWNPCWSP-208
Q5:
Which one of the following describes the correct hierarchy of 802.1X authentication key derivation?
○
AThe MSK is generated from the 802.1X/EAP authentication. The PMK is derived from the MSK. The PTK is derived from the PMK, and the keys used for actual data encryption are a part of the PTK.
○
BIf passphrase-based client authentication is used by the EAP type, the PMK is mapped directly from the user's passphrase. The PMK is then used during the 4-way handshake to create data encryption keys.
○
CAfter successful EAP authentication, the RADIUS server generates a PMK. A separate key, the MSK, is derived from the AAA key and is hashed with the PMK to create the PTK and GTK.
○
DThe PMK is generated from a successful mutual EAP authentication. When mutual authentication is not used, an MSK is created. Either of these two keys may be used to derive the temporal data encryption keys during the 4-way handshake.