Exam Details

  • Exam Code
    :CWSP-205
  • Exam Name
    :Certified Wireless Security Professional
  • Certification
    :CWNP Certifications
  • Vendor
    :CWNP
  • Total Questions
    :119 Q&As
  • Last Updated
    :Apr 13, 2025

CWNP CWNP Certifications CWSP-205 Questions & Answers

  • Question 91:

    Given: ABC Hospital wishes to create a strong security policy as a first step in securing their 802.11 WLAN.

    Before creating the WLAN security policy, what should you ensure you possess?

    A. Awareness of the exact vendor devices being installed

    B. Management support for the process

    C. End-user training manuals for the policies to be created

    D. Security policy generation software

  • Question 92:

    As the primary security engineer for a large corporate network, you have been asked to author a new security policy for the wireless network. While most client devices support 802.1X authentication, some legacy devices still only support passphrase/PSK-based security methods.

    When writing the 802.11 security policy, what password-related items should be addressed?

    A. MSCHAPv2 passwords used with EAP/PEAPv0 should be stronger than typical WPA2-PSK passphrases.

    B. Password complexity should be maximized so that weak WEP IV attacks are prevented.

    C. Static passwords should be changed on a regular basis to minimize the vulnerabilities of a PSK-based authentication.

    D. Certificates should always be recommended instead of passwords for 802.11 client authentication.

    E. EAP-TLS must be implemented in such scenarios.

  • Question 93:

    In what deployment scenarios would it be desirable to enable peer-to-peer traffic blocking?

    A. In home networks in which file and printer sharing is enabled

    B. At public hot-spots in which many clients use diverse applications

    C. In corporate Voice over Wi-Fi networks with push-to-talk multicast capabilities

    D. In university environments using multicast video training sourced from professor's laptops

  • Question 94:

    As a part of a large organization's security policy, how should a wireless security professional address the problem of rogue access points?

    A. Use a WPA2-Enterprise compliant security solution with strong mutual authentication and encryption for network access of corporate devices.

    B. Hide the SSID of all legitimate APs on the network so that intruders cannot copy this parameter on rogue APs.

    C. Conduct thorough manual facility scans with spectrum analyzers to detect rogue AP RF signatures.

    D. A trained employee should install and configure a WIPS for rogue detection and response measures.

    E. Enable port security on Ethernet switch ports with a maximum of only 3 MAC addresses on each port.

  • Question 95:

    What elements should be addressed by a WLAN security policy? (Choose 2)

    A. Enabling encryption to prevent MAC addresses from being sent in clear text

    B. How to prevent non-IT employees from learning about and reading the user security policy

    C. End-user training for password selection and acceptable network use

    D. The exact passwords to be used for administration interfaces on infrastructure devices

    E. Social engineering recognition and mitigation techniques

  • Question 96:

    Given: In a security penetration exercise, a WLAN consultant obtains the WEP key of XYZ Corporation's wireless network. Demonstrating the vulnerabilities of using WEP, the consultant uses a laptop running a software AP in an attempt to hijack the authorized user's connections. XYZ's legacy network is using 802.11n APs with 802.11b, 11g, and 11n client devices.

    With this setup, how can the consultant cause all of the authorized clients to establish Layer 2 connectivity with the software access point?

    A. All WLAN clients will reassociate to the consultant's software AP if the consultant's software AP provides the same SSID on any channel with a 10 dB SNR improvement over the authorized AP.

    B. A higher SSID priority value configured in the Beacon frames of the consultant's software AP will take priority over the SSID in the authorized AP, causing the clients to reassociate.

    C. When the RF signal between the clients and the authorized AP is temporarily disrupted and the consultant's software AP is using the same SSID on a different channel than the authorized AP, the clients will reassociate to the software AP.

    D. If the consultant's software AP broadcasts Beacon frames that advertise 802.11g data rates that are faster rates than XYZ's current 802.11b data rates, all WLAN clients will reassociate to the faster AP.

  • Question 97:

    You perform a protocol capture using Wireshark and a compatible 802.11 adapter in Linux. When viewing the capture, you see an auth req frame and an auth rsp frame. Then you see an assoc req frame and an assoc rsp frame. Shortly after, you see DHCP communications and then ISAKMP protocol packets. What security solution is represented?

    A. 802.1X/EAP-TTLS

    B. Open 802.11 authentication with IPSec

    C. 802.1X/PEAPv0/MS-CHAPv2

    D. WPA2-Personal with AES-CCMP

    E. EAP-MD5

  • Question 98:

    Given: ABC Corporation is evaluating the security solution for their existing WLAN. Two of their supported solutions include a PPTP VPN and 802.1X/LEAP. They have used PPTP VPNs because of their wide support in server and desktop operating systems. While both PPTP and LEAP adhere to the minimum requirements of the corporate security policy, some individuals have raised concerns about MS-CHAPv2 (and similar) authentication and the known fact that MS-CHAPv2 has proven vulnerable in improper implementations.

    As a consultant, what do you tell ABC Corporation about implementing MS-CHAPv2 authentication? (Choose 2)

    A. MS-CHAPv2 is compliant with WPA-Personal, but not WPA2-Enterprise.

    B. MS-CHAPv2 is subject to offline dictionary attacks.

    C. LEAP's use of MS-CHAPv2 is only secure when combined with WEP.

    D. MS-CHAPv2 is only appropriate for WLAN security when used inside a TLS-encrypted tunnel.

    E. MS-CHAPv2 uses AES authentication, and is therefore secure.

    F. When implemented with AES-CCMP encryption, MS-CHAPv2 is very secure.

  • Question 99:

    Given: You manage a wireless network that services 200 wireless users. Your facility requires 20 access points, and you have installed an IEEE 802.11-compliant implementation of 802.1X/LEAP with AES-CCMP as an authentication and encryption solution.

    In this configuration, the wireless network is initially susceptible to what type of attacks? (Choose 2)

    A. Encryption cracking

    B. Offline dictionary attacks

    C. Layer 3 peer-to-peer

    D. Application eavesdropping

    E. Session hijacking

    F. Layer 1 DoS

  • Question 100:

    Given: The Aircrack-ng WLAN software tool can capture and transmit modified 802.11 frames over the

    wireless network. It comes pre-installed on Kali Linux and some other Linux distributions.

    What are three uses for such a tool? (Choose 3)

    A. Transmitting a deauthentication frame to disconnect a user from the AP.

    B. Auditing the configuration and functionality of a WIPS by simulating common attack sequences

    C. Probing the RADIUS server and authenticator to expose the RADIUS shared secret

    D. Cracking the authentication or encryption processes implemented poorly in some WLANs

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CWNP exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CWSP-205 exam preparations and CWNP certification application, do not hesitate to visit our Vcedump.com to find your solutions here.