CWNP CWSP-206 Exam
CWSP Certified Wireless Security Professional (Page 2 )

Updated On: 19-Jan-2026

You have a Windows laptop computer with an integrated, dual-band, Wi-Fi compliant adapter. Your laptop computer has protocol analyzer software installed that is capable of capturing and decoding 802.11ac data. What statement best describes the likely ability to capture 802.11ac frames for security testing purposes?

  1. Integrated 802.11ac adapters are not typically compatible with protocol analyzers in Windows laptops. It is often best to use a USB adapter or carefully select a laptop with an integrated adapter that will work.
  2. Laptops cannot be used to capture 802.11ac frames because they do not support MU-MIMO.
  3. Only Wireshark can be used to capture 802.11ac frames as no other protocol analyzer has implemented the proper frame decodes
  4. All integrated 802.11ac adapters will work with most protocol analyzers for frame capture, including the Radio Tap Header.
  5. The only method available to capture 802.11ac frames is to perform a remote capture with a compatible access point.

Answer(s): A



ABC Company is an Internet Service Provider with thousands of customers. ABC’s customers are given login credentials for network access when they become a customer. ABC uses an LDAP server as the central user credential database. ABC is extending their service to existing customers in some public access areas and would like to use their existing database for authentication. How can ABC Company use their existing user database for wireless user authentication as they implement a large-scale WPA2-Enterprise WLAN security solution?

  1. Implement a RADIUS server and query user authentication requests through the LDAP server.
  2. Mirror the LDAP server to a RADIUS database within a WLAN controller and perform daily backups to synchronize the user databases.
  3. Import all users from the LDAP server into a RADIUS server with an LDAP-to-RADIUS conversion tool.
  4. Implement an X.509 compliant Certificate Authority and enable SSL queries on the LDAP server.

Answer(s): A



ABC Company has recently installed a WLAN controller and configured it to support WPA2-Enterprise security. The administrator has configured a security profile on the WLAN controller for each group within the company (Marketing, Sales, and Engineering). How are authenticated users assigned to groups so that they receive the correct security profile within the WLAN controller?

  1. The RADIUS server sends the list of authenticated users and groups to the WLAN controller as part of a 4-Way Handshake prior to user authentication.
  2. The WLAN controller polls the RADIUS server for a complete list of authenticated users and groups after each user authentication.
  3. The RADIUS server sends a group name return list attribute to the WLAN controller during every successful user authentication.
  4. The RADIUS server forwards the request for a group attribute to an LDAP database service, and LDAP sends the group attribute to the WLAN controller.

Answer(s): C



ABC Company is deploying an IEEE 802.11-compliant wireless security solution using 802.1X/EAP authentication. According to company policy, the security solution must prevent an eavesdropper from decrypting data frames traversing a wireless connection. What security characteristic and/or component plays a role in preventing data decryption?

  1. 4-Way Handshake
  2. PLCP Cyclic Redundancy Check (CRC)
  3. Multi-factor authentication
  4. Encrypted Passphrase Protocol (EPP)
  5. Integrity Check Value (ICV)

Answer(s): A



The IEEE 802.11 Pairwise Transient Key (PTK) is derived from what cryptographic element?

  1. PeerKey (PK)
  2. Group Master Key (GMK)
  3. Key Confirmation Key (KCK)
  4. Pairwise Master Key (PMK)
  5. Phase Shift Key (PSK)
  6. Group Temporal Key (GTK)

Answer(s): D



Viewing page 2 of 13
Viewing questions 6 - 10 out of 60 questions



Post your Comments and Discuss CWNP CWSP-206 exam prep with other Community members:

Join the CWSP-206 Discussion