Free CWNP CWSP-206 Exam Questions (page: 5)

Many computer users connect to the Internet at airports, which often have 802.11n access points with a captive portal for authentication. While using an airport hotspot with this security solution, to what type of wireless attack is a user susceptible?

  1. Wi-Fi phishing
  2. Management interface exploits
  3. UDP port redirection
  4. IGMP snooping

Answer(s): A



During 802.1X/LEAP authentication, the username is passed across the wireless medium in clear text. From a security perspective, why is this significant?

  1. The username can be looked up in a dictionary file that lists common username/password combinations.
  2. The username is needed for Personal Access Credential (PAC) and X.509 certificate validation.
  3. 4-Way Handshake nonces are based on the username in WPA and WPA2 authentication.
  4. The username is an input to the LEAP challenge/response hash that is exploited, so the username must be known to conduct authentication cracking.

Answer(s): D



In XYZ’s small business, two autonomous 802.11ac APs and 12 client devices are in use with WPA2-Personal. What statement about the WLAN security of this company is true?

  1. Intruders may obtain the passphrase with an offline dictionary attack and gain network access, but will be unable to decrypt the data traffic of other users.
  2. Because WPA2-Personal uses Open System authentication followed by a 4-Way Handshake, hijacking attacks are easily performed.
  3. A successful attack against all unicast traffic on the network would require a weak passphrase dictionary attack and the capture of the latest 4-Way Handshake for each client.
  4. An unauthorized wireless client device cannot associate, but can eavesdrop on some data because WPA2-Personal does not encrypt multicast or broadcast traffic.
  5. An unauthorized WLAN user with a protocol analyzer can decode data frames of authorized users if he captures the BSSID, client MAC address, and a user’s 4-Way Handshake.

Answer(s): C



The Aircrack-ng WLAN software tool can capture and transmit modified 802.11 frames over the wireless network. It comes pre-installed on Kali Linux and some other Linux distributions. Which one of the following would not be a suitable penetration testing action taken with this tool?

  1. Auditing the configuration and functionality of a WIPS by simulating common attack sequences.
  2. Transmitting a deauthentication frame to disconnect a user from the AP.
  3. Cracking the authentication or encryption processes implemented poorly in some WLANs.
  4. Probing the RADIUS server and authenticator to expose the RADIUS shared secret.

Answer(s): D



Viewing page 5 of 16



Post your Comments and Discuss CWNP CWSP-206 exam prep with other Community members:

CWSP-206 Exam Discussions & Posts