Free CWSP-207 Exam Braindumps

While performing a manual scan of your environment using a spectrum analyzer on a laptop computer, you notice a signal in the real time FFT view. The signal is characterized by having peak power centered on channel 11 with an approximate width of 20 MHz at its peak. The signal widens to approximately 40 MHz after it has weakened by about 30 dB.

What kind of signal is displayed in the spectrum analyzer?

  1. A frequency hopping device is being used as a signal jammer in 5 GHz
  2. A low-power wideband RF attack is in progress in 2.4 GHz, causing significant 802.11 interference
  3. An 802.11g AP operating normally in 2.4 GHz
  4. An 802.11a AP operating normally in 5 GHz

Answer(s): C



You are using a protocol analyzer for random checks of activity on the WLAN. In the process, you notice two different EAP authentication processes. One process (STA1) used seven EAP frames (excluding ACK frames) before the 4-way handshake and the other (STA2) used 11 EAP frames (excluding ACK frames) before the 4-way handshake.

Which statement explains why the frame exchange from one STA required more frames than the frame exchange from another STA when both authentications were successful? (Choose the single most probable answer given a stable WLAN.)

  1. STA1 and STA2 are using different cipher suites.
  2. STA2 has retransmissions of EAP frames.
  3. STA1 is a reassociation and STA2 is an initial association.
  4. STA1 is a TSN, and STA2 is an RSN.
  5. STA1 and STA2 are using different EAP types.

Answer(s): E



Given: ABC Corporation's 802.11 WLAN is comprised of a redundant WLAN controller pair (N+1) and 30 access points implemented in 2004. ABC implemented WEP encryption with IPSec VPN technology to secure their wireless communication because it was the strongest security solution available at the time it was implemented. IT management has decided to upgrade the WLAN infrastructure and implement Voice over Wi-Fi and is concerned with security because most Voice over Wi-Fi phones do not support IPSec.

As the wireless network administrator, what new security solution would be best for protecting ABC's data?

  1. Migrate corporate data clients to WPA-Enterprise and segment Voice over Wi-Fi phones by assigning them to a different frequency band.
  2. Migrate corporate data and Voice over Wi-Fi devices to WPA2-Enterprise with fast secure roaming support, and segment Voice over Wi-Fi data on a separate VLAN.
  3. Migrate to a multi-factor security solution to replace IPSec; use WEP with MAC filtering, SSID hiding, stateful packet inspection, and VLAN segmentation.
  4. Migrate all 802.11 data devices to WPA-Personal, and implement a secure DHCP server to allocate addresses from a segmented subnet for the Voice over Wi-Fi phones.

Answer(s): B



Given: The ABC Corporation currently utilizes an enterprise Public Key Infrastructure (PKI) to allow employees to securely access network resources with smart cards. The new wireless network will use WPA2-Enterprise as its primary authentication solution. You have been asked to recommend a Wi-Fi Alliance-tested EAP method.

What solutions will require the least change in how users are currently authenticated and still integrate with their existing PKI?

  1. EAP-FAST
  2. EAP-TLS
  3. PEAPv0/EAP-MSCHAPv2
  4. LEAP
  5. PEAPv0/EAP-TLS
  6. EAP-TTLS/MSCHAPv2

Answer(s): B






Post your Comments and Discuss CWNP CWSP-207 exam with other Community members:

CWSP-207 Exam Discussions & Posts