Free CWSP-207 Exam Braindumps (page: 11)

Page 10 of 31

What statement accurately describes the functionality of the IEEE 802.1X standard?

  1. Port-based access control with EAP encapsulation over the LAN (EAPoL)
  2. Port-based access control with dynamic encryption key management and distribution
  3. Port-based access control with support for authenticated-user VLANs only
  4. Port-based access control with mandatory support of AES-CCMP encryption
  5. Port-based access control, which allows three frame types to traverse the uncontrolled port: EAP, DHCP, and DNS.

Answer(s): A



In the IEEE 802.11-2012 standard, what is the purpose of the 802.1X Uncontrolled Port?

  1. To allow only authentication frames to flow between the Supplicant and Authentication Server
  2. To block authentication traffic until the 4-Way Handshake completes
  3. To pass general data traffic after the completion of 802.11 authentication and key management
  4. To block unencrypted user traffic after a 4-Way Handshake completes

Answer(s): A



Given: An 802.1X/EAP implementation includes an Active Directory domain controller running Windows Server 2012 and an AP from a major vendor. A Linux server is running RADIUS and it queries the domain controller for user credentials. A Windows client is accessing the network.

What device functions as the EAP Supplicant?

  1. Linux server
  2. Windows client
  3. Access point
  4. Windows server
  5. An unlisted switch
  6. An unlisted WLAN controller

Answer(s): B



What wireless security protocol provides mutual authentication without using an X.509 certificate?

  1. EAP-FAST
  2. EAP-MD5
  3. EAP-TLS
  4. PEAPv0/EAP-MSCHAPv2
  5. EAP-TTLS
  6. PEAPv1/EAP-GTC

Answer(s): A






Post your Comments and Discuss CWNP CWSP-207 exam with other Community members:

CWSP-207 Exam Discussions & Posts