Free CWSP-207 Exam Braindumps (page: 13)

Page 12 of 31

When implementing a WPA2-Enterprise security solution, what protocol must the selected RADIUS server support?

  1. LWAPP, GRE, or CAPWAP
  2. IPSec/ESP
  3. EAP
  4. CCMP and TKIP
  5. LDAP

Answer(s): C



Given: XYZ Company has recently installed an 802.11ac WLAN. The company needs the ability to control access to network services, such as file shares, intranet web servers, and Internet access based on an employee's job responsibilities.

What WLAN security solution meets this requirement?

  1. An autonomous AP system with MAC filters
  2. WPA2-Personal with support for LDAP queries
  3. A VPN server with multiple DHCP scopes
  4. A WLAN controller with RBAC features
  5. A WLAN router with wireless VLAN support

Answer(s): D



Given: Your network includes a controller-based WLAN architecture with centralized data forwarding. The AP builds an encrypted tunnel to the WLAN controller. The WLAN controller is uplinked to the network via a trunked 1 Gbps Ethernet port supporting all necessary VLANs for management, control, and client traffic.

What processes can be used to force an authenticated WLAN client's data traffic into a specific VLAN as it exits the WLAN controller interface onto the wired uplink? (Choose 3)

  1. On the Ethernet switch that connects to the AP, configure the switch port as an access port (not trunking) in the VLAN of supported clients.
  2. During 802.1X authentication, RADIUS sends a return list attribute to the WLAN controller assigning the user and all traffic to a specific VLAN.
  3. In the WLAN controller's local user database, create a static username-to-VLAN mapping on the WLAN controller to direct data traffic from a specific user to a designated VLAN.
  4. Configure the WLAN controller with static SSID-to-VLAN mappings; the user will be assigned to a VLAN according to the SSID being used.

Answer(s): B,C,D



What is the purpose of the Pairwise Transient Key (PTK) in IEEE 802.11 Authentication and Key Management?

  1. The PTK is a type of master key used as an input to the GMK, which is used for encrypting multicast data frames.
  2. The PTK contains keys that are used to encrypt unicast data frames that traverse the wireless medium.
  3. The PTK is XOR'd with the PSK on the Authentication Server to create the AAA key.
  4. The PTK is used to encrypt the Pairwise Master Key (PMK) for distribution to the 802.1X Authenticator prior to the 4-Way Handshake.

Answer(s): B






Post your Comments and Discuss CWNP CWSP-207 exam with other Community members:

CWSP-207 Exam Discussions & Posts