Free CWSP-207 Exam Braindumps (page: 15)

Page 14 of 31

When TKIP is selected as the pairwise cipher suite, what frame types may be protected with data confidentiality? (Choose 2)

  1. Robust broadcast management
  2. Robust unicast management
  3. Control
  4. Data
  5. ACK
  6. QoS Data

Answer(s): D,F



What statements are true about 802.11-2012 Protected Management Frames? (Choose 2)

  1. 802.11w frame protection protects against some Layer 2 denial-of-service (DoS) attacks, but it cannot prevent all types of Layer 2 DoS attacks.
  2. When frame protection is in use, the PHY preamble and header as well as the MAC header are encrypted with 256- or 512-bit AES.
  3. Authentication, association, and acknowledgment frames are protected if management frame protection is enabled, but deauthentication and disassociation frames are not.
  4. Management frame protection protects disassociation and deauthentication frames.

Answer(s): A,D



Given: AAA is an architectural framework used to provide three separate security components in a network. Listed below are three phrases that each describe one aspect of the AAA framework. Option-1 -- This AAA function is performed first and validates user identify prior to determining the network resources to which they will be granted access. Option-2 -- This function is used for monitoring and auditing purposes and includes the collection of data that identifies what a user has done while connected. Option-3 -- This function is used to designate permissions to a particular user.

What answer correctly pairs the AAA component with the descriptions provided above?

  1. Option-1 ­ Access Control
    Option-2 ­ Authorization
    Option-3 ­ Accounting
  2. Option-1 ­ Authentication
    Option-2 ­ Accounting
    Option-3 ­ Association
  3. Option-1 ­ Authorization
    Option-2 ­ Access Control
    Option-3 ­ Association
  4. Option-1 ­ Authentication
    Option-2 ­ Accounting
    Option-3 ­ Authorization

Answer(s): D



What security benefits are provided by endpoint security solution software? (Choose 3)

  1. Can prevent connections to networks with security settings that do not conform to company policy
  2. Can collect statistics about a user's network use and monitor network threats while they are connected
  3. Can restrict client connections to networks with specific SSIDs and encryption types
  4. Can be used to monitor for and prevent network attacks by nearby rogue clients or APs

Answer(s): A,B,C






Post your Comments and Discuss CWNP CWSP-207 exam with other Community members:

CWSP-207 Exam Discussions & Posts