Free CWSP-207 Exam Braindumps (page: 16)

Page 15 of 31

What drawbacks initially prevented the widespread acceptance and use of Opportunistic Key Caching (OKC)?

  1. Sharing cached keys between controllers during inter-controller roaming created vulnerabilities that exposed the keys to attackers.
  2. Because OKC is not defined by any standards or certification body, client support was delayed and sporadic early on.
  3. Key exchanges during fast roams required processor-intensive cryptography, which was prohibitive for legacy devices supporting only TKIP.
  4. The Wi-Fi Alliance continually delayed the creation of a client certification for OKC, even though it was defined by IEEE 802.11r.

Answer(s): B



Given: When the CCMP cipher suite is used for protection of data frames, 16 bytes of overhead are added to the Layer 2 frame. 8 of these bytes comprise the MIC.

What purpose does the encrypted MIC play in protecting the data frame?

  1. The MIC is used as a first layer of validation to ensure that the wireless receiver does not incorrectly process corrupted signals.
  2. The MIC provides for a cryptographic integrity check against the data payload to ensure that it matches the original transmitted data.
  3. The MIC is a hash computation performed by the receiver against the MAC header to detect replay attacks prior to processing the encrypted payload.
  4. The MIC is a random value generated during the 4-way handshake and is used for key mixing to enhance the strength of the derived PTK.

Answer(s): B



A single AP is configured with three separate WLAN profiles, as follows:
1. SSID: ABCData ­ BSSID: 00:11:22:00:1F:C3 ­ VLAN 10 ­ Security: PEAPv0/EAP-MSCHAPv2 with AES-CCMP ­ 3 current clients
2. SSID: ABCVoice ­ BSSID: 00:11:22:00:1F:C4 ­ VLAN 60 ­ Security: WPA2-Personal with AES-CCMP ­ 2 current clients
3. SSID: Guest ­ BSSID: 00:11:22:00:1F:C5 ­ VLAN 90 ­ Security: Open with captive portal authentication ­ 3 current clients

Three STAs are connected to ABCDat

  1. Three STAs are connected to Guest. Two STAs are connected to ABCVoice.
    How many unique GTKs and PTKs are currently in place in this scenario?
  2. 1 GTK ­ 8 PTKs
  3. 2 GTKs ­ 5 PTKs
  4. 2 GTKs ­ 8 PTKs
  5. 3 GTKs ­ 8 PTKs

Answer(s): B



You have an AP implemented that functions only using 802.11-2012 standard methods for the WLAN communications on the RF side and implementing multiple SSIDs and profiles on the management side configured as follows:
1. SSID: Guest ­ VLAN 90 ­ Security: Open with captive portal authentication ­ 2 current clients
2. SSID: ABCData ­ VLAN 10 ­ Security: PEAPv0/EAP-MSCHAPv2 with AES-CCMP ­ 5 current clients

3. SSID: ABCVoice ­ VLAN 60 ­ Security: WPA2-Personal ­ 2 current clients

Two client STAs are connected to ABCData and can access a media server that requires authentication at the Application Layer and is used to stream multicast video streams to the clients.

What client stations possess the keys that are necessary to decrypt the multicast data packets carrying these videos?

  1. Only the members of the executive team that are part of the multicast group configured on the media server
  2. All clients that are associated to the AP using the ABCData SSID
  3. All clients that are associated to the AP using any SSID
  4. All clients that are associated to the AP with a shared GTK, which includes ABCData and ABCVoice.

Answer(s): B






Post your Comments and Discuss CWNP CWSP-207 exam with other Community members:

CWSP-207 Exam Discussions & Posts