Free CWSP-207 Exam Braindumps (page: 4)

Page 3 of 31

Given: One of the security risks introduced by WPA2-Personal is an attack conducted by an authorized network user who knows the passphrase. In order to decrypt other users' traffic, the attacker must obtain certain information from the 4-way handshake of the other users.

In addition to knowing the Pairwise Master Key (PMK) and the supplicant's address (SA), what other three inputs must be collected with a protocol analyzer to recreate encryption keys? (Choose 3)

  1. Authenticator nonce
  2. Supplicant nonce
  3. Authenticator address (BSSID)
  4. GTKSA
  5. Authentication Server nonce

Answer(s): A,B,C



What is a primary criteria for a network to qualify as a Robust Security Network (RSN)?

  1. Token cards must be used for authentication.
  2. Dynamic WEP-104 encryption must be enabled.
  3. WEP may not be used for encryption.
  4. WPA-Personal must be supported for authentication and encryption.
  5. WLAN controllers and APs must not support SSHv1.

Answer(s): C



Given: You are using a Wireless Aggregator utility to combine multiple packet captures. One capture exists for each of channels 1, 6 and 11.
What kind of troubleshooting are you likely performing with such a tool?

  1. Wireless adapter failure analysis.
  2. Interference source location.
  3. Fast secure roaming problems.
  4. Narrowband DoS attack detection.

Answer(s): C



Which of the following security attacks cannot be detected by a WIPS solution of any kind? (Choose
2)

  1. Rogue APs
  2. DoS
  3. Eavesdropping
  4. Social engineering

Answer(s): C,D






Post your Comments and Discuss CWNP CWSP-207 exam with other Community members:

CWSP-207 Discussions & Posts