slide 1: CERTIFIED WIRELESS
SECURITY
PROFESSIONAL
CWNP
CWSP-206
slide 2: Secure Your Place in the
Most Competitive IT
Industry
Grades4 S ur e’ s top CWSP-206 dumps
are meant to deliver you the best
knowledge on CWSP certification
syllabus contents. CWSP Certified
Wireless Security Professional exam
dumps provide you the best learning
opportunity employing minimum
efforts while the results are pleasantly
surprising beyond your expectations.
This quality CWNP CWSP-206
braindumps PDF polishes your skills
and widens your horizons intellectually
to ace challenges of a complex IT
certification like CWNP .
slide 3: 3
CWSP-206 CERTIFIED WIRELESS SECURITY PROFESSIONAL DUMPS QUESTIONS
Question :1
What TKIP feature was introduced to counter the weak integrity check algorithm used in WEP
A. RC5 stream cipher
B. Block cipher support
C. Sequence counters
D. 32-bit ICV CRC-32
E. Michael
Answer: E
slide 4: 4
CWSP-206 CERTIFIED WIRELESS SECURITY PROFESSIONAL DUMPS QUESTIONS
Question :2
Your network implements an 802.1X/EAP-based wireless security solution. A WLAN controller is installed and
manages seven APs. Free RADIUS is used for the RADIUS server and is installed on a dedicated server named SRV21.
One example client is a MacBook Pro with 8 GB RAM. What device functions as the 802.1X/EAP Authenticator
A. WLAN Controller/AP
B. MacBook Pro
C. SRV21
D. RADIUS server
Answer: A
slide 5: 5
CWSP-206 CERTIFIED WIRELESS SECURITY PROFESSIONAL DUMPS QUESTIONS
Question :3
You are the WLAN administrator in your organization and you are required to monitor the network and ensure all
active WLANs are providing RSNs. You have a laptop protocol analyzer configured. In what frame could you see the
existence or non-existence of proper RSN configuration parameters for each BSS through the RSNIE
A. CTS
B. Beacon
C. RTS
D. Data frames
E. Probe request
Answer: B
slide 6: 6
CWSP-206 CERTIFIED WIRELESS SECURITY PROFESSIONAL DUMPS QUESTIONS
Question :4
During 802.1X/LEAP authentication the username is passed across the wireless medium in clear text.
From a security perspective why is this significant
A. The username can be looked up in a dictionary file that lists common username/password
combinations.
B. The username is needed for Personal Access Credential PAC and X.509 certificate validation.
C. 4-Way Handshake nonces are based on the username in WPA and WPA2 authentication.
D. The username is an input to the LEAPchallenge/response hash that is exploited so the username must
be known to conduct authentication cracking.
Answer: D
slide 7: 7
CWSP-206 CERTIFIED WIRELESS SECURITY PROFESSIONAL DUMPS QUESTIONS
Question :5
As the primary security engineer for a large corporate network you have been asked to author a new security
policy for the wireless network. While most client devices support 802.1X authentication some legacy devices still
only support passphrase/PSK-based security methods. When writing the 802.11 security policy what password-
related items should be addressed
A. Certificates should always be recommended instead of passwords for 802.11 client authentication.
B. Password complexity should be maximized so that weak WEP IV attacks are prevented.
C. Static passwords should be changed on a regular basis to minimize the vulnerabilities of a PSK-based
authentication.
D. EAP-TLS must be implemented in such scenarios.
E. MS-CHAPv2 passwords used with EAP/PEAPv0 should be stronger than typical WPA2-PSK passphrases.
Answer: C
slide 8: 8
CWSP-206 CERTIFIED WIRELESS SECURITY PROFESSIONAL DUMPS QUESTIONS
Question :6
The IEEE 802.11 standard defined Open System authentication as consisting of two auth frames and two assoc
frames. In a WPA2-Enterprise network what process immediately follows the 802.11 association procedure
A. 802.1X/ EAPauthentication
B. Group Key Handshake
C. DHCP Discovery
D. RADIUS shared secret lookup
E. 4-Way Handshake
F. Passphrase-to-PSK mapping
Answer: A
slide 9: 9
https://www.grades4sure.com/CWSP-206-exam-questions.html
We like to
For watching this Slide