Download CWNP.CWSP-205.PrepAway.2019-01-05.70q.tqb

Download Exam

File Info

Exam Certified Wireless Security Professional (CWSP)
Number CWSP-205
File Name CWNP.CWSP-205.PrepAway.2019-01-05.70q.tqb
Size 309 KB
Posted Jan 05, 2019
Download CWNP.CWSP-205.PrepAway.2019-01-05.70q.tqb

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Given: WLAN attacks are typically conducted by hackers to exploit a specific vulnerability within a network. 
What statement correctly pairs the type of WLAN attack with the exploited vulnerability? (Choose 3)


  1. Management interface exploit attacks are attacks that use social engineering to gain credentials from managers.
  2. Zero-day attacks are always authentication or encryption cracking attacks.
  3. RF DoS attacks prevent successful wireless communication on a specific frequency or frequency range.
  4. Hijacking attacks interrupt a user’s legitimate connection and introduce a new connection with an evil twin AP.
  5. Social engineering attacks are performed to collect sensitive information from unsuspecting users
  6. Association flood attacks are Layer 3 DoS attacks performed against authenticated client stations
Correct answer: CDE



Question 2

Given: One of the security risks introduced by WPA2-Personal is an attack conducted by an authorized network user who knows the passphrase. In order to decrypt other users’ traffic, the attacker must obtain certain information from the 4-way handshake of the other users. 
In addition to knowing the Pairwise Master Key (PMK) and the supplicant’s address (SA), what other three inputs must be collected with a protocol analyzer to recreate encryption keys? (Choose 3) 


  1. Authenticator nonce
  2. Supplicant nonce
  3. Authenticator address (BSSID)
  4. GTKSA 
  5. Authentication Server nonce
Correct answer: ABC



Question 3

What is a primary criteria for a network to qualify as a Robust Security Network (RSN)?


  1. Token cards must be used for authentication.
  2. Dynamic WEP-104 encryption must be enabled.
  3. WEP may not be used for encryption.
  4. WPA-Personal must be supported for authentication and encryption.
  5. WLAN controllers and APs must not support SSHv1.
Correct answer: C









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files