Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Note! Following CWSP-206 Exam is Retired now. Please select the alternative replacement for your Exam Certification. The new exam code is CWSP-207

Verified By IT Certified Experts

CertsTopics.com Certified Safe Files

Up-To-Date Exam Study Material

99.5% High Success Pass Rate

100% Accurate Answers

Instant Downloads

Exam Questions And Answers PDF

Try Demo Before You Buy

Certification Exams with Helpful Questions And Answers

CWSP Certified Wireless Security Professional Questions and Answers

Question 1

What software and hardware tools are used in the processperformed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?

Options:

A.

A low-gain patch antenna and terminal emulation software

B.

MAC spoofing software and MAC DoS software

C.

RF jamming device and a wireless radio card

D.

A wireless workgroup bridge and a protocol analyzer

Buy Now
Question 2

In order to acquire credentials of a valid user on a public hotspot network, what attacks may be conducted? Choose thesingle completely correct answer.

Options:

A.

MAC denial of service and/or physical theft

B.

Social engineering and/or eavesdropping

C.

Authentication cracking and/or RF DoS

D.

Code injection and/or XSS

E.

RF DoS and/or physical theft

Question 3

ABC Company has recently installed a WLAN controller and configured it to support WPA2-Enterprise security. The administrator has configured a security profile on the WLAN controller for each groupwithin the company (Marketing, Sales, and Engineering). How are authenticated users assigned to groups so that they receive the correct security profile within the WLAN controller?

Options:

A.

The RADIUS server sends the list of authenticated users and groups to the WLAN controller as part of a 4-Way Handshake prior to user authentication.

B.

The WLAN controller polls the RADIUS server for a complete list of authenticated users and groups after each user authentication.

C.

The RADIUS server sends a group name return list attribute to the WLAN controller during every successful user authentication.

D.

The RADIUS server forwards the request for a group attribute to an LDAP database service, and LDAP sends the group attribute to the WLAN controller.