Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
sale

Want to Unlock All Questions for this Exam?

Full Exam Access, Discussions, No Robots Checks

CWNP CWSP-205 Exam Actual Questions

The questions for CWSP-205 were last updated on April 23, 2024.
  • Viewing page 1 out of 30 pages.
  • Viewing questions 1-4 out of 124 questions

Topic 1 - Wireless Network Attacks and Threat Assessment

Question #1 Topic 1

Given: John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website. The banks website uses the HTTPS protocol to protect sensitive account information. While John was using the hot-spot, a hacker was able to obtain Johns bank account user ID and password and exploit this information.
What likely scenario could have allowed the hacker to obtain Johns bank account user ID and password?

  • A. John's bank is using an expired X.509 certificate on their web server. The certificate is on John's Certificate Revocation List (CRL), causing the user ID and password to be sent unencrypted.
  • B. John uses the same username and password for banking that he does for email. John used a POP3 email client at the wireless hot-spot to check his email, and the user ID and password were not encrypted.
  • C. John accessed his corporate network with his IPSec VPN software at the wireless hot-spot. An IPSec VPN only encrypts data, so the user ID and password were sent in clear text. John uses the same username and password for banking that he does for his IPSec VPN software.
  • D. The bank’s web server is using an X.509 certificate that is not signed by a root CA, causing the user ID and password to be sent unencrypted.
  • E. Before connecting to the bank’s website, John’s association to the AP was hijacked. The attacker intercepted the HTTPS public encryption key from the bank’s
Reveal Solution Hide Solution   Discussion  

Correct Answer: B 🗳️

Question #2 Topic 1

What type of WLAN attack is prevented with the use of a per-MPDU TKIP sequence counter (TSC)?

  • A. Weak-IV
  • B. Forgery
  • C. Replay
  • D. Bit-flipping
  • E. Session hijacking
Reveal Solution Hide Solution   Discussion  

Correct Answer: C 🗳️

Question #3 Topic 1

What 802.11 WLAN security problem is directly addressed by mutual authentication?

  • A. Wireless hijacking attacks
  • B. Weak password policies
  • C. MAC spoofing
  • D. Disassociation attacks
  • E. Offline dictionary attacks
  • F. Weak Initialization Vectors
Reveal Solution Hide Solution   Discussion  

Correct Answer: A 🗳️

Question #4 Topic 1

ABC Company uses the wireless network for highly sensitive network traffic. For that reason, they intend to protect their network in all possible ways. They are continually researching new network threats and new preventative measures. They are interested in the security benefits of 802.11w, but would like to know its limitations.
What types of wireless attacks are protected by 802.11w? (Choose 2)

  • A. RF DoS attacks
  • B. Layer 2 Disassociation attacks
  • C. Robust management frame replay attacks
  • D. Social engineering attacks
Reveal Solution Hide Solution   Discussion  

Correct Answer: BC 🗳️

Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...