Logo Passei Direto

CWNP Certification CWSP-207 Dumps Questions

Ferramentas de estudo

Material
Study with thousands of resources!

Text Material Preview

CWSP-207 CWNP Wireless Security Professional (CWSP) exam dumps
questions are the best material for you to test all the related CWNP exam topics.
By using the CWSP-207 exam dumps questions and practicing your skills, you
can increase your confidence and chances of passing the CWSP-207 exam.
Features of Dumpsinfo’s products
Instant Download
Free Update in 3 Months
Money back guarantee
PDF and Software
24/7 Customer Support
Besides, Dumpsinfo also provides unlimited access. You can get all
Dumpsinfo files at lowest price.
CWNP Wireless Security Professional (CWSP) CWSP-207 exam free dumps
questions are available below for you to study. 
Full version: CWSP-207 Exam Dumps Questions
1.Which of these types of EAP require a client-side X.509 digital certificate to be used as the
supplicant credentials? (Choose all that apply.)
A. EAP-TTLS
B. EAP-PEAPv0 (EAP-MSCHAPv2)
C. EAP-PEAPv0 (EAP-TLS)
D. EAP-FAST
E. EAP-TLS (privacy mode)
F. EAP-TLS (nonprivacy mode)
Answer: CEF
2.Which of these roaming methods requires the use of FT Action frames?
A. Over-the-air fast BSS transition
 1 / 16
https://www.dumpsinfo.com/unlimited-access/
https://www.dumpsinfo.com/exam/cwsp-207
B. Over-the-WDS fast BSS transition
C. Over-the-DS fast BSS transition
D. Over-the-WLS fast BSS transition
Answer: C
3.You perform a protocol capture using Wireshark and a compatible 802.11 adapter in Linux. When
viewing the capture, you see an auth req frame and an auth rsp frame. Then you see an assoc req
frame and an assoc rsp frame.
Shortly after, you see DHCP communications and then ISAKMP protocol packets.
What security solution is represented?
A. 802.1X/EAP-TTLS
B. Open 802.11 authentication with IPSec
C. 802.1X/PEAPv0/MS-CHAPv2
D. WPA2-Personal with AES-CCMP
E. EAP-MD5
Answer: B
4.When monitoring APs within a LAN using a Wireless Network Management System (WNMS), what
secure protocol may be used by the WNMS to issue configuration changes to APs?
A. IPSec/ESP
B. TFTP
C. 802.1X/EAP
D. SNMPv3
E. PPTP
Answer: D
5.While performing a manual scan of your environment using a spectrum analyzer on a laptop
computer, you notice a signal in the real time FFT view.
The signal is characterized by having peak power centered on channel 11 with an approximate width
of 20 MHz at its peak. The signal widens to approximately 40 MHz after it has weakened by about 30
dB.
What kind of signal is displayed in the spectrum analyzer?
A. A frequency hopping device is being used as a signal jammer in 5 GHz
B. A low-power wideband RF attack is in progress in 2.4 GHz, causing significant 802.11 interference
C. An 802.11g AP operating normally in 2.4 GHz
D. An 802.11a AP operating normally in 5 GHz
Answer: C
6.TKIP can be used with which of the following? (Choose all that apply.)
A. WEP
B. WPA-Personal
C. WPA-Enterprise
D. WPA-2 Personal
E. WPA-2 Enterprise
F. 802.11-2012 (RSN)
Answer: BCDEF
 2 / 16
https://www.dumpsinfo.com/
7.The ___________ key is used to encrypt/decrypt unicast 802.11 frames, and the ___________ key
is used to encrypt/decrypt broadcast and multicast 802.11 frames.
A. Group Master, Group Temporal
B. Pairwise Master, Group Temporal
C. Master Session, Pairwise Transient
D. Pairwise Transient, Group Temporal
E. Pairwise Master, Pairwise Transient
Answer: D
8. 802.11i
9.Which of these types of EAP is designed for a Fixed Mobile Convergence (FMC) authentication
solution over an 802.11 WLAN and a 3G cellular telephone network?
A. EAP-SIM
B. EAP-GTC
C. EAP-PEAPv0 (EAP-TLS)
D. EAP-AKA
E. EAP-Fortress
F. EAP-TTLS
Answer: D
10.Your WIDS detected a rogue AP and sent an email alert to an administrator in the same building in
which the rogue was detected.
The administrator reads the email and does not respond to the alarm, but rather waits until after lunch
and then calls you for direction. This delay has allowed the device to be on the network for over an
hour and placed the organization’s private information at risk.
What is the most likely reason the administrator took no action?
A. The WIDS detected the rogue, and no further action was required.
B. You are the only person who knows how to deal with rogue APs.
C. The security policy lacks response procedures.
D. Only a properly configured WIPS can mitigate a rogue AP.
Answer: C
11.Identify the protocols that are normally used to manage WLAN infrastructure devices securely.
(Choose all that apply.)
A. HTTPS
B. Telnet
C. SSH2
D. TLS
E. IPsec
F. CCMP/AES
Answer: AC
12.When an RS-232 serial cable is connected between a service laptop and SC Series hardware,
which parameters need to be selected?
A. Baud Rate = 9600, Parity = None Data Bits = 8, Stop Bits =1, Flow Control = XON/XOFF
B. Baud Rate = 115200, Parity = None Data Bits = 8, Stop Bits = 1, Flow Control = XON/XOFF
C. Baud Rate = 115200, Parity =None Data Bits = 8, Stop Bits = 1, Flow Control = None
 3 / 16
https://www.dumpsinfo.com/
D. Baud Rate = 115200, Parity = Even Data Bits = 8, Stop Bits = 1, Flow Control = XON/XOFF
Answer: A
13.What does 802.1X/EAP provide when implemented for WLAN security? (Choose all that apply.)
A. Access to network resources
B. Verification of access point credentials
C. Dynamic authentication
D. Dynamic encryption-key generation
E. Verification of user credentials
Answer: ADE
14.A WIDS/WIPS consists of which of the following components? (Choose two.)
A. WIDS/WIPS server
B. Midspan injector
C. Sensors
D. MDM server
E. SNMP server
Answer: AC
15.When considering the 4-Way Handshake that is used to create dynamic encryption keys, what is
the main difference between 802.1X/EAP and PSK authentication? (Choose all that apply.)
A. 802.1X/EAP supplicants all use the same PMK.
B. Clients that use PSK authentication all use the same PTK.
C. 802.1X/EAP supplicants all use a different PMK.
D. Clients that use PSK authentication all use a different PTK.
E. 802.1X/EAP supplicants all use a different PTK.
F. Clients that use PSK authentication all use the same PMK.
Answer: CF
16.Joe's new laptop is experiencing difficulty connecting to ABC Company's 802.11 WLAN using
802.1X/EAP PEAPv0.
The company's wireless network administrator assured Joe that his laptop was authorized in the
WIPS management console for connectivity to ABC's network before it was given to him. The WIPS
termination policy includes alarms for rogue stations, roque APs, DoS attacks and unauthorized
roaming.
What is a likely reason that Joe cannot connect to the network?
A. Joe disabled his laptop's integrated 802.11 radio and is using a personal PC card radio with a
different chipset, drivers, and client utilities.
B. Joe's integrated 802.11 radio is sending multiple Probe Request frames on each channel.
C. An ASLEAP attack has been detected on APs to which Joe's laptop was trying to associate. The
WIPS responded by disabling the APs.
D. Joe configured his 802.11 radio card to transmit at 100 mW to increase his SNR. The WIPS is
detecting this much output power as a DoS attack.
Answer: A
17.In a guest firewall policy, which IP networks should be restricted? (Choose two.)
A. 172.16.0.0/12
 4 / 16
https://www.dumpsinfo.com/
B. 20.0.0.0/8
C. 192.16.0.0/16
D. 172.10.0.0/24
E. 10.0.0.0/8
Answer: AE
18.Another auditor tells you that they use the same toolkit to conduct audits as they use to conduct
WLAN site survey work.
Why would they do this since they are performing two different types of work?
A. Many auditors cannot afford a proper auditing kit.
B. The two types of work are similar enough to use the same tools.
C. They have never been shown how to conduct an audit.
D. Their scope of work document limits them to passive auditing.
Answer: B
19.Which of these encryption technologies have been cracked? (Choose all that apply.)
A. 64-bit static WEP
B. 128-bit Dynamic WEP
C. CCMP/AES
D. 128-bit static WEP
Answer: ABD
20.Given: XYZ Company has recently installed an 802.11ac WLAN. The company needs the ability to
control access to networkservices, such as file shares, intranet web servers, and Internet access
based on an employee's job responsibilities.
What WLAN security solution meets this requirement?
A. An autonomous AP system with MAC filters
B. WPA2-Personal with support for LDAP queries
C. A VPN server with multiple DHCP scopes
D. A WLAN controller with RBAC features
E. A WLAN router with wireless VLAN support
Answer: D
21.Brooke is using an integrated WIDS/WIPS solution with APs as part-time sensors to protect
against rogue APs. Brooke has deployed VoWiFi phones and wants to ensure maximum
performance.
Which WIDS/WIPS configuration setting is advisable when APs function as part-time WIPS sensors?
A. Disable spectrum analysis
B. Disable rouge containment
C. Suspend off-channel scanning based on QoS priority markings
D. Suspend rogue containment
Answer: C
22.When 802.1X/EAP is properly deployed, which of these external databases can a RADIUS server
query for proxy authentication?
A. Active Directory
B. E-Directory
 5 / 16
https://www.dumpsinfo.com/
C. Open Directory
D. All of the above
Answer: D
23.Which wireless security standards and certifications call for the use of CCMP/AES encryption?
(Choose all that apply.)
A. WPA
B. 802.11-2012
C. 802.1X
D. WPA2
E. 802.11 legacy
Answer: BD
24.Which of these types of EAP are susceptible to offline dictionary attacks? (Choose all that apply.)
A. EAP-SIM
B. EAP-MD5
C. EAP-PEAPv0 (EAP-TLS)
D. EAP-FAST
E. EAP-PEAPv1 (EAP-GTC)
F. EAP-LEAP
Answer: BF
25.The network administrator of the WonderPuppy Coffee Company calls up the support hotline for
his WLAN vendor and informs the support personnel that the WLAN is broken.
The support personnel ask the customer a series of questions so that they can isolate and identify the
cause of a potential problem.
What are some common Troubleshooting 101 questions? (Choose all that apply.)
A. When is the problem happening?
B. What is your favorite color?
C. What is your quest?
D. Does the problem reoccur or did it just happen once?
E. Did you make any changes recently?
Answer: ADE
26.Which method of guest management can be used by a company to gather valuable personal
information about guest users?
A. Social login
B. Kiosk mode
C. Receptionist registration
D. Self-registration
E. Employee sponsorship
Answer: A
27.In a robust security network (RSN), which 802.11 management frames are used by an access
point to inform client STAs about the RSNA security capabilities of the access point and effectively
the BSS? (Choose all that apply.)
A. Beacon management frame
 6 / 16
https://www.dumpsinfo.com/
B. Probe request frame
C. Probe response frame
D. Association request frame
E. Reassociation response frame
F. Reassociation request frame
G. Association response frame
Answer: AC
28.An AP advertising an 802.1X/EAP employee SSID along with a guest SSID is considered to be
operating what type of network device?
A. Core
B. Distribution
C. Access
D. Network layer
E. Session layer
Answer: C
29.While conducting a routine security analysis of your company’s network, you discover an
unauthorized access point installed on the network under the vice president’s desk.
What should you do in dealing with the rogue device since the vice president is likely to have placed
the device there to provide coverage in the office for her own wireless devices?
A. Remove the device and take it to the IT office for forensics.
B. Unplug the device from the network but leave it in place.
C. Follow the procedures for rogue device management in company policy.
D. Ask the vice president what she would like done with the device.
Answer: C
30.Which one of the following describes the correct hierarchy of 802.1X authentication key
derivation?
A. The MSK is generated from the 802.1X/EAP authentication. The PMK is derived from the MSK.
The PTK is derived from the PMK, and the keys used for actual data encryption are a part of the PTK.
B. If passphrase-based client authentication is used by the EAP type, the PMK is mapped directly
from the user's passphrase. The PMK is then used during the 4-way handshake to create data
encryption keys.
C. After successful EAP authentication, the RADIUS server generates a PMK. A separate key, the
MSK, is derived from the AAA key and is hashed with the PMK to create the PTK and GTK.
D. The PMK is generated from a successful mutual EAP authentication. When mutual authentication
is not used, an MSK is created. Either of these two keys may be used to derive the temporal data
encryption keys during the 4-way handshake.
Answer: A
31.Given: You are using a Wireless Aggregator utility to combine multiple packet captures. One
capture exists for each of channels 1, 6 and 11.
What kind of troubleshooting are you likely performing with such a tool?
A. Wireless adapter failure analysis.
B. Interference source location.
C. Fast secure roaming problems.
D. Narrowband DoS attack detection.
 7 / 16
https://www.dumpsinfo.com/
Answer: C
32.In a point-to-point bridge environment where 802.1X/EAP is used for bridge authentication, what
device in the network acts as the 802.1X supplicant?
A. Nonroot bridge
B. WLAN controller
C. Root bridge
D. RADIUS server
E. Layer 3 core switch
Answer: A
33.What port needs to be open on a firewall to permit RadSec protocol authentication and accounting
traffic?
A. UDP 1812
B. UDP 1813
C. TCP 369
D. TCP 636
E. TCP 2083
Answer: E
34.What are some of the different types and form factors of WIPS servers? (Choose all that apply.)
A. WLAN controller
B. Cloud network management server
C. Standalone appliance
D. On-premises network management server
E. Virtual appliance
F. All of the above
Answer: F
35.What wireless authentication technologies may build a TLS tunnel between the supplicant and the
authentication server before passing client authentication credentials to the authentication server?
(Choose 3)
A. EAP-MD5
B. EAP-TLS
C. LEAP
D. PEAPv0/MSCHAPv2
E. EAP-TTLS
Answer: BDE
36.Which of these authentication methods does not require any WLAN client configuration and is
sometimes bound together with other authentication methods?
A. Hologram authentication
B. Captive web portal authentication
C. MAC authentication
D. TSA authentication
E. 802.1X/EAP authentication
Answer: C
 8 / 16
https://www.dumpsinfo.com/
37.Which of these inner authentication EAP types is intended to be used with an 802.1X framework
that uses security token devices as the supplicant credentials? (Choose all that apply.)
A. EAP-GTC
B. EAP-MSCHAPv2
C. EAP-POTP
D. EAP-LEAP
E. EAP-PEAP
F. EAP-TTLS
Answer: AC
38.What are some of the risks if a rogue device goes undetected?
A. Data theft
B. Data destruction
C. Loss of network services
D. Data insertion
E. Third-party attacks
F. All of the above
Answer: F
39.You have been tasked with configuring a secure WLAN for 500 APs at the corporate offices. All
the APs and employee Windows laptops have been configured for 802.1X using PEAPv1 (EAP-GTC).
The domain user accounts are failing authentication with every attempt.
After viewing the graphic shown here, determine the possible causes of the problem. (Choose all that
apply.)
A. The Windows OS laptops have the root certificate installed in the incorrect store.
 9 / 16
https://www.dumpsinfo.com/
B. The Windows OS laptops’ supplicant has been configured for machine authentication.
C. The shared secret does not match between the AP and the RADIUS server.
D. The RADIUS cannot query LDAP.
E. The Windows OS laptops have been configured for PEAPv0 (EAP-MSCHAPv2).
F. The server certificate has expired.
Answer: AF
40.What type of files are used by the MDM profiles for Apple Mac OS and iOS devices? (Choose all
that apply.)
A. HTTP
B. XML
C. JAVA
D. PHP
E. Python
Answer: B
41.Which of these attacks are wireless users susceptible to at a public-access hotspot? (Choose all
that apply.)
A. Wi-Fi phishing
B. Happy AP attack
C. Peer-to-peer attackD. Malicious eavesdropping
E. 802.11 reverse ARP attack
F. Man-in-the-middle
G. Wireless hijacking
Answer: ACDFG
42.In the basic 4-way handshake used in secure 802.11 networks, what is the purpose of the ANonce
and SNonce? (Choose 2)
A. They are used to pad Message 1 and Message 2 so each frame contains the same number of
bytes.
B. The IEEE 802.11 standard requires that all encrypted frames contain a nonce to serve as a
Message Integrity Check (MIC).
C. They are added together and used as the GMK, from which the GTK is derived.
D. They are input values used in the derivation of the Pairwise Transient Key.
E. They allow the participating STAs to create dynamic keys while avoiding sending unicast
encryption keys across the wireless medium.
Answer: DE
43.Which of the following is not a standard or amendment created by the IEEE? (Choose all that
apply.)
A. 802.11X
B. 802.1x
C. 802.3af
D. 802.11N
E. 802.11g
Answer: ABD
 10 / 16
https://www.dumpsinfo.com/
44.The following numbered items show some of the contents of each of the four frames exchanged
during the 4- way handshake:
45.What are some of the major differences between SNMPv3 and SNMPv2? (Choose all that apply.)
A. SNMPv3 requires username/passwords.
B. SNMPv3 requires community strings.
C. SNMPv3 uses 56-bit DES encryption to encrypt packets.
D. SNMPv3 uses 128-bit AES encryption to encrypt packets.
Answer: AC
46.What protocol, listed here, allows a network manager to securely administer the network?
A. TFTP
B. Telnet
C. HTTPS
D. SNMPv2
Answer: C
47.What are some of the methods used by WIPS vendors to determine if a rogue device is connected
to the wired network infrastructure? (Choose all that apply.)
A. TTL packet analysis
B. RF triangulation
C. Signature analysis
D. Behavioral analysis
E. MAC table analysis
F. Proprietary analysis
Answer: AEF
48.The majority of rogue devices are placed by whom? (Choose all that apply.)
A. Attackers
B. Wardrivers
C. Employees
D. Contractors
E. Visitors
Answer: CDE
49. Initiation of 4-way handshake
50.What is another name for a wireless hijacking attack?
A. Wi-Fi phishing
B. Man-in-the-middle
C. Fake AP
D. Evil twin
E. AirSpy
Answer: D
51.What kind of remote actions can an MDM administrator send to the mobile device over the
 11 / 16
https://www.dumpsinfo.com/
Internet?
A. Configuration changes
B. Restrictions changes
C. Locking the device
D. Wiping the device
E. Application changes
F. All of the above
Answer: F
52.Andrew Garcia, the WLAN administrator, is trying to explain to his boss that the WLAN is not the
reason that Andrew’s boss cannot post on Facebook. Andrew has determined that the problem does
not exist at Layer 1 or Layer 2 of the OSI model.
What should Andrew say to his boss? (Choose the best answer.)
A. Wi-Fi only operates at Layer 1 and Layer 2 of the OSI model. The WLAN is not the problem.
B. The problem is most likely a networking problem or an application problem.
C. Don’t worry, boss; I will fix it.
D. Why are you looking at Facebook during business hours?
Answer: C
53.Given: In XYZ's small business, two autonomous 802.11ac APs and 12 client devices are in use
with WPA2- Personal.
What statement about the WLAN security of this company is true?
A. Intruders may obtain the passphrase with an offline dictionary attack and gain network access, but
will be unable to decrypt the data traffic of other users.
B. A successful attack against all unicast traffic on the network would require a weak passphrase
dictionary attack and the capture of the latest 4-Way Handshake for each client.
C. An unauthorized wireless client device cannot associate, but can eavesdrop on some data
because WPA2- Personal does not encrypt multicast or broadcast traffic.
D. An unauthorized WLAN user with a protocol analyzer can decode data frames of authorized users
if he captures the BSSID, client MAC address, and a user's 4-Way Handshake.
E. Because WPA2-Personal uses Open System authentication followed by a 4-Way Handshake,
hijacking attacks are easily performed.
Answer: B
54.An HT client STA is transmitting to an HT AP using modulation and coding scheme (MCS) #12
that defines 16-QAM modulation, two spatial streams, a 40-MHz bonded channel, and an 800 ns
guard interval to achieve a data rate of 162 Mbps.
According to the IEEE, which types of encryption should be used by the HT client STA? (Choose all
that apply.)
A. Static WEP
B. Dynamic WEP
C. TKIP/ARC4
D. CCMP/AES
E. All of the above
Answer: D
55.Monitoring potentially malicious wireless activity on the network is handled by _____________,
whereas intrusion remediation and mitigation is handled by __________________________.
 12 / 16
https://www.dumpsinfo.com/
A. WIDS, WIDS
B. WIPS, WIPS
C. WIDS, FIPS
D. WIPS, FIPS
E. WIDS, WIPS
Answer: E
56.You are using a utility that takes input and generates random output. For example, you can
provide the input of a known word as a secret word and then also provide another known word as salt
input.
When you process the input it generates a secret code which is a combination of letters and numbers
with case sensitivity. For what is the described utility used? (Choose 3)
A. Generating passwords for WLAN infrastructure equipment logins
B. Generating PMKs that can be imported into 802.11 RSN-compatible devices
C. Generating secret keys for RADIUS servers and WLAN infrastructure devices
D. Generating passphrases for WLAN systems secured with WPA2-Personal
E. Generating dynamic session keys used for IPSec VPNs
Answer: ACD
57.What are some of the security capabilities found in an enterprise WLAN router that is typically
deployed in remote branch locations? (Choose all that apply.)
A. Integrated WIPS server
B. Integrated VPN server
C. Integrated NAC server
D. Integrated firewall
E. Integrated VPN client
Answer: DE
58.What are some of the advantages of using SAE authentication over PSK authentication? (Choose
all that apply.)
A. Protects against brute-force dictionary attacks.
B. Protects against forgery and replay attacks.
C. Protects against rogue APs and clients.
D. PMKs cannot be compromised or regenerated.
E. PMKs are no longer needed.
Answer: ABD
59.You have been working with the network staff to expand the wireless coverage within your
customer’s building. Halfway through the project you are asked by a member of management to stop
and leave the premises.
Which step in WLAN deployment did you most likely not take prior to beginning the WLAN
expansion?
A. Obtaining a Scope of Work (SOW) agreement
B. Signing a mutual nondisclosure agreement (NDA)
C. Reviewing written corporate security policies
D. Requesting that a facility escort be present
Answer: C
 13 / 16
https://www.dumpsinfo.com/
60.What are the keys that make up a pairwise transient key? (Choose all that apply.)
A. STK
B. KEK
C. SMK
D. TK
E. KCK
Answer: BDE
61.What planes of operation reside in the access points of a distributed WLAN architecture? (Choose
all that apply.)
A. Radio plane
B. Data plane
C. Network plane
D. Control plane
E. Management plane
Answer: BC
62.Given: You have a Windows laptop computer with an integrated, dual-band, Wi-Fi compliant
adapter. Your laptop computer has protocol analyzer software installed that is capable of capturing
and decoding 802.11ac data.
What statement best describes the likely ability to capture 802.11ac frames for security testing
purposes?
A. All integrated 802.11ac adapters will work with most protocol analyzers for frame capture, including
the Radio Tap Header.
B. Integrated 802.11ac adapters are not typically compatible with protocol analyzers in Windows
laptops. It is often best to use a USB adapter or carefully select a laptop with an integrated adapter
that will work.
C. Laptops cannot be used to capture 802.11ac frames because they do not support MUCWSP-
MIMO.
D. Only Wireshark can be used to capture 802.11ac frames as no other protocol analyzer has
implemented the proper frame decodes.E. The only method available to capture 802.11ac frames is to perform a remote capture with a
compatible access point.
Answer: B
63.In an IEEE 802.11-compliant WLAN, when is the 802.1X Controlled Port placed into the unblocked
state?
A. After EAP authentication is successful
B. After Open System authentication
C. After the 4-Way Handshake
D. After any Group Handshake
Answer: A
64.What is the chronological order in which the following security standards and certifications were
defined?
65.What attack cannot be detected by a Wireless Intrusion Prevention System (WIPS)?
 14 / 16
https://www.dumpsinfo.com/
A. MAC Spoofing
B. Eavesdropping
C. Hot-spotter
D. Soft AP
E. Deauthentication flood
F. EAP flood
Answer: B
66. WPA
A. 3, 5, 2, 4, 1
B. 3, 2, 5, 4, 1
C. 3, 5, 2, 1, 4
D. 1, 3, 2, 5, 4
E. 1, 3, 5, 4, 2
Answer: A
67.The network administrator of the Holy Grail Corporation calls up the support hotline for his WLAN
vendor and informs the support personnel that the WLAN bridge link is no longer working.
The support personnel ask the customer a series of questions so that they can isolate and identify the
cause of a potential problem.
What are some common Troubleshooting 101 questions? (Choose all that apply.)
A. When is the problem happening?
B. Where is the problem happening?
C. Does the problem affect one client or numerous clients?
D. What is the airspeed velocity of an unladen swallow?
Answer: ABC
68.Which of these terms best describes the capability of a RADIUS server to forward the RADIUS
requests across the Internet between different ISPs or different companies?
A. Machine authentication
B. LDAP authentication
C. User authentication
D. Realm-based authentication
E. Domain authentication
Answer: D
69.What WLAN client device behavior is exploited by an attacker during a hijacking attack?
A. When the RF signal between a client and an access point is disrupted for more than a few
seconds, the client device will attempt to associate to an access point with better signal quality.
B. When the RF signal between a client and an access point is lost, the client will not seek to
reassociate with another access point until the 120 second hold down timer has expired.
C. After the initial association and 4-way handshake, client stations and access points do not need to
perform another 4-way handshake, even if connectivity is lost.
D. As specified by the Wi-Fi Alliance, clients using Open System authentication must allow direct
client-to- client connections, even in an infrastructure BSS.
E. Client drivers scan for and connect to access points in the 2.4 GHz band before scanning the 5
GHz band.
Answer: A
 15 / 16
https://www.dumpsinfo.com/
70.Which of the following protocols is used for authentication in an 802.1X framework?
A. IPSec
B. TKIP
C. EAP
D. L2TP
Answer: C
71.Which type of triangulation method takes into account the speed of travel?
A. RF triangulation
B. RF calibration
C. RF positioning
D. RF fingerprinting
E. TDoA
Answer: E
72.Which hash algorithms can be used in the IKE authentication process? (Choose two.)
A. Diffie-Hellman
B. MS-CHAPv2
C. MD5
D. ISAKMP
E. SHA-1
Answer: CE
Powered by TCPDF (www.tcpdf.org)
 16 / 16
https://www.dumpsinfo.com/
http://www.tcpdf.org