CertsChief Guaranteed Success with Accurate & Updated Questions. Questions & Answers PDF For More Information - Visit: https://www.certschief.com/ ProductFull Version Features: 90 Days Free Updates 30 Days Money Back Guarantee Instant Download Once Purchased 24/7 Online Chat Support CWNP CWSP-207 CWNP Certified Wireless Security Professional (CWSP) Visit us athttps://www.certschief.com/cwsp-207/ Latest Version: 6.0 Question: 1 With a WLAN infrastructure, where can the guest captive web portal operate? Response: A. AP B. WLAN controller C. Third-party server D. All of the above Answer: D Question: 2 Which RADIUS attribute is used to protect encapsulated EAP frames within RADIUS packets? Response: A. (11) Filter-Id B. (26) Vendor-Specific C. (40) Acct-Status-Type D. (79) EAP-Message E. (80) Message-Authenticator Answer: D Question: 3 The CCMP header is made up of which of the following pieces? (Choose two.) Response: A. PN B. TTAK C. TSC D. Key ID E. MIC Answer: AD Visit us athttps://www.certschief.com/cwsp-207/ Question: 4 At which layer of the OSI model does 802.11 technology operate? Response: A. Session B. Network C. Physical D. Presentation E. Transport Answer: C Question: 5 What would be the intended purpose of using a third-party AP as part of a WLAN audit? Response: A. Audit Layer 1. B. Audit Layer 2. C. Audit the wired infrastructure. D. Audit the WIPS. Answer: D Question: 6 In a guest firewall policy, which IP networks should be restricted? (Choose two.) Response: A. 172.16.0.0/12 B. 20.0.0.0/8 C. 192.16.0.0/16 D. 172.10.0.0/24 E. 10.0.0.0/8 Answer: AD Question: 7 Visit us athttps://www.certschief.com/cwsp-207/ When deploying a corporate 802.11 WLAN, what password-related items should always be included in a security policy? (Choose two.) Response: A. The password policy should mandate a procedure on how passphrases are created for handheld devices that use WPA2-Personal. B. End-user WPA2-Enterprise passwords should contain numbers, special characters, and upper- and lowercase letters. C. Client-side certificates should always be used instead of passwords when securing a WLAN. D. Machine authentication should always be mandated. Answer: AB Question: 8 Which of these attacks are considered denial-of-service attacks? (Choose two.) Response: A. Man-in-the-middle B. Jamming C. Deauthentication spoofing D. MAC spoofing E. Peer-to-peer Answer: BC Question: 9 Which hash algorithms can be used in the IKE authentication process? (Choose two.) Response: A. Diffie-Hellman B. MS-CHAPv2 C. MD5 D. ISAKMP E. SHA-1 Answer: CE Visit us athttps://www.certschief.com/cwsp-207/ Question: 10 Name the labels that a WIPS uses to classify an 802.11 device. (Choose all that apply.) Response: A. Authorized B. Unauthorized C. Enabled D. Disabled E. Rogue F. Neighbor Answer: ABEF Visit us athttps://www.certschief.com/cwsp-207/ Page | 1 http://www.certschief.com/exam/0B0-104/ For More Information - Visit: http://www.certschief.com/ Discount Coupon Code: CERTSCHIEF10 Powered by TCPDF (www.tcpdf.org) Visit us athttps://www.certschief.com/cwsp-207/