CWNP CWSP-207 CWNP Wireless Security Professional (CWSP) Online Training
CWNP CWSP-207 Online Training
The questions for CWSP-207 were last updated at Jul 19,2025.
- Exam Code: CWSP-207
- Exam Name: CWNP Wireless Security Professional (CWSP)
- Certification Provider: CWNP
- Latest update: Jul 19,2025
When developing a security policy, it is important to include many influences such as internal requirements, governmental regulations, and industry standards.
When is it allowable not to include a specific external influence in your policy development?
- A . When there is little to no chance of being audited for compliance
- B . When your organization is not part of the applicable audience of the external policy influence
- C . When implementing wireless devices without the knowledge of the governing body that developed the external policy
- D . When adherence to the external regulation or standard is cost prohibitive
An HT client STA is transmitting to an HT AP using modulation and coding scheme (MCS) #12 that defines 16-QAM modulation, two spatial streams, a 40-MHz bonded channel, and an 800 ns guard interval to achieve a data rate of 162 Mbps.
According to the IEEE, which types of encryption should be used by the HT client STA? (Choose all that apply.)
- A . Static WEP
- B . Dynamic WEP
- C . TKIP/ARC4
- D . CCMP/AES
- E . All of the above
How does a RADIUS server communicate with an authenticator? (Choose all that apply.)
- A . UDP ports 1812 and 1813
- B . TCP ports 1645 and 1646
- C . Encrypted TLS tunnel
- D . Encrypted IPsec tunnel
- E . RADIUS IP packets
- F . EAPOL frames
You are configuring seven APs to prevent common security attacks. The APs are to be installed in a small business and to reduce costs, the company decided to install all consumer grade wireless routers.
The wireless routers will connect to a switch, which connects directly to the Internet connection providing 50 Mbps of Internet bandwidth that will be shared among 53 wireless clients and 17 wired clients.
To ensure the wireless network is as secure as possible from common attacks, what security measure can you implement given only the hardware referenced?
- A . WPA-Enterprise
- B . 802.1X/EAP-PEAP
- C . WPA2-Enterprise
- D . WPA2-Personal
The IEEE 802.11-2012 standard mandates this encryption for robust security network associations and the optional use of which other encryption?
- A . WEP, AES
- B . IPsec, AES
- C . MPPE, TKIP
- D . TKIP, WEP
- E . CCMP, TKIP
What type of WLAN attacks might be detected by a distributed WIDS/WIPS solution using a signature analysis software engine? (Choose all that apply.)
- A . PS-Poll flood
- B . Deauthentication attack
- C . Protocol fuzzing
- D . Virtual carrier attack
- E . CTS flood attack
- F . Zero day attack
What is some of the operation information that an 802.11k-2008Ccompliant client station may receive in the neighbor report from an 802.11k-2008Ccompliant access point (AP)? (Choose all that apply.)
- A . BSSID of neighbor AP
- B . PHY types supported by neighbor AP
- C . APSD support of neighbor AP
- D . Channel number of neighbor AP
- E . All of the above
What are the available form factors for network management server (NMS) solutions? (Choose all that apply.)
- A . Hardware appliance
- B . Virtual appliance
- C . Software subscription service
- D . Integrated access point
The Wi-Fi Alliance is responsible for which of the following certification programs? (Choose all that apply.)
- A . WPA2
- B . WEP
- C . 802.11-2012
- D . WMM
- E . PSK
Which Layer 2 protocol is used for authentication in an 802.1X framework?
- A . PAP
- B . MS-CHAPv2
- C . EAP
- D . CHAP
- E . MS-CHAP