CWNP CWSP-207 CWNP Wireless Security Professional (CWSP) Online Training
CWNP CWSP-207 Online Training
The questions for CWSP-207 were last updated at Jul 18,2025.
- Exam Code: CWSP-207
- Exam Name: CWNP Wireless Security Professional (CWSP)
- Certification Provider: CWNP
- Latest update: Jul 18,2025
What is some of the proper documentation needed prior to the WLAN security audit?
- A . Statement of work
- B . Liability waiver
- C . Nondisclosure agreement
- D . All of the above
What must occur in order for dynamic TKIP/ARC4 or CCMP/AES encryption keys to be generated? (Choose all that apply.)
- A . Shared Key authentication and 4-Way Handshake
- B . 802.1X/EAP authentication and 4-Way Handshake
- C . Open System authentication and 4-Way Handshake
- D . PSK authentication and 4-Way Handshake
What statement accurately describes the functionality of the IEEE 802.1X standard?
- A . Port-based access control with EAP encapsulation over the LAN (EAPoL)
- B . Port-based access control with dynamic encryption key management and distribution
- C . Port-based access control with support for authenticated-user VLANs only
- D . Port-based access control with mandatory support of AES-CCMP encryption
- E . Port-based access control, which allows three frame types to traverse the uncontrolled port: EAP, DHCP, and DNS.
Which of these types of EAP require a server-side certificate to create an encrypted TLS tunnel?
- A . EAP-TTLS
- B . EAP-PEAPv0 (EAP-MSCHAPv2)
- C . EAP-PEAPv0 (EAP-TLS)
- D . EAP-FAST
- E . EAP-PEAPv1 (EAP-GTC)
- F . EAP-LEAP
To calculate the capability Jeff should have on the network, which of the following can the NAC server use to initially identify and set his permission? (Choose all that apply.)
- A . Posture
- B . DHCP fingerprinting
- C . RADIUS attributes
- D . RADIUS CoA
- E . MDM profiles
Which of these attacks are wireless users susceptible to at a public-access hotspot? (Choose all that apply.)
- A . Wi-Fi phishing
- B . Happy AP attack
- C . Peer-to-peer attack
- D . Malicious eavesdropping
- E . 802.11 reverse ARP attack
- F . Man-in-the-middle
- G . Wireless hijacking
For an 802.1X/EAP solution to work properly with a WLAN, which two components must both support the same type of encryption?
- A . Supplicant and authenticator
- B . Authorizer and authenticator
- C . Authenticator and authentication server
- D . Supplicant and authentication server
When an attacker passively captures and examines wireless frames from a victim’s network, what type of attack is taking place?
- A . Injection
- B . Data destruction
- C . Frame manipulation
- D . Man in the middle
- E . Eavesdropping
Wired leakage occurs under which of the following circumstances?
- A . When weak wireless encryption is used
- B . When weak wireless authentication is used
- C . When wired broadcast traffic is passed through an AP
- D . When wired unicast traffic is passed through an AP
- E . When the protection mode is disabled on an AP
These qualifications for interoperability are usually based on key components and functions that are defined in the IEEE 802.11-2012 standard and various 802.11 amendments.
- A . Request for Comments
- B . Wi-Fi Alliance
- C . Federal Information Processing Standards
- D . Internet Engineering Task Force
- E . Wi-Fi CERTIFIED