CWNP CWSP-207 CWNP Wireless Security Professional (CWSP) Online Training
CWNP CWSP-207 Online Training
The questions for CWSP-207 were last updated at Jul 18,2025.
- Exam Code: CWSP-207
- Exam Name: CWNP Wireless Security Professional (CWSP)
- Certification Provider: CWNP
- Latest update: Jul 18,2025
Which of these alarms should be configured to send an automatic notification to the WIPS administrator’s phone and/or email account? (Choose all that apply.)
- A . Man-in-the-middle attack detected
- B . Unauthorized client detected
- C . Rogue AP detected
- D . Unauthorized AP detected
What is another name for a wireless hijacking attack?
- A . Wi-Fi phishing
- B . Man-in-the-middle
- C . Fake AP
- D . Evil twin
- E . AirSpy
Which of these terms best describes a measure of uncertainty associated with a random variable?
- A . Entropy
- B . Encryption
- C . Encapsulation
- D . Encoding
Which of these tools are required for a proper WLAN security audit? (Choose all that apply.)
- A . Spectrum analyzer
- B . WLAN protocol analyzer
- C . WLAN penetration testing software tools
- D . Global positioning sensor (GPS)
- E . Cameras
In an IEEE 802.11-compliant WLAN, when is the 802.1X Controlled Port placed into the unblocked state?
- A . After EAP authentication is successful
- B . After Open System authentication
- C . After the 4-Way Handshake
- D . After any Group Handshake
Which of these authentication methods are supported by RADIUS and can be used for WLAN security? (Choose all that apply.)
- A . Hologram authentication
- B . Captive web portal authentication
- C . MAC authentication
- D . TSA authentication
- E . 802.1X/EAP authentication
Tammy, the WLAN security engineer, has recommended to management that WPA-Personal security not be deployed within the ACME Company’s WLAN.
What are some of the reasons for Tammy’s recommendation? (Choose all that apply.)
- A . Static passphrases and PSKs are susceptible to social engineering attacks.
- B . WPA-Personal is susceptible to brute-force dictionary attacks, but WPA-Personal is not at risk.
- C . WPA-Personal uses static encryption keys.
- D . WPA-Personal uses weaker TKIP encryption.
- E . 802.11 data frames can be decrypted if the passphrase is compromised.
What is the recommended ratio of WIPS sensors providing security monitoring to access points that are providing access for WLAN clients?
- A . 1:2
- B . 1:3
- C . 1:4
- D . 1:5
- E . Depends on the customer’s needs
Laura is attempting to diagnose a WLAN by using a packet analyzer to capture the exchange of frames and packets between a wireless client and the AP.
In the process of analyzing the packets, she sees two 802.11 authentication frames, two 802.11 association frames, and DHCP requests and responses, and then she begins to see encrypted data.
Which of the following could the client be using? (Choose all that apply.)
- A . Open System authentication
- B . Shared Key authentication
- C . 802.1X/EAP
- D . WEP
- E . IPsec
What statements are true about 802.11-2012 Protected Management Frames? (Choose 2)
- A . 802.11w frame protection protects against some Layer 2 denial-of-service (DoS) attacks, but it cannot prevent all types of Layer 2 DoS attacks.
- B . When frame protection is in use, the PHY preamble and header as well as the MAC header are encrypted with 256- or 512-bit AES.
- C . Authentication, association, and acknowledgment frames are protected if management frame protection is enabled, but deauthentication and disassociation frames are not.
- D . Management frame protection protects disassociation and deauthentication frames.