CWNP CWSP-207 CWNP Wireless Security Professional (CWSP) Online Training
CWNP CWSP-207 Online Training
The questions for CWSP-207 were last updated at Jul 18,2025.
- Exam Code: CWSP-207
- Exam Name: CWNP Wireless Security Professional (CWSP)
- Certification Provider: CWNP
- Latest update: Jul 18,2025
As defined by the 802.11-2012 standard, which of these authentication methods can be used by a client station to establish a pairwise master key security association (PMKSA)? (Choose all that apply.)
- A . PSK authentication
- B . WEP authentication
- C . 802.1X/EAP authentication
- D . Open authentication
- E . SAE authentication
Which of the following is a valid reason to avoid the use of EAP-MD5 in production WLANs?
- A . It does not support a RADIUS server.
- B . It is not a valid EAP type.
- C . It does not support mutual authentication.
- D . It does not support the outer identity.
Which WLAN architectural models typically require support for 802.1Q tagging at the edge on the network when multiple user VLANs are required? (Choose all that apply.)
- A . Autonomous WLAN architecture
- B . Centralized WLAN architecture
- C . Distributed WLAN architecture
- D . None of the above
What software and hardware tools are used in the process performed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?
- A . A low-gain patch antenna and terminal emulation software
- B . MAC spoofing software and MAC DoS software
- C . RF jamming device and a wireless radio card
- D . A wireless workgroup bridge and a protocol analyzer
Given: An 802.1X/EAP implementation includes an Active Directory domain controller running Windows Server 2012 and an AP from a major vendor. A Linux server is running RADIUS and it queries the domain controller for user credentials.
A Windows client is accessing the network.
What device functions as the EAP Supplicant?
- A . Linux server
- B . Windows client
- C . Access point
- D . Windows server
- E . An unlisted switch
- F . An unlisted WLAN controller
What preventative measures are performed by a WIPS against intrusions?
- A . EAPoL Reject frame flood against a rogue AP
- B . Evil twin attack against a rogue AP
- C . Deauthentication attack against a classified neighbor AP
- D . ASLEAP attack against a rogue AP
- E . Uses SNMP to disable the switch port to which rogue APs connect
Which organization is responsible for the creation of documents known as Requests for Comments?
- A . IEEE
- B . ISO
- C . IETF
- D . Wi-Fi Alliance
- E . RFC Consortium
You must support a TSN as you have older wireless equipment that will not support the required processing of AES encryption.
Which one of the following technologies will you use on the network so that a TSN can be implemented that would not be required in a network compliant with 802.11-2012 non-deprecated technologies?
- A . WEP
- B . RC4
- C . CCMP
- D . WPA2
What 802.11 WLAN security problem is directly addressed by mutual authentication?
- A . Wireless hijacking attacks
- B . Weak password policies
- C . MAC spoofing
- D . Disassociation attacks
- E . Offline dictionary attacks
- F . Weak Initialization Vectors
Although your organization’s written policy and many external policy influences may require only periodic scanning for rogue devices, you are trying to make a case for deploying a WIPS.
What are some of the benefits of using a WIPS to achieve policy compliance that make it more desirable than using periodic handheld or laptop-based scanning solutions? (Choose all that apply.)
- A . WIPSs are less expensive and easier to implement.
- B . WIPSs can provide 24-hour scanning and protection.
- C . WIPSs are a more scalable solution for security.
- D . WIPSs can correlate across multiple locations.
- E . WIPSs can provide both compliance and security.