CWNP CWSP-207 CWNP Wireless Security Professional (CWSP) Online Training
CWNP CWSP-207 Online Training
The questions for CWSP-207 were last updated at Jul 19,2025.
- Exam Code: CWSP-207
- Exam Name: CWNP Wireless Security Professional (CWSP)
- Certification Provider: CWNP
- Latest update: Jul 19,2025
Which of these radio form factors are used in 802.11 WIDS/WIPS sensors? (Choose all that apply.)
- A . Sensor with 2.4 GHz and 5 GHz radio
- B . Sensor with 5 GHz radio and software-defined radio (SDR) for both 2.4 and 5 GHz
- C . Sensor with three radios: 2.4 GHz, 5 GHz, and SDR radio
- D . Sensor with 2.4 GHz radio, 5 GHz radio, and spectrum analyzer chip
- E . Sensor with 900 MHz radio, 2.4 GHz radio, and 5 GHz radio
- F . Depends on the vendor
Which of these radio form factors are used in 802.11 WIDS/WIPS sensors? (Choose all that apply.)
- A . Sensor with 2.4 GHz and 5 GHz radio
- B . Sensor with 5 GHz radio and software-defined radio (SDR) for both 2.4 and 5 GHz
- C . Sensor with three radios: 2.4 GHz, 5 GHz, and SDR radio
- D . Sensor with 2.4 GHz radio, 5 GHz radio, and spectrum analyzer chip
- E . Sensor with 900 MHz radio, 2.4 GHz radio, and 5 GHz radio
- F . Depends on the vendor
Which of these radio form factors are used in 802.11 WIDS/WIPS sensors? (Choose all that apply.)
- A . Sensor with 2.4 GHz and 5 GHz radio
- B . Sensor with 5 GHz radio and software-defined radio (SDR) for both 2.4 and 5 GHz
- C . Sensor with three radios: 2.4 GHz, 5 GHz, and SDR radio
- D . Sensor with 2.4 GHz radio, 5 GHz radio, and spectrum analyzer chip
- E . Sensor with 900 MHz radio, 2.4 GHz radio, and 5 GHz radio
- F . Depends on the vendor
Which of these radio form factors are used in 802.11 WIDS/WIPS sensors? (Choose all that apply.)
- A . Sensor with 2.4 GHz and 5 GHz radio
- B . Sensor with 5 GHz radio and software-defined radio (SDR) for both 2.4 and 5 GHz
- C . Sensor with three radios: 2.4 GHz, 5 GHz, and SDR radio
- D . Sensor with 2.4 GHz radio, 5 GHz radio, and spectrum analyzer chip
- E . Sensor with 900 MHz radio, 2.4 GHz radio, and 5 GHz radio
- F . Depends on the vendor
SSID: ABCVoice VLAN 60 Security: WPA2-Personal 2 current clients
Two client STAs are connected to ABCData and can access a media server that requires authentication at the Application Layer and is used to stream multicast video streams to the clients.
What client stations possess the keys that are necessary to decrypt the multicast data packets carrying these videos?
- A . Only the members of the executive team that are part of the multicast group configured on the media server
- B . All clients that are associated to the AP using the ABCData SSID
- C . All clients that are associated to the AP using any SSID
- D . All clients that are associated to the AP with a shared GTK, which includes ABCData and ABCVoice.
Which of the following encryption methods use symmetric algorithms? (Choose all that apply.)
- A . WEP
- B . TKIP
- C . Public-key cryptography
- D . CCMP
Which of the following can be used with a wireless network to segment or restrict access to parts of the network? (Choose all that apply.)
- A . VLANs
- B . WPA-2
- C . Firewall
- D . 802.11i
- E . RBAC
Given: Mary has just finished troubleshooting an 802.11g network performance problem using a laptop-based WLAN protocol analyzer. The wireless network implements 802.1X/PEAP and the client devices are authenticating properly.
When Mary disables the WLAN protocol analyzer, configures her laptop for PEAP authentication, and then tries to connect to the wireless network, she is unsuccessful.
Before using the WLAN protocol analyzer, Mary’s laptop connected to the network without any problems.
What statement indicates why Mary cannot access the network from her laptop computer?
- A . The nearby WIPS sensor categorized Mary’s protocol analyzer adapter as a threat and is performing a deauthentication flood against her computer.
- B . The PEAP client’s certificate was voided when the protocol analysis software assumed control of the wireless adapter.
- C . The protocol analyzer’s network interface card (NIC) drivers are still loaded and do not support the version of PEAP being used.
- D . Mary’s supplicant software is using PEAPv0/EAP-MSCHAPv2, and the access point is using PEAPv1/EAP- GTC.
What type of files are used by the MDM profiles for Apple Mac OS and iOS devices? (Choose all that apply.)
- A . HTTP
- B . XML
- C . JAVA
- D . PHP
- E . Python
Given: The ABC Corporation currently utilizes an enterprise Public Key Infrastructure (PKI) to allow employees to securely access network resources with smart cards.
The new wireless network will use WPA2-Enterprise as its primary authentication solution. You have been asked to recommend a Wi-Fi Alliance-tested EAP method.
What solutions will require the least change in how users are currently authenticated and still integrate with their existing PKI?
- A . EAP-FAST
- B . EAP-TLS
- C . PEAPv0/EAP-MSCHAPv2
- D . LEAP
- E . PEAPv0/EAP-TLS
- F . EAP-TTLS/MSCHAPv2