Certified Wireless Security Professional – CWSP Practice Exam Back to exams page. Take the CWSP course here. 1. What are some of the reasons to create a well-defined security policy?It is important to have a central source of documentation that defines practices and proceduresIT staff requires the documented authority to enforce the defined policies To maintain network security with consistencyAll of the above 2. Which of the following steps are involved in creating a wireless security policy?Provide ongoing monitoring and security auditingPerform a risk assessmentImplement WEP instead of WPA2All of the above 3. Which of the following define the criteria that should be included with the security policy functions?Management of WLAN devicesUse of passwordsCapture and analyze WLAN trafficAll of the above 4. Which of the following solutions should be considered to aid in security policy enforcement for mobile device technology?MDMBYODWPA3Social networking policy 5. Security baselines give the minimum configurations that must be deployed when staging a new deviceTrueFalse 6. Which of the following provides a starting point to work from when striving for wireless network security?Device labelingSecurity baselinesMonitoringNone of the above 7. One way to work with hardening is to begin by changing default passwords because the default password is going to be known by other people as wellTrueFalse 8. Which of the following make social networking vulnerable to potential threats within an organization?Phishing attacksMalware threatsDevice registrationRemote lock and wipe 9. To which region’s citizens does the General Data Protection Regulation or GDPR apply?CanadaEuropean UnionAsiaRussia 10. To which type of sensitive information does PCI DSS apply?Research dataBig dataCredit card dataNone of the above 11. Which statements describe the guidelines for employee encouragement for security?Ensure that the leadership team leads the security initiativesAvoid involving internal users in security awareness trainingEnsure security is part of the organization's cultureAll of the above 12. What topics should be covered in security awareness training?Asset classificationRisk managementPhysical and logical securitySafe computing best practices 13. What are elements of a Common Vulnerabilities and Exposures or CVE?IncidentReferenceDescriptionAll of the above 14. Which of the following is a plan for managing important upgrades for all the software and technologies that a company uses internally or distributing to clients?Network managementPatch managementSNMPResource management 15. Which of the following can help you aggregate and correlate data from multiple devices?PCI-DSSHIPAASNMPSIEM 16. In a Man in the middle attack, an attacker passively captures and examines wireless frames from a victim's networkTrueFalse 17. Which of the following is capable of mitigating attacks from rogue access points?AESWPA3WIPS802.1X/EAP 18. Which of the following uses disguised email as a vector and the goal is to trick the recipient into believing that the message is legitimate?Man in the middle attackPhishingDenial of Service attackJamming 19. Match the penetration testing task with it's descriptionDiscovery Scan actual systems and discover client's vulnerabilitiesUnselectDocument the findingsUnselectMonitor what is visibleUnselectPrepare and define the workUnselectReport Scan actual systems and discover client's vulnerabilitiesUnselectDocument the findingsUnselectMonitor what is visibleUnselectPrepare and define the workUnselectPlanning Scan actual systems and discover client's vulnerabilitiesUnselectDocument the findingsUnselectMonitor what is visibleUnselectPrepare and define the workUnselectAttack Scan actual systems and discover client's vulnerabilitiesUnselectDocument the findingsUnselectMonitor what is visibleUnselectPrepare and define the workUnselect 20. Passive scanning tools listen to all packets on a given channel, analyzing those packets, rather than transmitting probe requestsTrueFalse 21. The typical wireless intrusion detection system is a client/server model that consists of which of the following two components?SensorsRADIUS ServerWindows ServerWIPS Server 22. What are some of the recommendations that might be made to a customer after a successful WLAN security audit?Stringent authentication methodsRole-based access control proceduresEmployee trainingAll of the above 23. WLAN protocol analyzers are typically used for Layer 2 auditing and spectrum analyzers are used for Layer 1 auditingTrueFalse 24. The principle of least privilege is to run processes in their lowest level of permissionTrueFalse 25. Which of the following system provides the capability of providing the ability to remotely act on client devices?WIDSWIPSBYODMDM 26. The PCI-DSS regulations that govern hospital patient information policy will have a great impact on wireless security policyTrueFalse 27. Match the labels that a WIPS uses with it's descriptionAuthorized refers to any client station or access point that is considered a potential threatUnselectrefers to any new 802.11 radio that has been detected but not classified as a rogueUnselectrefers to any client station or access point that is a member of the company's wireless network.Unselectrefers to any client station or access point that is detected by the WIPS and whose identity is knownUnselectUnauthorized refers to any client station or access point that is considered a potential threatUnselectrefers to any new 802.11 radio that has been detected but not classified as a rogueUnselectrefers to any client station or access point that is a member of the company's wireless network.Unselectrefers to any client station or access point that is detected by the WIPS and whose identity is knownUnselectRogue refers to any client station or access point that is considered a potential threatUnselectrefers to any new 802.11 radio that has been detected but not classified as a rogueUnselectrefers to any client station or access point that is a member of the company's wireless network.Unselectrefers to any client station or access point that is detected by the WIPS and whose identity is knownUnselectNeighbor refers to any client station or access point that is considered a potential threatUnselectrefers to any new 802.11 radio that has been detected but not classified as a rogueUnselectrefers to any client station or access point that is a member of the company's wireless network.Unselectrefers to any client station or access point that is detected by the WIPS and whose identity is knownUnselect 28. Which of the following type of triangulation method uses the variation of arrival times of the same transmitted signal?RF positioningRF calibrationRF fingerprintingTime difference of arrival (TDoA) 29. RF fingerprinting solutions are more costly and require more time to set up and calibrate. Recalibration is required should the RF environment changeTrueFalse 30. Which of the following will help detect any type of RF interference that might conflict with your WLAN?Spectrum analysisProtocol analysisSignature analysisMAC table analysis 31. What is the difference between WIPS and WIDS?Both can detect threats onlyBoth can detect threats, but WIPS can also do threat mitigationBoth can detect and mitigate threatsBoth can detect threats, but WIDS can also do threat mitigation 32. Auditing the WLAN security practices of a stadium that uses wireless Point of Sale terminals refers to which of the following regulation?HIPPAPCIGDPRFIPS 33. Which of these types of EAP require a server-side certificate to create an encrypted TLS tunnel?EAP-TTLSEAP-TLSEAP-MSCHAPv2All of the above 34. EAP-MD5 and EAP-LEAP protect the supplicant validation exchange within a TLS tunnel and are therefore not susceptible to offline dictionary attacksTrueFalse 35. Which of the following ports are used by RADIUS protocol for authentication and accounting?UDP ports 1812 and 1813TCP ports 1812 and 1813TCP port 443 and 80None of the above 36. Which of the following protocols is used to provide user authentication in an 802.1X framework?MS-CHAPPAPMS-CHAPv2EAP 37. In digital communications, which of the following is a measure of uncertainty associated with a random variable?EncodingCryptographyEntropyEncryption 38. Which of the following is considered as a more secure replacement for PSK authentication?WDSPer-user PSKWPA3Simultaneous Authentication of Equals (SAE) 39. The 802.11-2012 standard defines which of the following fast secure roaming mechanisms?Pre-authenticationOKCPMK cachingFast BSS transition 40. Which of the following WPA3-SAE mode is backward compatible for WPA2 devices?WPA3-SAE transition modeWPA3-SAE modeWDSOKC 41. Which of the following is the Cisco suggested EAP method to mitigate the offline dictionary attacks?EAP-FASTLEAPRADIUSNone of the above 42. Symmetric key encryption uses two keys. One key is used to encrypt the plaintext, and the other key is used to decrypt the ciphertext.TrueFalse 43. Which of the following features is introduced in WPA3 that protects encrypted data and prevents a future sessions by not exposing the past transmissions?Forward SecrecyOKC4-way handshakeEnterprise 192-bit encryption 44. Opportunistic wireless encryption encrypts all wireless traffic by adding a Diffie-Hellman key exchange that creates an unknown PMK used in the 4-way handshake to generate the encryption keysTrueFalse 45. Which of the following tunneling protocol provides data confidentiality, data integrity, and nonrepudiation?PPTPL2TPCHAPPAP 46. Which of the following RSNA authentication mechanisms are specified in the 802.11i standard?Pre-shared key (PSK)802.1XIPSecP2TP 47. The fundamental elements of RADIUS are the supplicant, authenticator, and an applicantTrueFalse 48. Put the authentication and key management key hierarchy in correct order TEK PMK GTK MSK 49. Which of the following documents outlines the audit requirements, deliverables, and timeline that the auditor will execute for a customer?Nondisclosure agreementStatement of workLiability waiverNone of the above 50. Which of the following frame exchange methods are used by Fast BSS transition?Over the air fast BSS transitionOver the DS fast BSS transition4-way handshakeMobile IP solution Loading...