CWSP Exam 2

1. Which of the following was introduced in WPA3 as a replacement for PSK?
2. Which of the following uses probe requests from the wireless client and probe responses from the access point?
3. SSID Information Element is present in the Beacon management frame and Association Request frame
4. Which of the following packets are transmitted between the supplicant and the wireless LAN controller?
5. Which of the following keys is used to secure unicast traffic?
6. Which of the following characteristics are related to WEP, which make it weak for wireless network security?
7. Which of the following are dynamic key mechanisms?
8. You are using a public Wi-Fi hotspot and are accessing a website using HTTPS. Which of the following encryption method does HTTPS use?
9. Symmetric encryption is more processor intensive than asymmetric encryption
10. Which of the following valid VPN modes are used to secure communications on wireless networks?
11. Which of the following is friendlier to roaming than enterprise security?
12. Best practices recommend that roam times, if we talk about voice over IP, should be less than how long?
13.

In order for a client to connect to the wireless network, the client must authenticate and associate to the access point

14. Which of the following was never defined under any wireless security standard?
15. Which of the following protocols allows two devices to exchange a secret key across an insecure communications channel?
16. Which of the following creates a pseudo-random value that is used in cryptographic operations?
17. Match the cipher with it's description
AES
It is a block cipher

Unselect

It is based on the Rijndael algorithm

Unselect

It is an encryption protocol that uses AES cipher

Unselect

It uses the RC4

Unselect

CCMP
It is a block cipher

Unselect

It is based on the Rijndael algorithm

Unselect

It is an encryption protocol that uses AES cipher

Unselect

It uses the RC4

Unselect

TKIP
It is a block cipher

Unselect

It is based on the Rijndael algorithm

Unselect

It is an encryption protocol that uses AES cipher

Unselect

It uses the RC4

Unselect

3DES
It is a block cipher

Unselect

It is based on the Rijndael algorithm

Unselect

It is an encryption protocol that uses AES cipher

Unselect

It uses the RC4

Unselect

18. The CCMP header includes which of the following fields?
19. Which of these types of EAP use two phases of operation?
20. Which of these types of EAP supports the legacy methods of PAP, CHAP, MS-CHAP, and MS-CHAPv2?
21. Encryption provides mechanisms for validating user identity while authentication provides mechanisms for data privacy or confidentiality
22. Which of these types of EAP was primarily developed for the mobile phone industry and more specifically for second-generation (2G) mobile networks?
23. Match the key with it's functionality
KCK
Used to provide data integrity during the 4-way handshake and group key handshake

Unselect

Used by the EAPOL-key frames to provide data privacy during the 4-way handshake and group key handshake

Unselect

Used to encrypt/decrypt the MSDU payload of 802.11 data frames between the supplicant and the authenticator

Unselect

KEK
Used to provide data integrity during the 4-way handshake and group key handshake

Unselect

Used by the EAPOL-key frames to provide data privacy during the 4-way handshake and group key handshake

Unselect

Used to encrypt/decrypt the MSDU payload of 802.11 data frames between the supplicant and the authenticator

Unselect

TK
Used to provide data integrity during the 4-way handshake and group key handshake

Unselect

Used by the EAPOL-key frames to provide data privacy during the 4-way handshake and group key handshake

Unselect

Used to encrypt/decrypt the MSDU payload of 802.11 data frames between the supplicant and the authenticator

Unselect

24. Which of the following are used during the 4-way handshake to produce a pairwise transient key (PTK)?
25. The master session key (MSK) is used to create the group temporal key (GTK)
26. Which of the following keys is used to encrypt all unicast transmissions between a client station and an access point?
27. Which of the following services is a set of one or more algorithms designed to provide authentication and key management?
28. The authentication key management (AKM) suite field in the RSN information elements indicates which of the following authentication mechanisms?
29. One of the purposes of the 4-way handshake is to confirm the selection of encryption cipher suites
30. Which of the following can happen if the pre-shared key is compromised during PSK authentication?
31. Which of the following defines automatic WPA and WPA2 security configurations for home and small business users?
32. Which of the following allows for 802.1X/EAP authentication to be skipped when roaming?
33. The 802.11-2012 standard defines a PMK identifier with the following formula:

PMKID = HMAC-SHA1-128(PMK, “PMK Name” II AA II SPA)

What do 'AA' and 'SPA' represent in the above formula?
34. In which of the roaming methods, FT Action request frame is forwarded over the distribution system (DS)?
35. Many wireless LAN clients do not support OKC because it is not an official roaming standard
36. Match the device with its key holder role
WLAN Controller
PMK R1

Unselect

PMK R0

Unselect

PMK S0

Unselect

Access Point
PMK R1

Unselect

PMK R0

Unselect

PMK S0

Unselect

Client Station
PMK R1

Unselect

PMK R0

Unselect

PMK S0

Unselect

37. Which of the following information is used in the FT initial mobility domain association request and response frames?
38. Which of the following is the seeding material for both over the air and over the DS fast BSS transition frames exchanges?
39. Which protocol can be used to create a virtual point-to-point link between a controller-based AP and a WLAN controller?
40. What are some of the common capabilities often found in a wireless LAN controller?
41. What are some of the features of SNMPv3?
42. Which of the following best describes a policy that dictates which corporate resource can or cannot be accessed when employees use personally owned mobile devices?
43. Which of the following methods compares the target's detected RSSI values with the RSSI values of the known reference points?
44. Which of the following will assist in identifying security threats at Layer 1?
45. Which of the following problems is solved by using Opportunistic wireless encryption (OWE)?
46. Using WPA2-PSK, PMK and PTK can be discovered leaving all network traffic accessible to a hacker
47. Which of the following represents physical proof that a penetration tester has permission from the client to test (attack) the network?
48. What you will generally find in a Penetration Testing report?
49. Which of the following is the result of the interaction between the likelihood of something happening, and its impact?
50. Which of the following are included in the Pentesting Strategy?