Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

CWNP CWSP-206 Actual Questions

Page: 2 / 2
Question 8

In a security penetration exercise, a WLAN consultant obtains the WEP key of XYZ Corporation’s wireless network. Demonstrating the vulnerabilities of using WEP, the consultant uses a laptop running asoftware AP in an attempt to hijack the authorized user’s connections. XYZ’s legacy network is using 802.11n APs with 802.11b, 11g, and 11n client devices. With this setup, how can the consultant cause all of the authorized clients to establish Layer 2 connectivity with the software access point?

Options:

A.

When the RF signal between the clients and the authorized AP is temporarily disrupted and the consultant’s software AP is using the same SSID on a different channel than the authorized AP, the clients will reassociate to the software AP.

B.

If the consultant’s software AP broadcasts Beacon frames that advertise 802.11g data rates that are faster rates than XYZ’s current 802.11b data rates, all WLAN clients will reassociate to the faster AP.

C.

A higher SSID priority value configured in the Beacon frames of the consultant’s software AP will take priority over the SSID in the authorized AP, causing the clients to reassociate.

D.

All WLAN clients will reassociate to the consultant’s software AP if the consultant’s software AP provides the same SSID on any channel with a 10 dB SNR improvement over the authorized AP.

Question 9

What WLAN client device behavior is exploited by an attacker during a hijacking attack?

Options:

A.

After the initial association and 4-way handshake, client stations and access points do not need to perform another 4-way handshake, even if connectivity is lost.

B.

Client drivers scan for and connect to access point in the 2.4 GHz band before scanning the 5 GHz band.

C.

When the RF signal between a client and an access point is disrupted for more than a few seconds, the client device will attempt toassociate to an access point with better signal quality.

D.

When the RF signal between a client and an access point is lost, the client will not seek to reassociate with another access point until the 120 second hold down timer has expired.

E.

As specifiedby the Wi-Fi Alliance, clients using Open System authentication must allow direct client-to-client connections, even in an infrastructure BSS.

Page: 2 / 2
CWNP CWSP-206 Actual Questions,
Exam Code: CWSP-206
Exam Name: CWSP Certified Wireless Security Professional
Last Update: May 2, 2024
Questions: 60
CWSP-206 pdf

CWSP-206 PDF

$28  $80
CWSP-206 Engine

CWSP-206 Testing Engine

$33.25  $95
CWSP-206 PDF + Engine

CWSP-206 PDF + Testing Engine

$45.5  $130