Enroll Course

100% Online Study
Web & Video Lectures
Earn Diploma Certificate
Access to Job Openings
Access to CV Builder



online courses

Certified Wireless Security Professional (CWSP-207)

Certified Wireless Security Professional CWSP-207 Exam Questions . 

The Certified Wireless Security Professional CWSP-207 certification is a brand-new, professional-level wireless LAN certification that has been recently introduced into the CWNP Program. PassQuestion offers the latest Certified Wireless Security Professional CWSP-207 Exam Questions based on actual exam questions and answers, providing a realistic simulation of the certification examination. This invaluable resource allows you to test your knowledge and skills in a format that closely mirrors the actual CWSP-207 exam. It's important to make sure that you are using the most up-to-date Certified Wireless Security Professional CWSP-207 Exam Questions to ensure the best possible preparation. With the right resources and thorough preparation, you can confidently clear the CWSP-207 exam on the first attempt.

The Certified Wireless Security Professional (CWSP) certification is a professional level wireless LAN credential under the CWNP Program. To obtain this certification, one must already hold a current and valid CWNA credential. The CWSP exam, which is taken at a Pearson Vue Testing Center, requires a pass rate of 70% or higher, with instructors needing to achieve a pass rate of 80% or higher.

Preparation for the CWSP exam should begin with the exam objectives, which encompass the full range of skills that will be assessed. The CWSP certification remains valid for three years. If recertification is desired, the candidate must still have a current CWNA credential and pass the most recent version of the CWSP exam. Successfully passing the CWSP exam also results in the renewal of the CWNA certificate for another three years.

A CWSP is a WLAN subject matter expert (SME) capable of assisting in the creation and implementation of an organization's enforceable security policy. This is achieved by adhering to relevant regulations, standards, and accepted best practices. The SME is also capable of identifying and mitigating threats to a wireless network. Moreover, a CWSP can effectively utilize the appropriate tools and procedures to ensure the network's ongoing security.

CWSP Exam Details:

Exam Number: CWSP-207
Cost: $349.99 (USD) - Exam Voucher
Availability: Pearson Vue Testing Centers
Duration: 90 Minutes
Questions: 60 multiple choice
Language: English      

CWSP Exam Topics

Security Policy 10%

1.1 Define WLAN security Requirements
1.2 Develop WLAN security policies
1.3 Ensure proper training is administered for all stakeholders related to security policies and ongoing security awareness

Vulnerabilities, Threats, and Attacks 30%

2.1 Identify potential vulnerabilities and threats to determine the impact on the WLAN and supporting systems and verify, mitigate, and remediate them
2.2 Describe and perform risk analysis and risk mitigation procedures

WLAN Security Design and Architecture 50%

3.1 Select the appropriate security solution for a given implementation and ensure it is installed and configured according to policy requirements
3.2 Implement or recommend appropriate wired security configurations to support the WLAN
3.3 Implement authentication and security services
3.4 Implement secure transitioning (roaming) solutions
3.5 Secure public access and/or open networks
3.6 Implement preventative measures required for common vulnerabilities associated with wireless infrastructure devices and avoid weak security solutions

Security Lifecycle Management 10%

4.1 Understand and implement management within the security lifecycle of identify, assess, protect, and monitor
4.2 Use effective change management procedures including documentation, approval, and notifications
4.3 Use information from monitoring solutions for load observation and forecasting of future requirements to comply with security policy
4.4 Implement appropriate maintenance procedures including license management, software/code upgrades, and configuration management
4.5 Implement effective auditing procedures to perform audits, analyze results, and generate reports

View Online Certified Wireless Security Professional CWSP-207 Free Questions

1. Which of these authentication methods are supported by RADIUS and can be used for WLAN security? (Choose all that apply.)
A. Hologram authentication
B. Captive web portal authentication
C. MAC authentication
D. TSA authentication
E. 802.1X/EAP authentication
Answer: BCE

2. What 802.11 WLAN security problem is directly addressed by mutual authentication?
A. Wireless hijacking attacks
B. Weak password policies
C. MAC spoofing
D. Disassociation attacks
E. Offline dictionary attacks
F. Weak Initialization Vectors
Answer: A

3. Given: ABC Hospital wishes to create a strong security policy as a first step in securing their 802.11 WLAN. 
Before creating the WLAN security policy, what should you ensure you possess?
A. Awareness of the exact vendor devices being installed
B. Management support for the process
C. End-user training manuals for the policies to be created
D. Security policy generation software
Answer: B

4. What does 802.1X/EAP provide when implemented for WLAN security? (Choose all that apply.)
A. Access to network resources
B. Verification of access point credentials
C. Dynamic authentication
D. Dynamic encryption-key generation
E. Verification of user credentials
Answer: ADE

5. What type of WLAN security policy defines WLAN security auditing requirements and policy violation report procedures?
A. Functional policy
B. General policy
C. Protocol policy
D. Performance policy
Answer: B

6. What elements should be addressed by a WLAN security policy? (Choose 2)
A. Enabling encryption to prevent MAC addresses from being sent in clear text
B. How to prevent non-IT employees from learning about and reading the user security policy
C. End-user training for password selection and acceptable network use
D. The exact passwords to be used for administration interfaces on infrastructure devices
E. Social engineering recognition and mitigation techniques
Answer: CE

7. You work as the security administrator for your organization. In relation to the WLAN, you are viewing a dashboard that shows security threat, policy compliance and rogue threat charts.
What type of system is in view?
A. Wireshark Protocol Analyzer
B. Wireless VPN Management Systems
C. Wireless Intrusion Prevention System
D. Distributed RF Spectrum Analyzer
E. WLAN Emulation System
Answer: C

8. ABC Company uses the wireless network for highly sensitive network traffic. For that reason, they intend to protect their network in all possible ways.
They are continually researching new network threats and new preventative measures. They are interested in the security benefits of 802.11w, but would like to know its limitations.
What types of wireless attacks are protected by 802.11w? (Choose 2)
A. RF DoS attacks
B. Layer 2 Disassociation attacks
C. Robust management frame replay attacks
D. Social engineering attacks
Answer: BC

9. Which of these attacks can be mitigated with a mutual authentication solution? (Choose all that apply.)
A. Malicious eavesdropping
B. Deauthentication
C. Man-in-the-middle
D. Wireless hijacking
E. Authentication flood
Answer: CD

10. How are IPsec VPNs used to provide security in combination with 802.11 WLANs?
A. Client-based security on public access WLANs
B. Point-to-point wireless bridge links
C. Connectivity across WAN links
D. All of the above
Answer: D

Related Courses and Certification

Full List Of IT Professional Courses & Technical Certification Courses Online
Also Online IT Certification Courses & Online Technical Certificate Programs