Weekend Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 3
Total 27 questions
Exam Code: CWSP-208                Update: Sep 14, 2025
Exam Name: Certified Wireless Security Professional (CWSP)

CWNP Certified Wireless Security Professional (CWSP) CWSP-208 Exam Dumps: Updated Questions & Answers (September 2025)

Question # 1

Given: ABC Company secures their network with WPA2-Personal authentication and AES-CCMP encryption.

What part of the 802.11 frame is always protected from eavesdroppers by this type of security?

A.

All MSDU contents

B.

All MPDU contents

C.

All PPDU contents

D.

All PSDU contents

Question # 2

Given: You must implement 7 APs for a branch office location in your organization. All APs will be autonomous and provide the same two SSIDs (CORP1879 and Guest).

Because each AP is managed directly through a web-based interface, what must be changed on every AP before enabling the WLANs to ensure proper staging procedures are followed?

A.

Fragmentation threshold

B.

Administrative password

C.

Output power

D.

Cell radius

Question # 3

In the basic 4-way handshake used in secure 802.11 networks, what is the purpose of the ANonce and SNonce? (Choose 2)

A.

They are used to pad Message 1 and Message 2 so each frame contains the same number of bytes.

B.

The IEEE 802.11 standard requires that all encrypted frames contain a nonce to serve as a Message Integrity Check (MIC).

C.

They are added together and used as the GMK, from which the GTK is derived.

D.

They are input values used in the derivation of the Pairwise Transient Key.

E.

They allow the participating STAs to create dynamic keys while avoiding sending unicast encryption keys across the wireless medium.

Question # 4

A single AP is configured with three separate WLAN profiles, as follows:

1. SSID: ABCData – BSSID: 00:11:22:00:1F:C3 – VLAN 10 – Security: PEAPv0/EAP-MSCHAPv2 with AES-CCMP – 3 current clients

2. SSID: ABCVoice – BSSID: 00:11:22:00:1F:C4 – VLAN 60 – Security: WPA2-Personal with AES-CCMP – 2 current clients

3. SSID: Guest – BSSID: 00:11:22:00:1F:C5 – VLAN 90 – Security: Open with captive portal authentication – 3 current clients

Three STAs are connected to ABCData. Three STAs are connected to Guest. Two STAs are connected to ABCVoice.

How many unique GTKs and PTKs are currently in place in this scenario?

A.

1 GTK – 8 PTKs

B.

2 GTKs – 5 PTKs

C.

2 GTKs – 8 PTKs

D.

3 GTKs – 8 PTKs

Question # 5

In the IEEE 802.11-2012 standard, what is the purpose of the 802.1X Uncontrolled Port?

A.

To allow only authentication frames to flow between the Supplicant and Authentication Server

B.

To block authentication traffic until the 4-Way Handshake completes

C.

To pass general data traffic after the completion of 802.11 authentication and key management

D.

To block unencrypted user traffic after a 4-Way Handshake completes

Question # 6

Given: You are using WEP as an encryption solution. You are using VLANs for network segregation.

Why can you not establish an RSNA?

A.

RSNA connections require TKIP or CCMP.

B.

RSNA connections require BIP and do not support TKIP, CCMP or WEP.

C.

RSNA connections require CCMP and do not support TKIP or WEP.

D.

RSNA connections do not work in conjunction with VLANs.

Question # 7

Given: ABC Company is deploying an IEEE 802.11-compliant wireless security solution using 802.1X/EAP authentication. According to company policy, the security solution must prevent an eavesdropper from decrypting data frames traversing a wireless connection.

What security characteristics and/or components play a role in preventing data decryption? (Choose 2)

A.

Multi-factor authentication

B.

4-Way Handshake

C.

PLCP Cyclic Redundancy Check (CRC)

D.

Encrypted Passphrase Protocol (EPP)

E.

Integrity Check Value (ICV)

F.

Group Temporal Keys

Question # 8

What disadvantage does EAP-TLS have when compared with PEAPv0 EAP/MSCHAPv2 as an 802.11 WLAN security solution?

A.

Fast/secure roaming in an 802.11 RSN is significantly longer when EAP-TLS is in use.

B.

EAP-TLS does not protect the client's username and password inside an encrypted tunnel.

C.

EAP-TLS cannot establish a secure tunnel for internal EAP authentication.

D.

EAP-TLS is supported only by Cisco wireless infrastructure and client devices.

E.

EAP-TLS requires extensive PKI use to create X.509 certificates for both the server and all clients, which increases administrative overhead.

Question # 9

What statement accurately describes the functionality of the IEEE 802.1X standard?

A.

Port-based access control with EAP encapsulation over the LAN (EAPoL)

B.

Port-based access control with dynamic encryption key management and distribution

C.

Port-based access control with support for authenticated-user VLANs only

D.

Port-based access control with mandatory support of AES-CCMP encryption

E.

Port-based access control, which allows three frame types to traverse the uncontrolled port: EAP, DHCP, and DNS.

Question # 10

Wireless Intrusion Prevention Systems (WIPS) provide what network security services? (Choose 2)

A.

Configuration distribution for autonomous APs

B.

Wireless vulnerability assessment

C.

Application-layer traffic inspection

D.

Analysis and reporting of AP CPU utilization

E.

Policy enforcement and compliance management

Page: 1 / 3
Total 27 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 14 Sep 2025