top of page
Writer's pictureAnindita

CWNP Wi-Fi Security CWSP-206 Certification Study Guide

CWNP CWSP-206 Certification Exam Details


CWNP CWSP-206 certifications are globally accepted and add significant value to any IT professional. The certification gives you a profound understanding of all the workings of the network models and the devices that are utilized with it. NWexam.com is proud to provide to you the best CWNP Exam Guides.

The CWNP CWSP-206 Exam is challenging, and thorough preparation is essential for success. This cert guide is designed to help you prepare for the Wi-Fi Security certification exam. It contains a detailed list of the topics covered on the Professional exam. These guidelines for the CWSP will help guide you through the study process for your certification.


To obtain Wireless Security Professional certification, you are required to pass CWSP CWSP-206 exam. This exam is created keeping in mind the input of professionals in the industry and reveals how Cisco products are used in organizations across the world.


CWSP-206 Wireless Security Professional Exam Summary


Exam Name: Wireless Security Professional

Exam Code: CWSP-206

Exam Price: $250 (USD)

Duration: 90 mins

Number of Questions: 60

Passing Score: 70%

Exam Registration: PEARSON VUE

Sample Questions: CWNP CWSP-206 Sample Questions

Recommended Training:


Topics covered in the Wi-Fi Security Wi-Fi Security CWSP-206 Exam


Security Policy - 10%


Define WLAN security Requirements

- Evaluate and incorporate business, technical, and applicable regulatory policies (for example, PCI-DSS, HIPAA, GPDR, etc.)

- Involve appropriate stakeholders

- Review client devices and applications

- Review WLAN infrastructure devices


Develop WLAN security policies

- Translate security requirements to high-level policy statements

- Write policies conforming to common practices including definitions of enforcement and constraint specification

- Ensure appropriate approval and support for all policies

- Implement security policy lifecycle management


Ensure proper training is administered for all stakeholders related to security policies and ongoing security awareness

Vulnerabilities, Threats, and Attacks - 30%


Identify potential vulnerabilities and threats to determine the impact on the WLAN and supporting systems and verify, mitigate, and remediate them

- Use information sources to identify the latest vulnerabilities related to a WLAN including online repositories containing CVEs

- Determine the risk and impact of identified vulnerabilities

- Select appropriate actions to mitigate threats exposed by vulnerabilities


Review and adjust device configurations to ensure conformance with security policy

Implement appropriate code modifications, patches and upgrades

Quarantine unrepaired/compromised systems

Examine logs and network traffic where applicable

- Describe and detect possible, common WLAN attacks including eavesdropping, man-in the-middle, cracking, phishing, and social engineering attacks

- Implement penetration testing procedures to identify weaknesses in the WLAN

Use appropriate penetration testing processes including scope definition, information gathering, scanning, attack, and documentation procedures

Select and use penetration testing tools including project documentation, scanners, hardware tools, Kali Linux, protocol analyzers, WLAN auditing tools (software and hardware)

- Implement network monitoring to identify attacks and potential vulnerabilities

Use appropriate tools for network monitoring including centralized monitoring, distributed monitoring, and Security Information Event Management (SIEM) systems

Implement mobile (temporary), integrated and overlay WIPS solutions to monitor security events


Describe and perform risk analysis and risk mitigation procedures

- Asset management

- Risk Ratings

- Loss expectancy calculations

- Develop risk management plans for WLANs


WLAN Security Design and Architecture - 45%


Select the appropriate security solution for a given implementation and ensure it is installed and configured according to policy requirements

- Select and implement appropriate authentication solutions

WPA/WPA2-Personal (Pre-Shared Key)

WPA/WPA2-Enterprise

WPA3-SAE and 192-Bit enterprise security

802.1X/EAP

Understand the capabilities of EAP methods including EAP-TLS, EAP-TTLS, PEAP, EAP-FAST, EAP-SIM, and EAP-GTC

Guest access authentication

- Select and implement appropriate encryption solutions

Encryption methods and concepts

TKIP/RC4

CCMP/AES

SAE and 192-bit security

OWE

Virtual Private Network (VPN)

- Select and implement wireless monitoring solutions

Wireless Intrusion Prevention System (WIPS) - overlay and integrated

Laptop-based monitoring with protocol and spectrum analyzers

- Understand and explain 802.11 Authentication and Key Management (AKM) components and processes

Encryption keys and key hierarchies

Handshakes and exchanges (4-way, SAE, OWE)

Pre-shared keys

Pre-RSNA security (WEP and 802.11 Shared Key authentication)

TSN security

RSN security

WPA, WPA2, and WPA3


Implement or recommend appropriate wired security configurations to support the WLAN - Physical port security in Ethernet switches

- Network segmentation, VLANs, and layered security solutions

- Tunneling protocols and connections

- Access Control Lists (ACLs)

- Firewalls


Implement authentication and security services

- Role-Based Access Control (RBAC)

- Certificate Authorities (CAs)

- AAA Servers

- Client onboarding

- Network Access Control (NAC)

- BYOD and MDM


Implement secure transitioning (roaming) solutions

- 802.11r Fast BSS Transition (FT)

- Opportunistic Key Caching (OKC)

- Pre-Shared Key (PSK) - standard and per-user


Secure public access and/or open networks

- Guest access

- Peer-to-peer connectivity

- Captive portals

- Hotspot 2.0/Passpoint


Implement preventative measures required for common vulnerabilities associated with wireless infrastructure devices and avoid weak security solution

- Weak/default passwords

- Misconfiguration

- Firmware/software updates

- HTTP-based administration interface access

- Telnet-based administration interface access

- Older SNMP protocols such as SNMPv1 and SNMPv2


Security Lifecycle Management - 15%


Understand and implement management within the security lifecycle of identify, assess, protect, and monitor

- Identify technologies being introduced to the WLAN

- Assess security requirements for new technologies

- Implement appropriate protective measures for new technologies and validate the security of the measures

- Monitor and audit the new technologies for security compliance (Security Information Event Management (SIEM), portable audits, infrastructure-based audits, WIPS/WIDS)


Use effective change management procedures including documentation, approval, and notifications


Use information from monitoring solutions for load observation and forecasting of future requirements to comply with security policy


Implement appropriate maintenance procedures including license management, software/code upgrades, and configuration management


Implement effective auditing procedures to perform audits, analyze results, and generate reports

- User interviews

- Vulnerability scans

- Reviewing access controls

- Penetration testing

- System log analysis

- Report findings to management and support professionals as appropriate


What type of questions is on the CWNP CWSP-206 exams?


● Single answer

● choice

● Multiple answer multiple choice

● Drag and Drop (DND)

● Router Simulation

● Testlet


Wi-Fi Security CWSP-206 Practice Exam Questions.


Grab an understanding from these CWNP CWSP-206 sample questions and answers and improve your CWSP-206 exam preparation towards attaining a Wireless Security Professional Certification. Answering these sample questions will make familiar with the types of questions you can expect on the actual exam. Doing practice with Wi-Fi Security CWSP questions and answers before the exam as much as possible is the key to passing the CWNP CWSP-206 certification exam.


CWSP-206 Wireless Security Professional Sample Questions:-


01. Which of these attacks are considered denial-of-service attacks?

(Choose two.)


a) Man-in-the-middle

b) Jamming

c) Deauthentication spoofing

d) MAC spoofing

e) Peer-to-peer

Answer: b, c

02. The CCMP header is made up of which of the following pieces?

(Choose two.)


a) PN

b) TTAK

c) TSC

d) Key ID

e) MIC

Answer: a, d

03. What are some the components within an MDM architecture?

(Choose all that apply.)


a) AP

b) RADIUS

c) BYOD

d) APNs

e) GCM

Answer: a, d, e

04. Which of these types of EAP use three phases of operation?


a) EAP-TTLS

b) EAP-PEAPv0 (EAP-MSCHAPv2)

c) EAP-PEAPv0 (EAP-TLS)

d) EAP-FAST

e) EAP-TLS (privacy mode)

f) EAP-TLS (non privacy mode)

Answer: d

05. You must locate non-compliant 802.11 devices. Which one of the following tools will you use and why?


a) A spectrum analyzer, because it can show the energy footprint of a device using WPA differently from a device using WPA2.

b) A spectrum analyzer, because it can decode the PHY preamble of a non-compliant device.

c) A protocol analyzer, because it can be used to report on security settings and regulatory or rule compliance.

d) A protocol analyzer, because it can be used to view the spectrum energy of non-compliant 802.11 devices, which is always different from compliant devices.

Answer: c

06. How are IPsec VPNs used to provide security in combination with 802.11 WLANs?


a) Client-based security on public access WLANs

b) Point-to-point wireless bridge links

c) Connectivity across WAN links

d) All of the above

Answer: d

07. When deploying a corporate 802.11 WLAN, what password-related items should always be included in a security policy?

(Choose two.)


a) The password policy should mandate a procedure on how passphrases are created for handheld devices that use WPA2-Personal.

b) End-user WPA2-Enterprise passwords should contain numbers, special characters, and upper- and lowercase letters.

c) Client-side certificates should always be used instead of passwords when securing a WLAN.

d) Machine authentication should always be mandated.

Answer: a, b

08. What would be the intended purpose of using a third-party AP as part of a WLAN audit?


a) Audit the WIPS.

b) Audit the wired infrastructure.

c) Audit Layer 2.

d) Audit Layer 1.

Answer: a

09. At which layer of the OSI model does 802.11 technology operate?


a) Session

b) Network

c) Physical

d) Presentation

e) Transport

Answer: c

10. With a WLAN infrastructure, where can the guest captive web portal operate?


a) AP

b) WLAN controller

c) Third-party server

d) All of the above

Answer: d


Not every IT certification is intended for professionals, but CWNP certification is a great deal. After achieving this CWNP CWSP-206, you can grab an opportunity to be an IT professional with unique capability and can help the industry or get a good job. Many individuals do the Cisco certifications just for the interest, and that payback as a profession because of the worth of this course.

Comments


bottom of page