Certified Wireless Security Professional (CWSP)

Here you have the best CWNP CWSP-205 practice exam questions

  • You have 119 total questions to study from
  • Each page has 5 questions, making a total of 24 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on January 6, 2026
  • This site is not affiliated with or endorsed by CWNP.
Question 1 of 119
Given: John Smith uses a coffee shop's Internet hot-spot (no authentication or encryption) to transfer funds between his checking and savings accounts at his bank's website. The banks website uses the HTTPS protocol to protect sensitive account information. While John was using the hot-spot, a hacker was able to obtain Johns bank account user ID and password and exploit this information.
What likely scenario could have allowed the hacker to obtain Johns bank account user ID and password?
Correct Answer: B

Question 2 of 119
What type of WLAN attack is prevented with the use of a per-MPDU TKIP sequence counter (TSC)?
Correct Answer: C

Question 3 of 119
What 802.11 WLAN security problem is directly addressed by mutual authentication?
Correct Answer: A

Question 4 of 119
ABC Company uses the wireless network for highly sensitive network traffic. For that reason, they intend to protect their network in all possible ways. They are continually researching new network threats and new preventative measures. They are interested in the security benefits of 802.11w, but would like to know its limitations.
What types of wireless attacks are protected by 802.11w? (Choose 2)
Correct Answer: B, C

Question 5 of 119
You are configuring seven APs to prevent common security attacks. The APs are to be installed in a small business and to reduce costs, the company decided to install all consumer-grade wireless routers. The wireless routers will connect to a switch, which connects directly to the Internet connection providing 50 Mbps of
Internet bandwidth that will be shared among 53 wireless clients and 17 wired clients.
To ensure the wireless network is as secure as possible from common attacks, what security measure can you implement given only the hardware referenced?
Correct Answer: D