BlackFriday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CWNP Exam CWSP-207 Topic 3 Question 14 Discussion

Actual exam question for CWNP's CWSP-207 exam
Question #: 14
Topic #: 3
[All CWSP-207 Questions]

In an effort to optimize WLAN performance, ABC Company has upgraded their WLAN infrastructure from 802.11a/g to 802.11n. 802.11a/g clients are still supported and are used throughout ABC's facility. ABC has always been highly security conscious, but due to budget limitations, they have not yet updated their overlay WIPS solution to 802.11n or 802.11ac.

Given ABC's deployment strategy, what security risks would not be detected by the 802.11a/g WIPS?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Kami
17 days ago
Haha, I bet the security team is wishing they had a time machine to go back and upgrade that WIPS before the 802.11n rollout. Talk about being behind the curve!
upvoted 0 times
...
Portia
18 days ago
Well, the WIPS is clearly not keeping up with the times. I bet the IT team is just praying they don't get hit by some crazy 802.11n attack!
upvoted 0 times
...
Sherron
20 days ago
Hmm, I'm torn between B and D. Either way, the outdated WIPS is leaving some nasty blind spots in ABC's security.
upvoted 0 times
...
Marsha
21 days ago
I'm going with D. If the WIPS is only 802.11a/g, it won't be able to catch an 802.11n client spoofing an authorized client's MAC.
upvoted 0 times
...
Valentine
22 days ago
Definitely B. The WIPS can't detect rogue APs operating in 40 MHz-only mode, which is a huge security risk.
upvoted 0 times
Carey
3 days ago
I agree, rogue APs in Greenfield 40 MHz-only mode can easily go undetected.
upvoted 0 times
...
Earleen
3 days ago
That's a major vulnerability that ABC Company needs to address as soon as possible.
upvoted 0 times
...
...
Adelaide
23 days ago
I'm going to have to go with C on this one. Seeing an 802.11a STA perform a deauthentication attack against the 802.11n APs would definitely slip under the radar of that legacy WIPS.
upvoted 0 times
...
Lenna
24 days ago
Haha, these security questions always make me feel like I'm in a spy movie! But seriously, I think B is the right answer. The WIPS is just not equipped to handle those newer 802.11n shenanigans.
upvoted 0 times
...
Mike
28 days ago
I'd go with D. An 802.11n client spoofing the MAC address of an authorized client could easily slip past the older 802.11a/g WIPS solution.
upvoted 0 times
Stephaine
11 days ago
C) 802.11a STA performing a deauthentication attack against 802.11n APs
upvoted 0 times
...
Amira
14 days ago
B) Rogue AP operating in Greenfield 40 MHz-only mode
upvoted 0 times
...
Alecia
15 days ago
A) Hijacking attack performed by using a rogue 802.11n AP against an 802.11a client
upvoted 0 times
...
...
Laine
1 months ago
Option B seems like the most likely security risk here. The WIPS is not able to detect rogue APs operating in 40 MHz-only mode, which could allow for some nasty attacks.
upvoted 0 times
Una
2 days ago
We should definitely look into upgrading the overlay WIPS solution to better protect our network.
upvoted 0 times
...
Jani
8 days ago
It's concerning that the WIPS wouldn't be able to detect such a significant security risk.
upvoted 0 times
...
Santos
23 days ago
I agree, rogue APs in Greenfield 40 MHz-only mode could definitely pose a serious threat.
upvoted 0 times
...
...
Cassi
1 months ago
I believe the 802.11a WIPS would also miss detecting 802.11n clients spoofing the MAC address of authorized 802.11n clients.
upvoted 0 times
...
Marjory
2 months ago
I agree with Estrella. The WIPS may not be able to detect rogue APs operating in Greenfield 40 MHz-only mode as well.
upvoted 0 times
...
Estrella
2 months ago
I think the security risks that would not be detected by the 802.11a/g WIPS are hijacking attacks using rogue 802.11n APs against 802.11a clients.
upvoted 0 times
...

Save Cancel