Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CWNP Exam CWSP-207 Topic 3 Question 14 Discussion

Actual exam question for CWNP's CWSP-207 exam
Question #: 14
Topic #: 3
[All CWSP-207 Questions]

In an effort to optimize WLAN performance, ABC Company has upgraded their WLAN infrastructure from 802.11a/g to 802.11n. 802.11a/g clients are still supported and are used throughout ABC's facility. ABC has always been highly security conscious, but due to budget limitations, they have not yet updated their overlay WIPS solution to 802.11n or 802.11ac.

Given ABC's deployment strategy, what security risks would not be detected by the 802.11a/g WIPS?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Kami
2 months ago
Haha, I bet the security team is wishing they had a time machine to go back and upgrade that WIPS before the 802.11n rollout. Talk about being behind the curve!
upvoted 0 times
...
Portia
2 months ago
Well, the WIPS is clearly not keeping up with the times. I bet the IT team is just praying they don't get hit by some crazy 802.11n attack!
upvoted 0 times
...
Sherron
2 months ago
Hmm, I'm torn between B and D. Either way, the outdated WIPS is leaving some nasty blind spots in ABC's security.
upvoted 0 times
...
Marsha
2 months ago
I'm going with D. If the WIPS is only 802.11a/g, it won't be able to catch an 802.11n client spoofing an authorized client's MAC.
upvoted 0 times
...
Valentine
2 months ago
Definitely B. The WIPS can't detect rogue APs operating in 40 MHz-only mode, which is a huge security risk.
upvoted 0 times
Roosevelt
20 days ago
It's crucial for maintaining the security of their WLAN infrastructure.
upvoted 0 times
...
Rolf
28 days ago
I think they should prioritize updating their overlay WIPS solution to detect these rogue APs.
upvoted 0 times
...
Carey
1 months ago
I agree, rogue APs in Greenfield 40 MHz-only mode can easily go undetected.
upvoted 0 times
...
Earleen
1 months ago
That's a major vulnerability that ABC Company needs to address as soon as possible.
upvoted 0 times
...
...
Adelaide
2 months ago
I'm going to have to go with C on this one. Seeing an 802.11a STA perform a deauthentication attack against the 802.11n APs would definitely slip under the radar of that legacy WIPS.
upvoted 0 times
...
Lenna
2 months ago
Haha, these security questions always make me feel like I'm in a spy movie! But seriously, I think B is the right answer. The WIPS is just not equipped to handle those newer 802.11n shenanigans.
upvoted 0 times
...
Mike
2 months ago
I'd go with D. An 802.11n client spoofing the MAC address of an authorized client could easily slip past the older 802.11a/g WIPS solution.
upvoted 0 times
Stephaine
1 months ago
C) 802.11a STA performing a deauthentication attack against 802.11n APs
upvoted 0 times
...
Amira
1 months ago
B) Rogue AP operating in Greenfield 40 MHz-only mode
upvoted 0 times
...
Alecia
1 months ago
A) Hijacking attack performed by using a rogue 802.11n AP against an 802.11a client
upvoted 0 times
...
...
Laine
2 months ago
Option B seems like the most likely security risk here. The WIPS is not able to detect rogue APs operating in 40 MHz-only mode, which could allow for some nasty attacks.
upvoted 0 times
Una
1 months ago
We should definitely look into upgrading the overlay WIPS solution to better protect our network.
upvoted 0 times
...
Jani
1 months ago
It's concerning that the WIPS wouldn't be able to detect such a significant security risk.
upvoted 0 times
...
Santos
2 months ago
I agree, rogue APs in Greenfield 40 MHz-only mode could definitely pose a serious threat.
upvoted 0 times
...
...
Cassi
2 months ago
I believe the 802.11a WIPS would also miss detecting 802.11n clients spoofing the MAC address of authorized 802.11n clients.
upvoted 0 times
...
Marjory
3 months ago
I agree with Estrella. The WIPS may not be able to detect rogue APs operating in Greenfield 40 MHz-only mode as well.
upvoted 0 times
...
Estrella
3 months ago
I think the security risks that would not be detected by the 802.11a/g WIPS are hijacking attacks using rogue 802.11n APs against 802.11a clients.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77