What security vulnerabilities may result from a lack of staging, change management, and installation procedures for WLAN infrastructure equipment? (Choose 2)
A.
The WLAN system may be open to RF Denial-of-Service attacks
B.
WIPS may not classify authorized, rogue, and neighbor APs accurately
C.
Authentication cracking of 64-bit Hex WPA-Personal PSK
D.
Management interface exploits due to the use of default usernames and passwords for AP management
Without proper staging, change management, and installation procedures, significant vulnerabilities may arise:
(B) WIPS relies on a known database of authorized APs and clients. If devices are deployed without proper registration and staging, WIPS cannot accurately classify devices as authorized, rogue, or neighbor.
(D) If APs are installed without changing default credentials, attackers can exploit them through common web or SNMP-based management interfaces.
This undermines both operational visibility and network security posture.
[References:, , CWSP-208 Study Guide, Chapter 8 – WLAN Security Design and Architecture, , CWNP CWSP-208 Official Objectives: “Security Design and Policy Implementation”]
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit