Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is included in a Pairwise Transient Key (PTK)






2. Is data encrypted over a capwap tunnel?






3. How does infrastructure MFP work






4. What does Proactive Key Caching do






5. 6 criteria types for rogue classification






6. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






7. Switch global config to enable dot1x radius server






8. What does IBN allow you to assign






9. Will foreign/anchor communication work through PAT?






10. Steps to configure wlcs for guest wlan






11. Difference between mobility list and mobility group






12. What are virtual domains used for in WCS






13. How does client MFP work






14. Methods for authenticating to NAC






15. How fast is fast secure roaming






16. Ports to open on fw to allow foreign to anchor controller tunnel to be built






17. What does Fast Secure Roaming use re: Keying






18. Regulatory Compliance Acronyms






19. What ports does OEAP use to connect to anchor WLC






20. How is IBN implemented on a WLAN






21. When PKC is used






22. What are the 4 main components of NGS re: guests






23. WLC Tacacs+ roles






24. Steps to config. .1x for AP to WLC connections






25. Steps to auth with NAA w/ SSO






26. 2 different types of wIPS deployment






27. Difference between MFP-1 & MFP-2






28. Why is fast secure roaming used






29. Things to Enable in ACS (Global Authentication Page) for PEAP support






30. What is NGS & whats it used for






31. Whats included in 802.11-2012






32. How is OEAP encrypted






33. Whats in CCXv4?






34. How does CCKM simplify PMK Caching






35. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM






36. What does FIPS-2 require for WLC to RADIUS communications






37. Enhanced Neighbor list - E2E






38. What protocol to WLCs use to communicate with IPS






39. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






40. AAA override






41. How is encryption established between OEAP & Anchor WLC






42. IAPP roaming protocol






43. Steps to adding an IPS






44. What is 802.11w?






45. Encryption types used by SNMPv3






46. How is IBN-QoS






47. Protocols used in wIPS






48. How is the CAPWAP tunnel between AP & WLC encrypted






49. Steps to installing Server Cert into ACS






50. What is used for HREAP Roaming re: keying