Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Steps to installing Server Cert into ACS






2. What does IBN allow you to assign






3. Is data encrypted over a capwap tunnel?






4. Briefly describe peap






5. AAA override






6. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






7. What are mping and eping used for from the wlc cli






8. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment






9. Steps to setting up an out-of-band virtual gateway NAS setup






10. 2 different types of wIPS deployment






11. What does Fast Secure Roaming use re: Keying






12. Protocols used in wIPS






13. How does client MFP work






14. Vlan pooling






15. What is the IEEE Standards version of MFP






16. Difference between mobility list and mobility group






17. What does a wired IPS do compared to the WLC IDS






18. 6 criteria types for rogue classification






19. What is Conditional Web Redirect






20. What does FIPS-2 require for WLC to RADIUS communications






21. What are virtual domains used for in WCS






22. Steps to auth with NAA w/ SSO






23. Why add an IPS if WLCs already detect attacks.






24. Ports to open on fw to allow foreign to anchor controller tunnel to be built






25. What is included in a Pairwise Transient Key (PTK)






26. Regulatory Compliance Acronyms






27. What is 802.11w?






28. When will a WLC use a Local EAP profile?






29. Steps to config. .1x for AP to WLC connections






30. Authentication types used by SNMPv3






31. What is NGS & whats it used for






32. How to set up tacacs roles in ACS for WLC authorization






33. How is OEAP encrypted






34. How long before an HREAP goes into disconnected/standalone mode






35. Whats included in 802.11-2012






36. How does infrastructure MFP work






37. What triggers can initiate a WLC to request a client to roam






38. IAPP roaming protocol






39. RADIUS UDP Ports






40. What does Proactive Key Caching do






41. Encryption types used by SNMPv3






42. Describe AP Assisted Roaming






43. What must be configd on ACS to enable dot1x from switch






44. Will foreign/anchor communication work through PAT?






45. How fast is fast secure roaming






46. What protocol to WLCs use to communicate with IPS






47. Whats added in CCXv5?






48. How is IBN implemented on a WLAN






49. Encryption algorithm used by Certificates






50. Switchport config to enable dot1x on a port