Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Steps to installing Server Cert into ACS






2. How is IBN-QoS






3. How does client MFP work






4. Regulatory Compliance Acronyms






5. Enhanced Neighbor list






6. 3 categories of segmented traffic






7. Steps to posture assesment






8. What are virtual domains used for in WCS






9. Client Roaming Reasons






10. Switch global config to enable dot1x radius server






11. NAC Deployment Types






12. How is OEAP encrypted






13. How does infrastructure MFP work






14. Ports to open on fw to allow foreign to anchor controller tunnel to be built






15. Eap process/messages






16. Steps to roaming in non802.1R






17. RADIUS UDP Ports






18. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






19. Directed Roam Request






20. What ports does OEAP use to connect to anchor WLC






21. Difference between MFP-1 & MFP-2






22. What are the 4 main components of NGS re: guests






23. What is included in a Pairwise Transient Key (PTK)






24. Main elements of a NAC deployment






25. When PKC is used






26. Whats added in CCXv5?






27. What must be configd on ACS to enable dot1x from switch






28. Peap fast reconnect






29. Briefly describe eap-tls






30. 3 modes of radius fallback






31. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM






32. What triggers can initiate a WLC to request a client to roam






33. What is a mobility list used for






34. 6 criteria types for rogue classification






35. What does Proactive Key Caching do






36. How does CCKM simplify PMK Caching






37. Encryption types used by SNMPv3






38. Protocols used in wIPS






39. What is HREAP Local Auth limitation






40. Encryption algorithm used by Certificates






41. What must be configured the same for an HREAP not to disconnect clients when failing over (or back) to a WLC






42. How is encryption established between OEAP & Anchor WLC






43. Steps to roaming in 802.1R






44. Methods for authenticating to NAC






45. What does FIPS-2 require for WLC to RADIUS communications






46. Why is fast secure roaming used






47. What is used for HREAP Roaming re: keying






48. What protocol to WLCs use to communicate with IPS






49. Whats included in 802.11-2012






50. Describe AP Assisted Roaming