Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Enhanced Neighbor list - E2E






2. What are mping and eping used for from the wlc cli






3. Whats in CCXv4?






4. What is included in a Pairwise Transient Key (PTK)






5. Steps to installing Server Cert into ACS






6. Directed Roam Request






7. Will foreign/anchor communication work through PAT?






8. Why is fast secure roaming used






9. IAPP roaming protocol






10. 3 modes of radius fallback






11. How to set up tacacs roles in ACS for WLC authorization






12. How is IBN implemented on a WLAN






13. How does client MFP work






14. Briefly describe peap






15. How is the CAPWAP tunnel between AP & WLC encrypted






16. What triggers can initiate a WLC to request a client to roam






17. Regulatory Compliance Acronyms






18. Encryption algorithm used by Certificates






19. Authentication types used by SNMPv3






20. How is OEAP encrypted






21. Briefly describe eap-tls






22. Describe AP Assisted Roaming






23. Difference between mobility list and mobility group






24. How long before an HREAP goes into disconnected/standalone mode






25. What is the radius server override interface option under WLAN-->AAA?






26. How fast is fast secure roaming






27. Client Roaming Reasons






28. Whats added in CCXv5?






29. Steps to roaming in non802.1R






30. When submitting a CSR from ACS






31. 802.11R






32. 3 categories of segmented traffic






33. Enhanced Neighbor list






34. What part of an 802.11 Beacon contains the security mechanisms in use






35. Briefly describe eap-mschapv2






36. What protocol to WLCs use to communicate with IPS






37. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment






38. What are the 4 main components of NGS re: guests






39. What is the caveat to having redundant anchor controllers






40. What does a wired IPS do compared to the WLC IDS






41. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






42. How is encryption established between OEAP & Anchor WLC






43. Difference between MFP-1 & MFP-2






44. WLC Tacacs+ roles






45. What is HREAP Local Auth limitation






46. NAC Deployment Types






47. Why add an IPS if WLCs already detect attacks.






48. What must be configd on ACS to enable dot1x from switch






49. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






50. What must be configured for SSO authentication to work