Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






2. What is HREAP Local Auth limitation






3. Steps to auth with NAA w/ SSO






4. Enhanced Neighbor list - E2E






5. What does Fast Secure Roaming use re: Keying






6. Things to Enable in ACS (Global Authentication Page) for PEAP support






7. NAC Deployment Types






8. Authentication types used by SNMPv3






9. What must be configured the same for an HREAP not to disconnect clients when failing over (or back) to a WLC






10. AAA override






11. What are the 4 main components of NGS re: guests






12. What part of an 802.11 Beacon contains the security mechanisms in use






13. How long before an HREAP goes into disconnected/standalone mode






14. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment






15. Briefly describe eap-mschapv2






16. Steps to roaming in 802.1R






17. Why add an IPS if WLCs already detect attacks.






18. What does IBN allow you to assign






19. Switch global config to enable dot1x radius server






20. What is NGS & whats it used for






21. How does the Nac Appliance Agent (NAA) work cohesively with 802.1x






22. Vlan pooling






23. 3 modes of radius fallback






24. How is IBN-QoS






25. When will a WLC use a Local EAP profile?






26. Difference between MFP-1 & MFP-2






27. Eap process/messages






28. IAPP roaming protocol






29. What are virtual domains used for in WCS






30. What triggers can initiate a WLC to request a client to roam






31. How fast is fast secure roaming






32. What kind of mgmt frames does client mfp protect






33. How does infrastructure MFP work






34. 802.11R






35. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM






36. Encryption algorithm used by Certificates






37. What is included in a Pairwise Transient Key (PTK)






38. Whats added in CCXv5?






39. How to set up tacacs roles in ACS for WLC authorization






40. Whats included in 802.11-2012






41. Why is fast secure roaming used






42. What is 802.11w?






43. Steps to configure wlcs for guest wlan






44. Encryption types used by SNMPv3






45. 2 different types of wIPS deployment






46. Directed Roam Request






47. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






48. What ports does OEAP use to connect to anchor WLC






49. What are mping and eping used for from the wlc cli






50. 6 criteria types for rogue classification