Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does FIPS-2 require for WLC to RADIUS communications






2. NAC Deployment Types






3. What is the IEEE Standards version of MFP






4. What does a wired IPS do compared to the WLC IDS






5. Encryption types used by SNMPv3






6. Steps to adding an IPS






7. What is 802.11w?






8. How long before an HREAP goes into disconnected/standalone mode






9. What are mping and eping used for from the wlc cli






10. What is a mobility list used for






11. Whats added in CCXv5?






12. Enhanced Neighbor list - E2E






13. Steps to installing Server Cert into ACS






14. Steps to roaming in 802.1R






15. Main elements of a NAC deployment






16. 2 different types of wIPS deployment






17. What does Fast Secure Roaming use re: Keying






18. How does the Nac Appliance Agent (NAA) work cohesively with 802.1x






19. Difference between MFP-1 & MFP-2






20. Steps to roaming in non802.1R






21. Encryption algorithm used by Certificates






22. How is IBN-VLAN Selection implemted in ACS






23. AAA override






24. RADIUS UDP Ports






25. WLC Tacacs+ roles






26. Steps to posture assesment






27. What must be configured for SSO authentication to work






28. What ports does OEAP use to connect to anchor WLC






29. What kind of mgmt frames does client mfp protect






30. Regulatory Compliance Acronyms






31. When will a WLC use a Local EAP profile?






32. What is included in a Pairwise Transient Key (PTK)






33. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM






34. Authentication types used by SNMPv3






35. Briefly describe peap






36. What is NGS & whats it used for






37. How is IBN implemented on a WLAN






38. What is the caveat to having redundant anchor controllers






39. Briefly describe eap-mschapv2






40. 6 criteria types for rogue classification






41. Protocols used in wIPS






42. Steps to setting up an out-of-band virtual gateway NAS setup






43. What is HREAP Local Auth limitation






44. How is encryption established between OEAP & Anchor WLC






45. 3 modes of radius fallback






46. How does infrastructure MFP work






47. Describe AP Assisted Roaming






48. What is the WLAN-->Advanced--> DIagnostic Channel used for






49. Enhanced Neighbor list






50. When submitting a CSR from ACS