Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






2. What is HREAP Local Auth limitation






3. Eap process/messages






4. Will foreign/anchor communication work through PAT?






5. Whats added in CCXv5?






6. What part of an 802.11 Beacon contains the security mechanisms in use






7. Steps to adding an IPS






8. What does FIPS-2 require for WLC to RADIUS communications






9. Steps to posture assesment






10. How is IBN implemented on a WLAN






11. Steps to installing Server Cert into ACS






12. Whats in CCXv4?






13. Vlan pooling






14. What is used for HREAP Roaming re: keying






15. What does a wired IPS do compared to the WLC IDS






16. How is encryption established between OEAP & Anchor WLC






17. How is IBN-QoS






18. Regulatory Compliance Acronyms






19. Enhanced Neighbor list - E2E






20. Authentication types used by SNMPv3






21. AAA override






22. What is included in a Pairwise Transient Key (PTK)






23. Client Roaming Reasons






24. Difference between MFP-1 & MFP-2






25. How long before an HREAP goes into disconnected/standalone mode






26. Steps to auth with NAA w/ SSO






27. What is the IEEE Standards version of MFP






28. How is IBN-VLAN Selection implemted in ACS






29. How does CCKM simplify PMK Caching






30. Protocols used in wIPS






31. RADIUS UDP Ports






32. Switchport config to enable dot1x on a port






33. Steps to setting up an out-of-band virtual gateway NAS setup






34. Methods for authenticating to NAC






35. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM






36. Things to Enable in ACS (Global Authentication Page) for PEAP support






37. What triggers can initiate a WLC to request a client to roam






38. Briefly describe peap






39. What is a mobility list used for






40. What ports does OEAP use to connect to anchor WLC






41. Encryption algorithm used by Certificates






42. Encryption types used by SNMPv3






43. What must be configured for SSO authentication to work






44. How is OEAP encrypted






45. Steps to roaming in 802.1R






46. What are mping and eping used for from the wlc cli






47. Directed Roam Request






48. 802.11R






49. What is 802.11w?






50. What does IBN allow you to assign