Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What triggers can initiate a WLC to request a client to roam






2. What is the radius server override interface option under WLAN-->AAA?






3. Eap process/messages






4. Steps to adding an IPS






5. Enhanced Neighbor list - E2E






6. 802.11R






7. What CCX version is required for CCKM






8. When will a WLC use a Local EAP profile?






9. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






10. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






11. Ports to open on fw to allow foreign to anchor controller tunnel to be built






12. Peap fast reconnect






13. How does client MFP work






14. Regulatory Compliance Acronyms






15. Vlan pooling






16. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM






17. What does Fast Secure Roaming use re: Keying






18. How is IBN-QoS






19. What is HREAP Local Auth limitation






20. Steps to posture assesment






21. How to add IPS TLS info to WLC






22. Briefly describe eap-mschapv2






23. What ports does OEAP use to connect to anchor WLC






24. 3 categories of segmented traffic






25. How to set up tacacs roles in ACS for WLC authorization






26. Briefly describe eap-tls






27. Whats included in 802.11-2012






28. What is a mobility list used for






29. Encryption algorithm used by Certificates






30. Methods for authenticating to NAC






31. What is used for HREAP Roaming re: keying






32. WLC Tacacs+ roles






33. How is IBN-VLAN Selection implemted in ACS






34. Whats added in CCXv5?






35. Briefly describe peap






36. What kind of local 802.1x auth. does HREAP support






37. What does Proactive Key Caching do






38. What is the IEEE Standards version of MFP






39. Why add an IPS if WLCs already detect attacks.






40. How long before an HREAP goes into disconnected/standalone mode






41. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment






42. How is OEAP encrypted






43. 6 criteria types for rogue classification






44. RADIUS UDP Ports






45. IAPP roaming protocol






46. Enhanced Neighbor list






47. Steps to installing Server Cert into ACS






48. How is IBN implemented on a WLAN






49. How is encryption established between OEAP & Anchor WLC






50. What is 802.11w?