Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is used for HREAP Roaming re: keying






2. Enhanced Neighbor list






3. What does IBN allow you to assign






4. How is IBN implemented on a WLAN






5. What does Proactive Key Caching do






6. What does Fast Secure Roaming use re: Keying






7. What triggers can initiate a WLC to request a client to roam






8. What must be configured the same for an HREAP not to disconnect clients when failing over (or back) to a WLC






9. How long before an HREAP goes into disconnected/standalone mode






10. What are virtual domains used for in WCS






11. Peap fast reconnect






12. How fast is fast secure roaming






13. What must be configured for SSO authentication to work






14. Client Roaming Reasons






15. When submitting a CSR from ACS






16. What does FIPS-2 require for WLC to RADIUS communications






17. Encryption types used by SNMPv3






18. How is IBN-VLAN Selection implemted in ACS






19. What is HREAP Local Auth limitation






20. 3 categories of segmented traffic






21. Things to Enable in ACS (Global Authentication Page) for PEAP support






22. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment






23. What part of an 802.11 Beacon contains the security mechanisms in use






24. Switchport config to enable dot1x on a port






25. Briefly describe peap






26. Why is fast secure roaming used






27. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






28. What is included in a Pairwise Transient Key (PTK)






29. What protocol to WLCs use to communicate with IPS






30. 802.11R






31. Authentication types used by SNMPv3






32. What is the caveat to having redundant anchor controllers






33. Why add an IPS if WLCs already detect attacks.






34. 6 criteria types for rogue classification






35. Whats added in CCXv5?






36. Directed Roam Request






37. Vlan pooling






38. NAC Deployment Types






39. Is data encrypted over a capwap tunnel?






40. Describe AP Assisted Roaming






41. Regulatory Compliance Acronyms






42. What kind of local 802.1x auth. does HREAP support






43. Steps to setting up an out-of-band virtual gateway NAS setup






44. 2 different types of wIPS deployment






45. When PKC is used






46. Switch global config to enable dot1x radius server






47. How is IBN-QoS






48. Difference between MFP-1 & MFP-2






49. What is the WLAN-->Advanced--> DIagnostic Channel used for






50. RADIUS UDP Ports