Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Whats in CCXv4?






2. Briefly describe eap-mschapv2






3. Protocols used in wIPS






4. What is NGS & whats it used for






5. When submitting a CSR from ACS






6. Enhanced Neighbor list - E2E






7. Regulatory Compliance Acronyms






8. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






9. What ports does OEAP use to connect to anchor WLC






10. AAA override






11. Difference between MFP-1 & MFP-2






12. How long before an HREAP goes into disconnected/standalone mode






13. How to set up tacacs roles in ACS for WLC authorization






14. Ports to open on fw to allow foreign to anchor controller tunnel to be built






15. How is IBN-QoS






16. Whats included in 802.11-2012






17. How to add IPS TLS info to WLC






18. Difference between mobility list and mobility group






19. What CCX version is required for CCKM






20. How does client MFP work






21. RADIUS UDP Ports






22. Directed Roam Request






23. Encryption algorithm used by Certificates






24. How is IBN-VLAN Selection implemted in ACS






25. Encryption types used by SNMPv3






26. How does CCKM simplify PMK Caching






27. Briefly describe eap-tls






28. Briefly describe peap






29. Peap fast reconnect






30. What must be configured for SSO authentication to work






31. Steps to posture assesment






32. What is HREAP Local Auth limitation






33. Is data encrypted over a capwap tunnel?






34. Steps to adding an IPS






35. What does a wired IPS do compared to the WLC IDS






36. What does IBN allow you to assign






37. What is included in a Pairwise Transient Key (PTK)






38. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM






39. 3 categories of segmented traffic






40. What are virtual domains used for in WCS






41. What does Proactive Key Caching do






42. When will a WLC use a Local EAP profile?






43. Steps to auth with NAA w/ SSO






44. Why add an IPS if WLCs already detect attacks.






45. Switchport config to enable dot1x on a port






46. Switch global config to enable dot1x radius server






47. What does FIPS-2 require for WLC to RADIUS communications






48. Main elements of a NAC deployment






49. When PKC is used






50. How is the CAPWAP tunnel between AP & WLC encrypted