Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How to add IPS TLS info to WLC






2. Steps to setting up an out-of-band virtual gateway NAS setup






3. What must be configured for SSO authentication to work






4. 2 different types of wIPS deployment






5. How is IBN-VLAN Selection implemted in ACS






6. What triggers can initiate a WLC to request a client to roam






7. Steps to config. .1x for AP to WLC connections






8. Protocols used in wIPS






9. Regulatory Compliance Acronyms






10. What is HREAP Local Auth limitation






11. Describe AP Assisted Roaming






12. Why is fast secure roaming used






13. Main elements of a NAC deployment






14. How does the Nac Appliance Agent (NAA) work cohesively with 802.1x






15. Briefly describe eap-tls






16. What does IBN allow you to assign






17. Vlan pooling






18. What is the radius server override interface option under WLAN-->AAA?






19. What is a mobility list used for






20. What must be configured the same for an HREAP not to disconnect clients when failing over (or back) to a WLC






21. Encryption algorithm used by Certificates






22. Briefly describe eap-mschapv2






23. Peap fast reconnect






24. How to set up tacacs roles in ACS for WLC authorization






25. What does Proactive Key Caching do






26. What is used for HREAP Roaming re: keying






27. What CCX version is required for CCKM






28. AAA override






29. How is the CAPWAP tunnel between AP & WLC encrypted






30. Steps to posture assesment






31. Why add an IPS if WLCs already detect attacks.






32. What are mping and eping used for from the wlc cli






33. How is IBN implemented on a WLAN






34. What is NGS & whats it used for






35. IAPP roaming protocol






36. What does a wired IPS do compared to the WLC IDS






37. 6 criteria types for rogue classification






38. What does Fast Secure Roaming use re: Keying






39. 3 modes of radius fallback






40. Steps to auth with NAA w/ SSO






41. What protocol to WLCs use to communicate with IPS






42. How does client MFP work






43. Enhanced Neighbor list






44. Difference between mobility list and mobility group






45. Switch global config to enable dot1x radius server






46. Ports to open on fw to allow foreign to anchor controller tunnel to be built






47. When will a WLC use a Local EAP profile?






48. How fast is fast secure roaming






49. Encryption types used by SNMPv3






50. How is OEAP encrypted