Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Directed Roam Request






2. Steps to adding an IPS






3. What is HREAP Local Auth limitation






4. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






5. Eap process/messages






6. Steps to posture assesment






7. Is data encrypted over a capwap tunnel?






8. What kind of local 802.1x auth. does HREAP support






9. What is Conditional Web Redirect






10. How is IBN-QoS






11. What does a wired IPS do compared to the WLC IDS






12. What must be configured for SSO authentication to work






13. Difference between mobility list and mobility group






14. Briefly describe peap






15. Steps to configure wlcs for guest wlan






16. NAC Deployment Types






17. What does FIPS-2 require for WLC to RADIUS communications






18. Ports to open on fw to allow foreign to anchor controller tunnel to be built






19. When PKC is used






20. 3 categories of segmented traffic






21. What is the radius server override interface option under WLAN-->AAA?






22. Encryption types used by SNMPv3






23. Enhanced Neighbor list






24. Authentication types used by SNMPv3






25. Why add an IPS if WLCs already detect attacks.






26. How fast is fast secure roaming






27. What triggers can initiate a WLC to request a client to roam






28. How does infrastructure MFP work






29. How is the CAPWAP tunnel between AP & WLC encrypted






30. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment






31. 6 criteria types for rogue classification






32. What part of an 802.11 Beacon contains the security mechanisms in use






33. Steps to roaming in 802.1R






34. How is IBN implemented on a WLAN






35. Encryption algorithm used by Certificates






36. What is used for HREAP Roaming re: keying






37. How long before an HREAP goes into disconnected/standalone mode






38. What are virtual domains used for in WCS






39. 2 different types of wIPS deployment






40. What are the 4 main components of NGS re: guests






41. 3 modes of radius fallback






42. Regulatory Compliance Acronyms






43. How is IBN-VLAN Selection implemted in ACS






44. Switch global config to enable dot1x radius server






45. Whats included in 802.11-2012






46. What is the WLAN-->Advanced--> DIagnostic Channel used for






47. Steps to roaming in non802.1R






48. What protocol to WLCs use to communicate with IPS






49. What kind of mgmt frames does client mfp protect






50. WLC Tacacs+ roles