Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does IBN allow you to assign






2. 3 categories of segmented traffic






3. 3 modes of radius fallback






4. How is IBN implemented on a WLAN






5. What is included in a Pairwise Transient Key (PTK)






6. What is 802.11w?






7. What must be configured the same for an HREAP not to disconnect clients when failing over (or back) to a WLC






8. Authentication types used by SNMPv3






9. How is IBN-VLAN Selection implemted in ACS






10. What part of an 802.11 Beacon contains the security mechanisms in use






11. What ports does OEAP use to connect to anchor WLC






12. Briefly describe peap






13. Peap fast reconnect






14. What is Conditional Web Redirect






15. Encryption algorithm used by Certificates






16. What is NGS & whats it used for






17. How is the CAPWAP tunnel between AP & WLC encrypted






18. How does CCKM simplify PMK Caching






19. How does the Nac Appliance Agent (NAA) work cohesively with 802.1x






20. Steps to roaming in 802.1R






21. IAPP roaming protocol






22. How to set up tacacs roles in ACS for WLC authorization






23. When will a WLC use a Local EAP profile?






24. How is IBN-QoS






25. Enhanced Neighbor list






26. WLC Tacacs+ roles






27. What does Proactive Key Caching do






28. Enhanced Neighbor list - E2E






29. Steps to roaming in non802.1R






30. 2 different types of wIPS deployment






31. What are mping and eping used for from the wlc cli






32. What kind of local 802.1x auth. does HREAP support






33. How does infrastructure MFP work






34. Things to Enable in ACS (Global Authentication Page) for PEAP support






35. Client Roaming Reasons






36. Is data encrypted over a capwap tunnel?






37. Methods for authenticating to NAC






38. What is the caveat to having redundant anchor controllers






39. What is the radius server override interface option under WLAN-->AAA?






40. When submitting a CSR from ACS






41. Why add an IPS if WLCs already detect attacks.






42. How to add IPS TLS info to WLC






43. Protocols used in wIPS






44. What does FIPS-2 require for WLC to RADIUS communications






45. How long before an HREAP goes into disconnected/standalone mode






46. NAC Deployment Types






47. What must be configured for SSO authentication to work






48. RADIUS UDP Ports






49. 6 criteria types for rogue classification






50. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment