Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. RADIUS UDP Ports






2. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM






3. What does FIPS-2 require for WLC to RADIUS communications






4. Whats included in 802.11-2012






5. What CCX version is required for CCKM






6. What is the caveat to having redundant anchor controllers






7. Steps to setting up an out-of-band virtual gateway NAS setup






8. Main elements of a NAC deployment






9. When will a WLC use a Local EAP profile?






10. Why add an IPS if WLCs already detect attacks.






11. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






12. What kind of mgmt frames does client mfp protect






13. What is used for HREAP Roaming re: keying






14. Methods for authenticating to NAC






15. Directed Roam Request






16. Steps to posture assesment






17. What are virtual domains used for in WCS






18. What does a wired IPS do compared to the WLC IDS






19. What protocol to WLCs use to communicate with IPS






20. What must be configd on ACS to enable dot1x from switch






21. Whats in CCXv4?






22. How is OEAP encrypted






23. Will foreign/anchor communication work through PAT?






24. Steps to config. .1x for AP to WLC connections






25. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






26. What must be configured for SSO authentication to work






27. Steps to roaming in 802.1R






28. What must be configured the same for an HREAP not to disconnect clients when failing over (or back) to a WLC






29. Vlan pooling






30. WLC Tacacs+ roles






31. Things to Enable in ACS (Global Authentication Page) for PEAP support






32. 802.11R






33. Describe AP Assisted Roaming






34. Enhanced Neighbor list






35. What does Fast Secure Roaming use re: Keying






36. Steps to auth with NAA w/ SSO






37. Briefly describe peap






38. What is Conditional Web Redirect






39. What is 802.11w?






40. Ports to open on fw to allow foreign to anchor controller tunnel to be built






41. Why is fast secure roaming used






42. What is included in a Pairwise Transient Key (PTK)






43. What does IBN allow you to assign






44. What is NGS & whats it used for






45. Difference between mobility list and mobility group






46. How does infrastructure MFP work






47. How is encryption established between OEAP & Anchor WLC






48. When PKC is used






49. Encryption types used by SNMPv3






50. Eap process/messages