Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






2. Encryption types used by SNMPv3






3. NAC Deployment Types






4. 802.11R






5. Describe AP Assisted Roaming






6. What part of an 802.11 Beacon contains the security mechanisms in use






7. Steps to config. .1x for AP to WLC connections






8. What is the caveat to having redundant anchor controllers






9. How is IBN implemented on a WLAN






10. Eap process/messages






11. Main elements of a NAC deployment






12. How fast is fast secure roaming






13. Whats added in CCXv5?






14. How to set up tacacs roles in ACS for WLC authorization






15. RADIUS UDP Ports






16. What must be configured the same for an HREAP not to disconnect clients when failing over (or back) to a WLC






17. What is 802.11w?






18. What is Conditional Web Redirect






19. How is the CAPWAP tunnel between AP & WLC encrypted






20. Encryption algorithm used by Certificates






21. What is included in a Pairwise Transient Key (PTK)






22. Why add an IPS if WLCs already detect attacks.






23. What is a mobility list used for






24. Briefly describe eap-tls






25. Ports to open on fw to allow foreign to anchor controller tunnel to be built






26. What must be configd on ACS to enable dot1x from switch






27. When will a WLC use a Local EAP profile?






28. What CCX version is required for CCKM






29. What is the radius server override interface option under WLAN-->AAA?






30. Difference between MFP-1 & MFP-2






31. What are virtual domains used for in WCS






32. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM






33. Enhanced Neighbor list






34. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






35. Is data encrypted over a capwap tunnel?






36. What protocol to WLCs use to communicate with IPS






37. What kind of local 802.1x auth. does HREAP support






38. What triggers can initiate a WLC to request a client to roam






39. Directed Roam Request






40. Steps to roaming in non802.1R






41. 3 categories of segmented traffic






42. When PKC is used






43. What does a wired IPS do compared to the WLC IDS






44. Steps to installing Server Cert into ACS






45. What must be configured for SSO authentication to work






46. How long before an HREAP goes into disconnected/standalone mode






47. When submitting a CSR from ACS






48. Vlan pooling






49. Steps to posture assesment






50. Regulatory Compliance Acronyms