Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Authentication types used by SNMPv3






2. Steps to roaming in 802.1R






3. When will a WLC use a Local EAP profile?






4. Steps to adding an IPS






5. What ports does OEAP use to connect to anchor WLC






6. What CCX version is required for CCKM






7. Whats included in 802.11-2012






8. What is HREAP Local Auth limitation






9. Main elements of a NAC deployment






10. What is used for HREAP Roaming re: keying






11. What is NGS & whats it used for






12. What is the caveat to having redundant anchor controllers






13. What does Proactive Key Caching do






14. Enhanced Neighbor list - E2E






15. How is IBN-QoS






16. Steps to roaming in non802.1R






17. Why add an IPS if WLCs already detect attacks.






18. What must be configured the same for an HREAP not to disconnect clients when failing over (or back) to a WLC






19. What protocol to WLCs use to communicate with IPS






20. Briefly describe eap-tls






21. What must be configured for SSO authentication to work






22. Briefly describe eap-mschapv2






23. Protocols used in wIPS






24. What does FIPS-2 require for WLC to RADIUS communications






25. Methods for authenticating to NAC






26. What is the radius server override interface option under WLAN-->AAA?






27. Eap process/messages






28. Steps to posture assesment






29. Steps to config. .1x for AP to WLC connections






30. How long before an HREAP goes into disconnected/standalone mode






31. What are mping and eping used for from the wlc cli






32. Client Roaming Reasons






33. Whats added in CCXv5?






34. How fast is fast secure roaming






35. How does client MFP work






36. How is the CAPWAP tunnel between AP & WLC encrypted






37. Enhanced Neighbor list






38. What does IBN allow you to assign






39. How is encryption established between OEAP & Anchor WLC






40. When submitting a CSR from ACS






41. WLC Tacacs+ roles






42. 3 modes of radius fallback






43. What triggers can initiate a WLC to request a client to roam






44. Why is fast secure roaming used






45. Encryption algorithm used by Certificates






46. Difference between mobility list and mobility group






47. Switchport config to enable dot1x on a port






48. When PKC is used






49. Briefly describe peap






50. How is IBN-VLAN Selection implemted in ACS