Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Ports to open on fw to allow foreign to anchor controller tunnel to be built






2. What is NGS & whats it used for






3. Regulatory Compliance Acronyms






4. Steps to roaming in 802.1R






5. What does Fast Secure Roaming use re: Keying






6. Why is fast secure roaming used






7. Whats in CCXv4?






8. What is the WLAN-->Advanced--> DIagnostic Channel used for






9. Steps to installing Server Cert into ACS






10. Things to Enable in ACS (Global Authentication Page) for PEAP support






11. What must be configured for SSO authentication to work






12. What is a mobility list used for






13. Steps to configure wlcs for guest wlan






14. Difference between mobility list and mobility group






15. Steps to setting up an out-of-band virtual gateway NAS setup






16. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM






17. Steps to auth with NAA w/ SSO






18. When submitting a CSR from ACS






19. Switch global config to enable dot1x radius server






20. Will foreign/anchor communication work through PAT?






21. What is used for HREAP Roaming re: keying






22. What ports does OEAP use to connect to anchor WLC






23. Steps to config. .1x for AP to WLC connections






24. What are the 4 main components of NGS re: guests






25. Briefly describe eap-mschapv2






26. How long before an HREAP goes into disconnected/standalone mode






27. Switchport config to enable dot1x on a port






28. What are virtual domains used for in WCS






29. Methods for authenticating to NAC






30. Encryption algorithm used by Certificates






31. Authentication types used by SNMPv3






32. Eap process/messages






33. Steps to adding an IPS






34. 6 criteria types for rogue classification






35. How does infrastructure MFP work






36. How is IBN-QoS






37. Encryption types used by SNMPv3






38. How to set up tacacs roles in ACS for WLC authorization






39. What is Conditional Web Redirect






40. What are mping and eping used for from the wlc cli






41. How fast is fast secure roaming






42. What part of an 802.11 Beacon contains the security mechanisms in use






43. Whats included in 802.11-2012






44. What does a wired IPS do compared to the WLC IDS






45. What CCX version is required for CCKM






46. What is the IEEE Standards version of MFP






47. Briefly describe eap-tls






48. How is encryption established between OEAP & Anchor WLC






49. How is IBN-VLAN Selection implemted in ACS






50. 802.11R