Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How fast is fast secure roaming






2. Why is fast secure roaming used






3. What does Proactive Key Caching do






4. Briefly describe eap-tls






5. What is a mobility list used for






6. What is NGS & whats it used for






7. 3 categories of segmented traffic






8. What protocol to WLCs use to communicate with IPS






9. When PKC is used






10. What is 802.11w?






11. Enhanced Neighbor list






12. Steps to roaming in 802.1R






13. Briefly describe eap-mschapv2






14. Whats added in CCXv5?






15. What is the IEEE Standards version of MFP






16. WLC Tacacs+ roles






17. What is the caveat to having redundant anchor controllers






18. What is used for HREAP Roaming re: keying






19. Methods for authenticating to NAC






20. Switch global config to enable dot1x radius server






21. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






22. What is the WLAN-->Advanced--> DIagnostic Channel used for






23. What does FIPS-2 require for WLC to RADIUS communications






24. When will a WLC use a Local EAP profile?






25. How is IBN-QoS






26. What must be configured the same for an HREAP not to disconnect clients when failing over (or back) to a WLC






27. How is the CAPWAP tunnel between AP & WLC encrypted






28. What does IBN allow you to assign






29. Peap fast reconnect






30. What does Fast Secure Roaming use re: Keying






31. Things to Enable in ACS (Global Authentication Page) for PEAP support






32. What must be configd on ACS to enable dot1x from switch






33. 6 criteria types for rogue classification






34. Why add an IPS if WLCs already detect attacks.






35. How long before an HREAP goes into disconnected/standalone mode






36. IAPP roaming protocol






37. What ports does OEAP use to connect to anchor WLC






38. What is included in a Pairwise Transient Key (PTK)






39. How does client MFP work






40. Is data encrypted over a capwap tunnel?






41. When submitting a CSR from ACS






42. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment






43. Ports to open on fw to allow foreign to anchor controller tunnel to be built






44. Steps to configure wlcs for guest wlan






45. How does infrastructure MFP work






46. Encryption algorithm used by Certificates






47. Main elements of a NAC deployment






48. NAC Deployment Types






49. Steps to auth with NAA w/ SSO






50. How does the Nac Appliance Agent (NAA) work cohesively with 802.1x