Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






2. What does Proactive Key Caching do






3. How does client MFP work






4. When will a WLC use a Local EAP profile?






5. What does FIPS-2 require for WLC to RADIUS communications






6. Whats added in CCXv5?






7. What kind of local 802.1x auth. does HREAP support






8. What triggers can initiate a WLC to request a client to roam






9. Client Roaming Reasons






10. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM






11. How fast is fast secure roaming






12. Things to Enable in ACS (Global Authentication Page) for PEAP support






13. WLC Tacacs+ roles






14. Briefly describe eap-mschapv2






15. What is HREAP Local Auth limitation






16. What does a wired IPS do compared to the WLC IDS






17. Describe AP Assisted Roaming






18. 6 criteria types for rogue classification






19. IAPP roaming protocol






20. When PKC is used






21. Eap process/messages






22. How is IBN-QoS






23. What is the radius server override interface option under WLAN-->AAA?






24. What does IBN allow you to assign






25. How does infrastructure MFP work






26. What does Fast Secure Roaming use re: Keying






27. Why add an IPS if WLCs already detect attacks.






28. What must be configd on ACS to enable dot1x from switch






29. What is a mobility list used for






30. What must be configured for SSO authentication to work






31. How is encryption established between OEAP & Anchor WLC






32. How is IBN implemented on a WLAN






33. AAA override






34. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment






35. Authentication types used by SNMPv3






36. How does CCKM simplify PMK Caching






37. How to set up tacacs roles in ACS for WLC authorization






38. Briefly describe peap






39. Main elements of a NAC deployment






40. Steps to setting up an out-of-band virtual gateway NAS setup






41. Difference between MFP-1 & MFP-2






42. Steps to installing Server Cert into ACS






43. What kind of mgmt frames does client mfp protect






44. Enhanced Neighbor list






45. What is 802.11w?






46. Steps to config. .1x for AP to WLC connections






47. How to add IPS TLS info to WLC






48. What part of an 802.11 Beacon contains the security mechanisms in use






49. How is OEAP encrypted






50. What are virtual domains used for in WCS