Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. NAC Deployment Types






2. What are virtual domains used for in WCS






3. When will a WLC use a Local EAP profile?






4. 3 modes of radius fallback






5. How does the Nac Appliance Agent (NAA) work cohesively with 802.1x






6. Protocols used in wIPS






7. What must be configured the same for an HREAP not to disconnect clients when failing over (or back) to a WLC






8. Methods for authenticating to NAC






9. Authentication types used by SNMPv3






10. What must be configured for SSO authentication to work






11. What protocol to WLCs use to communicate with IPS






12. Whats added in CCXv5?






13. What are mping and eping used for from the wlc cli






14. How to set up tacacs roles in ACS for WLC authorization






15. Switch global config to enable dot1x radius server






16. What is the WLAN-->Advanced--> DIagnostic Channel used for






17. Briefly describe eap-tls






18. How is IBN implemented on a WLAN






19. Steps to posture assesment






20. How does infrastructure MFP work






21. What must be configd on ACS to enable dot1x from switch






22. Steps to installing Server Cert into ACS






23. Encryption algorithm used by Certificates






24. 802.11R






25. Why add an IPS if WLCs already detect attacks.






26. When submitting a CSR from ACS






27. What is Conditional Web Redirect






28. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






29. How is encryption established between OEAP & Anchor WLC






30. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment






31. Regulatory Compliance Acronyms






32. What does FIPS-2 require for WLC to RADIUS communications






33. What is used for HREAP Roaming re: keying






34. How is IBN-QoS






35. How to add IPS TLS info to WLC






36. How is IBN-VLAN Selection implemted in ACS






37. How is the CAPWAP tunnel between AP & WLC encrypted






38. What does Proactive Key Caching do






39. How fast is fast secure roaming






40. Is data encrypted over a capwap tunnel?






41. Directed Roam Request






42. What is included in a Pairwise Transient Key (PTK)






43. What part of an 802.11 Beacon contains the security mechanisms in use






44. What is the radius server override interface option under WLAN-->AAA?






45. What is 802.11w?






46. Steps to auth with NAA w/ SSO






47. Enhanced Neighbor list - E2E






48. 3 categories of segmented traffic






49. Client Roaming Reasons






50. Whats in CCXv4?