Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When PKC is used






2. Vlan pooling






3. How is IBN-QoS






4. Briefly describe eap-mschapv2






5. Whats in CCXv4?






6. How is IBN-VLAN Selection implemted in ACS






7. What CCX version is required for CCKM






8. Protocols used in wIPS






9. What must be configd on ACS to enable dot1x from switch






10. Steps to setting up an out-of-band virtual gateway NAS setup






11. Eap process/messages






12. What does FIPS-2 require for WLC to RADIUS communications






13. What is included in a Pairwise Transient Key (PTK)






14. When will a WLC use a Local EAP profile?






15. Whats included in 802.11-2012






16. Peap fast reconnect






17. What kind of mgmt frames does client mfp protect






18. Describe AP Assisted Roaming






19. Ports to open on fw to allow foreign to anchor controller tunnel to be built






20. What is a mobility list used for






21. Difference between MFP-1 & MFP-2






22. Steps to installing Server Cert into ACS






23. How is the CAPWAP tunnel between AP & WLC encrypted






24. What is 802.11w?






25. Regulatory Compliance Acronyms






26. Encryption types used by SNMPv3






27. What does Proactive Key Caching do






28. How does client MFP work






29. Is data encrypted over a capwap tunnel?






30. How long before an HREAP goes into disconnected/standalone mode






31. What is the WLAN-->Advanced--> DIagnostic Channel used for






32. Switch global config to enable dot1x radius server






33. What does IBN allow you to assign






34. Enhanced Neighbor list - E2E






35. Steps to roaming in 802.1R






36. When submitting a CSR from ACS






37. How fast is fast secure roaming






38. What must be configured for SSO authentication to work






39. Authentication types used by SNMPv3






40. AAA override






41. 2 different types of wIPS deployment






42. What are mping and eping used for from the wlc cli






43. How is OEAP encrypted






44. Steps to auth with NAA w/ SSO






45. How is IBN implemented on a WLAN






46. Switchport config to enable dot1x on a port






47. Steps to config. .1x for AP to WLC connections






48. 3 modes of radius fallback






49. What is HREAP Local Auth limitation






50. What does Fast Secure Roaming use re: Keying