Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Whats included in 802.11-2012






2. Directed Roam Request






3. Things to Enable in ACS (Global Authentication Page) for PEAP support






4. What kind of local 802.1x auth. does HREAP support






5. 2 different types of wIPS deployment






6. How to add IPS TLS info to WLC






7. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






8. How is encryption established between OEAP & Anchor WLC






9. What part of an 802.11 Beacon contains the security mechanisms in use






10. What must be configured for SSO authentication to work






11. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM






12. Steps to configure wlcs for guest wlan






13. How long before an HREAP goes into disconnected/standalone mode






14. How does infrastructure MFP work






15. Briefly describe eap-tls






16. Whats in CCXv4?






17. How is IBN implemented on a WLAN






18. How does client MFP work






19. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment






20. Steps to setting up an out-of-band virtual gateway NAS setup






21. Main elements of a NAC deployment






22. Steps to config. .1x for AP to WLC connections






23. How is the CAPWAP tunnel between AP & WLC encrypted






24. Regulatory Compliance Acronyms






25. Why is fast secure roaming used






26. What is included in a Pairwise Transient Key (PTK)






27. RADIUS UDP Ports






28. What must be configd on ACS to enable dot1x from switch






29. Steps to roaming in 802.1R






30. How is OEAP encrypted






31. Steps to posture assesment






32. Switch global config to enable dot1x radius server






33. Protocols used in wIPS






34. Authentication types used by SNMPv3






35. NAC Deployment Types






36. What is the WLAN-->Advanced--> DIagnostic Channel used for






37. Why add an IPS if WLCs already detect attacks.






38. Ports to open on fw to allow foreign to anchor controller tunnel to be built






39. What protocol to WLCs use to communicate with IPS






40. Steps to auth with NAA w/ SSO






41. What are the 4 main components of NGS re: guests






42. What does Fast Secure Roaming use re: Keying






43. What is the IEEE Standards version of MFP






44. What does Proactive Key Caching do






45. Steps to roaming in non802.1R






46. How is IBN-VLAN Selection implemted in ACS






47. Encryption algorithm used by Certificates






48. What does IBN allow you to assign






49. AAA override






50. How does the Nac Appliance Agent (NAA) work cohesively with 802.1x