Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. NAC Deployment Types






2. What is the caveat to having redundant anchor controllers






3. Steps to installing Server Cert into ACS






4. AAA override






5. Steps to adding an IPS






6. Why is fast secure roaming used






7. What are virtual domains used for in WCS






8. Methods for authenticating to NAC






9. What are the 4 main components of NGS re: guests






10. Describe AP Assisted Roaming






11. Eap process/messages






12. What part of an 802.11 Beacon contains the security mechanisms in use






13. How fast is fast secure roaming






14. Steps to config. .1x for AP to WLC connections






15. What CCX version is required for CCKM






16. What is used for HREAP Roaming re: keying






17. What does Fast Secure Roaming use re: Keying






18. What does a wired IPS do compared to the WLC IDS






19. What is HREAP Local Auth limitation






20. Things to Enable in ACS (Global Authentication Page) for PEAP support






21. What is the IEEE Standards version of MFP






22. What triggers can initiate a WLC to request a client to roam






23. What ports does OEAP use to connect to anchor WLC






24. How is IBN-QoS






25. Authentication types used by SNMPv3






26. Whats included in 802.11-2012






27. Directed Roam Request






28. Switchport config to enable dot1x on a port






29. What does FIPS-2 require for WLC to RADIUS communications






30. Encryption algorithm used by Certificates






31. What is 802.11w?






32. 6 criteria types for rogue classification






33. Whats in CCXv4?






34. How is IBN-VLAN Selection implemted in ACS






35. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






36. What is a mobility list used for






37. Vlan pooling






38. What is the radius server override interface option under WLAN-->AAA?






39. When submitting a CSR from ACS






40. How long before an HREAP goes into disconnected/standalone mode






41. Enhanced Neighbor list - E2E






42. What must be configured for SSO authentication to work






43. Steps to setting up an out-of-band virtual gateway NAS setup






44. How to set up tacacs roles in ACS for WLC authorization






45. Ports to open on fw to allow foreign to anchor controller tunnel to be built






46. Steps to roaming in 802.1R






47. Briefly describe peap






48. Is data encrypted over a capwap tunnel?






49. What is Conditional Web Redirect






50. IAPP roaming protocol