Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 3 modes of radius fallback






2. How is OEAP encrypted






3. How is the CAPWAP tunnel between AP & WLC encrypted






4. Will foreign/anchor communication work through PAT?






5. What does FIPS-2 require for WLC to RADIUS communications






6. What part of an 802.11 Beacon contains the security mechanisms in use






7. What does a wired IPS do compared to the WLC IDS






8. Ports to open on fw to allow foreign to anchor controller tunnel to be built






9. What are virtual domains used for in WCS






10. Directed Roam Request






11. How long before an HREAP goes into disconnected/standalone mode






12. Steps to roaming in 802.1R






13. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






14. NAC Deployment Types






15. Difference between MFP-1 & MFP-2






16. What CCX version is required for CCKM






17. What must be configd on ACS to enable dot1x from switch






18. Steps to posture assesment






19. What is the radius server override interface option under WLAN-->AAA?






20. Briefly describe eap-mschapv2






21. Whats included in 802.11-2012






22. Steps to auth with NAA w/ SSO






23. What triggers can initiate a WLC to request a client to roam






24. Switchport config to enable dot1x on a port






25. Steps to setting up an out-of-band virtual gateway NAS setup






26. 3 categories of segmented traffic






27. 802.11R






28. 2 different types of wIPS deployment






29. Protocols used in wIPS






30. How does infrastructure MFP work






31. 6 criteria types for rogue classification






32. What is HREAP Local Auth limitation






33. Enhanced Neighbor list






34. When submitting a CSR from ACS






35. What does Proactive Key Caching do






36. Steps to installing Server Cert into ACS






37. RADIUS UDP Ports






38. When will a WLC use a Local EAP profile?






39. Vlan pooling






40. How is encryption established between OEAP & Anchor WLC






41. Enhanced Neighbor list - E2E






42. What is a mobility list used for






43. What is used for HREAP Roaming re: keying






44. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment






45. What does IBN allow you to assign






46. What is NGS & whats it used for






47. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






48. Encryption types used by SNMPv3






49. Steps to adding an IPS






50. What is included in a Pairwise Transient Key (PTK)