Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does FIPS-2 require for WLC to RADIUS communications






2. When PKC is used






3. When submitting a CSR from ACS






4. Difference between MFP-1 & MFP-2






5. What kind of mgmt frames does client mfp protect






6. Regulatory Compliance Acronyms






7. What is Conditional Web Redirect






8. Things to Enable in ACS (Global Authentication Page) for PEAP support






9. Steps to posture assesment






10. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM






11. What are virtual domains used for in WCS






12. Is data encrypted over a capwap tunnel?






13. What are mping and eping used for from the wlc cli






14. Whats included in 802.11-2012






15. How to set up tacacs roles in ACS for WLC authorization






16. Enhanced Neighbor list






17. Briefly describe eap-tls






18. Steps to roaming in non802.1R






19. Encryption types used by SNMPv3






20. Whats in CCXv4?






21. Why add an IPS if WLCs already detect attacks.






22. What is used for HREAP Roaming re: keying






23. What does a wired IPS do compared to the WLC IDS






24. Peap fast reconnect






25. Steps to setting up an out-of-band virtual gateway NAS setup






26. What part of an 802.11 Beacon contains the security mechanisms in use






27. Steps to auth with NAA w/ SSO






28. What is HREAP Local Auth limitation






29. Steps to adding an IPS






30. Why is fast secure roaming used






31. What is included in a Pairwise Transient Key (PTK)






32. What must be configd on ACS to enable dot1x from switch






33. WLC Tacacs+ roles






34. Authentication types used by SNMPv3






35. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






36. How is encryption established between OEAP & Anchor WLC






37. What is NGS & whats it used for






38. How does infrastructure MFP work






39. Eap process/messages






40. Encryption algorithm used by Certificates






41. What are the 4 main components of NGS re: guests






42. Steps to config. .1x for AP to WLC connections






43. What must be configured for SSO authentication to work






44. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






45. How is IBN implemented on a WLAN






46. 802.11R






47. Steps to configure wlcs for guest wlan






48. What is the IEEE Standards version of MFP






49. What kind of local 802.1x auth. does HREAP support






50. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment