Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How does client MFP work






2. Briefly describe peap






3. Steps to installing Server Cert into ACS






4. Directed Roam Request






5. How is encryption established between OEAP & Anchor WLC






6. What is included in a Pairwise Transient Key (PTK)






7. What does FIPS-2 require for WLC to RADIUS communications






8. Ports to open on fw to allow foreign to anchor controller tunnel to be built






9. Methods for authenticating to NAC






10. Whats added in CCXv5?






11. Switch global config to enable dot1x radius server






12. Steps to config. .1x for AP to WLC connections






13. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






14. Steps to auth with NAA w/ SSO






15. What must be configured the same for an HREAP not to disconnect clients when failing over (or back) to a WLC






16. What part of an 802.11 Beacon contains the security mechanisms in use






17. When PKC is used






18. Why add an IPS if WLCs already detect attacks.






19. What are the 4 main components of NGS re: guests






20. How is OEAP encrypted






21. Switchport config to enable dot1x on a port






22. Whats in CCXv4?






23. What is Conditional Web Redirect






24. When submitting a CSR from ACS






25. What is NGS & whats it used for






26. Will foreign/anchor communication work through PAT?






27. RADIUS UDP Ports






28. Encryption algorithm used by Certificates






29. Steps to roaming in 802.1R






30. What does a wired IPS do compared to the WLC IDS






31. NAC Deployment Types






32. Is data encrypted over a capwap tunnel?






33. Whats included in 802.11-2012






34. What are virtual domains used for in WCS






35. 2 different types of wIPS deployment






36. What protocol to WLCs use to communicate with IPS






37. WLC Tacacs+ roles






38. Things to Enable in ACS (Global Authentication Page) for PEAP support






39. What must be configured for SSO authentication to work






40. What is the caveat to having redundant anchor controllers






41. What is the radius server override interface option under WLAN-->AAA?






42. How is IBN-VLAN Selection implemted in ACS






43. Eap process/messages






44. Steps to posture assesment






45. Briefly describe eap-tls






46. What is 802.11w?






47. Steps to configure wlcs for guest wlan






48. What is HREAP Local Auth limitation






49. Encryption types used by SNMPv3






50. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM