Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Steps to auth with NAA w/ SSO






2. 3 categories of segmented traffic






3. How is encryption established between OEAP & Anchor WLC






4. What must be configured the same for an HREAP not to disconnect clients when failing over (or back) to a WLC






5. What triggers can initiate a WLC to request a client to roam






6. What kind of mgmt frames does client mfp protect






7. Whats included in 802.11-2012






8. What CCX version is required for CCKM






9. What does a wired IPS do compared to the WLC IDS






10. How does infrastructure MFP work






11. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment






12. What is Conditional Web Redirect






13. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM






14. What does FIPS-2 require for WLC to RADIUS communications






15. Steps to configure wlcs for guest wlan






16. Ports to open on fw to allow foreign to anchor controller tunnel to be built






17. What are virtual domains used for in WCS






18. 802.11R






19. 6 criteria types for rogue classification






20. Briefly describe eap-mschapv2






21. Is data encrypted over a capwap tunnel?






22. Switchport config to enable dot1x on a port






23. How is IBN-VLAN Selection implemted in ACS






24. Directed Roam Request






25. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






26. What is the caveat to having redundant anchor controllers






27. What is HREAP Local Auth limitation






28. Authentication types used by SNMPv3






29. Why is fast secure roaming used






30. How to set up tacacs roles in ACS for WLC authorization






31. What kind of local 802.1x auth. does HREAP support






32. How is the CAPWAP tunnel between AP & WLC encrypted






33. Client Roaming Reasons






34. How fast is fast secure roaming






35. Vlan pooling






36. What is the IEEE Standards version of MFP






37. What protocol to WLCs use to communicate with IPS






38. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






39. What ports does OEAP use to connect to anchor WLC






40. Enhanced Neighbor list - E2E






41. Eap process/messages






42. What part of an 802.11 Beacon contains the security mechanisms in use






43. How is IBN-QoS






44. 3 modes of radius fallback






45. When PKC is used






46. What does Proactive Key Caching do






47. How to add IPS TLS info to WLC






48. Methods for authenticating to NAC






49. What is NGS & whats it used for






50. What does Fast Secure Roaming use re: Keying