Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Enhanced Neighbor list - E2E






2. Why is fast secure roaming used






3. When will a WLC use a Local EAP profile?






4. What is included in a Pairwise Transient Key (PTK)






5. What kind of mgmt frames does client mfp protect






6. Steps to auth with NAA w/ SSO






7. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM






8. How does infrastructure MFP work






9. Steps to roaming in non802.1R






10. Main elements of a NAC deployment






11. Steps to configure wlcs for guest wlan






12. NAC Deployment Types






13. Switchport config to enable dot1x on a port






14. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






15. Encryption algorithm used by Certificates






16. 6 criteria types for rogue classification






17. Enhanced Neighbor list






18. What is Conditional Web Redirect






19. Authentication types used by SNMPv3






20. Ports to open on fw to allow foreign to anchor controller tunnel to be built






21. How does the Nac Appliance Agent (NAA) work cohesively with 802.1x






22. How is IBN-QoS






23. How is IBN implemented on a WLAN






24. Will foreign/anchor communication work through PAT?






25. 802.11R






26. Regulatory Compliance Acronyms






27. What is used for HREAP Roaming re: keying






28. Steps to adding an IPS






29. What is a mobility list used for






30. Protocols used in wIPS






31. What ports does OEAP use to connect to anchor WLC






32. What protocol to WLCs use to communicate with IPS






33. What part of an 802.11 Beacon contains the security mechanisms in use






34. What is the IEEE Standards version of MFP






35. Steps to posture assesment






36. Is data encrypted over a capwap tunnel?






37. Eap process/messages






38. 3 categories of segmented traffic






39. What does Proactive Key Caching do






40. Encryption types used by SNMPv3






41. IAPP roaming protocol






42. When submitting a CSR from ACS






43. Switch global config to enable dot1x radius server






44. What is 802.11w?






45. Steps to setting up an out-of-band virtual gateway NAS setup






46. 2 different types of wIPS deployment






47. How does CCKM simplify PMK Caching






48. What must be configured the same for an HREAP not to disconnect clients when failing over (or back) to a WLC






49. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment






50. What is the caveat to having redundant anchor controllers