Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Why add an IPS if WLCs already detect attacks.






2. What is 802.11w?






3. Difference between MFP-1 & MFP-2






4. What are mping and eping used for from the wlc cli






5. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM






6. Methods for authenticating to NAC






7. Steps to posture assesment






8. What does IBN allow you to assign






9. Steps to config. .1x for AP to WLC connections






10. What kind of mgmt frames does client mfp protect






11. What is NGS & whats it used for






12. Steps to installing Server Cert into ACS






13. Steps to auth with NAA w/ SSO






14. What is Conditional Web Redirect






15. What CCX version is required for CCKM






16. How is OEAP encrypted






17. Encryption types used by SNMPv3






18. What does a wired IPS do compared to the WLC IDS






19. How is IBN-QoS






20. Switch global config to enable dot1x radius server






21. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






22. RADIUS UDP Ports






23. How long before an HREAP goes into disconnected/standalone mode






24. What is used for HREAP Roaming re: keying






25. What is the IEEE Standards version of MFP






26. Steps to roaming in 802.1R






27. What does FIPS-2 require for WLC to RADIUS communications






28. What ports does OEAP use to connect to anchor WLC






29. Enhanced Neighbor list - E2E






30. What does Proactive Key Caching do






31. What is a mobility list used for






32. AAA override






33. Briefly describe peap






34. Whats included in 802.11-2012






35. How does infrastructure MFP work






36. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment






37. How is the CAPWAP tunnel between AP & WLC encrypted






38. Why is fast secure roaming used






39. What is the caveat to having redundant anchor controllers






40. How is IBN-VLAN Selection implemted in ACS






41. What are the 4 main components of NGS re: guests






42. What is the WLAN-->Advanced--> DIagnostic Channel used for






43. When will a WLC use a Local EAP profile?






44. Steps to roaming in non802.1R






45. 3 categories of segmented traffic






46. When submitting a CSR from ACS






47. Briefly describe eap-tls






48. 2 different types of wIPS deployment






49. Client Roaming Reasons






50. What is included in a Pairwise Transient Key (PTK)