Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. RADIUS UDP Ports






2. Whats in CCXv4?






3. How to set up tacacs roles in ACS for WLC authorization






4. Steps to installing Server Cert into ACS






5. What protocol to WLCs use to communicate with IPS






6. Peap fast reconnect






7. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM






8. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






9. Whats added in CCXv5?






10. How long before an HREAP goes into disconnected/standalone mode






11. What must be configured the same for an HREAP not to disconnect clients when failing over (or back) to a WLC






12. How is IBN-QoS






13. Is data encrypted over a capwap tunnel?






14. 2 different types of wIPS deployment






15. What CCX version is required for CCKM






16. 802.11R






17. Directed Roam Request






18. What does Fast Secure Roaming use re: Keying






19. How fast is fast secure roaming






20. Regulatory Compliance Acronyms






21. What does FIPS-2 require for WLC to RADIUS communications






22. What is the IEEE Standards version of MFP






23. What does a wired IPS do compared to the WLC IDS






24. Enhanced Neighbor list - E2E






25. How does client MFP work






26. Client Roaming Reasons






27. What is HREAP Local Auth limitation






28. Difference between MFP-1 & MFP-2






29. What kind of local 802.1x auth. does HREAP support






30. 3 modes of radius fallback






31. Why add an IPS if WLCs already detect attacks.






32. What does IBN allow you to assign






33. Steps to setting up an out-of-band virtual gateway NAS setup






34. What part of an 802.11 Beacon contains the security mechanisms in use






35. Switchport config to enable dot1x on a port






36. Steps to auth with NAA w/ SSO






37. Main elements of a NAC deployment






38. What are virtual domains used for in WCS






39. 6 criteria types for rogue classification






40. What are the 4 main components of NGS re: guests






41. Why is fast secure roaming used






42. Steps to adding an IPS






43. How is encryption established between OEAP & Anchor WLC






44. When PKC is used






45. Ports to open on fw to allow foreign to anchor controller tunnel to be built






46. How is IBN-VLAN Selection implemted in ACS






47. Protocols used in wIPS






48. Enhanced Neighbor list






49. What are mping and eping used for from the wlc cli






50. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment