Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What are virtual domains used for in WCS






2. What is included in a Pairwise Transient Key (PTK)






3. Briefly describe eap-tls






4. How does CCKM simplify PMK Caching






5. Is data encrypted over a capwap tunnel?






6. What is NGS & whats it used for






7. What does FIPS-2 require for WLC to RADIUS communications






8. What CCX version is required for CCKM






9. Switch global config to enable dot1x radius server






10. What does IBN allow you to assign






11. How is the CAPWAP tunnel between AP & WLC encrypted






12. How does infrastructure MFP work






13. How to set up tacacs roles in ACS for WLC authorization






14. Peap fast reconnect






15. How to add IPS TLS info to WLC






16. What are the 4 main components of NGS re: guests






17. Switchport config to enable dot1x on a port






18. NAC Deployment Types






19. What is the WLAN-->Advanced--> DIagnostic Channel used for






20. RADIUS UDP Ports






21. How long before an HREAP goes into disconnected/standalone mode






22. What is the radius server override interface option under WLAN-->AAA?






23. Enhanced Neighbor list - E2E






24. Whats included in 802.11-2012






25. 3 categories of segmented traffic






26. WLC Tacacs+ roles






27. Steps to setting up an out-of-band virtual gateway NAS setup






28. Whats in CCXv4?






29. When will a WLC use a Local EAP profile?






30. Enhanced Neighbor list






31. Authentication types used by SNMPv3






32. Encryption types used by SNMPv3






33. When PKC is used






34. Difference between MFP-1 & MFP-2






35. Steps to roaming in non802.1R






36. Steps to config. .1x for AP to WLC connections






37. How does client MFP work






38. 3 modes of radius fallback






39. What triggers can initiate a WLC to request a client to roam






40. What is HREAP Local Auth limitation






41. Steps to adding an IPS






42. How is IBN-QoS






43. When submitting a CSR from ACS






44. Eap process/messages






45. Ports to open on fw to allow foreign to anchor controller tunnel to be built






46. Why add an IPS if WLCs already detect attacks.






47. Describe AP Assisted Roaming






48. What part of an 802.11 Beacon contains the security mechanisms in use






49. Main elements of a NAC deployment






50. How fast is fast secure roaming