Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does Fast Secure Roaming use re: Keying






2. Briefly describe eap-mschapv2






3. Vlan pooling






4. How is encryption established between OEAP & Anchor WLC






5. What must be configd on ACS to enable dot1x from switch






6. Steps to configure wlcs for guest wlan






7. What does a wired IPS do compared to the WLC IDS






8. How fast is fast secure roaming






9. What CCX version is required for CCKM






10. How is IBN implemented on a WLAN






11. When will a WLC use a Local EAP profile?






12. What are mping and eping used for from the wlc cli






13. What is the IEEE Standards version of MFP






14. 6 criteria types for rogue classification






15. How to add IPS TLS info to WLC






16. What must be configured the same for an HREAP not to disconnect clients when failing over (or back) to a WLC






17. Steps to roaming in 802.1R






18. Describe AP Assisted Roaming






19. Regulatory Compliance Acronyms






20. What are the 4 main components of NGS re: guests






21. How is the CAPWAP tunnel between AP & WLC encrypted






22. What is included in a Pairwise Transient Key (PTK)






23. Encryption algorithm used by Certificates






24. What triggers can initiate a WLC to request a client to roam






25. How long before an HREAP goes into disconnected/standalone mode






26. Switchport config to enable dot1x on a port






27. Steps to setting up an out-of-band virtual gateway NAS setup






28. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






29. Enhanced Neighbor list - E2E






30. When submitting a CSR from ACS






31. Is data encrypted over a capwap tunnel?






32. What part of an 802.11 Beacon contains the security mechanisms in use






33. Eap process/messages






34. Protocols used in wIPS






35. What kind of local 802.1x auth. does HREAP support






36. AAA override






37. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






38. Difference between MFP-1 & MFP-2






39. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment






40. What does FIPS-2 require for WLC to RADIUS communications






41. Encryption types used by SNMPv3






42. Steps to config. .1x for AP to WLC connections






43. What does IBN allow you to assign






44. How is IBN-VLAN Selection implemted in ACS






45. Steps to auth with NAA w/ SSO






46. What does Proactive Key Caching do






47. What must be configured for SSO authentication to work






48. How is OEAP encrypted






49. 802.11R






50. Switch global config to enable dot1x radius server