Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Steps to configure wlcs for guest wlan






2. How does infrastructure MFP work






3. Main elements of a NAC deployment






4. What ports does OEAP use to connect to anchor WLC






5. Is data encrypted over a capwap tunnel?






6. What is 802.11w?






7. Encryption algorithm used by Certificates






8. Steps to setting up an out-of-band virtual gateway NAS setup






9. Regulatory Compliance Acronyms






10. Switch global config to enable dot1x radius server






11. What does a wired IPS do compared to the WLC IDS






12. How fast is fast secure roaming






13. How is encryption established between OEAP & Anchor WLC






14. 6 criteria types for rogue classification






15. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment






16. What is included in a Pairwise Transient Key (PTK)






17. What must be configured the same for an HREAP not to disconnect clients when failing over (or back) to a WLC






18. Briefly describe peap






19. When submitting a CSR from ACS






20. Client Roaming Reasons






21. Briefly describe eap-mschapv2






22. What does FIPS-2 require for WLC to RADIUS communications






23. RADIUS UDP Ports






24. Protocols used in wIPS






25. How long before an HREAP goes into disconnected/standalone mode






26. Steps to config. .1x for AP to WLC connections






27. How does client MFP work






28. What is HREAP Local Auth limitation






29. Authentication types used by SNMPv3






30. IAPP roaming protocol






31. What is a mobility list used for






32. How is IBN implemented on a WLAN






33. Ports to open on fw to allow foreign to anchor controller tunnel to be built






34. What does Fast Secure Roaming use re: Keying






35. What does IBN allow you to assign






36. Peap fast reconnect






37. What part of an 802.11 Beacon contains the security mechanisms in use






38. Why is fast secure roaming used






39. What is the caveat to having redundant anchor controllers






40. What CCX version is required for CCKM






41. Whats added in CCXv5?






42. Eap process/messages






43. What is used for HREAP Roaming re: keying






44. NAC Deployment Types






45. What are mping and eping used for from the wlc cli






46. Steps to roaming in non802.1R






47. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM






48. When PKC is used






49. How is the CAPWAP tunnel between AP & WLC encrypted






50. 802.11R