Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Briefly describe eap-tls






2. 802.11R






3. What is NGS & whats it used for






4. Why is fast secure roaming used






5. Peap fast reconnect






6. What does IBN allow you to assign






7. Steps to configure wlcs for guest wlan






8. Enhanced Neighbor list - E2E






9. When will a WLC use a Local EAP profile?






10. What does Fast Secure Roaming use re: Keying






11. What does a wired IPS do compared to the WLC IDS






12. How does the Nac Appliance Agent (NAA) work cohesively with 802.1x






13. What part of an 802.11 Beacon contains the security mechanisms in use






14. How is encryption established between OEAP & Anchor WLC






15. How does infrastructure MFP work






16. 2 different types of wIPS deployment






17. Enhanced Neighbor list






18. Regulatory Compliance Acronyms






19. Things to Enable in ACS (Global Authentication Page) for PEAP support






20. What ports does OEAP use to connect to anchor WLC






21. Encryption algorithm used by Certificates






22. When PKC is used






23. Difference between mobility list and mobility group






24. IAPP roaming protocol






25. What are virtual domains used for in WCS






26. How fast is fast secure roaming






27. What kind of mgmt frames does client mfp protect






28. Will foreign/anchor communication work through PAT?






29. How to set up tacacs roles in ACS for WLC authorization






30. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






31. Vlan pooling






32. RADIUS UDP Ports






33. Whats added in CCXv5?






34. What is the radius server override interface option under WLAN-->AAA?






35. Encryption types used by SNMPv3






36. Briefly describe peap






37. What is a mobility list used for






38. Methods for authenticating to NAC






39. 6 criteria types for rogue classification






40. What triggers can initiate a WLC to request a client to roam






41. Steps to roaming in non802.1R






42. What is HREAP Local Auth limitation






43. Switchport config to enable dot1x on a port






44. WLC Tacacs+ roles






45. What must be configured for SSO authentication to work






46. What must be configd on ACS to enable dot1x from switch






47. How is IBN implemented on a WLAN






48. What does FIPS-2 require for WLC to RADIUS communications






49. What is Conditional Web Redirect






50. What does Proactive Key Caching do