Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What protocol to WLCs use to communicate with IPS






2. What must be configured for SSO authentication to work






3. Steps to posture assesment






4. Protocols used in wIPS






5. 3 categories of segmented traffic






6. What ports does OEAP use to connect to anchor WLC






7. How does CCKM simplify PMK Caching






8. How does client MFP work






9. Vlan pooling






10. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






11. 6 criteria types for rogue classification






12. WLC Tacacs+ roles






13. How fast is fast secure roaming






14. 2 different types of wIPS deployment






15. Briefly describe eap-mschapv2






16. Ports to open on fw to allow foreign to anchor controller tunnel to be built






17. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






18. Enhanced Neighbor list - E2E






19. Why is fast secure roaming used






20. Steps to setting up an out-of-band virtual gateway NAS setup






21. Encryption algorithm used by Certificates






22. What does IBN allow you to assign






23. How is OEAP encrypted






24. NAC Deployment Types






25. Client Roaming Reasons






26. Main elements of a NAC deployment






27. When will a WLC use a Local EAP profile?






28. Switchport config to enable dot1x on a port






29. What must be configd on ACS to enable dot1x from switch






30. AAA override






31. Eap process/messages






32. When submitting a CSR from ACS






33. How long before an HREAP goes into disconnected/standalone mode






34. Steps to auth with NAA w/ SSO






35. What kind of local 802.1x auth. does HREAP support






36. What is HREAP Local Auth limitation






37. Enhanced Neighbor list






38. How to set up tacacs roles in ACS for WLC authorization






39. What does Proactive Key Caching do






40. Steps to config. .1x for AP to WLC connections






41. What is the WLAN-->Advanced--> DIagnostic Channel used for






42. What is Conditional Web Redirect






43. What is the caveat to having redundant anchor controllers






44. What triggers can initiate a WLC to request a client to roam






45. Steps to roaming in 802.1R






46. What must be configured the same for an HREAP not to disconnect clients when failing over (or back) to a WLC






47. How is encryption established between OEAP & Anchor WLC






48. Why add an IPS if WLCs already detect attacks.






49. How is IBN-VLAN Selection implemted in ACS






50. What does Fast Secure Roaming use re: Keying