Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How does infrastructure MFP work






2. Things to Enable in ACS (Global Authentication Page) for PEAP support






3. What are virtual domains used for in WCS






4. What does FIPS-2 require for WLC to RADIUS communications






5. Briefly describe eap-mschapv2






6. Why is fast secure roaming used






7. Difference between mobility list and mobility group






8. What is included in a Pairwise Transient Key (PTK)






9. How does CCKM simplify PMK Caching






10. What protocol to WLCs use to communicate with IPS






11. What is Conditional Web Redirect






12. When PKC is used






13. Difference between MFP-1 & MFP-2






14. What triggers can initiate a WLC to request a client to roam






15. What is NGS & whats it used for






16. Whats in CCXv4?






17. How is IBN-VLAN Selection implemted in ACS






18. What is the caveat to having redundant anchor controllers






19. Regulatory Compliance Acronyms






20. 6 criteria types for rogue classification






21. Directed Roam Request






22. What CCX version is required for CCKM






23. 3 categories of segmented traffic






24. Steps to setting up an out-of-band virtual gateway NAS setup






25. Why add an IPS if WLCs already detect attacks.






26. Briefly describe eap-tls






27. What is 802.11w?






28. 802.11R






29. Is data encrypted over a capwap tunnel?






30. 3 modes of radius fallback






31. Encryption algorithm used by Certificates






32. What part of an 802.11 Beacon contains the security mechanisms in use






33. Whats added in CCXv5?






34. AAA override






35. Main elements of a NAC deployment






36. NAC Deployment Types






37. What kind of local 802.1x auth. does HREAP support






38. Eap process/messages






39. How is IBN-QoS






40. How does the Nac Appliance Agent (NAA) work cohesively with 802.1x






41. Steps to posture assesment






42. Steps to configure wlcs for guest wlan






43. Authentication types used by SNMPv3






44. How is the CAPWAP tunnel between AP & WLC encrypted






45. Protocols used in wIPS






46. IAPP roaming protocol






47. How is IBN implemented on a WLAN






48. What are the 4 main components of NGS re: guests






49. How to set up tacacs roles in ACS for WLC authorization






50. Encryption types used by SNMPv3