Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How does infrastructure MFP work

2. Things to Enable in ACS (Global Authentication Page) for PEAP support

3. What are virtual domains used for in WCS

4. What does FIPS-2 require for WLC to RADIUS communications

5. Briefly describe eap-mschapv2

6. Why is fast secure roaming used

7. Difference between mobility list and mobility group

8. What is included in a Pairwise Transient Key (PTK)

9. How does CCKM simplify PMK Caching

10. What protocol to WLCs use to communicate with IPS

11. What is Conditional Web Redirect

12. When PKC is used

13. Difference between MFP-1 & MFP-2

14. What triggers can initiate a WLC to request a client to roam

15. What is NGS & whats it used for

16. Whats in CCXv4?

17. How is IBN-VLAN Selection implemted in ACS

18. What is the caveat to having redundant anchor controllers

19. Regulatory Compliance Acronyms

20. 6 criteria types for rogue classification

21. Directed Roam Request

22. What CCX version is required for CCKM

23. 3 categories of segmented traffic

24. Steps to setting up an out-of-band virtual gateway NAS setup

25. Why add an IPS if WLCs already detect attacks.

26. Briefly describe eap-tls

27. What is 802.11w?

28. 802.11R

29. Is data encrypted over a capwap tunnel?

30. 3 modes of radius fallback

31. Encryption algorithm used by Certificates

32. What part of an 802.11 Beacon contains the security mechanisms in use

33. Whats added in CCXv5?

34. AAA override

35. Main elements of a NAC deployment

36. NAC Deployment Types

37. What kind of local 802.1x auth. does HREAP support

38. Eap process/messages

39. How is IBN-QoS

40. How does the Nac Appliance Agent (NAA) work cohesively with 802.1x

41. Steps to posture assesment

42. Steps to configure wlcs for guest wlan

43. Authentication types used by SNMPv3

44. How is the CAPWAP tunnel between AP & WLC encrypted

45. Protocols used in wIPS

46. IAPP roaming protocol

47. How is IBN implemented on a WLAN

48. What are the 4 main components of NGS re: guests

49. How to set up tacacs roles in ACS for WLC authorization

50. Encryption types used by SNMPv3