Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Steps to setting up an out-of-band virtual gateway NAS setup






2. What ports does OEAP use to connect to anchor WLC






3. Difference between MFP-1 & MFP-2






4. Ports to open on fw to allow foreign to anchor controller tunnel to be built






5. Steps to posture assesment






6. Enhanced Neighbor list






7. What kind of mgmt frames does client mfp protect






8. What must be configured for SSO authentication to work






9. Difference between mobility list and mobility group






10. How does the Nac Appliance Agent (NAA) work cohesively with 802.1x






11. Vlan pooling






12. Authentication types used by SNMPv3






13. Briefly describe eap-tls






14. What CCX version is required for CCKM






15. WLC Tacacs+ roles






16. How does CCKM simplify PMK Caching






17. Briefly describe eap-mschapv2






18. What triggers can initiate a WLC to request a client to roam






19. Regulatory Compliance Acronyms






20. How is encryption established between OEAP & Anchor WLC






21. 3 categories of segmented traffic






22. What is HREAP Local Auth limitation






23. Encryption algorithm used by Certificates






24. What is NGS & whats it used for






25. 3 modes of radius fallback






26. How is the CAPWAP tunnel between AP & WLC encrypted






27. How to add IPS TLS info to WLC






28. How long before an HREAP goes into disconnected/standalone mode






29. Whats included in 802.11-2012






30. Steps to roaming in non802.1R






31. What does FIPS-2 require for WLC to RADIUS communications






32. How fast is fast secure roaming






33. How does client MFP work






34. IAPP roaming protocol






35. Main elements of a NAC deployment






36. Directed Roam Request






37. Switch global config to enable dot1x radius server






38. Methods for authenticating to NAC






39. What is the IEEE Standards version of MFP






40. How is IBN-VLAN Selection implemted in ACS






41. What part of an 802.11 Beacon contains the security mechanisms in use






42. What are virtual domains used for in WCS






43. Steps to auth with NAA w/ SSO






44. How is IBN implemented on a WLAN






45. What is a mobility list used for






46. Is data encrypted over a capwap tunnel?






47. When will a WLC use a Local EAP profile?






48. Steps to roaming in 802.1R






49. How does infrastructure MFP work






50. When PKC is used