Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. AAA override






2. What does IBN allow you to assign






3. Briefly describe peap






4. What does FIPS-2 require for WLC to RADIUS communications






5. What is included in a Pairwise Transient Key (PTK)






6. What does Fast Secure Roaming use re: Keying






7. What is HREAP Local Auth limitation






8. RADIUS UDP Ports






9. Ports to open on fw to allow foreign to anchor controller tunnel to be built






10. Enhanced Neighbor list






11. Client Roaming Reasons






12. What is Conditional Web Redirect






13. When PKC is used






14. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






15. Methods for authenticating to NAC






16. What CCX version is required for CCKM






17. What is used for HREAP Roaming re: keying






18. 6 criteria types for rogue classification






19. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






20. What are the 4 main components of NGS re: guests






21. Steps to auth with NAA w/ SSO






22. What protocol to WLCs use to communicate with IPS






23. How is IBN-QoS






24. Directed Roam Request






25. Switchport config to enable dot1x on a port






26. Difference between mobility list and mobility group






27. What kind of local 802.1x auth. does HREAP support






28. How is OEAP encrypted






29. Encryption algorithm used by Certificates






30. Peap fast reconnect






31. Vlan pooling






32. Protocols used in wIPS






33. Steps to setting up an out-of-band virtual gateway NAS setup






34. What are mping and eping used for from the wlc cli






35. Things to Enable in ACS (Global Authentication Page) for PEAP support






36. What is the IEEE Standards version of MFP






37. NAC Deployment Types






38. How long before an HREAP goes into disconnected/standalone mode






39. Regulatory Compliance Acronyms






40. What is 802.11w?






41. When submitting a CSR from ACS






42. How is the CAPWAP tunnel between AP & WLC encrypted






43. What are virtual domains used for in WCS






44. What must be configd on ACS to enable dot1x from switch






45. What is the caveat to having redundant anchor controllers






46. Steps to config. .1x for AP to WLC connections






47. How to set up tacacs roles in ACS for WLC authorization






48. What is NGS & whats it used for






49. What does Proactive Key Caching do






50. Briefly describe eap-tls