Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Enhanced Neighbor list






2. What is NGS & whats it used for






3. What is used for HREAP Roaming re: keying






4. What does FIPS-2 require for WLC to RADIUS communications






5. Eap process/messages






6. How to set up tacacs roles in ACS for WLC authorization






7. What does Fast Secure Roaming use re: Keying






8. How is OEAP encrypted






9. Whats in CCXv4?






10. What is a mobility list used for






11. 6 criteria types for rogue classification






12. Protocols used in wIPS






13. Briefly describe eap-tls






14. What CCX version is required for CCKM






15. What is the caveat to having redundant anchor controllers






16. How fast is fast secure roaming






17. What ports does OEAP use to connect to anchor WLC






18. What is HREAP Local Auth limitation






19. What must be configured for SSO authentication to work






20. Steps to installing Server Cert into ACS






21. WLC Tacacs+ roles






22. 2 different types of wIPS deployment






23. Authentication types used by SNMPv3






24. Will foreign/anchor communication work through PAT?






25. Whats included in 802.11-2012






26. Regulatory Compliance Acronyms






27. Main elements of a NAC deployment






28. What protocol to WLCs use to communicate with IPS






29. What does Proactive Key Caching do






30. Client Roaming Reasons






31. Steps to adding an IPS






32. Steps to configure wlcs for guest wlan






33. Briefly describe eap-mschapv2






34. 3 modes of radius fallback






35. Methods for authenticating to NAC






36. What is Conditional Web Redirect






37. What must be configured the same for an HREAP not to disconnect clients when failing over (or back) to a WLC






38. Briefly describe peap






39. How is the CAPWAP tunnel between AP & WLC encrypted






40. What are virtual domains used for in WCS






41. How does the Nac Appliance Agent (NAA) work cohesively with 802.1x






42. Steps to roaming in 802.1R






43. Steps to auth with NAA w/ SSO






44. What must be configd on ACS to enable dot1x from switch






45. Steps to posture assesment






46. How is encryption established between OEAP & Anchor WLC






47. What kind of mgmt frames does client mfp protect






48. Switchport config to enable dot1x on a port






49. Why add an IPS if WLCs already detect attacks.






50. What does IBN allow you to assign