Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Briefly describe peap






2. What are virtual domains used for in WCS






3. WLC Tacacs+ roles






4. Steps to setting up an out-of-band virtual gateway NAS setup






5. Will foreign/anchor communication work through PAT?






6. 802.11R






7. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






8. How to add IPS TLS info to WLC






9. Briefly describe eap-tls






10. Vlan pooling






11. What is the caveat to having redundant anchor controllers






12. Methods for authenticating to NAC






13. What does Proactive Key Caching do






14. Describe AP Assisted Roaming






15. What protocol to WLCs use to communicate with IPS






16. Steps to installing Server Cert into ACS






17. Whats in CCXv4?






18. Directed Roam Request






19. What ports does OEAP use to connect to anchor WLC






20. 6 criteria types for rogue classification






21. What must be configd on ACS to enable dot1x from switch






22. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM






23. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






24. Steps to posture assesment






25. What does a wired IPS do compared to the WLC IDS






26. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment






27. What is the WLAN-->Advanced--> DIagnostic Channel used for






28. Steps to config. .1x for AP to WLC connections






29. What is a mobility list used for






30. How is the CAPWAP tunnel between AP & WLC encrypted






31. What is included in a Pairwise Transient Key (PTK)






32. Difference between mobility list and mobility group






33. Client Roaming Reasons






34. What is NGS & whats it used for






35. What part of an 802.11 Beacon contains the security mechanisms in use






36. Steps to auth with NAA w/ SSO






37. What is the IEEE Standards version of MFP






38. How does CCKM simplify PMK Caching






39. What are mping and eping used for from the wlc cli






40. Ports to open on fw to allow foreign to anchor controller tunnel to be built






41. How does the Nac Appliance Agent (NAA) work cohesively with 802.1x






42. How does client MFP work






43. 2 different types of wIPS deployment






44. Whats added in CCXv5?






45. What does FIPS-2 require for WLC to RADIUS communications






46. AAA override






47. What must be configured for SSO authentication to work






48. How long before an HREAP goes into disconnected/standalone mode






49. What triggers can initiate a WLC to request a client to roam






50. Encryption types used by SNMPv3