Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Difference between MFP-1 & MFP-2






2. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






3. Whats included in 802.11-2012






4. How long before an HREAP goes into disconnected/standalone mode






5. Steps to auth with NAA w/ SSO






6. WLC Tacacs+ roles






7. AAA override






8. When will a WLC use a Local EAP profile?






9. Steps to setting up an out-of-band virtual gateway NAS setup






10. What are virtual domains used for in WCS






11. How is the CAPWAP tunnel between AP & WLC encrypted






12. Steps to adding an IPS






13. Authentication types used by SNMPv3






14. What does IBN allow you to assign






15. Difference between mobility list and mobility group






16. Protocols used in wIPS






17. What is the IEEE Standards version of MFP






18. What is a mobility list used for






19. Encryption types used by SNMPv3






20. Client Roaming Reasons






21. Whats added in CCXv5?






22. Switchport config to enable dot1x on a port






23. What is the caveat to having redundant anchor controllers






24. What is used for HREAP Roaming re: keying






25. 802.11R






26. 6 criteria types for rogue classification






27. Ports to open on fw to allow foreign to anchor controller tunnel to be built






28. 3 categories of segmented traffic






29. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment






30. What must be configured for SSO authentication to work






31. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM






32. Eap process/messages






33. Enhanced Neighbor list - E2E






34. Main elements of a NAC deployment






35. Steps to configure wlcs for guest wlan






36. How is encryption established between OEAP & Anchor WLC






37. Directed Roam Request






38. Why is fast secure roaming used






39. Regulatory Compliance Acronyms






40. Steps to roaming in 802.1R






41. When submitting a CSR from ACS






42. What part of an 802.11 Beacon contains the security mechanisms in use






43. How fast is fast secure roaming






44. Briefly describe eap-tls






45. IAPP roaming protocol






46. What must be configured the same for an HREAP not to disconnect clients when failing over (or back) to a WLC






47. How is IBN-QoS






48. How is IBN implemented on a WLAN






49. What are mping and eping used for from the wlc cli






50. Encryption algorithm used by Certificates