Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does Fast Secure Roaming use re: Keying






2. How is the CAPWAP tunnel between AP & WLC encrypted






3. Steps to roaming in non802.1R






4. What does FIPS-2 require for WLC to RADIUS communications






5. What are virtual domains used for in WCS






6. How is IBN-VLAN Selection implemted in ACS






7. What must be configured for SSO authentication to work






8. What CCX version is required for CCKM






9. Steps to auth with NAA w/ SSO






10. How to set up tacacs roles in ACS for WLC authorization






11. Steps to installing Server Cert into ACS






12. How is IBN-QoS






13. Steps to posture assesment






14. Switch global config to enable dot1x radius server






15. Methods for authenticating to NAC






16. What are the 4 main components of NGS re: guests






17. Authentication types used by SNMPv3






18. What kind of mgmt frames does client mfp protect






19. What is included in a Pairwise Transient Key (PTK)






20. What is Conditional Web Redirect






21. 3 categories of segmented traffic






22. What must be configd on ACS to enable dot1x from switch






23. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






24. Regulatory Compliance Acronyms






25. When will a WLC use a Local EAP profile?






26. How does infrastructure MFP work






27. Protocols used in wIPS






28. Steps to setting up an out-of-band virtual gateway NAS setup






29. When PKC is used






30. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM






31. What part of an 802.11 Beacon contains the security mechanisms in use






32. How is IBN implemented on a WLAN






33. Difference between MFP-1 & MFP-2






34. AAA override






35. Steps to adding an IPS






36. What triggers can initiate a WLC to request a client to roam






37. Whats added in CCXv5?






38. How does client MFP work






39. What is HREAP Local Auth limitation






40. Briefly describe peap






41. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






42. What does Proactive Key Caching do






43. Why add an IPS if WLCs already detect attacks.






44. How does the Nac Appliance Agent (NAA) work cohesively with 802.1x






45. Steps to configure wlcs for guest wlan






46. Encryption types used by SNMPv3






47. What is the WLAN-->Advanced--> DIagnostic Channel used for






48. What is the IEEE Standards version of MFP






49. What ports does OEAP use to connect to anchor WLC






50. Whats included in 802.11-2012