Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does a wired IPS do compared to the WLC IDS






2. How is the CAPWAP tunnel between AP & WLC encrypted






3. Steps to posture assesment






4. What does FIPS-2 require for WLC to RADIUS communications






5. What is included in a Pairwise Transient Key (PTK)






6. Encryption types used by SNMPv3






7. What does IBN allow you to assign






8. WLC Tacacs+ roles






9. What is the WLAN-->Advanced--> DIagnostic Channel used for






10. What is Conditional Web Redirect






11. Steps to roaming in 802.1R






12. What CCX version is required for CCKM






13. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






14. Enhanced Neighbor list - E2E






15. 6 criteria types for rogue classification






16. Directed Roam Request






17. What kind of local 802.1x auth. does HREAP support






18. How long before an HREAP goes into disconnected/standalone mode






19. Steps to config. .1x for AP to WLC connections






20. What triggers can initiate a WLC to request a client to roam






21. Briefly describe eap-mschapv2






22. Methods for authenticating to NAC






23. What is the IEEE Standards version of MFP






24. How is OEAP encrypted






25. Steps to auth with NAA w/ SSO






26. Ports to open on fw to allow foreign to anchor controller tunnel to be built






27. Whats included in 802.11-2012






28. How does the Nac Appliance Agent (NAA) work cohesively with 802.1x






29. How is IBN-VLAN Selection implemted in ACS






30. 3 modes of radius fallback






31. What are virtual domains used for in WCS






32. How does infrastructure MFP work






33. Encryption algorithm used by Certificates






34. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM






35. How does CCKM simplify PMK Caching






36. Things to Enable in ACS (Global Authentication Page) for PEAP support






37. Why add an IPS if WLCs already detect attacks.






38. Steps to configure wlcs for guest wlan






39. Difference between mobility list and mobility group






40. Difference between MFP-1 & MFP-2






41. What is the caveat to having redundant anchor controllers






42. NAC Deployment Types






43. How to add IPS TLS info to WLC






44. Briefly describe peap






45. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






46. Eap process/messages






47. Regulatory Compliance Acronyms






48. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment






49. How does client MFP work






50. Briefly describe eap-tls