Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What part of an 802.11 Beacon contains the security mechanisms in use






2. Eap process/messages






3. Whats added in CCXv5?






4. Authentication types used by SNMPv3






5. What does Fast Secure Roaming use re: Keying






6. 3 categories of segmented traffic






7. How does client MFP work






8. Steps to auth with NAA w/ SSO






9. What CCX version is required for CCKM






10. 3 modes of radius fallback






11. Briefly describe peap






12. How is encryption established between OEAP & Anchor WLC






13. Is data encrypted over a capwap tunnel?






14. Enhanced Neighbor list - E2E






15. What protocol to WLCs use to communicate with IPS






16. How is OEAP encrypted






17. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






18. Steps to setting up an out-of-band virtual gateway NAS setup






19. What does Proactive Key Caching do






20. Encryption algorithm used by Certificates






21. How does the Nac Appliance Agent (NAA) work cohesively with 802.1x






22. Vlan pooling






23. Steps to adding an IPS






24. What is the radius server override interface option under WLAN-->AAA?






25. Enhanced Neighbor list






26. Switchport config to enable dot1x on a port






27. What kind of local 802.1x auth. does HREAP support






28. What is NGS & whats it used for






29. Steps to configure wlcs for guest wlan






30. What is the IEEE Standards version of MFP






31. 802.11R






32. Methods for authenticating to NAC






33. Why is fast secure roaming used






34. When submitting a CSR from ACS






35. What is HREAP Local Auth limitation






36. How long before an HREAP goes into disconnected/standalone mode






37. How does CCKM simplify PMK Caching






38. Why add an IPS if WLCs already detect attacks.






39. Protocols used in wIPS






40. Regulatory Compliance Acronyms






41. What must be configured for SSO authentication to work






42. What are mping and eping used for from the wlc cli






43. RADIUS UDP Ports






44. When will a WLC use a Local EAP profile?






45. What is used for HREAP Roaming re: keying






46. What does IBN allow you to assign






47. What is Conditional Web Redirect






48. 6 criteria types for rogue classification






49. 2 different types of wIPS deployment






50. Difference between MFP-1 & MFP-2