Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What protocol to WLCs use to communicate with IPS






2. What triggers can initiate a WLC to request a client to roam






3. Authentication types used by SNMPv3






4. 802.11R






5. What does IBN allow you to assign






6. What is the radius server override interface option under WLAN-->AAA?






7. Steps to config. .1x for AP to WLC connections






8. Vlan pooling






9. Enhanced Neighbor list - E2E






10. What is the caveat to having redundant anchor controllers






11. Is data encrypted over a capwap tunnel?






12. How is OEAP encrypted






13. Describe AP Assisted Roaming






14. Difference between MFP-1 & MFP-2






15. Encryption types used by SNMPv3






16. Things to Enable in ACS (Global Authentication Page) for PEAP support






17. What is 802.11w?






18. Ports to open on fw to allow foreign to anchor controller tunnel to be built






19. WLC Tacacs+ roles






20. Switchport config to enable dot1x on a port






21. How is IBN-VLAN Selection implemted in ACS






22. Main elements of a NAC deployment






23. What is used for HREAP Roaming re: keying






24. Directed Roam Request






25. What kind of mgmt frames does client mfp protect






26. Peap fast reconnect






27. What part of an 802.11 Beacon contains the security mechanisms in use






28. Methods for authenticating to NAC






29. How does client MFP work






30. Steps to roaming in non802.1R






31. 3 modes of radius fallback






32. What is the IEEE Standards version of MFP






33. What must be configd on ACS to enable dot1x from switch






34. What does Fast Secure Roaming use re: Keying






35. Steps to installing Server Cert into ACS






36. How long before an HREAP goes into disconnected/standalone mode






37. When PKC is used






38. What is included in a Pairwise Transient Key (PTK)






39. When submitting a CSR from ACS






40. Steps to roaming in 802.1R






41. Steps to setting up an out-of-band virtual gateway NAS setup






42. Steps to configure wlcs for guest wlan






43. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






44. Steps to posture assesment






45. 6 criteria types for rogue classification






46. How to add IPS TLS info to WLC






47. What is a mobility list used for






48. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment






49. How is IBN implemented on a WLAN






50. When will a WLC use a Local EAP profile?