Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






2. What does Fast Secure Roaming use re: Keying






3. 6 criteria types for rogue classification






4. Client Roaming Reasons






5. How to set up tacacs roles in ACS for WLC authorization






6. What is NGS & whats it used for






7. How is OEAP encrypted






8. Enhanced Neighbor list - E2E






9. 802.11R






10. Authentication types used by SNMPv3






11. How is the CAPWAP tunnel between AP & WLC encrypted






12. Briefly describe peap






13. How fast is fast secure roaming






14. How long before an HREAP goes into disconnected/standalone mode






15. Describe AP Assisted Roaming






16. What ports does OEAP use to connect to anchor WLC






17. Why add an IPS if WLCs already detect attacks.






18. Peap fast reconnect






19. Switchport config to enable dot1x on a port






20. Briefly describe eap-mschapv2






21. Eap process/messages






22. 2 different types of wIPS deployment






23. Steps to adding an IPS






24. How to add IPS TLS info to WLC






25. Protocols used in wIPS






26. What triggers can initiate a WLC to request a client to roam






27. How is IBN implemented on a WLAN






28. Steps to roaming in 802.1R






29. What is Conditional Web Redirect






30. What protocol to WLCs use to communicate with IPS






31. What is used for HREAP Roaming re: keying






32. What CCX version is required for CCKM






33. 3 modes of radius fallback






34. Encryption types used by SNMPv3






35. Ports to open on fw to allow foreign to anchor controller tunnel to be built






36. Steps to config. .1x for AP to WLC connections






37. Encryption algorithm used by Certificates






38. When submitting a CSR from ACS






39. When PKC is used






40. Whats included in 802.11-2012






41. What must be configd on ACS to enable dot1x from switch






42. What is 802.11w?






43. Directed Roam Request






44. How does client MFP work






45. NAC Deployment Types






46. What part of an 802.11 Beacon contains the security mechanisms in use






47. How does CCKM simplify PMK Caching






48. What is the IEEE Standards version of MFP






49. IAPP roaming protocol






50. Difference between mobility list and mobility group