Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What protocol to WLCs use to communicate with IPS






2. AAA override






3. How long before an HREAP goes into disconnected/standalone mode






4. How is the CAPWAP tunnel between AP & WLC encrypted






5. Eap process/messages






6. What does a wired IPS do compared to the WLC IDS






7. What is used for HREAP Roaming re: keying






8. Encryption types used by SNMPv3






9. Authentication types used by SNMPv3






10. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment






11. What must be configured for SSO authentication to work






12. Describe AP Assisted Roaming






13. Steps to auth with NAA w/ SSO






14. What is the radius server override interface option under WLAN-->AAA?






15. Encryption algorithm used by Certificates






16. Peap fast reconnect






17. How does client MFP work






18. Switch global config to enable dot1x radius server






19. What must be configd on ACS to enable dot1x from switch






20. Vlan pooling






21. Steps to posture assesment






22. Regulatory Compliance Acronyms






23. Will foreign/anchor communication work through PAT?






24. What is the IEEE Standards version of MFP






25. Steps to installing Server Cert into ACS






26. What are mping and eping used for from the wlc cli






27. What is a mobility list used for






28. What does IBN allow you to assign






29. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






30. When PKC is used






31. Whats added in CCXv5?






32. What does Proactive Key Caching do






33. Whats in CCXv4?






34. Switchport config to enable dot1x on a port






35. What are virtual domains used for in WCS






36. Protocols used in wIPS






37. Ports to open on fw to allow foreign to anchor controller tunnel to be built






38. Directed Roam Request






39. How is IBN-QoS






40. What is the caveat to having redundant anchor controllers






41. Briefly describe eap-mschapv2






42. IAPP roaming protocol






43. Enhanced Neighbor list - E2E






44. Is data encrypted over a capwap tunnel?






45. Briefly describe peap






46. How to set up tacacs roles in ACS for WLC authorization






47. 2 different types of wIPS deployment






48. What is included in a Pairwise Transient Key (PTK)






49. How is IBN implemented on a WLAN






50. Steps to config. .1x for AP to WLC connections