Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When PKC is used






2. What is 802.11w?






3. Enhanced Neighbor list - E2E






4. What must be configured for SSO authentication to work






5. What ports does OEAP use to connect to anchor WLC






6. What kind of local 802.1x auth. does HREAP support






7. AAA override






8. Why add an IPS if WLCs already detect attacks.






9. 802.11R






10. Enhanced Neighbor list






11. What are the 4 main components of NGS re: guests






12. How does CCKM simplify PMK Caching






13. Why is fast secure roaming used






14. Steps to roaming in non802.1R






15. Steps to posture assesment






16. Switchport config to enable dot1x on a port






17. How long before an HREAP goes into disconnected/standalone mode






18. What is Conditional Web Redirect






19. How to add IPS TLS info to WLC






20. Describe AP Assisted Roaming






21. What triggers can initiate a WLC to request a client to roam






22. Will foreign/anchor communication work through PAT?






23. What is the radius server override interface option under WLAN-->AAA?






24. What are virtual domains used for in WCS






25. 6 criteria types for rogue classification






26. Whats included in 802.11-2012






27. Steps to roaming in 802.1R






28. How to set up tacacs roles in ACS for WLC authorization






29. Briefly describe eap-tls






30. When will a WLC use a Local EAP profile?






31. Whats in CCXv4?






32. 2 different types of wIPS deployment






33. Is data encrypted over a capwap tunnel?






34. How is IBN-QoS






35. Eap process/messages






36. Main elements of a NAC deployment






37. How is encryption established between OEAP & Anchor WLC






38. Things to Enable in ACS (Global Authentication Page) for PEAP support






39. Encryption algorithm used by Certificates






40. Briefly describe peap






41. What does IBN allow you to assign






42. What does FIPS-2 require for WLC to RADIUS communications






43. How is IBN implemented on a WLAN






44. Difference between mobility list and mobility group






45. Briefly describe eap-mschapv2






46. NAC Deployment Types






47. Steps to setting up an out-of-band virtual gateway NAS setup






48. What does Fast Secure Roaming use re: Keying






49. IAPP roaming protocol






50. What does Proactive Key Caching do