Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Difference between MFP-1 & MFP-2






2. Briefly describe peap






3. What are mping and eping used for from the wlc cli






4. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






5. Enhanced Neighbor list - E2E






6. AAA override






7. What protocol to WLCs use to communicate with IPS






8. Things to Enable in ACS (Global Authentication Page) for PEAP support






9. What must be configd on ACS to enable dot1x from switch






10. Steps to config. .1x for AP to WLC connections






11. Switchport config to enable dot1x on a port






12. Protocols used in wIPS






13. What CCX version is required for CCKM






14. RADIUS UDP Ports






15. What must be configured the same for an HREAP not to disconnect clients when failing over (or back) to a WLC






16. Steps to installing Server Cert into ACS






17. What does a wired IPS do compared to the WLC IDS






18. NAC Deployment Types






19. Ports to open on fw to allow foreign to anchor controller tunnel to be built






20. When PKC is used






21. 3 categories of segmented traffic






22. Is data encrypted over a capwap tunnel?






23. What is the radius server override interface option under WLAN-->AAA?






24. What does Proactive Key Caching do






25. 802.11R






26. Describe AP Assisted Roaming






27. Will foreign/anchor communication work through PAT?






28. Steps to posture assesment






29. Eap process/messages






30. How is IBN implemented on a WLAN






31. Steps to roaming in 802.1R






32. What is included in a Pairwise Transient Key (PTK)






33. How is IBN-QoS






34. Why is fast secure roaming used






35. How long before an HREAP goes into disconnected/standalone mode






36. What ports does OEAP use to connect to anchor WLC






37. What is 802.11w?






38. What is used for HREAP Roaming re: keying






39. When will a WLC use a Local EAP profile?






40. What is a mobility list used for






41. Why add an IPS if WLCs already detect attacks.






42. Authentication types used by SNMPv3






43. When submitting a CSR from ACS






44. Briefly describe eap-tls






45. What is Conditional Web Redirect






46. What does Fast Secure Roaming use re: Keying






47. How does the Nac Appliance Agent (NAA) work cohesively with 802.1x






48. 3 modes of radius fallback






49. Briefly describe eap-mschapv2






50. What does IBN allow you to assign