Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Whats added in CCXv5?






2. 2 different types of wIPS deployment






3. What are mping and eping used for from the wlc cli






4. Steps to auth with NAA w/ SSO






5. What is NGS & whats it used for






6. Ports to open on fw to allow foreign to anchor controller tunnel to be built






7. Switchport config to enable dot1x on a port






8. Steps to adding an IPS






9. Main elements of a NAC deployment






10. Steps to roaming in non802.1R






11. Why add an IPS if WLCs already detect attacks.






12. AAA override






13. Authentication types used by SNMPv3






14. When will a WLC use a Local EAP profile?






15. What is the IEEE Standards version of MFP






16. What is Conditional Web Redirect






17. Switch global config to enable dot1x radius server






18. What triggers can initiate a WLC to request a client to roam






19. How does client MFP work






20. Protocols used in wIPS






21. What is included in a Pairwise Transient Key (PTK)






22. Encryption algorithm used by Certificates






23. How is OEAP encrypted






24. What is the radius server override interface option under WLAN-->AAA?






25. Briefly describe peap






26. How long before an HREAP goes into disconnected/standalone mode






27. Eap process/messages






28. Vlan pooling






29. Difference between MFP-1 & MFP-2






30. How does CCKM simplify PMK Caching






31. How fast is fast secure roaming






32. What does Proactive Key Caching do






33. What is a mobility list used for






34. How to set up tacacs roles in ACS for WLC authorization






35. Things to Enable in ACS (Global Authentication Page) for PEAP support






36. RADIUS UDP Ports






37. Enhanced Neighbor list - E2E






38. What does IBN allow you to assign






39. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM






40. When submitting a CSR from ACS






41. 3 categories of segmented traffic






42. Steps to posture assesment






43. Describe AP Assisted Roaming






44. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






45. What ports does OEAP use to connect to anchor WLC






46. How is IBN-VLAN Selection implemted in ACS






47. Briefly describe eap-tls






48. What does a wired IPS do compared to the WLC IDS






49. What must be configured for SSO authentication to work






50. How is IBN implemented on a WLAN