Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What kind of mgmt frames does client mfp protect






2. How to add IPS TLS info to WLC






3. What does Proactive Key Caching do






4. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






5. Difference between mobility list and mobility group






6. Encryption algorithm used by Certificates






7. What are virtual domains used for in WCS






8. WLC Tacacs+ roles






9. Ports to open on fw to allow foreign to anchor controller tunnel to be built






10. 3 categories of segmented traffic






11. Authentication types used by SNMPv3






12. What CCX version is required for CCKM






13. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






14. Briefly describe eap-tls






15. Steps to auth with NAA w/ SSO






16. What kind of local 802.1x auth. does HREAP support






17. What is included in a Pairwise Transient Key (PTK)






18. How does the Nac Appliance Agent (NAA) work cohesively with 802.1x






19. Describe AP Assisted Roaming






20. IAPP roaming protocol






21. When PKC is used






22. Switch global config to enable dot1x radius server






23. What is Conditional Web Redirect






24. Steps to roaming in 802.1R






25. Whats in CCXv4?






26. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment






27. What protocol to WLCs use to communicate with IPS






28. Why is fast secure roaming used






29. How does CCKM simplify PMK Caching






30. What does FIPS-2 require for WLC to RADIUS communications






31. Steps to posture assesment






32. How to set up tacacs roles in ACS for WLC authorization






33. What does a wired IPS do compared to the WLC IDS






34. How is the CAPWAP tunnel between AP & WLC encrypted






35. Enhanced Neighbor list - E2E






36. What does IBN allow you to assign






37. Whats added in CCXv5?






38. What must be configured the same for an HREAP not to disconnect clients when failing over (or back) to a WLC






39. What is used for HREAP Roaming re: keying






40. Vlan pooling






41. What must be configd on ACS to enable dot1x from switch






42. 6 criteria types for rogue classification






43. Is data encrypted over a capwap tunnel?






44. What is the caveat to having redundant anchor controllers






45. How is encryption established between OEAP & Anchor WLC






46. What is 802.11w?






47. Steps to config. .1x for AP to WLC connections






48. Steps to setting up an out-of-band virtual gateway NAS setup






49. When will a WLC use a Local EAP profile?






50. How is IBN-QoS