Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. IAPP roaming protocol






2. What does IBN allow you to assign






3. What does Proactive Key Caching do






4. How does CCKM simplify PMK Caching






5. 6 criteria types for rogue classification






6. Steps to configure wlcs for guest wlan






7. What is NGS & whats it used for






8. How is IBN-VLAN Selection implemted in ACS






9. Steps to config. .1x for AP to WLC connections






10. What must be configured the same for an HREAP not to disconnect clients when failing over (or back) to a WLC






11. What must be configured for SSO authentication to work






12. What part of an 802.11 Beacon contains the security mechanisms in use






13. Switchport config to enable dot1x on a port






14. How does the Nac Appliance Agent (NAA) work cohesively with 802.1x






15. What is Conditional Web Redirect






16. What is the radius server override interface option under WLAN-->AAA?






17. What does Fast Secure Roaming use re: Keying






18. How does infrastructure MFP work






19. How is OEAP encrypted






20. What protocol to WLCs use to communicate with IPS






21. 3 categories of segmented traffic






22. Switch global config to enable dot1x radius server






23. Vlan pooling






24. Encryption types used by SNMPv3






25. Ports to open on fw to allow foreign to anchor controller tunnel to be built






26. Steps to auth with NAA w/ SSO






27. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM






28. What triggers can initiate a WLC to request a client to roam






29. Is data encrypted over a capwap tunnel?






30. What does FIPS-2 require for WLC to RADIUS communications






31. What ports does OEAP use to connect to anchor WLC






32. What kind of local 802.1x auth. does HREAP support






33. Whats included in 802.11-2012






34. Steps to adding an IPS






35. How to add IPS TLS info to WLC






36. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment






37. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






38. 2 different types of wIPS deployment






39. Steps to posture assesment






40. WLC Tacacs+ roles






41. Steps to roaming in 802.1R






42. What are virtual domains used for in WCS






43. What is the IEEE Standards version of MFP






44. Steps to installing Server Cert into ACS






45. Peap fast reconnect






46. Why add an IPS if WLCs already detect attacks.






47. Methods for authenticating to NAC






48. Briefly describe eap-mschapv2






49. Enhanced Neighbor list






50. Protocols used in wIPS