Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Whats included in 802.11-2012






2. Briefly describe peap






3. Client Roaming Reasons






4. When PKC is used






5. How long before an HREAP goes into disconnected/standalone mode






6. Steps to installing Server Cert into ACS






7. How is IBN implemented on a WLAN






8. What is included in a Pairwise Transient Key (PTK)






9. How fast is fast secure roaming






10. WLC Tacacs+ roles






11. Protocols used in wIPS






12. How is OEAP encrypted






13. 2 different types of wIPS deployment






14. Steps to posture assesment






15. What is used for HREAP Roaming re: keying






16. What ports does OEAP use to connect to anchor WLC






17. What triggers can initiate a WLC to request a client to roam






18. What protocol to WLCs use to communicate with IPS






19. 802.11R






20. What kind of local 802.1x auth. does HREAP support






21. What CCX version is required for CCKM






22. IAPP roaming protocol






23. Authentication types used by SNMPv3






24. Ports to open on fw to allow foreign to anchor controller tunnel to be built






25. Steps to roaming in non802.1R






26. What is HREAP Local Auth limitation






27. Peap fast reconnect






28. How does client MFP work






29. How is encryption established between OEAP & Anchor WLC






30. What is the IEEE Standards version of MFP






31. Steps to adding an IPS






32. How does CCKM simplify PMK Caching






33. What are virtual domains used for in WCS






34. Why add an IPS if WLCs already detect attacks.






35. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






36. Is data encrypted over a capwap tunnel?






37. NAC Deployment Types






38. Steps to setting up an out-of-band virtual gateway NAS setup






39. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM






40. Main elements of a NAC deployment






41. When will a WLC use a Local EAP profile?






42. Encryption algorithm used by Certificates






43. What does Proactive Key Caching do






44. Steps to config. .1x for AP to WLC connections






45. Difference between mobility list and mobility group






46. Directed Roam Request






47. What kind of mgmt frames does client mfp protect






48. What does FIPS-2 require for WLC to RADIUS communications






49. What are the 4 main components of NGS re: guests






50. Things to Enable in ACS (Global Authentication Page) for PEAP support