Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Things to Enable in ACS (Global Authentication Page) for PEAP support






2. How is IBN-VLAN Selection implemted in ACS






3. When PKC is used






4. What must be configd on ACS to enable dot1x from switch






5. What is the IEEE Standards version of MFP






6. Switch global config to enable dot1x radius server






7. What does FIPS-2 require for WLC to RADIUS communications






8. Regulatory Compliance Acronyms






9. Encryption algorithm used by Certificates






10. Steps to posture assesment






11. What is the radius server override interface option under WLAN-->AAA?






12. What does IBN allow you to assign






13. Whats added in CCXv5?






14. How is IBN-QoS






15. What CCX version is required for CCKM






16. Enhanced Neighbor list - E2E






17. How to set up tacacs roles in ACS for WLC authorization






18. Eap process/messages






19. How is the CAPWAP tunnel between AP & WLC encrypted






20. Vlan pooling






21. Peap fast reconnect






22. What is the WLAN-->Advanced--> DIagnostic Channel used for






23. Directed Roam Request






24. Whats in CCXv4?






25. What is included in a Pairwise Transient Key (PTK)






26. Steps to config. .1x for AP to WLC connections






27. Steps to auth with NAA w/ SSO






28. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment






29. Encryption types used by SNMPv3






30. Client Roaming Reasons






31. What protocol to WLCs use to communicate with IPS






32. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






33. AAA override






34. Protocols used in wIPS






35. What does Fast Secure Roaming use re: Keying






36. What is a mobility list used for






37. Difference between MFP-1 & MFP-2






38. What does a wired IPS do compared to the WLC IDS






39. How is OEAP encrypted






40. 3 modes of radius fallback






41. 802.11R






42. What kind of mgmt frames does client mfp protect






43. What is Conditional Web Redirect






44. How does infrastructure MFP work






45. 6 criteria types for rogue classification






46. What are mping and eping used for from the wlc cli






47. 2 different types of wIPS deployment






48. What is HREAP Local Auth limitation






49. How is encryption established between OEAP & Anchor WLC






50. What kind of local 802.1x auth. does HREAP support