Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What does Proactive Key Caching do






2. What CCX version is required for CCKM






3. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






4. Steps to posture assesment






5. Steps to roaming in non802.1R






6. What is the radius server override interface option under WLAN-->AAA?






7. Briefly describe eap-tls






8. Enhanced Neighbor list - E2E






9. Protocols used in wIPS






10. What triggers can initiate a WLC to request a client to roam






11. Reason why you can NOT use WLC RADIUS server to auth. against OpenLDAP or Win-2003 (or later)






12. What is 802.11w?






13. What kind of local 802.1x auth. does HREAP support






14. Switchport config to enable dot1x on a port






15. Encryption algorithm used by Certificates






16. Client Roaming Reasons






17. Authentication types used by SNMPv3






18. What is the IEEE Standards version of MFP






19. How is IBN implemented on a WLAN






20. Whats included in 802.11-2012






21. Briefly describe peap






22. How is IBN-VLAN Selection implemted in ACS






23. How is OEAP encrypted






24. Methods for authenticating to NAC






25. What must be configured for SSO authentication to work






26. How to add IPS TLS info to WLC






27. What are the 4 main components of NGS re: guests






28. Why is fast secure roaming used






29. Vlan pooling






30. What kind of mgmt frames does client mfp protect






31. What does IBN allow you to assign






32. 802.11R






33. When PKC is used






34. What is NGS & whats it used for






35. Eap process/messages






36. What are mping and eping used for from the wlc cli






37. What is included in a Pairwise Transient Key (PTK)






38. What is the WLAN-->Advanced--> DIagnostic Channel used for






39. 6 criteria types for rogue classification






40. What is Conditional Web Redirect






41. What does a wired IPS do compared to the WLC IDS






42. What is the caveat to having redundant anchor controllers






43. How to set up tacacs roles in ACS for WLC authorization






44. Regulatory Compliance Acronyms






45. How does client MFP work






46. Steps to setting up out-of-band virtual gateway setup on the NAS & NAM






47. Is data encrypted over a capwap tunnel?






48. What are virtual domains used for in WCS






49. Steps to auth with NAA w/ SSO






50. When submitting a CSR from ACS