Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Peap fast reconnect






2. What are virtual domains used for in WCS






3. Steps to adding an IPS






4. IAPP roaming protocol






5. Enhanced Neighbor list






6. Switchport config to enable dot1x on a port






7. Is data encrypted over a capwap tunnel?






8. Switch global config to enable dot1x radius server






9. NAC Deployment Types






10. Why is fast secure roaming used






11. What is included in a Pairwise Transient Key (PTK)






12. Steps to config. .1x for AP to WLC connections






13. What must be configd on ACS to enable dot1x from switch






14. Describe AP Assisted Roaming






15. How long before an HREAP goes into disconnected/standalone mode






16. What is the radius server override interface option under WLAN-->AAA?






17. How is IBN implemented on a WLAN






18. Steps to posture assesment






19. 6 criteria types for rogue classification






20. WLC Tacacs+ roles






21. What is the caveat to having redundant anchor controllers






22. AAA override






23. Client Roaming Reasons






24. Regulatory Compliance Acronyms






25. When PKC is used






26. Whats in CCXv4?






27. Steps to roaming in non802.1R






28. Directed Roam Request






29. 802.11R






30. Difference between mobility list and mobility group






31. Steps to installing Server Cert into ACS






32. Briefly describe peap






33. How is the CAPWAP tunnel between AP & WLC encrypted






34. What is used for HREAP Roaming re: keying






35. How is IBN-QoS






36. How to set up tacacs roles in ACS for WLC authorization






37. Methods for authenticating to NAC






38. Protocols used in wIPS






39. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment






40. What part of an 802.11 Beacon contains the security mechanisms in use






41. What are the 4 main components of NGS re: guests






42. RADIUS UDP Ports






43. 3 modes of radius fallback






44. Will foreign/anchor communication work through PAT?






45. Why add an IPS if WLCs already detect attacks.






46. What does FIPS-2 require for WLC to RADIUS communications






47. Difference between MFP-1 & MFP-2






48. When submitting a CSR from ACS






49. When will a WLC use a Local EAP profile?






50. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC