Test your basic knowledge |

CCNP Wireless Security

Subjects : cisco, it-skills, ccnp
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What CCX version is required for CCKM






2. What kind of local 802.1x auth. does HREAP support






3. How does client MFP work






4. What is the caveat to having redundant anchor controllers






5. 3 modes of radius fallback






6. What is needed to use Locally Significat Certificates (LSC) when establishing tunnel from OEAP to WLC






7. What does a wired IPS do compared to the WLC IDS






8. What triggers can initiate a WLC to request a client to roam






9. Steps to configure wlcs for guest wlan






10. WLC Tacacs+ roles






11. Main elements of a NAC deployment






12. What is the WLAN-->Advanced--> DIagnostic Channel used for






13. How is IBN implemented on a WLAN






14. 6 criteria types for rogue classification






15. How to add IPS TLS info to WLC






16. What is the IEEE Standards version of MFP






17. Switch global config to enable dot1x radius server






18. Peap fast reconnect






19. Client Roaming Reasons






20. Why add an IPS if WLCs already detect attacks.






21. Directed Roam Request






22. What are virtual domains used for in WCS






23. How is OEAP encrypted






24. Steps to setting up an out-of-band virtual gateway NAS setup






25. Eap process/messages






26. How is IBN-VLAN Selection implemted in ACS






27. Is data encrypted over a capwap tunnel?






28. Ports to open on fw to allow foreign to anchor controller tunnel to be built






29. Encryption algorithm used by Certificates






30. Difference between mobility list and mobility group






31. How fast is fast secure roaming






32. 802.11R






33. Encryption types used by SNMPv3






34. What is Ciscos gold confidence level deployment of wIPS aps in a walled environment






35. Enhanced Neighbor list






36. Describe AP Assisted Roaming






37. What is Conditional Web Redirect






38. Methods for authenticating to NAC






39. What is a mobility list used for






40. Authentication types used by SNMPv3






41. 2 different types of wIPS deployment






42. Steps to posture assesment






43. Regulatory Compliance Acronyms






44. Whats included in 802.11-2012






45. Steps to auth with NAA w/ SSO






46. What does IBN allow you to assign






47. What does Proactive Key Caching do






48. What are the 4 main components of NGS re: guests






49. What does FIPS-2 require for WLC to RADIUS communications






50. How does CCKM simplify PMK Caching