Wireless Roaming & Authentication (ENCOR/CCNP Quiz) Please enter your email: Suppose an enterprise offers a wireless network that guests can use but only after they read and accept an acceptable use policy document. Which one of the following methods can inherently handle this process? WPA3 personal WebAuth Open Authentication WPA2 enterprise Which of the following WPA versions is considered to have the most secure personal mode? WPA WPA3 WPA2 WPA1 Which one of the following makes the decision for a device to roam from one AP to another? The candidate AP The client device The original AP The wireless LAN controller When WPA2 enterprise mode is used on a WLAN, where is the supplicant role located? On the AP On the RADIUS server On the wireless client On the WLC When a client moves its association from one autonomous AP to another, it is actually leaving and joining which one of the following? BSS DS ESS SSID Which of the following parameters is useful for computing a client device’s location with respect to an AP? GPS RSS BSS Channel Does open Authentication require the use of which one of the following? RADIUS Pre-Shared Key None of the above HTTP/HTTPS 802.1x A client roams from controller A to controller B. If it undergoes a Layer 3 roam, which one of the following best describes the role of controller A? Foreign controller Master controller Host controller Anchor controller Which of the following is used to cache authentication key information to make roaming more efficient? PGP EoIP CCNA CCKM Ten lightweights APs are joined to a wireless LAN controller. If a client roams from one of the APs to another, which one of the following correctly describes the roam? Indirect roaming Intracontroller roaming Intercontroller roaming Autonomous roaming Loading … Written by