Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Submit Braindumps


Tell A Friend

    Contact Us



Latest Brain Dumps

 BrainDump List

 Certifications Dumps




  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

















Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.





Braindumps for "HP0-752" Exam

ProCurve Mobility

 Question 1.
Which authentication method can be combined with any other supplemental authentication method?

A. preshared keys
B. MAC authentication
C. 802.1X authentication
D. Extensible Authentication Protocol (EAP)

Answer: B

Question 2.
Your network features a full public key infrastructure (PKI) with digital certificates for users and workstations, as well as for servers. You are now adding a wireless LAN (WLAN) that implements 802.1X authentication with Extensible Authentication Protocol (EAP). 

Which EAP method should you select for the highest security?

A. Protected EAP (PEAP)
B. EAP-Tunneled TLS (TTLS)
C. EAP-Message Digest 5 (MD5)
D. EAP-Transport Layer Security (TLS)

Answer: D

Question 3.
Your company uses Wi-Fi Protected Access (WPA) encryption. 

Where is traffic encrypted?

A. over wireless bridges only
B. over the wired network only
C. over the wireless network only
D. over the wireless and wired network

Answer: C

Question 4.
Match the encryption method to the security standard.
Drag and drop the boxes on the right to the left and match the description to the security option.


Question 5.
Your company wants to implement the highest security authentication possible without installing certificates on each user's station. 

Which Extensible Authentication Protocol (EAP) method should you choose?

A. EAP-Message Digest 5 (MD5)
B. EAP-Transport Layer Security (TLS)
C. Protected EAP (PEAP) MS-CHAPv2
D. EAP-Subscriber Identity Module (SIM)

Answer: C

Question 6.
You are providing consulting services to a bookstore that wants to set up a wireless network to provide complimentary Internet access. 

Which security option should you choose to provide the widest support for customers who bring their own equipment?

A. Web authentication (Web-Auth)
B. MAC authentication (MAC-Auth)
C. dynamic Wired Equivalent Privacy (WEP)
D. Wi-Fi Protected Access (WPA) with preshared keys (PSK)

Answer: A

Question 7.
Which action does an 802.1X authenticator take if its Extensible Authentication Protocol (EAP) messages to the supplicant time out?

A. keeps the port closed
B. opens the port, by default
C. contacts the authentication server
D. sends a wake-up message to the supplicant

Answer: A

Question 8.
Which mechanisms are part of the 802.11h standard? (Select two.)

A. fast roaming for 802.1X
B. Transmit Power Control (TPC)
C. Inter-Access Point Protocol (IAPP)
D. fast roaming for Voice over IP (VoIP)
E. Dynamic Frequency Selection (DFS)
F. Quality of Service (QoS) for wireless stations

Answer: B, E

Question 9.
A station is configured for passive scanning. 

Which statement describes its behavior?

A. The station sends probe requests on only one channel.
B. The station sends probe requests on all supported channels.
C. The station listens for beacon frames from any access point (AP) within range.
D. The station listens only for beacon frames for previously-accessed wireless LANs (WLANs).

Answer: C

Question 10.
Which mode allows you to connect two wired networks through a wireless connection?

A. in-cell relay mode
B. internetwork mode
C. peer-to-peer mode
D. infrastructure mode

Answer: A


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA

              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

Copyright 2004 Inc. All rights reserved.