|
Question 1.
To enable the Automatic HTTP Proxy Service for guest users, you must define proxy server addresses for _______.
A. the "Guest Access" Access Policy
B. each 720wl that will support guest users
C. each Connection Profile that will support guest users
D. every component of the 700wl system
Answer: B
Question 2.
The full-edge deployment of the 700wl system provides for greater flexibility in policy definition than the single-gateway solution. This is because _______.
A. multiple 740wl Access Control Servers manage each 720wl
B. each 720wl is connected directly to a 740wl
C. each 720wl downlink port supports a single wireless access point
D. each wireless access point is defined as a virtual location
Answer: C
Question 3.
The single-gateway design for a 700wl system is suitable for smaller networks because it _______.
A. does not require any configuration of network switches
B. requires fewer 700wl devices than the full-edge solution
C. enables more granular policies than the full-edge solution
D. does not require the use of VLANs and virtualized locations
Answer: B
Question 4.
You are designing a 700wl system for deployment at a landscaping and facility-maintenance firm.
Which circumstance could require the use of virtualized locations?
A. Users associated with the "Designers" Identity Profile must access the 700wl system from
multiple locations.
B. One 720wl downlink port must support the "Maintenance" Connection Profile and the "Design"
Connection Profile.
C. The system must support redundant 740wl Access Control Servers located in different
subnets.
D. Designers must use LDAP authentication, and maintenance personnel must use RADIUS
authentication.
Answer: B
Question 5.
What are the components of a 700wl Rights Assignment? (Choose three)
A. User Profile
B. Identity Profile
C. Connection Profile
D. Security Policy
E. Group Policy
F. Access Policy
Answer: B, C, F
Question 6.
Under what circumstances does the HP Pro Curve Access Control Server 740wl forward user traffic to the secure network?
The 740wl ___________.
A. forwards user traffic during roaming
B. forwards user traffic if an Access Controller fails
C. never forwards user traffic
D. forwards user traffic until the user is authenticated
Answer: C
|
Question 1 Exhibit: You work as a network administrator at Certpaper.com. You study the exhibit carefully. Identify the HBA and F port in the SAN Core/Edge exhibit. A. 7 and 1 B. 7 and 5 C. 4 and 5 D. 6 and 3 Answer: B Question 2. What is a benefit of tracking changes to the source and target devices after a point in time replica is created? A. Reduces the Recovery Time Objective for restart operations from the target B. Speeds up the re-synchronization of the source and target C. Speeds up the initial synchronization of the source and target D. Reduces the Recovery Point Objective for restart operations from the target Answer: B Question 3. What does a cache dirty bit flag? A. Changed data not yet written to disk B. Data read from disk but not accessed by the host C. Changed data written to disk D. Data requested by host but not yet fetched Answer: A Question 4. Which remote replication solution has the lowest bandwidth requirement? A. Log shipping over IP networks B. Array based synchronous replication C. Asynchronous ordered writes D. Host based LVM Mirroring Answer: A Question 5. An application uses ten 9 GB Devices. A pointer based replica of the application is required every 4 hours. Each replica will be kept for 24 hours. The data changes by 10% every 4 hours. How many replica devices are required? A. 10 B. 90 C. 6 D. 60 Answer: D Question 6. What is a remote replication solution on EMC Symmetrix Arrays? A. SnapView B. EMCTimeFinder/Mirror C. SRDF/S D. MirrorView/A Answer: C Question 7. What is a benefit of a NAS Solution? A. Introduces block level I/O to the networked environment B. Enables the ability to share data across platforms C. Improved network bandwidth D. Improved network performance Answer: B Question 8. What is a logical component of a storage environment? A. Storage array B. Bus C. Memory D. Application Answer: D Question 9. Which statement describes the iSCSI protocol? A. SCSI over ATA B. SCSI over IP SCSI over IP C. IP over SCSI D. ATA over SCSI Answer: B Question 10. Exhibit: You work as a network administrator at Certpaper.com. You study the exhibit carefully. In the environment shown in the exhibit, the storage devices are RAID-1 protected. Which two components are Single Points of Failure? A. Switch andStorage Array Port B. Host and Switch C. Storage Array Port and Storage Device D. HBA and Host Answer: A
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.