|
Question 1. To enable the Automatic HTTP Proxy Service for guest users, you must define proxy server addresses for _______. A. the "Guest Access" Access Policy B. each 720wl that will support guest users C. each Connection Profile that will support guest users D. every component of the 700wl system Answer: B Question 2. The full-edge deployment of the 700wl system provides for greater flexibility in policy definition than the single-gateway solution. This is because _______. A. multiple 740wl Access Control Servers manage each 720wl B. each 720wl is connected directly to a 740wl C. each 720wl downlink port supports a single wireless access point D. each wireless access point is defined as a virtual location Answer: C Question 3. The single-gateway design for a 700wl system is suitable for smaller networks because it _______. A. does not require any configuration of network switches B. requires fewer 700wl devices than the full-edge solution C. enables more granular policies than the full-edge solution D. does not require the use of VLANs and virtualized locations Answer: B Question 4. You are designing a 700wl system for deployment at a landscaping and facility-maintenance firm. Which circumstance could require the use of virtualized locations? A. Users associated with the "Designers" Identity Profile must access the 700wl system from multiple locations. B. One 720wl downlink port must support the "Maintenance" Connection Profile and the "Design" Connection Profile. C. The system must support redundant 740wl Access Control Servers located in different subnets. D. Designers must use LDAP authentication, and maintenance personnel must use RADIUS authentication. Answer: B Question 5. What are the components of a 700wl Rights Assignment? (Choose three) A. User Profile B. Identity Profile C. Connection Profile D. Security Policy E. Group Policy F. Access Policy Answer: B, C, F Question 6. Under what circumstances does the HP Pro Curve Access Control Server 740wl forward user traffic to the secure network? The 740wl ___________. A. forwards user traffic during roaming B. forwards user traffic if an Access Controller fails C. never forwards user traffic D. forwards user traffic until the user is authenticated Answer: C Question 7. A 720wl's default downlink IP address is ________. A. used as the default gateway for all clients B. used by the 740wl to communicate with the 720wl C. dictated by the 740wl for all 720wls in a 700wl system D. the address to which NAT clients' source addresses translated Answer: C Question 8. At approximately 7:30 p.m., a user complains that she cannot access her mail server from a conference room. She claims she was able to access the mail server earlier in the day from her desk. What system tool is most useful for troubleshooting this user's network access problem? A. Client Status page B. User Rights Simulator C. LDAP Transaction Tracer D. RADIUS Transaction Tracer Answer: B Question 9. At a customer site, all guest users who log on through the 700wl system can access the customer's intranet servers. To improve security, you configure a Redirected Traffic Filter so that guests, who attempt to access intranet resources, will be redirected to a Web page displaying guest access rules. When testing the filter, you see that guest users actually receive a "Page not available" error when attempting to access these resources. To troubleshoot this problem, you should make sure you _______. A. disabled all default Redirected Traffic Filters to ensure they do not conflict with your custom filter B. configured an Authentication Policy and logon procedure for all guest users C. associated the new Redirected Traffic Filter with the Access Policy that affects guests D. configured an Allowed Traffic Filter to specify the destination of the redirected traffic Answer: D Question 10. You are troubleshooting an HP Pro Curve Integrated Access Manager 760wl that is not reachable through the web or Telnet. Which information about the device's configuration can be gathered from the LCD panel on the device's front panel? Select TWO. A. system time B. system uptime C. IP addressing information D. number of transmitted packets E. installed software version Answer: C, E Question 11. At a customer site, you are configuring an HP ProCurve Access Control Server 740wl. Which tasks can be performed at the CLI? Select TWO. A. configure IP address B. configure a connected 720wl C. set administrative password D. add users to built-in database E. configure LDAP authentication Answer: A, C Question 12. You are configuring a 740wl at a customer site. To set the shared secret without echoing it to the console, you must enter set shared secret with _____________ A. the no echo parameter B. the shared secret as a parameter C. no parameters D. the administrative password Answer: C Question 13. You must configure a 720wl that has not received an IP address through DHCP. How can you configure an IP address for this system? A. Use the Administrative Console to locate the 740wl by its MAC address and select it from the list of available devices. B. Start a web browser session using the default IP address 42.0.0.1. C. Start a web browser session using the factory-assigned IP address of the uplink port. D. Start a Telnet session with the default IP address 42.0.0.1. E. Start a direct serial console session and configure the device's IP address at the CLI. Answer: E Question 14. Which statement is true about the date and time configuration of the 700wl devices? A. Time settings must be dynamically acquired or statically defined each time the 740wl is rebooted. B. The 740wl can be configured to obtain time services from an NTP server. C. The 740wl and each 720wl cannot be configured to obtain time services from different servers. D. The 720wl acquires its time settings from the 740wl. Answer: B Question 15. When organizing 720wl Access Controllers into folders in the Administrative Console, you cannot _______. A. place more than five devices in a folder B. create folders within folders C. create custom folders D. configure more than five folders Answer: B Question 16. Which statement is true regarding this naming convention? 740wl-760wl-dist-4.1.1.37. The file ________. A. is invalid because the filename has no extension B. is designated for use in local updates C. must be compiled before installation D. must be accompanied by a checksum file Answer: B Question 17. The administrator of a 700wl system is performing a remote update on multiple 720wl devices. To simplify this task, the administrator changes the names of the image and checksum files. The administrator is careful to not change the file extensions. The update will ________. A. fail on devices currently running version 3 software B. succeed for all devices C. fail for all devices D. fail if it is not performed at the CLI Answer: C Question 18. A user at a customer site connects to a port on a 720wl with a wireless PC. The 700wl system will make a Rights Assignment for this client _______. A. immediately after the client is authenticated B. when the client first attempts to access an intranet server C. when the client submits authentication credentials D. immediately after the client sends an IP packet Answer: D Question 19. Exhibit: John is a user associated with the "Marketing" Identity Profile who connects through a 720wl port associated with the "Main Office" Connection Profile. In the exhibit, identify the row in the Rights Assignment table that will apply to John while the 700wl system is evaluating John's credentials. A. 1 B. 2 C. 3 D. 4 E. 5 Answer: D Question 20. A client of a 700wl system, configured with the default "Authenticated" Access Policy, enters "http://1.1.1.1" into the location bar of a Web browser. The browser displays _______. A. the 700wl Stop Page B. the Administrative Console C. the 700wl Logon Page D. a "page not available" error Answer: C
|
Question 1. What is fading? A. Another signal source is producing energy on the channel in which you are trying to operate. B. The desired signal reaches the receiving antenna via multiple paths, each of which has a different propagation delay and path loss. C. A time-varying change in the path loss of a link with the time variance governed by the movement of objects in the environment, including the transmitter and receiver themselves. D. A function of the frequency and should be provided in the cable specification by the vendor. E. The minimum signal level for the receiver to be able to acceptably decode the information. F. The time delay from the reception of the first instance of the signal until the last instance. Answer: C Explanation: Question 2. Which limitation applies to the use of the Cisco WLAN Solution Management over Wireless feature? A. Controllers must be managed using only secure protocols (that is, SSH and HTTPS), not no secure protocols (that is, HTTP and Telnet). B. Read-write access is not available; only read-only access is supported. C. Uploads and downloads from the controller are not allowed. D. Wireless clients can manage other controllers however not the same controller and AP to which the client is associated. Answer: C Explanation: Question 3. Up to how many Cisco WiSMs are supported in a single mobility group operating under v5.0 code? A. 5 B. 12 C. 16 D. 24 E. 150 F. 300 Answer: B Explanation: Question 4. The existing Cisco Unified Wireless Controller is running v5.0 code for both the controllers and the Cisco WCS. A controller has been configured with an appropriate rogue rule condition to report discovered APs to the Cisco WCS. What default alarm level is used to display all rogue APs in the Alarm Summary? A. Critical B. Flash C. Major D. Minor E. Urgent Answer: D Explanation: Question 5. Cisco Client Management Frame Protection is running on a mobility group with two controllers. Which two MFP requirements protect the network? (Choose two.) A. forces clients to authenticate, using a secure EAP method only B. implements the validation of wireless management frames C. requires CCXv5 D. requires the use of a nonbroadcast SSID E. requires CCXv4 Answer: B, C Explanation: Question 6. What is the result when client exclusion is enabled with a timeout value of zero? A. Clients are excluded indefinitely. B. Clients are never excluded. C. Client exclusion is disabled. D. Clients must be explicitly included by specifying the MAC address. E. Exclusion and inclusion is determined by access list. Answer: A Explanation: Question 7. The central office is currently using a combination of 4400 and 2100 series WLAN controllers running v4.2 and a variety of LWAPP-enabled access points servicing both 2.4 GHz and 5 GHz. The WLAN deployment has been extended to each remote office by implementing a 526 WLAN controller running v4.1 and several 521 access points. Wireless client deployment uses EAP-TLS authentication using a centralized RADIUS server plus 802.11n for performance. After the first remote office deployment, remote office users complain that they are not connecting via 802.11n. What is the most likely cause of this problem? A. The 526 WLAN controller does not support external authentication via RADIUS, prohibiting authentication. B. The 521 AP does not support 5 GHz, which prohibits 802.11n. C. The 521 AP and 526 WLAN controllers do not support AES, which prohibits 802.11n. D. The 526 WLAN controller does not support 802.11n with v4.1 and must be upgraded to v4.2. E. The 526 WLAN controller does not support 802.11n with either v4.1 or v4.2. Answer: E Explanation: Question 8. How do the features that are available on the Cisco WCS for Linux version differ from those of the Cisco WCS for Windows version? A. Assuming that there are no differences in hardware, a Cisco WCS for Linux can support up to 750 wireless LAN controllers. A Cisco WCS for Windows can support up to 250 wireless LAN controllers. B. Cisco WCS for Windows includes support for Cisco Spectrum Expert clients. Cisco WCS for Linux does not support Cisco Spectrum Expert clients. C. Cisco WCS for Linux is required for deployments. D. There are no differences in features between the Linux and Windows versions of Cisco WCS. Answer: D Explanation: Question 9. Which CLI command shows the controller configuration in a way that is similar to the way that it is displayed on Cisco IOS routers? A. show config B. show run config C. show run-config D. show running config E. show running-config Answer: E Explanation: Question 10. Which two attacks does Management Frame Protection help to mitigate? (Choose two.) A. Eavesdropping B. Denial of Service C. War Driving D. Man-in-the-Middle Answer: B, D Explanation:
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.