|
Question 1. Which authentication method can be combined with any other supplemental authentication method? A. preshared keys B. MAC authentication C. 802.1X authentication D. Extensible Authentication Protocol (EAP) Answer: B Question 2. Your network features a full public key infrastructure (PKI) with digital certificates for users and workstations, as well as for servers. You are now adding a wireless LAN (WLAN) that implements 802.1X authentication with Extensible Authentication Protocol (EAP). Which EAP method should you select for the highest security? A. Protected EAP (PEAP) B. EAP-Tunneled TLS (TTLS) C. EAP-Message Digest 5 (MD5) D. EAP-Transport Layer Security (TLS) Answer: D Question 3. Your company uses Wi-Fi Protected Access (WPA) encryption. Where is traffic encrypted? A. over wireless bridges only B. over the wired network only C. over the wireless network only D. over the wireless and wired network Answer: C Question 4. Match the encryption method to the security standard. Drag and drop the boxes on the right to the left and match the description to the security option. Answer: Question 5. Your company wants to implement the highest security authentication possible without installing certificates on each user's station. Which Extensible Authentication Protocol (EAP) method should you choose? A. EAP-Message Digest 5 (MD5) B. EAP-Transport Layer Security (TLS) C. Protected EAP (PEAP) MS-CHAPv2 D. EAP-Subscriber Identity Module (SIM) Answer: C Question 6. You are providing consulting services to a bookstore that wants to set up a wireless network to provide complimentary Internet access. Which security option should you choose to provide the widest support for customers who bring their own equipment? A. Web authentication (Web-Auth) B. MAC authentication (MAC-Auth) C. dynamic Wired Equivalent Privacy (WEP) D. Wi-Fi Protected Access (WPA) with preshared keys (PSK) Answer: A Question 7. Which action does an 802.1X authenticator take if its Extensible Authentication Protocol (EAP) messages to the supplicant time out? A. keeps the port closed B. opens the port, by default C. contacts the authentication server D. sends a wake-up message to the supplicant Answer: A Question 8. Which mechanisms are part of the 802.11h standard? (Select two.) A. fast roaming for 802.1X B. Transmit Power Control (TPC) C. Inter-Access Point Protocol (IAPP) D. fast roaming for Voice over IP (VoIP) E. Dynamic Frequency Selection (DFS) F. Quality of Service (QoS) for wireless stations Answer: B, E Question 9. A station is configured for passive scanning. Which statement describes its behavior? A. The station sends probe requests on only one channel. B. The station sends probe requests on all supported channels. C. The station listens for beacon frames from any access point (AP) within range. D. The station listens only for beacon frames for previously-accessed wireless LANs (WLANs). Answer: C Question 10. Which mode allows you to connect two wired networks through a wireless connection? A. in-cell relay mode B. internetwork mode C. peer-to-peer mode D. infrastructure mode Answer: A Question 11. Which type of message does a Radio Port (RP) transmit so that a ProCurve Wireless Edge Services xl Module can detect it on the network? A. Inter-Access Point Protocol (IAPP) B. Address Resolution Protocol (ARP) C. Link Layer Discovery Protocol (LLDP) D. Internet Control Message Protocol (ICMP) Answer: C Question 12. A company installs the ProCurve Wireless LAN System and requires two Radio Ports (RPs) for the cafeteria. One RP must be installed outside and one RP must be installed inside. Both RPs must support 802.11a, b, and g. Which RPs should the company purchase? A. two RP 210s B. one RP 220 and one RP 230 C. one RP 220 and one RP 210 D. one RP 230 and one RP 210 Answer: B Question 13. You connect a Radio Port (RP) to a ProCurve Switch 2600-PWR Series, which is connected to a wireless services-enabled switch. On the 2600-PWR Switch, port 5 connects to the RP, and port 1 connects to the wireless services-enabled switch. The 2600-PWR Switch is sending traffic from other VLANs to the wireless services-enabled switch. Which commands must you enter on the 2600-PWR Switch to enable the Wireless Module to detect the RP? (Select two.) A. vlan 2100 tagged 1 B. vlan 2100 tagged 5 C. vlan 2100 untagged 5 D. vlan 2100 untagged 1 E. auto provisioning enable Answer: A, C Question 14. Which virtual LAN (VLAN) or VLANs are automatically created on the wireless services-enabled switch if auto-provisioning is enabled? A. Radio Port VLAN B. the VLAN assigned to WLAN 1 C. any dynamic VLAN assigned to wireless users D. any VLAN created on the Wireless Edge Services xl Module Answer: A
|
Question 1. How many cache groups can be used in Transparent Cache Switching: A. 5 B. 4 C. 1 D. 3 E. 2 Answer: B Question 2. Session Capacity Threshold defines: A. The percent of remaining sessions available on the ServerIron B. The total number of sessions used on the ServerIron C. The total number of sessions that are configured on the real servers D. The total session capacity of the ServerIron Answer: A Question 3. Using show server real, if you see UNBND: A. The application is bound to the VIP B. The application port for the real server is not bound to the real server C. The application cannot be found D. The VIP is bound to the real server E. The application needs to be bound to the real server Answer: D Question 4. Using show server real, if you see UNBND: A. The application is bound to the VIP B. The application cannot be found C. The application needs to be bound to the real server D. The application port for the real server is not bound to the real server E. The VIP is bound to the real server Answer: E Question 5. Filters on the ServerIron configured for Server Load Balancing are: A. Set to drop any connections specified by the filter B. Applied to packets directed to the VIP C. Used to redirect packets to the Internet D. Set to drop traffic to or from specified ports Answer: B Question 6. When configuring real servers, there must be backup servers in order to have primary servers A. False B. True Answer: A Question 7. What is the default SLB behavior for Server Load Balancing for packets from the ServerIron to the real server? Choices: 1) Packets from the ServerIron to the real server a. Destination translates address from the VIP to the real serverIP b. Source translate the clients IP address 2) Packets from the ServerIron to the real server a. Destination translates address from the VIP to the real server IP b.Source leaves the clients IP address unchanged 3) Packets from the ServerIron to the real server a. Destination leave the clients IP address unchanged b. Source Translate the real server IP address into a VIP address 4) Packets from the ServerIron to the real server a. Destination Leave the real server IP address unchanged b. Source leaves the clients IP address unchanged A. 4 B. 2 C. 1 D. 3 Answer: B Question 8. Configuring a remote server as primary will include it: A. As the primary remote backup server B. As the primary backup server C. In the VIP balancing with the local servers D. As the server to access when all the locals have failed Answer: C Question 9. What ServerIron CLI command enables FWLB for TCP. A. ip policy 1 fw tcp 0 global B. ip policy 1 fw tcp 1 global C. ip policy 1 fw udp 1 global D. server fw-port 5 Answer: A Question 10. When configuring Hot Standby Redundancy, the configuration from one ServerIron can be copied to another ServerIron exactly except for: A. The management address and the MAC address B. The MAC address C. The sync-link address D. The management address Answer: D
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.