Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "HP0-752" Exam

ProCurve Mobility

 Question 1.
Which authentication method can be combined with any other supplemental authentication method?

A. preshared keys
B. MAC authentication
C. 802.1X authentication
D. Extensible Authentication Protocol (EAP)

Answer: B

Question 2.
Your network features a full public key infrastructure (PKI) with digital certificates for users and workstations, as well as for servers. You are now adding a wireless LAN (WLAN) that implements 802.1X authentication with Extensible Authentication Protocol (EAP). 

Which EAP method should you select for the highest security?

A. Protected EAP (PEAP)
B. EAP-Tunneled TLS (TTLS)
C. EAP-Message Digest 5 (MD5)
D. EAP-Transport Layer Security (TLS)

Answer: D

Question 3.
Your company uses Wi-Fi Protected Access (WPA) encryption. 

Where is traffic encrypted?

A. over wireless bridges only
B. over the wired network only
C. over the wireless network only
D. over the wireless and wired network

Answer: C

Question 4.
Match the encryption method to the security standard.
Drag and drop the boxes on the right to the left and match the description to the security option.

 

Answer:

 

Question 5.
Your company wants to implement the highest security authentication possible without installing certificates on each user's station. 

Which Extensible Authentication Protocol (EAP) method should you choose?

A. EAP-Message Digest 5 (MD5)
B. EAP-Transport Layer Security (TLS)
C. Protected EAP (PEAP) MS-CHAPv2
D. EAP-Subscriber Identity Module (SIM)

Answer: C

Question 6.
You are providing consulting services to a bookstore that wants to set up a wireless network to provide complimentary Internet access. 

Which security option should you choose to provide the widest support for customers who bring their own equipment?

A. Web authentication (Web-Auth)
B. MAC authentication (MAC-Auth)
C. dynamic Wired Equivalent Privacy (WEP)
D. Wi-Fi Protected Access (WPA) with preshared keys (PSK)

Answer: A

Question 7.
Which action does an 802.1X authenticator take if its Extensible Authentication Protocol (EAP) messages to the supplicant time out?

A. keeps the port closed
B. opens the port, by default
C. contacts the authentication server
D. sends a wake-up message to the supplicant

Answer: A

Question 8.
Which mechanisms are part of the 802.11h standard? (Select two.)

A. fast roaming for 802.1X
B. Transmit Power Control (TPC)
C. Inter-Access Point Protocol (IAPP)
D. fast roaming for Voice over IP (VoIP)
E. Dynamic Frequency Selection (DFS)
F. Quality of Service (QoS) for wireless stations

Answer: B, E

Question 9.
A station is configured for passive scanning. 

Which statement describes its behavior?

A. The station sends probe requests on only one channel.
B. The station sends probe requests on all supported channels.
C. The station listens for beacon frames from any access point (AP) within range.
D. The station listens only for beacon frames for previously-accessed wireless LANs (WLANs).

Answer: C

Question 10.
Which mode allows you to connect two wired networks through a wireless connection?

A. in-cell relay mode
B. internetwork mode
C. peer-to-peer mode
D. infrastructure mode

Answer: A

Question 11.
Which type of message does a Radio Port (RP) transmit so that a ProCurve Wireless Edge Services xl Module can detect it on the network?

A. Inter-Access Point Protocol (IAPP)
B. Address Resolution Protocol (ARP)
C. Link Layer Discovery Protocol (LLDP)
D. Internet Control Message Protocol (ICMP)

Answer: C

Question 12.
A company installs the ProCurve Wireless LAN System and requires two Radio Ports (RPs) for the cafeteria. One RP must be installed outside and one RP must be installed inside. Both RPs must support 802.11a, b, and g. 

Which RPs should the company purchase?

A. two RP 210s
B. one RP 220 and one RP 230
C. one RP 220 and one RP 210
D. one RP 230 and one RP 210

Answer: B

Question 13.
You connect a Radio Port (RP) to a ProCurve Switch 2600-PWR Series, which is connected to a wireless services-enabled switch. On the 2600-PWR Switch, port 5 connects to the RP, and port 1 connects to the wireless services-enabled switch. The 2600-PWR Switch is sending traffic from other VLANs to the wireless services-enabled switch. 

Which commands must you enter on the 2600-PWR Switch to enable the Wireless Module to detect the RP? (Select two.)

A. vlan 2100 tagged 1
B. vlan 2100 tagged 5
C. vlan 2100 untagged 5
D. vlan 2100 untagged 1
E. auto provisioning enable

Answer: A, C

Question 14.
Which virtual LAN (VLAN) or VLANs are automatically created on the wireless services-enabled switch if auto-provisioning is enabled?

A. Radio Port VLAN
B. the VLAN assigned to WLAN 1
C. any dynamic VLAN assigned to wireless users
D. any VLAN created on the Wireless Edge Services xl Module

Answer: A


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for FN0-202 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "FN0-202" Exam

FNC4-7E Foundry Networks Certified Layer 4-7 Engineer

 Question 1.
How many cache groups can be used in Transparent Cache Switching:

A. 5
B. 4
C. 1
D. 3
E. 2

Answer: B

Question 2.
Session Capacity Threshold defines:

A. The percent of remaining sessions available on the ServerIron
B. The total number of sessions used on the ServerIron
C. The total number of sessions that are configured on the real servers
D. The total session capacity of the ServerIron

Answer: A

Question 3.
Using show server real, if you see UNBND:

A. The application is bound to the VIP
B. The application port for the real server is not bound to the real server
C. The application cannot be found
D. The VIP is bound to the real server
E. The application needs to be bound to the real server

Answer: D

Question 4.
Using show server real, if you see UNBND:

A. The application is bound to the VIP
B. The application cannot be found
C. The application needs to be bound to the real server
D. The application port for the real server is not bound to the real server
E. The VIP is bound to the real server

Answer: E

Question 5.
Filters on the ServerIron configured for Server Load Balancing are:

A. Set to drop any connections specified by the filter
B. Applied to packets directed to the VIP
C. Used to redirect packets to the Internet
D. Set to drop traffic to or from specified ports

Answer: B

Question 6.
When configuring real servers, there must be backup servers in order to have primary servers

A. False
B. True

Answer: A

Question 7.
What is the default SLB behavior for Server Load Balancing for packets from the ServerIron to the real server?
Choices:
1) Packets from the ServerIron to the real server
   a. Destination translates address from the VIP to the real serverIP
   b. Source translate the clients IP address
2) Packets from the ServerIron to the real server
   a. Destination translates address from the VIP to the real server IP
   b.Source leaves the clients IP address unchanged
3) Packets from the ServerIron to the real server
   a. Destination leave the clients IP address unchanged
   b. Source Translate the real server IP address into a VIP address
4) Packets from the ServerIron to the real server
   a. Destination Leave the real server IP address unchanged
   b. Source leaves the clients IP address unchanged

A. 4
B. 2
C. 1
D. 3

Answer: B

Question 8.
Configuring a remote server as primary will include it:

A. As the primary remote backup server
B. As the primary backup server
C. In the VIP balancing with the local servers
D. As the server to access when all the locals have failed

Answer: C

Question 9.
What ServerIron CLI command enables FWLB for TCP.

A. ip policy 1 fw tcp 0 global
B. ip policy 1 fw tcp 1 global
C. ip policy 1 fw udp 1 global
D. server fw-port 5

Answer: A

Question 10.
When configuring Hot Standby Redundancy, the configuration from one ServerIron can be copied to another ServerIron exactly except for:

A. The management address and the MAC address
B. The MAC address
C. The sync-link address
D. The management address

Answer: D



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.