which path should you take to access the correct screen?
In order to create a new VLAN in an MSM controller configuration, which path should you take to
access the correct screen?
when is a user data tunnel created?
When Centralized Access Control is configured as Automatic, when is a user data tunnel created?
What distinguishes an HP MSM460 AP from an HP MSM430 AP?
What distinguishes an HP MSM460 AP from an HP MSM430 AP?
Which requirement applies to this scenario?
An MSM administrator creates an access-controlled VSC, which is not the default VSC, on a
standalone MSM Controller The controller should implement DHCP relay on this VSC; clients will
receive IP addresses from an external DHCP server The DHCP scope for the clients uses
192.168.1.0/24 and sets the default gateway to 192.168.1.1. The 192.168.1.0/24 subnet is
reserved for the wireless clients and does not exist in the LAN.
Which requirement applies to this scenario?
What should be included in the DHCP option list?
A company has two MSM760 Controllers that form a team. Some of the company’s APs connect
in remote offices and require Layer 3 discovery settings. The company has selected the DHCP
option for Layer 3 discovery.
What should be included in the DHCP option list?
Which action describes the correct setting to meet these requirements?
A company has an HP MSM solution that consists of an HP MSM760 Access Controller and
controlled HP MSM APs. The solution includes a VSC that enforces local Web-Auth (HTMLbased user login) using web pages and guest accounts configured on the controller The company
wants to prevent guests from logging in after normal business hours. Which action describes the
correct setting to meet these requirements?
Which devices negotiate the Extensible Authentication Protocol (EAP) method during the 802.1X authentication p
Which devices negotiate the Extensible Authentication Protocol (EAP) method during the 802.1X
authentication process?
Which statement accurately describes this vulnerability?
A company CEO hears about Hole 196 and is concerned that WPA/WPA2 will not protect the
company’s wireless communications from eavesdroppers.
Which statement accurately describes this vulnerability?
Which 802.11 frames can be sent at any supported rate (as opposed to the basic rate)?
Which 802.11 frames can be sent at any supported rate (as opposed to the basic rate)?
Which adjustment would cause the ACS to function more efficiently?
The MSM APs in an MSM solution are configured to use Automatic Channel Selection (ACS) on
their 2.4 GHz radios. Which adjustment would cause the ACS to function more efficiently?