hown in the exhibit, does the Comware switch drop or permit each frame as it arrives on port GigigabitEthernet
Which security protocol introduces vulnerabilities because the password is sent in plaintext and can be interc
Which security protocol introduces vulnerabilities because the password is sent in plaintext and
can be intercepted and easily read?
Which security protocol requires the servers to use digital certificates?
Which security protocol requires the servers to use digital certificates?
How should the network administrator complete this task?
An HP Provision ASIC switch implements connection rate filtering. When an endpoint violates the
connection rate policy, its traffic is filtered for less than 30 seconds. The company wants violator
traffic to be filtered for about one minute.
How should the network administrator complete this task?
Which technology should be used to tunnel multicast traffic securely across a network?
Which technology should be used to tunnel multicast traffic securely across a network?
What must the administrator verify when configuring IMC to discover the switches?
A network administrator plans to use HP Intelligent Management Center (IMC) to manage a
network with thousands of HP switches. The administrator wants to use IMC for functions such as
configuring ACLs and VLANs on multiple switches at once.
What must the administrator verify when configuring IMC to discover the switches?
which version of SNMP is implemented by default?
A network administrator is deploying HP 5800 switches at the access layer and wants to manage
them with HP Intelligent Management Center (IMC). When SNMP is enabled on these switches,
which version of SNMP is implemented by default?
Where does a Comware switch direct sFlow samples?
A network administrator wants to configure a Comware switch to send HP Intelligent Management
Center (IMC) sFlow samples. Where does a Comware switch direct sFlow samples?
What explains this behavior?
A network administrator deploys several HP MSM APs and an HP MSM Controller. The APs
discover the controller, establish management tunnels, and become synchronized. The
administrator wants to check some settings on one of the APs and attempts to reach its web
browser interface, but the request times out.
However, a ping to the AP succeeds.
What explains this behavior?
How should the network administrator connect the controller to the corporate LAN?
A company is deploying an HP MSM760 Controller that will control approximately 80 HP MSM
APs. The HP MSM solution will provide wireless guest services and a WLAN for employees, which
is secured with WPA2 and 802.1X.
The controller will perform the following functions:
Handle all guest traffic
Provide DHCP services for guest clients
Force guests to log in through a web page and implement access controls
How should the network administrator connect the controller to the corporate LAN?