Refer to the exhibits.
Click here for Exhibit 2 -Portion of VSC settings and example of VSC binding Exhibit 1 shows the network topology for an HP MSM Controller and its controlled HP MSM APs. Assume that
the APs have successfully discovered the controller and become managed. Exhibit 2 shows a portion of the VSC settings for a VSC that this solution supports.
This VSC is the default VSC.
The controller must provide DHCP services for clients connected to this VSC, but does not need to provide addresses for any other purpose. The global DHCP settings include two options for
listening for requests. Which options must be enabled, and which can be disabled?
Hot Area:
A network administrator maps a network profile with aVLAN ID 512 to the LAN port of an HP MSM765zl Mobility Controller The network administrator configures an IP interface for this profile and intends to contact and manage the controller
on this interface.
All other settings remain at default.
What is one step that the network administrator must complete before connecting to the controller on its new IP address?
A. Set the untagged LAN port network interface IP address to none.
B. Enable Spanning Tree Protocol (STP) on the interface.
C. Select the new IP interface as an active interface in the Controller 籑anagement>; Management tool window
D. Set the IP interface as the authorized egress VLAN in the default VSC.
HP MSM APs support a VSC that specifies 54 Mbps as the highest supported data rate. Several clients connect to the WLAN associated with this VSC. What is the throughput and bandwidth that the clients experience?
A. All clients connected to an AP radio share a throughput of less than 54 Mbps, but a client can transmit or receive at 54 Mbps.
B. When multiple clients connect to an AP radio, each of those clients is limited to 54 Mbps.
C. All clients connected to the VSC share a total of 54 Mbps of throughput regardless of how many AP radios support the VSC.
D. When multiple clients connect to an AP radio, each client typically receives about 50 Mbps throughput.
When Centralized Access Control is configured as Automatic, when is a user data tunnel created?
A. when more than one controller is on the network that has the same access control configuration
B. when tunnels are manually configured and available
C. when IPSec is set up between two controllers
D. when a synchronized AP and its controller are on different subnets
A customer has 600 APs and requires N+1 redundancy for the wireless services.
Which teaming solution meets the customer's needs?
A. Four MSM760 Controllers with 600 licenses total
B. Three MSM760 Controllers with 800 licenses total
C. Four MSM760 Controllers with 900 licenses total
D. Three MSM760 Controllers with 600 licenses total
APs. What could occur if AP 2 fails?
A. AP 1 establishes a session with AP 3.
B. AP 1 establishes a session with AP 4.
C. AP 4 establishes a session with AP 5.
D. AP 4 establishes a session with AP 3.
Which feature differentiates the default VSC from other VSCs that are configured on an MSM Controller?
A. Traffic from the default VSC is always routed out the Internet port.
B. The default VSC can be used to control untagged wired traffic that is received on the LAN port.
C. The default VSC must always be access controlled.
D. Wireless clients that fail authentication to another VSC are assigned to this VSC.
What is the term used for the role of an MSM controller when it is managing RADIUS server logins?
A. RADIUS authenticator
B. RADIUS supplicant
C. RADIUS proxy
D. RADIUS client
Refer to the exhibit.
A hospital has an HP MSM solution that provides guest access, including Web-Auth to the local login pages of the controller. The exhibit shows the Hospital VSC used by guests. The network administrators have created an isolated guest VLAN, VLAN 100. The HP MSM Controller should provide the same guest services to wired clients connected to this VLAN. The network administrator has configured a network profile and the required settings. How should the controller apply the profile in the VSC?
A. As the egress VLAN for unauthenticated users
B. As the egress VLAN for authenticated users
C. As the ingress VLAN
D. As the egress VLAN for intercepted users
Refer to the exhibit.
The exhibit shows a VSC setting that is disabled. A network administrator is creating an access- controlled VSC for guest access. Which use case does disabling this setting impact?
A. The company has central RADIUS servers and web servers, which it wants to use to authenticate guests.
B. The controller is part of a teaming solution.
C. Guests need to log into the controller's local pages to receive access to any resources.
D. Guests need to receive access to resources on their local subnet before authenticating.