An administrator changes the setting for VLAN 200 on an HP 830 switch from tagged to untagged. How will this change affect the traffic sent over VLAN 200?
A. Traffic sent over VLAN 200 will be forwarded to untagged VLAN 1.
B. Tagged management traffic can no longer be sent on VLAN 200.
C. Traffic sent over VLAN 200 will have the 802.1Q tag removed.
D. Tagged traffic sent over VLAN 200 will be forwarded without changing the 802.1Q tag.
An organization wants to upgrade their wireless network to allow employees to connect using their 802.11ac enabled devices. Which HP access points meet this requirement?
A. HP 425
B. HPMSM466
C. HP MSM430
D. HP 560
Where can a network administrator check for successful authentication in User Access Manager?
A. User Access Log > Auth Failure Log
B. User Access > LDAP Users
C. User Access Log > Access Details
D. User Access > Access Device Log
An organization's security policy mandates the use of 802.1X port based authentication. The organization's security policy also mandates that before an employee's personal device can connect to the wireless network, it must download anti-virus, security patch, and other essential software. What should be configured on the access point to support these requirements?
A. EAP-TLS
B. dynamic WEP
C. portal authentication
D. 802.1X guest VLAN
Which command configures the management IP address on a WLAN controller?
A. interface ip address 192.168.0.100 slot 1
B. oap management-ip 192.168.0.100 slot 1
C. management-ip address 192.168.0.100 255.255.255.0
D. ip address 192.168.0.100 24
Which statement is correct about security on a wireless network?
A. 802.1X with EAP-TLS mode provides encryption without authentication.
B. In MAC authentication, the MAC address can be spoofed.
C. 802.1X with PEAP MSCHAPV2 provides authentication without encryption.
D. MAC authentication provides encryption.
Refer to the exhibit.
A company wants to connect a mid-size branch office to their corporate location. An HP 10500/7500 Unified Wired-Wireless module is deployed at the corporate location. A maximum of six HP MSM access points will be deployed at the branch location.
Which HP device meets these customer requirements and is the most cost effective solution for the branch location?
A. HP 830
B. HP 870
C. HP 2920
D. HP 7500
A company plans to deploy an HP MSM wireless network. The company currently has a RADIUS server that is used to control employee access to the company's Intranet from wired clients. They want to use the same RADIUS server to control employee's access from wireless clients.
The company also wants to allow guests to connect to the wireless network. They want to allow the guests to reach the Internet, but they want to make sure that guests cannot reach the company's Intranet.
Based on these requirements, which traffic optimization scheme should be implemented?
A. Deploy distributed forwarding for employees and distributed forwarding with centralized authentication for guests.
B. Deploy distributed forwarding for employees and centralized access control for guests.
C. Deploy centralized access control for employees and distributed forwarding with centralized authentication for guests.
D. Deploy centralized access control for employees and distributed forwarding for guests.
Which action can a guest manager perform?
A. Manage accounts of other guest managers.
B. Create but not delete guest accounts.
C. Set up corporate users as guests in the self-service page.
D. Extend the lifetime of guest accounts.
Refer to the exhibit.
Based on the access controller configuration shown in the exhibit, when can newly discovered access points (AP) join this AC?
A. An AP can automatically join if the controller recognizes the AP serial number
B. An AP can automatically join if the controller recognizes the AP IP subnet address
C. An AP can automatically join if the controller recognizes the AP name
D. An AP can automatically join if the controller recognizes the AP model type