HP Unified Wired-Wireless Networks and BYOD Sample Questions:
1. Which action does the Wireless Intrusion Prevention System (WlPS) take when it detects that a device is sending frames with a fixed initialization vector?
A) adds the device to the dynamic blacklist
B) captures the frames for future analysis
C) deauthenticates the user
D) logs the event
2. Which factors impact the calculation of the Effective Isotropic Radiated Power (EIRP)?
A) antenna gain, cable loss, and transmit power
B) antenna gain, propagation loss, and transmit power
C) propagation loss, receiver sensitivity, and transmit power
D) antenna height, interference, and receiver signal strength
3. Which command configures the management IP address on a WLAN controller?
A) interface ip address 192.168.0.100 slot 1
B) management-ip address 192.168.0.100 255.255.255.0
C) ip address 192.168.0.100 24
D) oap management-ip 192.168.0.100 slot 1
4. A network administrator has been receiving complaints about dropped voice calls. The administrator looks at the client's information on the access controller. The administrator sees that the clients experiencing dropped voice calls have a roaming status of Normal. The administrator also sees that the clients not experiencing dropped voice calls have a roaming status of Fast Roaming.
What could cause two clients to have different naming statuses?
A) Fast roaming cannot be used for clients using WPA and 802.1X
B) Fast roaming cannot be used when the client is on the edge of cell coverage
C) Fast roaming cannot be used for clients using PEAP/MS-CHAPv2
D) Fast roaming cannot be used for clients using WPA2 and 802.1X
5. Which components participate in the HP BYOD authentication process? (Select two.)
A) User Access Manager
B) User Access Manager DHCP agent
C) BYOD portal server
D) HTTP agent
E) Wireless Service Manager (WSM)
Solutions:
Question # 1 Answer: D | Question # 2 Answer: A | Question # 3 Answer: D | Question # 4 Answer: A | Question # 5 Answer: A,E |