HP0-Y44 - Implementing and Troubleshooting HP Wireless Networks

Go back to HP

Example Questions

A company has an HP MSM solution that consists of an HP MSM Controller and controlled HP MSM APs. The solution includes an access VSC, which enforces HTML-based user login (Web-Auth) using the controller's internal login pages. The network administrator knows that many users who will connect to the VSC clients configured for Web proxy to a server that operates on port 8080. Which steps can the network administrator take to help clients log in and use the network? (Select two) A company is using the internal login pages of an HP MSM Controller to provide Web-Auth service to guests but wants to customize these pages. The designer wants to create wants to create logout links in the custom welcome pages an example of valid code for this purpose. The network administrator can refer the Web designer to one default controller that includes a logout button. Which file is this? What is the purpose of the uncontrolled port in the 802.1X authentication process? A company has an HP HSM solution that consists of an HP MSM760 Access Controller and controlled HP MSM317 Access Devices. The solution supports a VSG that enforces HTML based user login (Web-Auth) using the controller's internal login pages. The company wants to customize these pages. What are the correct guidelines for customization? A controlled HP MSM AP radio is configured to select its channel automatically. When does the AP run the algorithm lo select a channel? A network administrator is troubleshooting a problem with HP MSM APs that fail to become controlled by the HP MSM Controller. The APs are deployed across a layer 3 boundary from the controller, and their DHCP server provides them with the controller’s address. The network administrator observes the following behavior in the controller’s web browser interface: - The APs appear in the Discovered APs section. - The APs status remains Pending, and the Diagnosis reads Waiting acceptance. - The APs never progress to a different status. What might be the problem? A network administrator has installed an HP MSM765 zl controller in slot D of an HP 8212 zl switch. The administrator plans to configure a management IP address on the controller's (untagged) internet port network and have APs communicate with the controller on that address. This solution is in the subnet that is associated with VLAN2 in the corporate LAN. How should the administrator configure the internet port network to connect in the correct VLAN? A network administrator is troubleshooting a problem with HP MSM APs that fail to become controlled by the HP MSM Controller. The APs are deployed across a layer 3 boundary from the controller, and their DHCP server provides them with the controller's address. The network administrator observes the following behavior in the controller's web browser interface: - The APs appear in the Discovered APs section. - The APs status remains Pending, and the Diagnosis reads Waiting acceptance. - The APs never progress to a different status. What might be the problem? A company wants to increase its security by adding its security by adding a wireless intrusion detection system/intrusion prevention system (IDS/IPS), which could detect rogue APs and Wi-Fi Protected Access (WPA) attacks. Which product would provide this extra layer of security? In an 802.11 infrastructure mode cell, how can stations communicate? A company has an HP MSM solution that consists of an HP MSM760 Access Controller and controlled HP MSM APs. The company wants to prevent guests from logging in after normal business hours. Which action describes the correct settings to meet these requirements? How does 802.1h (DFS) help 802.11 devices avoid interference? What distinguishes an HP MSM466 AP from an HP MSM460 AP? (Select two) Which statement correctly describes the security options available for the local mesh links controlled MSM APs? A network administrator wants to collect and monitor statistics from across an enterprise wireless network. The network includes three HP MSM765 Controllers and 440 HP MSM APs. The network administrator also wants to monitor other network infrastructure devices, including HP and non-HP switches. Which solution provide this capability? A company has an HP MSM solution that consists of an HP MSM 760 Controlled HP MSM APs. The solution supports a VSC that enforces HTML based user login (Web-Auth) using the controller's internal login pages. The administrator wants to customize the messages that are displayed when a user fails authentication. The network wants to make the changes as simple edits to the text that is displayed by default rather than change the underlying code. In which file does the network administrator find the text edit? The 802.11n radio in one AP supports three spatial streams. The 802.11n radio in another AP supports two spatial streams. Which benefit does the first AP radio provide over the second AP radio? A network administrator is configuring a VSC that enforces WPA2 with preshared keys (PSK) on an HP Controller. The VSC must support Voice over IP (VoIP) applications, so the network administrator enables opportunistic key caching to support fast roaming. When the network administrator saves the VSC settings, an error indicates 802.1X is required. How should the network administrator resolve this error? A customer is considering an HP MSM720 Access Controller to manage and provide other services for wireless solution. The deployment includes 40 HP MSM APs. The customer would like the option to support additional APs in the future. Which product offering should the customer consider instead? How does opportunistic key caching speed up the roaming process? A company is using the internal login pages of an HP MSM Controller to provide Web-Auth service to guests but wants to customize these pages. The designer wants to create logout links in the custom welcome pages an example of valid code for this purpose. The network administrator can refer the Web designer to one default controller that includes a logout button. Which file is this? What disfurnishes an HP MSM466 AP from an HP MSM460 AP? (Select two) A company has an HP MSM solution that consists of an HP MSM 760 Controlled HP MSM APs. The solution supports a VSC that enforces HTML based user login (Web- Auth) using the controller’s internal login pages. The administrator wants to customize the messages that are displayed when a user fails authentication. The network wants to make the changes as simple edits to the text that is displayed by default rather than change the underlying code. In which file does the network administrator find the text edit? HP MSM APs support a VSC that specifies 54 Mbps as the highest supported data rate. Several clients to the WALN associated with this VSC. What is the throughput and bandwidth that experience? Which 802.11n technology involves a radio transmitting the same data on more than one antenna? Which TAP method requires the supplicant and the authentication server to mutually authenticate with digital certification? HP MSM APs support a VSC that specifies Mbps as the highest supported data rate. Several clients to the WALN associated with this VSC. What is the throughput and bandwidth that experience? Which statement accurately describes 802 11i Mixed Mode? A controlled IIP MSM AP radio is configured lo select its channel automatically. When does the AP run the algorithm lo select a channel? A company has an HP MSM solution that provides guest access, including Web-Auth to the local login pages of the controllers. The VSC that provides gust access is not the default VSC. The network administrator have created an isolated guest VLAN, VLAN 100. The HP MSM Controller provide the same guest services to wired clients connected to this VLAN. What must network administrator configure for this network profile? What is a proper use for an ingress VLAN in an HP MSM VSC? A company wants to increase its security by adding a wireless intrusion detection system/intrusion prevention system (IDS/IPS), which could detect rogue APs and Wi-Fi Protected Access (WPA) attacks. Which product would provide this extra layer of security? What distinguishes an HP MSM460 from an HP MSM 430 AP? A company has HP MSM solution that consists of an HP MSM760 Controller and controlled HP APs. The solution supports a VSC that enforces HTML based user login (Web Auth) using the controller's internal login pages. The company wants users to see the login page, read a legal agreement, and then click a button to receive free access. For this purpose, the company Web designer has customized the appearance of the login page but not altered underlying code. How should the network administrator configure authentication in the VSC? What distinguishes MSM APs that implement a dynamic mesh link from HP MSM APs that implement a static link? A network administrator has installed an HP MSM765 zl controller in slot D of an HP 8212 zl switch. The network administrator plans to configure management IP address on the controller's (untagged) internet port network and have APs communicate with the controller on that address. This IP address is the only one necessary for the solution. Because the controller does not used to receive traffic on its on its LAN port, how should the administrator configure the interface on the switch side? A network administrator has defined a new network profile on an HP MSM765 zl Mobility Controller. The network administrator now wants to associate the profile with an IP interface. However, when the network administrator moves to the Controller >> Network > IP interface window, the button for adding a new interface in grayed out to and cannot be checked. What should the administrator do? A network administrator has installed an HP MSM765 zl controller in slot D of an HP 8212 zl switch. The administrator plans to configure a management IP address on the controller’s (untagged) internet port network and have APs communicate with the controller on that address. This solution is in the subnet that is associated with VLAN2 in the corporate LAN. How should the administrator configure the internet port network to connect in the correct VLAN? A company's CEO has heard about Hole 196 and is connected that WPA/WPA2 will not protect the company's wireless communication from eavesdroppers. Which statement describes the vulnerability? The use Controller for Access Control is selected option is selected for VSC that is defined on an MSM Controller. The VSC also has these security strings: - 802.1X authentication, using an external RADIUS server - WPA2 encryption - Wireless MAC filter with block list. - Wireless IP filter Which security setting is processed first? A company has an HP MSM solution that consists of an HP MSM Controller and controlled HP MSM APs. The solution includes an access VSC, which enforces HTML-based user login (Web- Auth) using the controller's internal login pages. The network administrator knows that many users who will connect to the VSC clients configured for Web proxy to a server that operates on port 8080. Which steps can the network administrator take to help clients log in and use the network? (Select two) A company has an HP MSM solution that consists of an HP MSM Controller and controlled HP MSM APs. The solution includes an access VSC, which enforces HTML-based user login (Web- Auth) using the controller’s internal login pages. The network administrator knows that many users who will connect to the VSC clients configured for Web proxy to a server that operates on port 8080. Which steps can the network administrator take to help clients log in and use the network? (Select two) A network administrator configures most settings for an HP MSM team from the team web browser interface. However, the network administrator must configure a few settings from the interface of the individual member. What are two of these settings? (Select two) A company has an environment with multiple HP MSM Controllers that do not form a team. The company wants to control precisely which controllers manage which APs. What is one feature that network administrator can implement for this purpose? A network administrator has defined a new network profile on an HP MSM765 z1 Mobility Controller. The network administrator now wants to associate the profile with an IP interface. However, when the network administrator moves to the Controller >> Network > IP interface window, the button for adding a new interface in grayed out to and cannot be checked. What should the administrator do? A hotel chain requires an HP MSM for guests who log in through web pages hosted on the HP MSM Controller. The company wants to customize the pages with its own logos, pictures, and messaging. What are valid ways that the network administrator can lead the customized pages on the controller? (Select two) A company has an HP HSM solution that consists of an HP MSM760 Access Controller and controlled HP MSM317 Access Devices. The solution supports a VSG that enforces HTML based user login (Web-Auth) using the controller’s internal login pages. The company wants to customize these pages. What are the correct guidelines for customization? A company’s CEO has heard about Hole 196 and is connected that WPA/WPA2 will not protect the company’s wireless communication from eavesdroppers. Which statement describes the vulnerability? A company is deploying an HP MSM APs. The HP MSM solution will provide wireless guest services and a WLAN for employees, which is sourced with WPA2 and 802.1X. The controller will: Handle all guest traffic Provide DHCP services for guest clients Force guests to log in through a Web page, and implement access controls How should the network administrator connect the controller to the corporate LAN? The use Controller for Access Control is selected option for VSC that is defined on an MSM Controller. The VSC also has these security strings: - 802.1X authentication, using an external RADIUS server - WPA2 encryption - Wireless MAC filter with block list. - Wireless IP filter Which security setting is processed first?

Study Guides