Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

HP HP0-729 Exam - Cheat-Test.com

Free HP0-729 Sample Questions:

Q: 1 At a customer site, you have defined VLAN 128 on a ProCurve Switch 5300xl and on a connected Access Point 530. You must now configure an Access Profile in Identity Driven Manager that will assign Marketing users to this VLAN. However, the VLAN is not listed among the choices for the Access Profile. Which step is necessary to make the VLAN available?
A. Define the AP 530 as a Location.
B. Perform a rediscovery of the switch.
C. Define the VLAN as a Network Resource.
D. Import Marketing users from Active Directory.
Answer: B

Q: 2 Which applications must be hosted on the same computer to enable ProCurve Manager Plus/Identity Driven Manager to function in a Windows environment? (Select two.)
A. PCM+ server
B. DHCP server
C. Identity Driven Manager
D. Internet Authentication Service
E. Active Directory domain controller
Answer: A, C

Q: 3 At a customer site, you must configure Identity Driven Manager to enforce access policies for users who will use 802.1X authentication to connect through an Ethernet port on a ProCurve Switch 5300xl. Where can you enter the RADIUS shared secret?
A. CLI of the Switch 5300xl
B. network setup for client computers
C. Remote Access Policy on RADIUS server
D. Location setting in Identity Driven Manager
Answer: A

Q: 4 At a customer site where PCM+/IDM is deployed, 50 new users are added to Active Directory groups already imported into IDM. When will these users appear in IDM?
A. when PCM+/IDM performs auto-discovery
B. when the IDM RADIUS Agent polls Active Directory
C. when the users are authenticated through RADIUS
D. when the IDM Access Policy is deployed to the realm
Answer: C

Q: 5 In Identity Driven Manager, which object contains the Time, Location, and System parameters?
A. Identity Profile
B. Access Profile
C. Access Policy Group
D. Network Resource Access Rule
Answer: C

Q: 6 In Identity Driven Manager, which user-defined object identifies specific switch ports and access points where users connect to the network?
A. Location
B. Access Profile
C. Connection Profile
D. Network Resource
Answer: A

Q: 7 At a customer site, a technician creates a new Sales group in Active Directory and adds 20 new users to the group. When the technician imports the users into IDM, they are all assigned to the Default Access Policy Group. What is the cause of this assignment?
A. The technician did not include the Sales group in the import.
B. The technician did deploy the policy to the realm after importing users.
C. The technician did not enable the IDM RADIUS Agent before importing users.
D. The technician did not create a Sales Access Policy Group before importing users.
Answer: A

Q: 8 At a customer site, a technician configures 802.1X authentication for four switch ports on a ProCurve Switch 5300xl. The technician does not issue a command specifying an unauthenticated VLAN ID. Presuming DHCP is properly configured for all VLANs, how will this configuration affect VLAN membership and IP addressing for unauthenticated users?
A. The users will receive addresses in the range associated with VLAN 1.
B. The users will receive addresses in the range associated with the untagged VLAN on the ports where they connect.
C. The users will be assigned addresses in the range associated with the VLAN ID returned by the RADIUS server.
D. The users will not be assigned to any VLAN. Windows XP clients will receive private addresses in the 169.254.0.0/16 range.
Answer: D

Q: 9 In a Windows environment, what is a role of the IDM RADIUS Agent?
A. to add RADIUS attributes to a RADIUS-ACCEPT packet from IAS
B. to act as a RADIUS proxy server for all clients associating through Locations defined in IDM
C. to monitor the Windows Active Directory and IAS for evidence of unauthorized logins or access attempts
D. to ensure that user accounts created in RADIUS databases on ProCurve access points and are correctly added to Active Directory on the Domain Controller
Answer: A

Q: 10 Which ProCurve radio device features a built-in RADIUS server?
A. Radio Port 210
B. Radio Port 230
C. Access Point 420
D. Access Point 530
Answer: D

Q: 11 What sources of user identity are directly supported by the user import feature in Identity Driven Manager? (Select three.)
A. XML file
B. CSV file
C. RADIUS server
D. LDAP server
E. SQL database
F. ODBC database
G. Windows Active Directory
Answer: A, D, G

Q: 12 At a customer site, you are configuring web authentication for guest users who will authenticate through a Wireless Edge Services xl Module. Users associating with the Guest SSID will receive addresses in the range of 192.168.64.0/24 and will be associated with VLAN 64. Why is it necessary to assign an IP address in the range of 192.168.64.0/24 to the VLAN 64 interface on the Wireless Edge Services xl Module?
A. to enable clients to communicate with the VLAN 64 default gateway
B. to enable client browsers to be redirected to the web authentication page
C. to enable the Wireless Module to act as a RADIUS client for VLAN 64 users
D. to enable the Wireless Module to communicate with ProCurve Manager Plus
Answer: B

Q: 13 At a customer site, an administrator has changed the configuration for the Inventory Access Profile in Identity Driven Manager so that users will be associated with VLAN 64 instead of VLAN 48. However, when users log on, they are still assigned to VLAN 48. Which step is necessary to correct this error?
A. Deploy the policy to the realm.
B. Manually re-discover VLAN 64.
C. Delete VLAN 48 from ProCurve Manager Plus.
D. Re-import affected users into Identity Driven Manager.
Answer: A

Q: 14 At a customer site, PCM+/IDM shows two realm names for an Active Directory domain. One is the company's domain name, ABC.com. The other realm name is the NetBIOS name, ABC. How should the administrator correct this configuration?
A. Wait for automatic realm discovery to resolve the error.
B. Delete both realms and force a manual realm discovery.
C. Define the NetBIOS name as an alias for the other realm and delete the NetBIOS name.
D. Delete the realm name based on the domain name and force a manual realm discovery.
Answer: C

Q: 15 At a customer site, you note that the address variables for a Secure Access 700wl system include two entries for @INTRANET@. How will the system interpret this variable in Allowed Traffic Filters?
A. The system will use the default value.
B. The system will use the user-defined value.
C. The system will merge the values into a single variable.
D. The system will use the value that appears last in the table.
Answer: B

Q: 16 Under what circumstances does a client of the Secure Access 700wl series require a real IP address? (Select two.)
A. The client is configured with a static IP address that is not valid on the secure network.
B. The client uses peer-to-peer applications that require peers to sometimes initiate conversations.
C. The client must be contacted from within the secure network for management and administration.
D. The client is connected to an xl Access Controller Module that is in a different subnet than the Access Control Server.
E. The client cannot obtain an address in the system's default address range because all available addresses are in use.
Answer: B, C

Q: 17 Under what circumstances is it necessary to configure a virtualized Connection Profile on the Secure Access 700wl series?
A. when a single xl Access Controller Module must support multiple access points
B. when a single Switch 5300xl must support multiple xl Access Controller Modules
C. when a single Access Control Server must support multiple xl Access Controller Modules
D. when a single xl Access Controller Module must support multiple addressing or encryption needs
Answer: D

Q: 18 On the Secure Access 700wl series, what is the effect of associating the "AC Internal Blocker" Redirected Traffic Filter with an Access Policy?
A. Clients cannot access the Administrative Console.
B. Clients cannot access the @INTRANET@ address range.
C. Clients can access only the 700wl Logon page before authentication.
D. Clients cannot be contacted directly by clients on the secure network.
Answer: B

Q: 19 On the Secure Access 700wl series, what is the difference between a custom Traffic Filter and a simple Traffic Filter?
A. All simple Traffic Filters are defined by default when the 700wl is installed. A custom Traffic Filter is user defined.
B. A simple Traffic Filter can apply only to one Access Policy. A custom Traffic Filter can apply to multiple Access Policies.
C. A simple Traffic Filter can apply only to one address range or port. A custom Traffic Filter can apply to multiple address ranges or ports.
D. A simple Traffic Filter uses source address as the only criterion for matching. A custom Traffic Filter can use IP protocol and TCP or UDP source or destination port.
Answer: C

Q: 20 Which configuration item must you access to define an address variable at the Administrative Console of a Secure Access 700wl system?
A. Location
B. Traffic Filter
C. Local Network
D. Global Network
Answer: B

Q: 21 By default, how do users identify themselves to the Secure Access 700wl series as guests?
A. The users must click the "Guest" button on the logon page.
B. The users must be associated with an SSID reserved for guests.
C. The users must be assigned to the "Guest Access" Identity Profile.
D. The users must be associated with a system-defined Guest Access Connection Profile.
Answer: A

Q: 22 At a customer site, several Inventory users have authenticated through the Secure Access 700wl system in the customer Warehouse and received the Any/Any/Authenticated Rights Assignment. You configure a new Rights Assignment that places these users in the Inventory Identity Profile and the Warehouse Connection Profile at the top of the Rights Assignment table. However, while verifying your configuration, you notice one of the clients still is subject to the Any/Any/Authenticated Rights Assignment. How can you resolve this issue?
A. Refresh user rights.
B. Restart the access point.
C. Deploy the policy to the realm.
D. Restart the Access Control Server 745wl.
Answer: A

Q: 23 A Secure Access 700wl system at a customer site uses the default "Guest Access" Access Policy. Which step is necessary to enable guest users to access the Internet?
A. Define an @INTERNET@ address variable.
B. Configure a custom "Internet" Redirected Traffic Filter for guest users.
C. Associate the "Outside World" Allowed Traffic Filter with the Access Policy.
D. Create a Global Network on the ACS with an IP address in the guest address range.
Answer: C

Q: 24 All sales representatives at a customer site must obtain real IP addresses from a DHCP server on the secure network. Which items must be configured on the Secure Access 700wl series to support this requirement? (Select two.)
A. a Connection Profile that places all sales representatives in the same VLAN
B. Authenticated Access Policies for sales representatives that include NAT options set to "When Necessary"
C. a DHCP scope on the xl Access Controller Module synchronized with the scope used by the internal DHCP server
D. DHCP relay enabling the Access Control Server 745wl to relay all DHCP requests to the xl Access Controller Module
E. a Connection Profile and Unauthenticated Access Policy that allows the users to obtain real IP addresses before authentication
Answer: B, E

Q: 25 Which option cannot be enabled in a 700wl Access Policy that must support real IP clients?
A. HTTP proxy
B. QoS marking
C. VPN encryption
D. VLAN tag matching
Answer: C

Q: 26 Which element in a 700wl Rights Assignment is associated with limitations on client bandwidth?
A. Traffic Filter
B. Identity Profile
C. Access Policy
D. Connection Profile
Answer: C

Q: 27 At a customer site, a user associates with a Secure Access 700wl system and is subject to an unauthenticated Access Policy that allows real IP. After logging on, the user is subject to an authenticated Access Policy that requires NAT. How will this affect the users network access?
A. The client will not be allowed to access any network resources and will not be reachable from within the secured network.
B. The client will be allowed to access resources allowed by the Access Policy, but will not be reachable from within the secured network.
C. The client will be allowed to access resources allowed by the Access Policy and will be reachable from within the secured network.
D. The client will not be allowed to access any network resources, but will be reachable from within the secured network.
Answer: B

Q: 28 What is the default value for the @INTRANET@ address variable on a Secure Access 700wl system?
A. the address range defined by the Access Control Server uplink address
B. the address range defined by the xl Access Controller Module uplink address
C. the address range defined by all VLANs configured on the 5300xl hosting the xl Access Controller Module
D. the address range defined by all router interfaces on the default gateway configured for the Access Control Server
Answer: A


© 2014 Cheat-Test.com, All Rights Reserved