Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

HP HP0-759 Exam - Cheat-Test.com

Free HP0-759 Sample Questions:

1.What is true with regard to Public Key Infrastructure (PKI)?
A: PKI uses a key pair, one private and one public, but does not use digital certificates.
B: PKI is a symmetric key scheme that uses digital certificates and certificate authorities to encrypt messages.
C: PKI uses digital certificates and certificate authorities to manage key exchanges between a sender and receiver.
D: PKI uses a symmetric key scheme to manage key exchange and uses digital certificates to encrypt the message to ensure confidentiality, authentication, integrity and non-repudiation.
Answer: C

2.When designing wireless networks, it is important to remember that government agencies limit the power of RF based networks in certain radio bands. The emitted power of a radio transmitter and any attached antenna is known as its ________.
A: Radiated Radio Frequency Power
B: WIreless System Power Radiation
C: Effective Isotropic Radiated Power
D: Effective Total Power Output
Answer: C

3.A network administrator plans to use a RADIUS server to authenticate access from the console to all the HP ProCurve switches. It is decided that the RADIUS server will be the primary authentication method and no secondary authentication method will be used. What will be the result of this proposed configuration?
A: The primary authentication method for manager-level access through the console port is the RADIUS server; if no RADIUS server is found, then access is denied.
B: The primary authentication method for operator-level access through the console port is the RADIUS server; if no RADIUS server is found, then access is denied.
C: The primary authentication method for manager-level access through the console port is the RADIUS server; if no RADIUS server is found, then only operator-level access is granted.
D: This configuration is not allowed because the console port must allow the use of a username from the local database in the event that the RADIUS server is not reachable.
Answer: D

4.Range can be impacted by obstacles in the signal path of the radio that either absorb or reflect the radio signal. Which factors describe environmental interference that may impact the cell size used on an 802.11b or 802.11g network? Select TWO.
A:wireless IR entertainment system remote controls
B:power lines and power stations
C:wireless 5Ghz telephones
D:900 MHz wireless security alarm system
E:walls that contain metal, cabinets, and metal desks
Answer: B, E

5.The IT department of a local high school has recently installed new HP ProCurve switches. They are setting up Authorized IP Managers to limit management access to the switches. Which access levels can be granted to an Authorized IP Manager? Select TWO.
A:manager
B:administrator
C:supervisor
D:aoperator
E:user
Answer: A, D

6.A software company uses 802.1X to authenticate all users on the network and to allow contract employees access to the network only during normal business hours. What is the best approach for configuring this time restriction?
A: Configure a "Time Restriction" policy and assign the user accounts for each contract employee to the policy.
B: Configure an access policy on the RADIUS server that associates a time restriction with usernames of the contract employees.
C: Create a "contractors" group in Active Directory (LDAP) and assign time restrictions to the group.
D: Configure an access policy on the RADIUS server that associates a time restriction with a "contractors" group.
Answer: D

7.Which Extensible Authentication Protocols will a ProCurve 520wl support? Select TWO.
A:SIM
B:TLS
C:LEAP
D:PEAP
E:EAP-OL
Answer: B, D

8.The 802.11 standard maps to which OSI layers?
A: Physical, Data Link
B: Physical, Data Link, Network
C: Physical, Data Link, Network, Transport
D: Physical, Data Link, Network, Transport, Session
Answer: A

9.During a dinner meeting, you transfer some documents to a customer through your 802.11g wireless card without the aid of an access point. During this process you and he formed ______________.
A: an Independent Basic Service Set
B: an Extended Basic Service Set
C: a WEP Key pair
D: a Standard Basic Service Set
Answer: A

10.Your client has installed ProCurve 520wls to provide wireless network access for his employees. When the access points are first powered on in a default state, which username/password pair would allow you to access the configuration from the web interface?
A: [blank]/public
B: admin/[blank]
C: admin/password
D: [blank]/password
Answer: A


© 2014 Cheat-Test.com, All Rights Reserved