A. APs of a specific type
B. All APs
C. APs in particular AP Group
D. APs designated as Air Monitors
E. APs meeting specified search criteria
A. To let hackers know which ports are open on your firewall
B. To aid in troubleshooting firewall policy configuration
C. To tell down stream routers to use a more appropriate router
D. To let the system count the violations
E. To let your users know they they are in violation of corporate policies
A. LAN
B. Remote Mesh
C. Roaming
D. LAN Mesh
E. Remote
A. 4.9 GHz devices
B. MAC addresses of neighboring APs
C. Security threats in the surroundings
D. Type of non-802.11 interference detected
E. Interfering Clients connected to other APs
A. One less than the number of firewall policies
B. One per authentication type
C. The same number as firewall policies
D. The same number as SSIDs
E. As many as necessary
A. Roles are not used on the Aruba system
B. The Logon Role
C. Authenticated role
D. Pre-Authentication role
E. Unauthenticated role
A. HSRP
B. SNMP
C. BGP
D. AES Encryption
E. Blowfish encryption
A. Domain name
B. Netbios name server
C. Pod name
D. Default router
E. Option 43
A. PSK
B. IPSEC
C. WEP Keys
D. 802.1X
E. Captive Portal