A) The configuration is not deployed.
B) The WLAN is configured at a lower level in the Managed Network hierarchy.
C) The Mobility Master (MM) does not have an active PEFNG license.
D) The WLAN is configured as a hidden SSID.
Correct Answer
verified
A) The MC maintains its current licenses for 30 days.
B) The MC loses all licenses and cannot support APs or clients.
C) The MC contacts Aruba Activate and uses the licensing limits defined there.
D) The MC maintains only licenses that have been locally installed on it.
Correct Answer
verified
A) Entries in the guest user database do not expire.
B) A Static host list can only contain a list of IP addresses.
C) Entries in the guest user database can be deleted.
D) Entries in the local user database cannot be modified.
E) The endpoints database can only be populated by manually adding MAC addresses to the table.
Correct Answer
verified
A) users who have connected to the SSID, but have not yet attempted authentication
B) users who successfully authenticate and are assigned to the default role by the RADIUS server
C) users who successfully authenticate and are not assigned a different role by the RADIUS server
D) users who fall authentication
Correct Answer
verified
A) Choose the Internal captive portal with email registration option for the guest WLAN. Choose the Internal captive portal with email registration option for the guest WLAN.
B) Choose ClearPass or the other external captive portal option for the guest WLAN. Choose ClearPass or the other external captive portal
C) Make sure to create a guest provisioning account for the guest WLAN.
D) Disable authentication in the captive portal profile for the guest WLAN.
Correct Answer
verified
A) Assign switch ports connected to APs to VLANs associated with the desired subnets.
B) Set the VLANs associated with desired subnets in the WLAN settings.
C) Configure firewall policies that permit the desired subnet, and add them to the initial role for the WLAN.
D) In the WLAN settings, configure User role rules with the desired subnet addresses as match criteria.
Correct Answer
verified
A) Configuration of the Enforcement Policy.
B) An error in the role mapping policy.
C) Failure to select an appropriate authentication method for the authentication request.
D) Implementation of a firewall policy on ClearPass.
E) Failure to find an appropriate service to process the authentication request.
Correct Answer
verified
A) redirection of guests to an external captive portal
B) customization of the internal captive portal login page
C) addition of custom rules to control access for authenticated guests
D) provision of DHCP services to unauthenticated guests
Correct Answer
verified
A) These show the total amount of traffic the guest transmitted, as seen through RADIUS CoA packets from the NAD to ClearPass.
B) These show the total amount of traffic the NAD transmitted to ClearPass, as seen through RADIUS accounting messages from the NAD to ClearPass.
C) These show the total amount of traffic the guest transmitted after account expiration, as seen through RADIUS accounting messages sent from the NAD to ClearPass.
D) These show the total amount of traffic the guest transmitted, as seen through RADIUS CoA packets from the client to ClearPass.
E) These show the total amount of traffic the guest transmitted, as seen through RADIUS accounting messages sent from the NAD to ClearPass.
Correct Answer
verified
A) Run a Traffic Analysis report on the MM.
B) Add Aruba AirWave to the solution.
C) Enable archival from the MM interface Maintenance windows.
D) Make sure that MM has sufficient AppRF licenses.
Correct Answer
verified
A) with AirMatch
B) with Rule Based Client Match
C) with legacy ARM
D) with legacy Client Match
Correct Answer
verified
A) Enforcement Policy
B) Posture token derivation
C) Role Mapping
D) Endpoint Profiler
E) Chained simulation
Correct Answer
verified
A) If the user is not found in the local user repository and remotelab AD, a reject message is sent back to the NAD.
B) If the user is not found in the local user repository but is present in the remotelab AD, a reject message is sent back to the NAD.
C) If the user is not found in the local user repository, a reject message is sent back to the NAD.
D) If the user is not found in the remotelab AD but is present in the local user repository, a reject message is sent back to the NAD.
Correct Answer
verified
A) Move the user any svc-dhcp permit rule to the bottom of the list. Move the user any svc-dhcp permit rule to the bottom of the list.
B) Remove the deny rule from the policy. Remove the deny rule from the policy.
C) Use the correct service alias in the user any svc-dhcp permit rule. Use the correct service alias in the rule.
D) Change user to any in the user any svc-dhcp permit rule. Change user to any in the
Correct Answer
verified
A) 40 AP licenses on the MM and no licenses on the MC
B) 400 AP licenses on the MM and no licenses on the MC
C) 800 AP licenses on each MC and no licenses on the MM
D) 800 AP licenses on the MM and 40 AP licenses on each MC
Correct Answer
verified
A) to ensure server certificate validation does not fail due to client clock sync issues
B) to set expiry time in client certificate to a few minutes longer that the default setting
C) to adjust clock time on client device to a few minutes before current time
D) to ensure client certificate validation does not fail due to client clock sync issues
E) to set start time in client certificate to a few minutes before current time
Correct Answer
verified
A) It sends all user traffic in a GRE tunnel to a central Mobility Controller (MC) , and it sends control traffic in an IPsec tunnel to the controller.
B) It sends user and control traffic in two separate IPsec tunnels to the Mobility Controller (MC) .
C) It sends all employee and control traffic in a GRE tunnel to a central Mobility Controller (MC) , and it bridges all guest traffic locally.
D) It sends traffic designed to the corporate network in an IPsec tunnel to a central Mobility Controller (MC) , and it bridges other traffic locally.
Correct Answer
verified
A) It denies both packets.
B) It denies the packet from Client 1 and permits the packet from Client 2.
C) It permits both packets.
D) It permits the packet from Client 1 and denies the packet from Client 2.
Correct Answer
verified
A) Onboard Provisioning, Onboard Authorization, Onboard Pre-Auth
B) Onboard Authorization, Onboard Provisioning, Onboard Authorization
C) Onboard Provisioning, Onboard Pre-Auth, Onboard Authorization
D) Onboard Provisioning, Onboard Authorization, Onboard Provisioning
E) Onboard Provisioning, Onboard Pre-Auth, Onboard Authorization, Onboard Provisioning
Correct Answer
verified
A) to check license usage and determine the need for additional licenses
B) to generate reports about traffic patterns and network usage over the past several months
C) to view system usage statistics for the MM and troubleshoot potential issues
D) to analyze short term trends in network usage by client, AP, and application
Correct Answer
verified
Showing 21 - 40 of 40
Related Exams