Filters
Question type

Study Flashcards

Exhibit 1 Exhibit 1   Exhibit 2   A company has an Aruba Mobility Master (MM) -based solution and needs a new WLAN for the corporate campus. A network administrator completes the creation of this WLAN, as shown in Exhibit 1. When administrators try to test a connection to the WLAN, the WLAN does not show up in the list of WLANs on the client. The administrator can see the WLAN in the list, as shown in Exhibit 2. What is the error? A)  The configuration is not deployed. B)  The WLAN is configured at a lower level in the Managed Network hierarchy. C)  The Mobility Master (MM)  does not have an active PEFNG license. D)  The WLAN is configured as a hidden SSID. Exhibit 2 Exhibit 1   Exhibit 2   A company has an Aruba Mobility Master (MM) -based solution and needs a new WLAN for the corporate campus. A network administrator completes the creation of this WLAN, as shown in Exhibit 1. When administrators try to test a connection to the WLAN, the WLAN does not show up in the list of WLANs on the client. The administrator can see the WLAN in the list, as shown in Exhibit 2. What is the error? A)  The configuration is not deployed. B)  The WLAN is configured at a lower level in the Managed Network hierarchy. C)  The Mobility Master (MM)  does not have an active PEFNG license. D)  The WLAN is configured as a hidden SSID. A company has an Aruba Mobility Master (MM) -based solution and needs a new WLAN for the corporate campus. A network administrator completes the creation of this WLAN, as shown in Exhibit 1. When administrators try to test a connection to the WLAN, the WLAN does not show up in the list of WLANs on the client. The administrator can see the WLAN in the list, as shown in Exhibit 2. What is the error?


A) The configuration is not deployed.
B) The WLAN is configured at a lower level in the Managed Network hierarchy.
C) The Mobility Master (MM) does not have an active PEFNG license.
D) The WLAN is configured as a hidden SSID.

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

A company has a Mobility Master (MM) -based solution. There is a hardware issue with the MM appliance, and, as result, all connectivity is lost between the appliance and the network. The network manager is concerned about how this will impact licensing. How will the Mobility Controller (MC) be affected?


A) The MC maintains its current licenses for 30 days.
B) The MC loses all licenses and cannot support APs or clients.
C) The MC contacts Aruba Activate and uses the licensing limits defined there.
D) The MC maintains only licenses that have been locally installed on it.

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Which statement is true about the databases in ClearPass?


A) Entries in the guest user database do not expire.
B) A Static host list can only contain a list of IP addresses.
C) Entries in the guest user database can be deleted.
D) Entries in the local user database cannot be modified.
E) The endpoints database can only be populated by manually adding MAC addresses to the table.

F) A) and C)
G) D) and E)

Correct Answer

verifed

verified

Refer to the exhibit. Refer to the exhibit.   A network administrator sets up the Exam_Employees WLAN on an Aruba solution with a default role of guest, as shown in the exhibit. To which users does the guest role apply? A)  users who have connected to the SSID, but have not yet attempted authentication B)  users who successfully authenticate and are assigned to the default role by the RADIUS server C)  users who successfully authenticate and are not assigned a different role by the RADIUS server D)  users who fall authentication A network administrator sets up the Exam_Employees WLAN on an Aruba solution with a default role of guest, as shown in the exhibit. To which users does the guest role apply?


A) users who have connected to the SSID, but have not yet attempted authentication
B) users who successfully authenticate and are assigned to the default role by the RADIUS server
C) users who successfully authenticate and are not assigned a different role by the RADIUS server
D) users who fall authentication

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

A company has an Aruba solution. The company wants to host a guest login portal with this solution, and the login portal must give guests the option to create their own login accounts. How can a network administrator help meet these criteria?


A) Choose the Internal captive portal with email registration option for the guest WLAN. Choose the Internal captive portal with email registration option for the guest WLAN.
B) Choose ClearPass or the other external captive portal option for the guest WLAN. Choose ClearPass or the other external captive portal
C) Make sure to create a guest provisioning account for the guest WLAN.
D) Disable authentication in the captive portal profile for the guest WLAN.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A company has an Aruba solution that supports an employee WLAN. How can network administrators control in which subnets user receive IP addresses?


A) Assign switch ports connected to APs to VLANs associated with the desired subnets.
B) Set the VLANs associated with desired subnets in the WLAN settings.
C) Configure firewall policies that permit the desired subnet, and add them to the initial role for the WLAN.
D) In the WLAN settings, configure User role rules with the desired subnet addresses as match criteria.

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

If the "Alerts" tab in an access tracker entry shows the following error message: "Access denied by policy", what could be a possible cause for authentication failure?


A) Configuration of the Enforcement Policy.
B) An error in the role mapping policy.
C) Failure to select an appropriate authentication method for the authentication request.
D) Implementation of a firewall policy on ClearPass.
E) Failure to find an appropriate service to process the authentication request.

F) A) and B)
G) B) and E)

Correct Answer

verifed

verified

A company wants to provide wireless access for guests with their Aruba solution. Which configuration feature requires the customer to purchase PEFNG licenses?


A) redirection of guests to an external captive portal
B) customization of the internal captive portal login page
C) addition of custom rules to control access for authenticated guests
D) provision of DHCP services to unauthenticated guests

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

Refer to the exhibit. Refer to the exhibit.   A user logged in to the Self-Service Portal as shown. What does the traffic received and sent statistics present? A)  These show the total amount of traffic the guest transmitted, as seen through RADIUS CoA packets from the NAD to ClearPass. B)  These show the total amount of traffic the NAD transmitted to ClearPass, as seen through RADIUS accounting messages from the NAD to ClearPass. C)  These show the total amount of traffic the guest transmitted after account expiration, as seen through RADIUS accounting messages sent from the NAD to ClearPass. D)  These show the total amount of traffic the guest transmitted, as seen through RADIUS CoA packets from the client to ClearPass. E)  These show the total amount of traffic the guest transmitted, as seen through RADIUS accounting messages sent from the NAD to ClearPass. A user logged in to the Self-Service Portal as shown. What does the traffic received and sent statistics present?


A) These show the total amount of traffic the guest transmitted, as seen through RADIUS CoA packets from the NAD to ClearPass.
B) These show the total amount of traffic the NAD transmitted to ClearPass, as seen through RADIUS accounting messages from the NAD to ClearPass.
C) These show the total amount of traffic the guest transmitted after account expiration, as seen through RADIUS accounting messages sent from the NAD to ClearPass.
D) These show the total amount of traffic the guest transmitted, as seen through RADIUS CoA packets from the client to ClearPass.
E) These show the total amount of traffic the guest transmitted, as seen through RADIUS accounting messages sent from the NAD to ClearPass.

F) B) and D)
G) A) and B)

Correct Answer

verifed

verified

A company has an Aruba Mobility Master (MM) -based solution. A network administrator wants to collect and analyze information about clients and access points (APs) over extended periods of time. What should the administrator do to achieve this goal?


A) Run a Traffic Analysis report on the MM.
B) Add Aruba AirWave to the solution.
C) Enable archival from the MM interface Maintenance windows.
D) Make sure that MM has sufficient AppRF licenses.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

A company has an Aruba Mobility Master (MM) -based solution that runs ArubaOS 8 and uses the default AirMatch and Client Match settings. The ARM profile has been disabled for 5GHz radios. How are channel and transmit power settings managed for these radios?


A) with AirMatch
B) with Rule Based Client Match
C) with legacy ARM
D) with legacy Client Match

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Which is a valid policy simulation types in ClearPass? (Choose three.)


A) Enforcement Policy
B) Posture token derivation
C) Role Mapping
D) Endpoint Profiler
E) Chained simulation

F) A) and D)
G) A) and B)

Correct Answer

verifed

verified

Refer to the exhibit. Refer to the exhibit.   Based on the Authentication sources configuration shown, which statement accurately describes the outcome if the user is not found? A)  If the user is not found in the local user repository and remotelab AD, a reject message is sent back to the NAD. B)  If the user is not found in the local user repository but is present in the remotelab AD, a reject message is sent back to the NAD. C)  If the user is not found in the local user repository, a reject message is sent back to the NAD. D)  If the user is not found in the remotelab AD but is present in the local user repository, a reject message is sent back to the NAD. Based on the Authentication sources configuration shown, which statement accurately describes the outcome if the user is not found?


A) If the user is not found in the local user repository and remotelab AD, a reject message is sent back to the NAD.
B) If the user is not found in the local user repository but is present in the remotelab AD, a reject message is sent back to the NAD.
C) If the user is not found in the local user repository, a reject message is sent back to the NAD.
D) If the user is not found in the remotelab AD but is present in the local user repository, a reject message is sent back to the NAD.

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

A network administrator configures this policy: A network administrator configures this policy:   Users to which this policy apply are unable to receive IP addresses with DHCP. How should the administrator fix the issue? A)  Move the user any svc-dhcp permit rule to the bottom of the list. Move the user any svc-dhcp permit rule to the bottom of the list. B)  Remove the deny rule from the policy. Remove the deny rule from the policy. C)  Use the correct service alias in the user any svc-dhcp permit rule. Use the correct service alias in the rule. D)  Change user to any in the user any svc-dhcp permit rule. Change user to any in the Users to which this policy apply are unable to receive IP addresses with DHCP. How should the administrator fix the issue?


A) Move the user any svc-dhcp permit rule to the bottom of the list. Move the user any svc-dhcp permit rule to the bottom of the list.
B) Remove the deny rule from the policy. Remove the deny rule from the policy.
C) Use the correct service alias in the user any svc-dhcp permit rule. Use the correct service alias in the rule.
D) Change user to any in the user any svc-dhcp permit rule. Change user to any in the

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

A company plans to deploy a Mobility Master (MM) solution with two MM nodes. The MM solution will manage 10 Mobility Controller (MC) appliance that will control a total of 400 APs. How should the network administrator install the AP licenses?


A) 40 AP licenses on the MM and no licenses on the MC
B) 400 AP licenses on the MM and no licenses on the MC
C) 800 AP licenses on each MC and no licenses on the MM
D) 800 AP licenses on the MM and 40 AP licenses on each MC

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Refer to the exhibit. Refer to the exhibit.   What is the purpose of the 'Clock Skew Allowance' setting? (Choose tow.)  A)  to ensure server certificate validation does not fail due to client clock sync issues B)  to set expiry time in client certificate to a few minutes longer that the default setting C)  to adjust clock time on client device to a few minutes before current time D)  to ensure client certificate validation does not fail due to client clock sync issues E)  to set start time in client certificate to a few minutes before current time What is the purpose of the 'Clock Skew Allowance' setting? (Choose tow.)


A) to ensure server certificate validation does not fail due to client clock sync issues
B) to set expiry time in client certificate to a few minutes longer that the default setting
C) to adjust clock time on client device to a few minutes before current time
D) to ensure client certificate validation does not fail due to client clock sync issues
E) to set start time in client certificate to a few minutes before current time

F) C) and D)
G) B) and D)

Correct Answer

verifed

verified

An Aruba Remote AP (RAP) operates in split-tunnel mode. How does the AP forward traffic?


A) It sends all user traffic in a GRE tunnel to a central Mobility Controller (MC) , and it sends control traffic in an IPsec tunnel to the controller.
B) It sends user and control traffic in two separate IPsec tunnels to the Mobility Controller (MC) .
C) It sends all employee and control traffic in a GRE tunnel to a central Mobility Controller (MC) , and it bridges all guest traffic locally.
D) It sends traffic designed to the corporate network in an IPsec tunnel to a central Mobility Controller (MC) , and it bridges other traffic locally.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Refer to the exhibits. Exhibit 1 Refer to the exhibits. Exhibit 1   Exhibit 2   A company has an Aruba solution. Client 1 is assigned to the users1 role, and Client 2 is assigned to the users2 role. The exhibits show current firewall rules for those roles. The network1 alias used to be 10.1.1.0/24, but the network administrator now changes the network1 alias to 172.16.1.0/24. Client 1 and Client 2 both then send a packet destined to 172.16.1.10. How does the firewall handle these packets? A)  It denies both packets. B)  It denies the packet from Client 1 and permits the packet from Client 2. C)  It permits both packets. D)  It permits the packet from Client 1 and denies the packet from Client 2. Exhibit 2 Refer to the exhibits. Exhibit 1   Exhibit 2   A company has an Aruba solution. Client 1 is assigned to the users1 role, and Client 2 is assigned to the users2 role. The exhibits show current firewall rules for those roles. The network1 alias used to be 10.1.1.0/24, but the network administrator now changes the network1 alias to 172.16.1.0/24. Client 1 and Client 2 both then send a packet destined to 172.16.1.10. How does the firewall handle these packets? A)  It denies both packets. B)  It denies the packet from Client 1 and permits the packet from Client 2. C)  It permits both packets. D)  It permits the packet from Client 1 and denies the packet from Client 2. A company has an Aruba solution. Client 1 is assigned to the users1 role, and Client 2 is assigned to the users2 role. The exhibits show current firewall rules for those roles. The network1 alias used to be 10.1.1.0/24, but the network administrator now changes the network1 alias to 172.16.1.0/24. Client 1 and Client 2 both then send a packet destined to 172.16.1.10. How does the firewall handle these packets?


A) It denies both packets.
B) It denies the packet from Client 1 and permits the packet from Client 2.
C) It permits both packets.
D) It permits the packet from Client 1 and denies the packet from Client 2.

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

An Android device goes through the single-SSID Onboarding process and successfully connects using EAP-TLS to the secure network. What is the order in which services are triggered?


A) Onboard Provisioning, Onboard Authorization, Onboard Pre-Auth
B) Onboard Authorization, Onboard Provisioning, Onboard Authorization
C) Onboard Provisioning, Onboard Pre-Auth, Onboard Authorization
D) Onboard Provisioning, Onboard Authorization, Onboard Provisioning
E) Onboard Provisioning, Onboard Pre-Auth, Onboard Authorization, Onboard Provisioning

F) B) and E)
G) A) and B)

Correct Answer

verifed

verified

What is one reason for a network administrator to visit the Dashboard > Usage window on an Aruba Mobility Master (MM) ?


A) to check license usage and determine the need for additional licenses
B) to generate reports about traffic patterns and network usage over the past several months
C) to view system usage statistics for the MM and troubleshoot potential issues
D) to analyze short term trends in network usage by client, AP, and application

E) All of the above
F) A) and C)

Correct Answer

verifed

verified

Showing 21 - 40 of 40

Related Exams

Show Answer