ERASED TEST, YOU MAY BE INTERESTED ON Aruba Campus Access - part 4
COMMENTS | STATISTICS | RECORDS |
---|
TAKE THE TEST
Title of test:
Aruba Campus Access - part 4 Description: Aruba Campus Author:
Creation Date: 20/11/2024 Category: Others Number of questions: 20 |
Share the Test:
New Comment
No comments about this test.
Content:
Using Aruba best practices what should be enabled for visitor networks where encryption is
needed but authentication is not required? A. Wi-Fi Protected Access 3 Enterprise
B. Opportunistic Wireless Encryption
C. Wired Equivalent Privacy
D. Open Network Access
. With the Aruba CX 6000 24G switch with uplinks of 1/1/25 andwhat does the switch do when a client port detects a loop and the do-not-disabie parameter is used? A. Port status will be validated once status is cleared B. An event log message is created. C. The network analytics engine is triggered. D. Port status led blinks in amber with 100hz. . What is true regarding 802.11k? A. It extends radio measurements to define mechanisms for wireless network management of stations B. It reduces roaming delay by pre-authenticating clients with multiple target APs before a client roams to an AP C. It provides mechanisms for APs and clients to dynamically measure the available radio resources. D. It considers several metrics before it determines if a client should be steered to the 5GHz band, including client RSSI. When configuring UBT on a switch what will happen when a gateway role is not specified? A. The switch will put the client on the access VLAN B. The gateway will assign a default role to the client C. The switch will assign the default deny role to the client. D. The gateway will send back the deny role to the client. . Match the appropriate QoS concept with its definition. (Options may be used more than once or not at all.) Best Effort Service Class of Service Differentiated Services WMM. Match the topics of an AOS10 Tunneled mode setup between an AP and a Gateway. (Options may be used more than once or not at all.) Authenticator Negotiate IPsec Phase 1 Negotiate IPsec Phase 2 RADIUS proxy. A network administrator is attempting to troubleshoot a connectivity issue between a group of users and a particular server The administrator needs to examine the packets over a period of time from their desktop; however, the administrator is not directly connected to the AOS-CX switch involved with the traffic flow. What statements are correct regarding the ERSPAN session that needs to be established on an AOS-CX switch? (Select two ) A. On the source AOS-CX switch, the destination specified is the switch to which the administrator's desktop is connected B. The encapsulation protocol used is GRE. C. The encapsulation protocol used is VXLAN. D. The encapsulation protocol is UDP. E. On the source AOS-CX switch, the destination specified is the administrators desktop. In AOS 10. which session-based ACL below will only allow ping from any wired station to wireless clients but will not allow ping from wireless clients to wired stations"? The wired host ingress traffic arrives on a trusted port. A. ip access-list session pingFromWired any user any permit B. ip access-list session pingFromWired user any svc-icmp deny any any svc-icmp permit C. ip access-list session pingFromWired any any svc-icmp permit user any svc-icmp deny D. ip access-list session pingFromWired any any svc-icmp deny any user svc-icmp permit . You are setting up a customer's 15 headless loT devices that do not support 802.1X. What should you use? A. Multiple Pre-Shared Keys (MPSK) Local B. Clearpass with WPA3-PSK C. Clearpass with WPA3-AES D. Multiple Pre-Shared Keys (MPSK) with WPA3-AES . Your customer is interested in hearing more about how roles can help keep consistent policy enforcement in a distributed overlay fabric How would you explain this concept to them'' A. Group Based Policy ID is applied on egress VTEP after device authentication and policy is enforced on ingress VTEP B. Role-based policies are tied to IP addresses which have an advantage over IP-based policies and role names are sent between VTEPs C. Group Based Policy ID is applied on ingress VTEP after device authentication and policy is enforced on egress VTEP D. Role-based policies enhance User Based Tunneling across the campus network and the policy traffic is protected with iPsec. A customer is using stacked Aruba CX 6200 and CX 6300 switches for access and a VSX pair of Aruba CX 8325 as a collapsed core 802 1X is implemented for authentication. Due to the lack of cabling, some unmanaged switches are still in use Sometimes devices behind these switches cause network outages The switch should send a warning to the helpdesk when the problem occurs You have been asked to implement an effective solution to the problem What is the solution for this? A. Configure spanning tree on the Aruba CX 8325 switches Set the trap-option B. Configure loop protection on all edge ports of the Aruba CX 6200 and CX 6300 switches No trap option is needed C. Configure loop protection on all edge ports of the Aruba CX 6200 and CX 6300 switches Set up the trap-option D. Configure spanning tree on the Aruba CX 6200 and CX 6300 switches No trap option is needed . Which statement best describes QoS? A. Determining which traffic passes specified quality metrics B. Scoring traffic based on the quality of the contents C. Identifying specific traffic for special treatment D. Identifying the quality of the connection . What is used to retrieve data stored in a Management Information Base (MIS)? A. SNMPv3 B. DSCP C. TLV D. CDP . Describe the difference between Class of Service (CoS) and Differentiated Services Code Point (DSCP). A. CoS has much finer granularity than DSCP B. CoS is only contained in VLAN Tag fields DSCP is in the IP Header and preserved throughout the IP packet flow C. They are similar and can be used interchangeably. D. CoS is only used to determine CLASS of traffic DSCP is only used to differentiate between different Classes. For an Aruba AOS10 AP in mixed mode, which factors can be used to determine the forwarding role assigned to a client? (Select two.) A. Client IP address B. 802.1X authentication result C. Client MAC address D. Client SSID E. Client VLAN . On AOS10 Gateways, which device persona is only available when configuring a Gateway-only group'? A. Edge B. Mobility C. Branch D. VPN Concentrator . You are helping an onsite network technician bring up an Aruba 9004 gateway with ZTP for a branch office The technician was to plug in any port for the ZTP process to start Thirty minutes after the gateway was plugged in new users started to complain they were no longer able to get to the internet. One user who reported the issue stated their IP address is 172.16 0.81 However, the branch office network is supposed to be on 10.231 81.0/24. What should the technician do to alleviate the issue and get the ZTP process started correctly? A. Turn off the DHCP scope on the gateway, and set DNS correctly on the gateway to reach Aruba Activate B. Move the cable on the gateway from port G0/0V1 tc port G0 0.0 C. Move the cable on the gateway to G0/0/1. and add the device's MAC and Serial number in Central D. Factory default and reboot the gateway to restart the process. What are the requirements to ensure that WMM is working effectively'? (Select two) A. The APs and the controller are Wi-Fi CERTIFIED for WMM which is enabled B. All APs need to be from the AP-5xx series and AP-6xx series which are Wi-Fi CERTIFIED 6. C. The Client must be Wi-Fi CERTIFIED for WMM and configured for WMM marking. D. The Aruba AOS10 APs installed have to be converted to controlled mode E. The AP needs to be connected via a tagged VLAN to the wired port. When setting up an Aruba CX VSX pair, which information does the Inter-Switch Link Protocol configuration use in the configuration created? A. hello interval is disabled by default B. hello interval is based on the value set by dead interval C. hello interval 100ms by default D. hello interval is 1s by default. What steps are part of the Key Management workflow when a wireless device is roaming from AP1 to AP2? (Select two.) A. AP1 will cache the client's information and send it to the Key Management service B. The Key Management service receives from AirMatch a list of all AP2's neighbors C. The Key Management service receives a list of all AP1 s neighbors from AirMatch. D. The Key Management service then generates R1 keys for AP2's neighbors. E. A client associates and authenticates with the AP2 after roaming from AP1. |
Report abuse