New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the HP Aruba-ACMA HPE6-A70 Questions and answers with CertsForce

Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions
Questions # 31:

An Aruba solution runs ArubaOS 8 and uses a mobility master architecture. Which feature can network administrators use to balance wireless devices across APs on different channels?

Options:

A.

AirMatch


B.

Client Match


C.

AppRF


D.

ARM


Expert Solution
Questions # 32:

A network administrator wants to implement MAC filtering for the wireless network of a local financial firm to ensure that only employees can access the wireless network. What is a potential weakness of this solution?

Options:

A.

MAC filters cannot be applied with WPA2 encryption.


B.

Authorized MAC addresses are visible in plaintext in the air and can be easily spoofed.


C.

Many popular clients do not have the capability to connect to WLANs that use MAC filters.


D.

MAC filters offer no protection against authorized users who try to connect unauthorized devices.


Expert Solution
Questions # 33:

Refer to the exhibit.

Question # 33

A network administrator sets up the Exam_Employees WLAN on an Aruba solution with a default role of guest, as shown in the exhibit. To which users does the guest role apply?

Options:

A.

users who successfully authenticate and are assigned to the default role by the RADIUS server


B.

users who successfully authenticate and are not assigned a different role by the RADIUS server


C.

users who have connected to the SSID, but have not yet attempted authentication


D.

users who fail authentication


Expert Solution
Questions # 34:

A customer has a large campus that requires 400 Aruba 335 APs to support a total of 20,000 wireless users and 12Gbps of traffic. Although the customer wants two controllers for redundancy, each controller must be able to support all of the APs and users on its own.

Which Aruba Mobility Controller models meet the customer requirements and DO NOT unnecessarily exceed them?

Options:

A.

Aruba 7024 controllers


B.

Aruba 7210 controllers


C.

Aruba 7240 controllers


D.

Aruba 7030 controllers


Expert Solution
Questions # 35:

An Aruba solution has a WLAN that uses WPA2-Personal security. How are encryption keys dynamically managed for the wireless users?

Options:

A.

The MM generates and distributes keys to clients and access points (APs).


B.

Administrators configure identical key strings on the Mobility Controllers (MCs) and wireless client 802.1X settings.


C.

Keys are generated and distributed securely during each wireless user authentication process.


D.

Keys are derived from the preshared key configured on the WLAN and on each wireless client.


Expert Solution
Questions # 36:

A company has a single Aruba Mobility Master (MM)-based solution with two Mobility Controllers (MCs). Network administrators want APs in building 1 to support a WLAN but do not want APs in building 2 to support the WLAN.

How can administrator ensure that they can enforce this rule as they set up the WLAN in the Mobility Master (MM) Interface?

Options:

A.

Place APs in different buildings in different AP Groups.


B.

Assign APs in different buildings to different MM nodes.


C.

Configure APs in different buildings to use different frequency bands.


D.

Assign different radio profiles to APs in different buildings.


Expert Solution
Questions # 37:

A company has a Mobility Master (MM)-based solution. A network administrator wants to monitor data transfer speed ranges of all currently connected clients.

Which dashboard page in the MM interface should the administrator visit?

Options:

A.

Security


B.

Performance


C.

Traffic Analysis


D.

Network


Expert Solution
Questions # 38:

A company has an Aruba solution that supports an employee WLAN. How can network administrators control in which subnets users receive IP addresses?

Options:

A.

Set the VLANs associated with desired subnets in the WLAN settings.


B.

Configure firewall policies that permit the desired subnet, and add them to the initial role for the WLAN.


C.

In the WLAN settings, configure User role rules with the desired subnet addresses as match criteria.


D.

Assign switch ports connected to APs to VLANs associated with the desired subnets.


Expert Solution
Questions # 39:

Which type of authentication server should administrators select to authenticate users to a ClearPass server?

Options:

A.

Windows


B.

RADIUS


C.

TACACS+


D.

LDAP


Expert Solution
Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions