Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > HP > Aruba-ACMP > HPE6-A71

HPE6-A71 Aruba Certified Mobility Professional Exam Question and Answers

Question # 4

An administrator wants to implement 802.1X authentication on Ethernet ports on branch office controllers. What must the administrator do to implement this policy?

A.

Define the port an untrusted, and assign an AAA policy to the port.

B.

Define the port as trusted, and assign an AAA policy to the port.

C.

Define the port as untrusted, and assign an AAA policy to the VLAN.

D.

Define the port as trusted, and assign an AAA policy to the VLAN.

Full Access
Question # 5

An administrator creates new pre-and post-authentication roles for a new WLAN. For which profile should the administrator assign these new roles under the Managed Network section?

A.

Server Groups

B.

Virtual AP

C.

802.1X

D.

AAA profile

Full Access
Question # 6

Which configuration command enables an Aruba Mobility Controller (MC) to send AMON messages to an AirWave System?

A.

auth-server

B.

snmp-server

C.

mgmt-server

D.

tunneled-node-server

Full Access
Question # 7

Refer to the exhibit.

An administrator examines the configuration of an AP from apboot mode shown in the exhibit.

What can the administrator determine from the configuration?

A.

RAP terminated on a stand-alone controller.

B.

AP terminated on a non-cluster Mobility Controller.

C.

RAP terminated on a Mobility Master.

D.

AP terminated on a Mobility Controller in a cluster.

Full Access
Question # 8

Refer to the exhibit.

What can an administrator determine from this Aruba device output?

A.

A switch is connected to a standalone Mobility Controller.

B.

An AP is connected to a Mobility Controller in a cluster.

C.

An AP is connected to a standalone Mobility Controller.

D.

A switch is connected to a Mobility Controller in a cluster.

Full Access
Question # 9

An administrator manages an Aruba wireless network. Users authenticate to the wireless network using PEAP, where their credentials are validated by the controller’s local database. The company purchases Android tablets to use with an inventory tracking system. The administrator notices that many of the users of these devices use their normal username and password to authenticate, which allows the tablet to access all resources that the user can access from their wireless computers. This is a security violation.

Which Aruba Mobility Controller (MC) feature should the administrator configure to restrict tablet access to a web portal for authentication, where an appropriate post-authentication policy can be applied to these tablets?

A.

AirMatch

B.

AP fingerprinting

C.

Server-derived roles

D.

User-derived rules

Full Access
Question # 10

Refer to the exhibit.

A user uses Microsoft Windows for a wireless session. Based on the output shown in the exhibit for the selected Aruba AP, what is the possible problem with this user’s wireless session?

A.

The AP has reached the limit for number of users that are allowed to connect to the radio.

B.

The controller cannot reach the AAA server to perform the authentication.

C.

The user is configured for PEAP, but the WLAN profile on the controller implemented EAP-TLS.

D.

The user misconfigured the Managed Network Settings profile in Windows.

Full Access
Question # 11

An administrator wants to reduce downtime of the wireless network when controllers are upgraded. Which Aruba OS feature should the administrator implement to reduce the amount of downtime the Aps will experience at the time of the upgrade process?

A.

Centralized upgrades

B.

AP apboot mode bypass

C.

AP fast start

D.

AP image preload

Full Access
Question # 12

Which two protocols does AirWave use to monitor Aruba Mobility Controllers (МС)?

A.

PAPI and AMON

B.

SNMP and AMON

C.

PAPI and GRE

D.

SNMP and SSH

Full Access
Question # 13

An administrator defines credentials in the Mobility Master> Configuration> System section to configure a Mobility Master (MM). The administrator then accesses AirWave and adds the MM in Monitor-Only mode. The administrator expects AirWave to automatically discover the Aruba Virtual Mobility Controllers (VMCs) also managed by the MM, but does not see these under APs/Devices> New section in AirWave.

What should the administrator do to solve this problem?

A.

Enable Automatic Device Authorization for the Group the Mobility Master belongs to in AirWave.

B.

Define AirWave communication parameters for the Virtual Mobility Controllers on the Mobility Master, and then scan for the Virtual Mobility Controllers in AirWave.

C.

Define the AirWave communication parameters on the Virtual Mobility Controllers, and then scan for the Virtual Mobility Controllers in AirWave.

D.

Define AirWave communication parameters for the Virtual Mobility Controllers on the Mobility Master, and have AirWave repoll the Mobility Master.

Full Access
Question # 14

A network of Mobility Controllers (MCs) is managed by a Mobility Master (MM). An administrator misconfigures the IP addressing on an MC and the MC loses connectivity to the MM.

How should the administrator fix this problem?

A.

Restore the previous configuration on the Mobility Master.

B.

Use the disaster recovery mode on the Mobility Master.

C.

Use the auto-recovery mode on the Mobility Master.

D.

Use the disaster recovery mode on the Mobility Controller.

Full Access
Question # 15

An administrator wants to add a new folder in AirWave. Where would the administrator perform this action?

A.

in AMP Setup

B.

in AP/Devices

C.

in Groups

D.

in Device Setup

Full Access
Question # 16

An administrator wants to dynamically upgrade AppRF on Aruba Mobility Controllers (MC) in a cluster. The administrator does not want to reboot the system at the time of the upgrade.

What should the administrator use for this upgrade?

A.

Aruba image

B.

Upgrade Profiles

C.

Loadable Service Module (LSM)

D.

Cluster Upgrade Manager

Full Access
Question # 17

Refer to the exhibit.

The branch office RAP shown in the exhibit provides secure wireless employee access. Because of security concerns, the company’s security policy does not allow wireless guest access. Some customers that visit the Branch office need Internet access. A RAP’s Ethernet Port 3 is used for wired guest access and Port2 is used for wired employee access. When employees connect to Port2, they are authenticated successfully and split-tunnel policy allows them access to both corporate and Internet resources from the Branch office. Guest users, however, cannot access Internet resources on Port 3.

How can the administrator provide guest users Internet access?

A.

Implement ClientMatch to handle the employee and guest user traffic correctly.

B.

Implement the MultiZone feature on the RAP.

C.

Configure a bridge role for the wired RAP port.

D.

Create a guest VAP that allows wired RAP port access.

Full Access
Question # 18

Where would an administrator define the split-tunneling mode for a RAP located at a branch office?

A.

the Firewall policy on the RAP

B.

the AAA policy on the controller

C.

the Firewall policy on the controller

D.

the VAP profile on the controller

Full Access
Question # 19

An administrator creates a User Rule for role derivation on the Mobility Master (MM). Which client information can an administrator specify to identify that a particular user should be assigned a different role from the initial role?

A.

IP address

B.

VLAN

C.

MAC address

D.

Profiling information

Full Access
Question # 20

An administrator configures a port on a RAP through the association of an AAA profile with 802.1X authentication to a RAP Ethernet port. This port connects to a switch with user desktops attached. The administrator notices that when users connect wirelessly to the RAP, a user role correctly restricts their traffic. But, when users connect with their wired desktops, they have full access to corporate resources.

What must the administrator do to restrict desktop usage based on the users’ role assignment?

A.

Apply a server-derived role privacy to the RAP port.

B.

Identify the RAP port as untrusted.

C.

Implement ACLs on the RAP port.

D.

Implement per-user tunnel node on the RAP.

Full Access
Question # 21

Which Aruba Mobility Controller (MC) administrative role should an administrator assign to a receptionist so that they can create and manage guest accounts?

A.

guest-provisioning

B.

receptionist

C.

guest-operator

D.

network-operations

Full Access
Question # 22

In the WebUI of an Aruba Mobility Controller (MC), where recommended approach for this process generate a tech support file that the Aruba Technical Support team can use to help customers?

A.

Diagnostics> Technical Support> System Information

B.

Maintenance> Copy logs> download logs

C.

Configuration> System> Logging

D.

Diagnostics>Technical Support> Copy Logs

Full Access
Question # 23

An administrator manages an AirWave Management Platform (AMP). The AMP server receives many SNMP traps from managed devices, but no alerts are generated on the AMP for certain critical traps.

Which rule should the administrator create to cause the AMP server to generate an alert based on receipt of a critical SNMP trap from an Aruba Mobility Controller (MC)?

A.

AMON rule

B.

SNMP trap rule

C.

Trigger rule

D.

Alert rule

Full Access
Question # 24

A cluster has two Aruba 7240 Mobility Controllers (MCs) and two Aruba 7220 Mobility Controllers (MCs). How is the cluster leader elected if all controllers have the default priority?

A.

The 7240 controller with the highest MAC address is elected.

B.

The controller with the highest IP address is elected.

C.

The controller with the highest MAC address is elected.

D.

The 7240 controller with the lowest IP address is elected.

Full Access
Question # 25

An administrator wants to implement AAA in an Aruba wireless environment that references two ClearPass servers for redundancy. To use these servers, what must the administrator create that will be referenced in the AAA profile?

A.

ClearPass Group

B.

Server matching rules

C.

Server Group

D.

Server Load Balancing

Full Access