ExamGecko
Home / HP / HPE6-A68 / List of questions
Ask Question

HP HPE6-A68 Practice Test - Questions Answers

List of questions

Question 1

Report Export Collapse

Refer to the exhibit.

HP HPE6-A68 image Question 1 14135 09162024180625000000

An AD user's department attribute value is configured as "QA". The user authenticates from a laptop running MAC OS X.

Which role is assigned to the user in ClearPass?

HR Local
HR Local
Remote Employee
Remote Employee
[Guest]
[Guest]
Executive
Executive
IOS Device
IOS Device
Suggested answer: C
Explanation:

None of the Listed Role Name conditions are met.

asked 16/09/2024
Kofi Amedorme
44 questions

Question 2

Report Export Collapse

Refer to the exhibit.

HP HPE6-A68 image Question 2 14136 09162024180625000000

Based on the Attribute configuration shown, which statement accurately describes the status of attribute values?

Only the attribute values of department and memberOf can be used in role mapping policies.
Only the attribute values of department and memberOf can be used in role mapping policies.
The attribute values of department, title, memberOf, telephoneNumber, and mail are directly applied as ClearPass.
The attribute values of department, title, memberOf, telephoneNumber, and mail are directly applied as ClearPass.
Only the attribute value of company can be used in role mapping policies, not the other attributes.
Only the attribute value of company can be used in role mapping policies, not the other attributes.
The attribute values of department and memberOf are directly applied as ClearPass roles.
The attribute values of department and memberOf are directly applied as ClearPass roles.
Only the attribute values of title, telephoneNumber, and mail can be used in role mapping policies.
Only the attribute values of title, telephoneNumber, and mail can be used in role mapping policies.
Suggested answer: D
asked 16/09/2024
Kyle Roarick
36 questions

Question 3

Report Export Collapse

Which components can use Active Directory authorization attributes for the decision-making process? (Select two.)

Profiling policy
Profiling policy
Certificate validation policy
Certificate validation policy
Role Mapping policy
Role Mapping policy
Enforcement policy
Enforcement policy
Posture policy
Posture policy
Suggested answer: C, D
Explanation:

C: Role Mappings Page - Rules Editor Page Parameters

HP HPE6-A68 image Question 3 explanation 14137 09162024180625000000

D: Enforcement Policy Attributes tab Parameters

HP HPE6-A68 image Question 3 explanation 14137 09162024180625000000

Reference: http://www.arubanetworks.com/techdocs/ClearPass/Aruba_CPPMOnlineHelp/Content/CPPM_User Guide/identity/RoleMappingPolicies.html http://www.arubanetworks.com/techdocs/ClearPass/Aruba_CPPMOnlineHelp/Content/

CPPM_User Guide/PolicySim/PS_Enforcement_Policy.htm

asked 16/09/2024
Adugna Mehari
37 questions

Question 4

Report Export Collapse

Refer to the exhibit.

HP HPE6-A68 image Question 4 14138 09162024180625000000

Based on the Authentication sources configuration shown, which statement accurately describes the outcome if the user is not found?

If the user is not found in the remotelab AD but is present in the local user repository, a reject message is sent back to the NAD.
If the user is not found in the remotelab AD but is present in the local user repository, a reject message is sent back to the NAD.
If the user is not found in the local user repository but is present in the remotelab AD, a reject message is sent back to the NAD.
If the user is not found in the local user repository but is present in the remotelab AD, a reject message is sent back to the NAD.
If the user is not found in the local user repository a reject message is sent back to the NAD.
If the user is not found in the local user repository a reject message is sent back to the NAD.
If the user is not found in the local user repository and remotelab AD, a reject message is sent back to the NAD.
If the user is not found in the local user repository and remotelab AD, a reject message is sent back to the NAD.
If the user is not found in the local user repository a timeout message is sent back to the NAD.
If the user is not found in the local user repository a timeout message is sent back to the NAD.
Suggested answer: D
Explanation:

Policy Manager looks for the device or user by executing the first filter associated with the authentication source.

After the device or user is found, Policy Manager then authenticates this entity against this authentication source. The flow is outlined below:

* On successful authentication, Policy Manager moves on to the next stage of policy evaluation, which collects role mapping attributes from the authorization sources.

* Where no authentication source is specified (for example, for unmanageable devices), Policy Manager passes the request to the next configured policy component for this service.

* If Policy Manager does not find the connecting entity in any of the configured authentication sources, it rejects the request.

Reference: ClearPass Policy Manager 6.5 User Guide (October 2015), page 134

https://community.arubanetworks.com/aruba/attachments/aruba/SoftwareUserReferenceGuides/52/1/ClearPass%20Policy%20Manager%206.5%20User%20Guide.pdf

asked 16/09/2024
Julius Nammeh
44 questions

Question 5

Report Export Collapse

Which authorization servers are supported by ClearPass? (Select two.)

Aruba Controller
Aruba Controller
LDAP server
LDAP server
Cisco Controller
Cisco Controller
Active Directory
Active Directory
Aruba Mobility Access Switch
Aruba Mobility Access Switch
Suggested answer: B, D
Explanation:

Authentication Sources can be one or more instances of the following examples:

* Active Directory

* LDAP Directory

* SQL DB

* Token Server

* Policy Manager local DB

Reference: ClearPass Policy Manager 6.5 User Guide (October 2015), page 114

https://community.arubanetworks.com/aruba/attachments/aruba/SoftwareUserReferenceGuides/52/1/ClearPass%20Policy%20Manager%206.5%20User%20Guide.pdf

asked 16/09/2024
Nicholas Stoner
41 questions

Question 6

Report Export Collapse

Which CLI command is used to upgrade the image of a ClearPass server?

Image update
Image update
System upgrade
System upgrade
Upgrade image
Upgrade image
Reboot
Reboot
Upgrade software
Upgrade software
Suggested answer: B
Explanation:

When logged in as appadmin, you can manually install the Upgrade and Patch binaries imported via the CLI using the following commands:

* system update (for patches)

* system upgrade (for upgrades)

Reference: ClearPass Policy Manager 6.5 User Guide (October 2015), page 564

https://community.arubanetworks.com/aruba/attachments/aruba/SoftwareUserReferenceGuides/52/1/ClearPass%20Policy%20Manager%206.5%20User%20Guide.pdf

asked 16/09/2024
Miguel Pinar Guruceta
43 questions

Question 7

Report Export Collapse

Which steps are required to use ClearPass as a TACACS+ Authentication server for a network device?

(Select two.)

Configure a TACACS Enforcement Profile on ClearPass for the desired privilege level.
Configure a TACACS Enforcement Profile on ClearPass for the desired privilege level.
Configure a RADIUS Enforcement Profile on ClearPass for the desired privilege level.
Configure a RADIUS Enforcement Profile on ClearPass for the desired privilege level.
Configure ClearPass as an Authentication server on the network device.
Configure ClearPass as an Authentication server on the network device.
Configure ClearPass roles on the network device.
Configure ClearPass roles on the network device.
Enable RADIUS accounting on the NAD.
Enable RADIUS accounting on the NAD.
Suggested answer: A, C
Explanation:

You need to make sure you modify your policy (Configuration » Enforcement » Policies » Edit - [Admin Network Login Policy]) and add your AD group settings in to the corresponding privilege level.

asked 16/09/2024
Nadja Burkart
32 questions

Question 8

Report Export Collapse

What are Operator Profiles used for?

to enforce role based access control for Aruba Controllers
to enforce role based access control for Aruba Controllers
to enforce role based access control for ClearPass Policy Manager admin users
to enforce role based access control for ClearPass Policy Manager admin users
to enforce role based access control for ClearPass Guest Admin users
to enforce role based access control for ClearPass Guest Admin users
to assign ClearPass roles to guest users
to assign ClearPass roles to guest users
to map AD attributes to admin privilege levels in ClearPass Guest
to map AD attributes to admin privilege levels in ClearPass Guest
Suggested answer: C
Explanation:

An operator profile determines what actions an operator is permitted to take when using ClearPass Guest.

Reference: http://www.arubanetworks.com/techdocs/ClearPass/CPGuest_UG_HTML_6.5/Content/OperatorLog ins/OperatorProfiles.htm

asked 16/09/2024
Khaled Fouad
33 questions

Question 9

Report Export Collapse

Refer to the exhibit.

HP HPE6-A68 image Question 9 14143 09162024180625000000

In the Aruba RADIUS dictionary shown, what is the purpose of the RADIUS attributes?

In the Aruba RADIUS dictionary shown, what is the purpose of the RADIUS attributes?

to send information via RADIUS packets to Aruba NADs
to send information via RADIUS packets to Aruba NADs
to gather and send Aruba NAD information to ClearPass
to gather and send Aruba NAD information to ClearPass
to send information via RADIUS packets to clients
to send information via RADIUS packets to clients
to gather information about Aruba NADs for ClearPass
to gather information about Aruba NADs for ClearPass
to send CoA packets from ClearPass to the Aruba NAD
to send CoA packets from ClearPass to the Aruba NAD
Suggested answer: C
asked 16/09/2024
Brian Kryszewski
33 questions

Question 10

Report Export Collapse

Refer to the exhibit.

HP HPE6-A68 image Question 10 14144 09162024180625000000

Based on the Guest Role Mapping Policy shown, what is the purpose of the Role Mapping Policy?

to display a role name on the Self-registration receipt page
to display a role name on the Self-registration receipt page
to send a firewall role back to the controller based on the Guest User's Role ID
to send a firewall role back to the controller based on the Guest User's Role ID
to assign Controller roles to guests
to assign Controller roles to guests
to assign three roles of [Contractor], [Guest] and [Employee] to every guest user
to assign three roles of [Contractor], [Guest] and [Employee] to every guest user
to create additional account roles for guest administrators to assign to guest accounts
to create additional account roles for guest administrators to assign to guest accounts
Suggested answer: C
asked 16/09/2024
Eric Tegels
44 questions
Total 116 questions
Go to page: of 12

Related questions