ExamGecko
Home Home / HP / HPE6-A68

HP HPE6-A68 Practice Test - Questions Answers, Page 11

Question list
Search
Search

Related questions











Refer to the exhibit.

An administrator logs in to the Guest module in ClearPass and 'Manage Accounts' displays as shown.

When a user with username [email protected] attempts to access the Web Login page, what will be the outcome?

A.
The user will be able to log in and authenticate successfully but will then be immediate disconnected.
A.
The user will be able to log in and authenticate successfully but will then be immediate disconnected.
Answers
B.
The user will be able to log in for the next 4.9. days, but then will no longer be able to log in.
B.
The user will be able to log in for the next 4.9. days, but then will no longer be able to log in.
Answers
C.
The user will not be able to log in and authenticate.
C.
The user will not be able to log in and authenticate.
Answers
D.
The user will be able to log in and authenticate successfully, but will then get a quarantine role.
D.
The user will be able to log in and authenticate successfully, but will then get a quarantine role.
Answers
E.
The user will not be able to access the Web Login page.
E.
The user will not be able to access the Web Login page.
Answers
Suggested answer: C

Refer to the exhibit.

An Enforcement Profile has been created in the Policy Manager as shown.

Which action will ClearPass take based on the Enforcement Profile?

A.
It will send the Session-Timeout attribute in the RADIUS Access-Request packet to the NAD and the NAD will end the user's session after 600 seconds.
A.
It will send the Session-Timeout attribute in the RADIUS Access-Request packet to the NAD and the NAD will end the user's session after 600 seconds.
Answers
B.
It will send the Session-Timeout attribute in the RADIUS Access-Accept packet to the User and the user's session will be terminated after 600 seconds.
B.
It will send the Session-Timeout attribute in the RADIUS Access-Accept packet to the User and the user's session will be terminated after 600 seconds.
Answers
C.
It will count down 600 seconds and send a RADUIS CoA message to the NAD to end the user's session after this time is up.
C.
It will count down 600 seconds and send a RADUIS CoA message to the NAD to end the user's session after this time is up.
Answers
D.
It will count down 600 seconds and send a RADUIUS CoA message to the user to end the user's session after this time is up.
D.
It will count down 600 seconds and send a RADUIUS CoA message to the user to end the user's session after this time is up.
Answers
E.
It will send the session –Timeout attribute in the RADIUS Access-Accept packet to the NAD and the NAD will end the user's session after 600 seconds.
E.
It will send the session –Timeout attribute in the RADIUS Access-Accept packet to the NAD and the NAD will end the user's session after 600 seconds.
Answers
Suggested answer: E

Use this form to make changes to the RADIUS Web Login Guest Network.

A Web Login page is configured in Clear Pass Guest as shown.

What is the purpose of the Pre-Auth Check?

A.
To authenticate users after the NAD sends an authentication request to ClerPass
A.
To authenticate users after the NAD sends an authentication request to ClerPass
Answers
B.
To authenticate users before the client sends the credentials to the NAD
B.
To authenticate users before the client sends the credentials to the NAD
Answers
C.
To authenticate users when they are roaming from one NAD to another
C.
To authenticate users when they are roaming from one NAD to another
Answers
D.
To authenticate users before they launch the Web Login Page
D.
To authenticate users before they launch the Web Login Page
Answers
E.
To replace the need for the NAD to send an authentication request to ClearPass
E.
To replace the need for the NAD to send an authentication request to ClearPass
Answers
Suggested answer: B

Refer to the exhibit.

Based on the guest Self-Registration with Sponsor Approval workflow shown, at which stage does the sponsor approve the user's request?

A.
After the RADIUS Access-Request
A.
After the RADIUS Access-Request
Answers
B.
After the NAS login, but before the RADIUS Access-Request
B.
After the NAS login, but before the RADIUS Access-Request
Answers
C.
Before the user can submit the registration form
C.
Before the user can submit the registration form
Answers
D.
After the RADIUS Access-Response
D.
After the RADIUS Access-Response
Answers
E.
After the receipt page is displayed, before the NAS login
E.
After the receipt page is displayed, before the NAS login
Answers
Suggested answer: E

What is the purpose of ClearPass Onboard?

A.
to provide MAC authentication for devices that don't support 802.1x
A.
to provide MAC authentication for devices that don't support 802.1x
Answers
B.
to run health checks on end user devices
B.
to run health checks on end user devices
Answers
C.
to provision personal devices to securely connect to the network
C.
to provision personal devices to securely connect to the network
Answers
D.
to configure self-registration pages for guest users
D.
to configure self-registration pages for guest users
Answers
E.
to provide guest access for visitors to connect to the network
E.
to provide guest access for visitors to connect to the network
Answers
Suggested answer: C

Refer to the exhibit.

Based on the configuration of a Windows 802.1X supplicant shown, what will be the outcome when 'Automatically use my Windows logon name and password' are selected?

A.
The client will use machine authentication.
A.
The client will use machine authentication.
Answers
B.
The client's Windows login username and password will be sent inside a certificate to the Active Directory server.
B.
The client's Windows login username and password will be sent inside a certificate to the Active Directory server.
Answers
C.
The client's Windows login username and password will be sent to the Authentication server.
C.
The client's Windows login username and password will be sent to the Authentication server.
Answers
D.
The client will need to re-authenticate every time they connect to the network.
D.
The client will need to re-authenticate every time they connect to the network.
Answers
E.
The client will prompt the user to enter the logon username and password.
E.
The client will prompt the user to enter the logon username and password.
Answers
Suggested answer: C

A bank would like to deploy ClearPass Guest with web login authentication so that their customers can selfregister on the network to get network access when they have meetings with bank employees. However, they're concerned about security.

What is true? (Choose three.)

A.
If HTTPS is used for the web login page, after authentication is completed guest Internet traffic willall be encrypted as well.
A.
If HTTPS is used for the web login page, after authentication is completed guest Internet traffic willall be encrypted as well.
Answers
B.
During web login authentication, if HTTPS is used for the web login page, guest credentials will beencrypted.
B.
During web login authentication, if HTTPS is used for the web login page, guest credentials will beencrypted.
Answers
C.
After authentication, an IPSEC VPN on the guest's client be used to encrypt Internet traffic.
C.
After authentication, an IPSEC VPN on the guest's client be used to encrypt Internet traffic.
Answers
D.
HTTPS should never be used for Web Login Page authentication.
D.
HTTPS should never be used for Web Login Page authentication.
Answers
E.
If HTTPS is used for the web login page, after authentication is completed some guest Internettraffic may be unencrypted.
E.
If HTTPS is used for the web login page, after authentication is completed some guest Internettraffic may be unencrypted.
Answers
Suggested answer: B, C, E

Which statement is true about the databases in ClearPass?

A.
Entries in the guest user database do not expire.
A.
Entries in the guest user database do not expire.
Answers
B.
A Static host list can only contain a list of IP addresses.
B.
A Static host list can only contain a list of IP addresses.
Answers
C.
Entries in the guest user database can be deleted.
C.
Entries in the guest user database can be deleted.
Answers
D.
Entries in the local user database cannot be modified.
D.
Entries in the local user database cannot be modified.
Answers
E.
The endpoints database can only be populated by manually adding MAC addresses to the table.
E.
The endpoints database can only be populated by manually adding MAC addresses to the table.
Answers
Suggested answer: A

Which is a valid policy simul-ation types in ClearPass? (Choose three.)

A.
Enforcement Policy
A.
Enforcement Policy
Answers
B.
Posture token derivation
B.
Posture token derivation
Answers
C.
Role Mapping
C.
Role Mapping
Answers
D.
Endpoint Profiler
D.
Endpoint Profiler
Answers
E.
Chained simulation
E.
Chained simulation
Answers
Suggested answer: A, C, E

Which statement is true? (Choose two.)

A.
Mobile device Management is the result of Onboarding.
A.
Mobile device Management is the result of Onboarding.
Answers
B.
Third party Mobile Device Management solutions can be integrated with ClearPass.
B.
Third party Mobile Device Management solutions can be integrated with ClearPass.
Answers
C.
Mobile Device Management is the authentication that happens before Onboarding.
C.
Mobile Device Management is the authentication that happens before Onboarding.
Answers
D.
Mobile Device Management is an application container that is used to provision work applications.
D.
Mobile Device Management is an application container that is used to provision work applications.
Answers
E.
Mobile Device Management is used to control device functions post-Onboarding.
E.
Mobile Device Management is used to control device functions post-Onboarding.
Answers
Suggested answer: B, E
Total 116 questions
Go to page: of 12