ExamGecko
Home Home / HP / HPE6-A71

HP HPE6-A71 Practice Test - Questions Answers, Page 12

Question list
Search
Search

List of questions

Search

Related questions











Refer to the exhibit.

An administrator examines the configuration of an AP from apboot mode shown in the exhibit.

What can the administrator determine from the configuration?

A.
RAP terminated on a stand-alone controller.
A.
RAP terminated on a stand-alone controller.
Answers
B.
AP terminated on a non-cluster Mobility Controller.
B.
AP terminated on a non-cluster Mobility Controller.
Answers
C.
RAP terminated on a Mobility Master.
C.
RAP terminated on a Mobility Master.
Answers
D.
AP terminated on a Mobility Controller in a cluster.
D.
AP terminated on a Mobility Controller in a cluster.
Answers
Suggested answer: D

An administrator deploys an AP at a branch office. The branch office has a private WAN circuit that provides connectivity to a corporate office controller. An Ethernet port on the AP is connected to a network storage device that contains sensitive information. The administrator is concerned about sending this traffic in clear-text across the private WAN circuit.

What can the administrator do to prevent this problem?

A.
Redirect the wired port traffic to an AP-to-controller GRE tunnel.
A.
Redirect the wired port traffic to an AP-to-controller GRE tunnel.
Answers
B.
Convert the campus AP into a RAP.
B.
Convert the campus AP into a RAP.
Answers
C.
Enable AP encryption for wired ports.
C.
Enable AP encryption for wired ports.
Answers
D.
Enable IPSec encryption on the AP's wired ports.
D.
Enable IPSec encryption on the AP's wired ports.
Answers
Suggested answer: B

An administrator deploys Aruba Mobility Controller 7005s to a company's branch offices. The administrator wants to disable the console port to prevent unauthorized access to the controllers.

Which controller command should the administrator use to implement this policy?

A.
no console enable
A.
no console enable
Answers
B.
no mgmt-user console
B.
no mgmt-user console
Answers
C.
mgmt-user console-block
C.
mgmt-user console-block
Answers
D.
console disable
D.
console disable
Answers
Suggested answer: C

Explanation:

References:

Refer to the exhibit.

Once connected to a WLAN, a user cannot reliably access resources in a company's network. Based on the output shown in the exhibit, what can be determined about the user's connection?

A.
The user has successfully authenticated through use of PEAP.
A.
The user has successfully authenticated through use of PEAP.
Answers
B.
The user is connected to a controller through use of the VIA client.
B.
The user is connected to a controller through use of the VIA client.
Answers
C.
The user is connected wirelessly to a controller.
C.
The user is connected wirelessly to a controller.
Answers
D.
The user is connected to an ArubaOS-Switch.
D.
The user is connected to an ArubaOS-Switch.
Answers
Suggested answer: D

What is true about clustering and AP connections to cluster members?

A.
The AP will always stay connected to the LMS IP address configured in the AP profile.
A.
The AP will always stay connected to the LMS IP address configured in the AP profile.
Answers
B.
During rebalancing, the active load is redistributed first.
B.
During rebalancing, the active load is redistributed first.
Answers
C.
The default thresholds are 75% for the Rebalanced Threshold and 25% for the Unbalanced Threshold.
C.
The default thresholds are 75% for the Rebalanced Threshold and 25% for the Unbalanced Threshold.
Answers
D.
AP load balancing is disabled by default.
D.
AP load balancing is disabled by default.
Answers
Suggested answer: D

Explanation:

References:

Which IEEE standard should user devices support to implement Fast BSS Transition when a network implements wireless roaming (mobility)?

A.
802.11r
A.
802.11r
Answers
B.
802.11f
B.
802.11f
Answers
C.
801.11m
C.
801.11m
Answers
D.
802.11i
D.
802.11i
Answers
Suggested answer: A

Explanation:

References:

An administrator purchases a pair of Mobility Masters (MM) and wants to deploy 16 Virtual Mobility Controllers (VMCs). What is the minimum number of clusters that the administrator needs to implement to support the number of VMCs?

A.
1
A.
1
Answers
B.
2
B.
2
Answers
C.
4
C.
4
Answers
D.
8
D.
8
Answers
Suggested answer: C

Explanation:

https://community.arubanetworks.com/t5/Aruba-Solution-Exchange/Clustering-of-Mobility-Controllers/ta-p/282686

Which methods can be used to configure RAP redundancy when connected to two redundant Aruba Mobility Controllers (MCs) in the DMZ? (Select two.)

A.
Virtual IP address of the two controllers.
A.
Virtual IP address of the two controllers.
Answers
B.
Active and Standby AAC.
B.
Active and Standby AAC.
Answers
C.
Primary and backup LMS IP addresses.
C.
Primary and backup LMS IP addresses.
Answers
D.
IPSec High Availability (HA) between two cluster members.
D.
IPSec High Availability (HA) between two cluster members.
Answers
E.
AirWave direction to RAPs redundant Mobility Controllers.
E.
AirWave direction to RAPs redundant Mobility Controllers.
Answers
Suggested answer: B, E

An administrator wants to change the default roles for the pre- and post-authentication user roles for a WLAN on a Mobility Master (MM). The controllers in the network perform all authentication.

Under the Managed Network hierarchy, where can the administrator assign these roles?

A.
AAA Profiles
A.
AAA Profiles
Answers
B.
VLAN
B.
VLAN
Answers
C.
RADIUS attributes
C.
RADIUS attributes
Answers
D.
AAA Server Group
D.
AAA Server Group
Answers
Suggested answer: A

Explanation:

References:

In the WebUI

1. Navigate to the Configuration > Security > Authentication > AAA Profiles page.

2. Select the default profile or a user-defined AAA profile.

3. Click the Initial Role drop-down list, and select the desired user role for unauthenticated users.

4. Click the 802.1x Authentication Default Role drop-down list and select the desired user role for users who have completed 802.1x authentication.

5. Click the MAC Authentication Default Role drop-down list and select the desired user role for clients who have completed MAC authentication.

6. Click Apply.

An administrator wants to implement 802.1X authentication on Ethernet ports on branch office controllers. What must the administrator do to implement this policy?

A.
Define the port an untrusted, and assign an AAA policy to the port.
A.
Define the port an untrusted, and assign an AAA policy to the port.
Answers
B.
Define the port as trusted, and assign an AAA policy to the port.
B.
Define the port as trusted, and assign an AAA policy to the port.
Answers
C.
Define the port as untrusted, and assign an AAA policy to the VLAN.
C.
Define the port as untrusted, and assign an AAA policy to the VLAN.
Answers
D.
Define the port as trusted, and assign an AAA policy to the VLAN.
D.
Define the port as trusted, and assign an AAA policy to the VLAN.
Answers
Suggested answer: A
Total 171 questions
Go to page: of 18