ExamGecko
Home Home / HP / HPE6-A85

HP HPE6-A85 Practice Test - Questions Answers, Page 5

Question list
Search
Search

Describe the purpose of the administrative distance

A.
Routes teamed via external BGP have a higher administrative distance than routes learned via OSPF
A.
Routes teamed via external BGP have a higher administrative distance than routes learned via OSPF
Answers
B.
The administrative distance is used as a trust rating For route entries
B.
The administrative distance is used as a trust rating For route entries
Answers
C.
The administrative distance for a static route is 10
C.
The administrative distance for a static route is 10
Answers
D.
The higher administrative distance is preferred
D.
The higher administrative distance is preferred
Answers
Suggested answer: B

Explanation:

The administrative distance is used as a trust rating for route entries (B). It is a metric used by routers to select the best path when there are two or more different routes to the same destination from two different routing protocols. The lower the administrative distance value, the more trustworthy the source of the route. For example, a directly connected network has an administrative distance of 0 because it is the most trusted source of routing information. In contrast, routes learned from different routing protocols have higher administrative distances, reflecting their relative trustworthiness.

What is the recommended VSF topology? (Select two.)

A.
Star
A.
Star
Answers
B.
Daisy chain plus MAD
B.
Daisy chain plus MAD
Answers
C.
Full mesh
C.
Full mesh
Answers
D.
Full mesh plus MAD
D.
Full mesh plus MAD
Answers
E.
Ring
E.
Ring
Answers
Suggested answer: B, E

Explanation:

Only: Daisy chain plus MAD and ring are the recommended VSF topologies for Aruba switches. They provide high availability and redundancy for the VSF stack. MAD (Multiple Active Detection) is a mechanism to detect and resolve split-brain scenarios in a VSF stack.

Reference: https://www.arubanetworks.com/techdocs/AOS-CX/10.04/HTML/5200-6790/GUID-D6EF042E-EEEF-49F7-B67E-4CAC41CCB24D.html

Which feature can network administrators use to centralized RF planning and optimization service when using an Aruba mobility master architecture?

A.
Airwave
A.
Airwave
Answers
B.
Client Match
B.
Client Match
Answers
C.
AirMatch
C.
AirMatch
Answers
D.
Client Wave
D.
Client Wave
Answers
Suggested answer: C

Explanation:

AirMatch is a feature that provides centralized RF planning and optimization service for Aruba wireless networks. It uses cloud-based algorithms and machine learning to optimize the RF performance and user experience.

Reference: https://www.arubanetworks.com/assets/ds/DS_AirMatch.pdf

In Aruba networks, the recommended Virtual Switching Framework (VSF) topologies include the daisy chain plus Multi-Active Detection (MAD) and the ring topology. The daisy chain topology with MAD provides a straightforward and effective way to connect multiple switches in a series while ensuring there is a mechanism in place (MAD) to detect and handle situations where more than one switch in the VSF might become active simultaneously. The ring topology offers redundancy by creating a looped connection pattern among the VSF members, enhancing network resilience and reliability.

Which statement about manual switch provisioning with Aruba Central is correct?

A.
Manual provisioning does not require DHCP and requires DNS
A.
Manual provisioning does not require DHCP and requires DNS
Answers
B.
Manual provisioning does not require DHCP and does not require DNS
B.
Manual provisioning does not require DHCP and does not require DNS
Answers
C.
Manual provisioning requires DHCP and does not require DNS
C.
Manual provisioning requires DHCP and does not require DNS
Answers
D.
Manual provisioning requires DHCP and requires DNS
D.
Manual provisioning requires DHCP and requires DNS
Answers
Suggested answer: C

Explanation:

Manual switch provisioning in Aruba Central can be done without relying on DNS services, but it does require DHCP to assign IP addresses to the switches. DHCP is essential for the switches to obtain an IP address, which is necessary for them to communicate within the network and with Aruba Central for management and configuration purposes. DNS, on the other hand, is not strictly required for manual provisioning as direct IP addresses or other methods can be used to connect to Aruba Central or other management interfaces.

Where are wireless client roaming decisions made?

A.
Client device
A.
Client device
Answers
B.
Virtual Controller
B.
Virtual Controller
Answers
C.
Joint decision made by the origination and destination APs
C.
Joint decision made by the origination and destination APs
Answers
D.
Aruba Central
D.
Aruba Central
Answers
Suggested answer: A

Explanation:

Wireless client roaming decisions are made by the client device based on its own criteria, such as signal strength, noise level, data rate, etc. The network can influence the client's roaming decision by providing information such as neighbor reports, load balancing, band steering, etc., but the final decision is up to the client.

Reference: https://www.arubanetworks.com/techdocs/Instant_86_WebHelp/Content/instant-ug/wlan-roaming/client-roaming.htm

Wireless client roaming decisions are primarily made by the client device itself. The client device monitors the signal strength and quality of the current connection and decides to roam to a different Access Point (AP) when the current signal deteriorates below a certain threshold or a better option is available. While APs and controllers can provide information and support for roaming decisions through protocols like 802.11k and 802.11v, the ultimate decision to roam is made by the client device based on its algorithms and thresholds.

A customer has just implemented user and device certificates via a company-wide Group Based Policy (GPO) Which EAP method requires client certificates when authenticating to the network?

A.
EAP-TTLS
A.
EAP-TTLS
Answers
B.
EAP-TLS
B.
EAP-TLS
Answers
C.
EAP-TEAP
C.
EAP-TEAP
Answers
D.
PEAP
D.
PEAP
Answers
Suggested answer: B

Explanation:

EAP-TLS is an authentication method that requires client certificates when authenticating to the network. It provides mutual authentication between the client and the server using public key cryptography and digital certificates.

Reference: https://www.arubanetworks.com/techdocs/ClearPass/6.9/Guest/Content/CPPM_UserGuide/EAP-TLS/EAP-TLS.htm

EAP-TLS (Extensible Authentication Protocol-Transport Layer Security) is an EAP method that requires both server-side and client-side certificates for authentication. It is considered one of the most secure EAP methods because it uses a mutual authentication process where both the user and the authentication server must prove their identities to each other through the use of certificates. Implementing user and device certificates via a Group Based Policy (GPO) aligns well with EAP-TLS requirements for client-side certificates.

You are configuring a network with a stacked pair of 6300M switches used for distribution and layer 3 services. You create a new VLAN for users that will be used on multiple access stacks of CX6200 switches connected downstream of the distribution stack You will be creating multiple VLANs/subnets similar to this will be utilized in multiple access stacks

What is the correct way to configure the routable interface for the subnet to be associated with this VLAN?

A.
Create a physically routed interface in the subnet on the 6300M stack for each downstream switch.
A.
Create a physically routed interface in the subnet on the 6300M stack for each downstream switch.
Answers
B.
Create an SVl in the subnet on each downstream switch
B.
Create an SVl in the subnet on each downstream switch
Answers
C.
Create an SVl in the subnet on the 6300M stack, and assign the management address of each downstream switch stack to a different IP address in the same subnet
C.
Create an SVl in the subnet on the 6300M stack, and assign the management address of each downstream switch stack to a different IP address in the same subnet
Answers
D.
Create an SVl in the subnet on the 6300M stack.
D.
Create an SVl in the subnet on the 6300M stack.
Answers
Suggested answer: D

Explanation:

The correct way to configure the routable interface for the subnet to be associated with this VLAN is to create an SVI Switched Virtual Interface (SVI) Switched Virtual Interface (SVI) is a virtual interface on a switch that represents a VLAN and provides Layer 3 routing functions for that VLAN . SVIs are used to enable inter-VLAN routing , provide gateway addresses for hosts in VLANs , apply ACLs or QoS policies to VLANs , etc . SVIs have some advantages over physical routed interfaces such as saving interface ports , reducing cable costs , simplifying network design , etc . SVIs are usually numbered according to their VLAN IDs (e.g., vlan 10) and assigned IP addresses within the subnet of their VLANs . SVIs can be created and configured by using commands such as interface vlan , ip address , no shutdown , etc . SVIs can be verified by using commands such as show ip interface brief , show vlan , show ip route , etc . in the subnet on the 6300M stack. An SVI is a virtual interface on a switch that represents a VLAN and provides Layer 3 routing functions for that VLAN. Creating an SVI in the subnet on the 6300M stack allows the switch to act as a gateway for the users in that VLAN and enable inter-VLAN routing between different subnets. Creating an SVI in the subnet on the 6300M stack also simplifies network design and management by reducing the number of physical interfaces and cables required for routing.

The other options are not correct ways to configure the routable interface for the subnet to be associated with this VLAN because:

Create a physically routed interface in the subnet on the 6300M stack for each downstream switch: This option is incorrect because creating a physically routed interface in the subnet on the 6300M stack for each downstream switch would require using one physical port and cable per downstream switch, which would consume interface resources and increase cable costs. Creating a physically routed interface in the subnet on the 6300M stack for each downstream switch would also complicate network design and management by requiring separate routing configurations and policies for each interface.

Create an SVl in the subnet on each downstream switch: This option is incorrect because creating an SVI in the subnet on each downstream switch would not enable inter-VLAN routing between different subnets, as each downstream switch would act as a gateway for its own VLAN only. Creating an SVI in the subnet on each downstream switch would also create duplicate IP addresses in the same subnet, which would cause IP conflicts and routing errors.

Create an SVl in the subnet on the 6300M stack, and assign the management address of each downstream switch stack to a different IP address in the same subnet: This option is incorrect because creating an SVI in the subnet on the 6300M stack, and assigning the management address of each downstream switch stack to a different IP address in the same subnet would not enable inter-VLAN routing between different subnets, as each downstream switch would still act as a gateway for its own VLAN only. Creating an SVI in the subnet on the 6300M stack, and assigning the management address of each downstream switch stack to a different IP address in the same subnet would also create unnecessary IP addresses in the same subnet, which would waste IP space and complicate network management.

When would you bond multiple 20MHz wide 802.11 channels?

A.
To decrease the Signal to Noise Ratio (SNR)
A.
To decrease the Signal to Noise Ratio (SNR)
Answers
B.
To increase throughput between the client and AP
B.
To increase throughput between the client and AP
Answers
C.
To provision highly available AP groups
C.
To provision highly available AP groups
Answers
D.
To utilize high gain omni-directional antennas
D.
To utilize high gain omni-directional antennas
Answers
Suggested answer: B

Explanation:

Bonding multiple 20MHz wide 802.11 channels is a technique to create a wider bandwidth channel that supports higher data rate transmissions. It can increase the throughput between the client and AP by using more spectrum resources and reducing interference.

Reference: https://ieeexplore.ieee.org/document/9288995

Bonding multiple 20MHz wide 802.11 channels is a technique used to increase the throughput between the client device and the Access Point (AP). By combining two or more 20MHz channels into a wider channel (e.g., 40MHz, 80MHz, or even 160MHz), the data carrying capacity and, consequently, the overall throughput of the wireless connection are increased. This method is particularly useful in high-bandwidth applications or environments where higher data rates are required.

Which authentication does Aruba's Captive Portal use?

A.
Layer 3 authentication
A.
Layer 3 authentication
Answers
B.
MAC authentication
B.
MAC authentication
Answers
C.
802.1x authentication
C.
802.1x authentication
Answers
D.
Layer 2 authentication
D.
Layer 2 authentication
Answers
Suggested answer: A

Explanation:

Aruba's Captive Portal uses Layer 3 authentication, which means that it intercepts the client's HTTP requests and redirects them to a web page where the client can enter their credentials. The credentials are then verified by a RADIUS server or a local database before granting network access.

Reference: https://www.arubanetworks.com/techdocs/Instant_86_WebHelp/Content/instant-ug/captive-portal/captive-portal-auth.htm

Aruba's Captive Portal primarily uses Layer 3 authentication, which operates at the network layer. When a user connects to a network with a Captive Portal, they are redirected to a web page for authentication. This process involves the user entering credentials or accepting terms and conditions through a web interface before gaining full access to the network. The Captive Portal intercepts the user's web traffic at Layer 3, requiring them to authenticate before proceeding, which is why it's considered a form of Layer 3 authentication.

When measuring signal strength, dBm is commonly used and 0 dBm corresponds to 1 mW power.

What does -20 dBm correspond to?

A.
.-1 mW
A.
.-1 mW
Answers
B.
.01 mw
B.
.01 mw
Answers
C.
10 mW
C.
10 mW
Answers
D.
1mW
D.
1mW
Answers
Suggested answer: B

Explanation:

dBm is a unit of power that measures the ratio of a given power level to 1 mW. The formula to convert dBm to mW is: P(mW) = 1mW * 10^(P(dBm)/10). Therefore, -20 dBm corresponds to 0.01 mW, as follows: P(mW) = 1mW * 10^(-20/10) = 0.01 mW

Reference: https://www.rapidtables.com/convert/power/dBm_to_mW.html

The dBm is a logarithmic unit of power relative to 1 milliwatt (mW). -20 dBm means that the signal strength is 20 decibels lower than 1 mW. In terms of mW, this is 0.01 mW. Each 10 dB decrease represents a tenfold decrease in power. Therefore, -20 dBm is 102102 or 0.01 mW.

Total 103 questions
Go to page: of 11