ExamGecko
Home Home / HP / HPE6-A85

HP HPE6-A85 Practice Test - Questions Answers, Page 8

Question list
Search
Search

List of questions

Search

A network technician is deploying 'headless' devices in the warehouse at the HQ location. So far, an SSID with 802.1X has been configured. However, these new devices lack 802.1X support.

Which option would provide enhanced security for these devices?

A.
WPA3-Personal
A.
WPA3-Personal
Answers
B.
Multi-Preshared keys (mPSK)
B.
Multi-Preshared keys (mPSK)
Answers
C.
WPA2-Enterprise
C.
WPA2-Enterprise
Answers
D.
Opportunistic Wireless Encryption (OWE)
D.
Opportunistic Wireless Encryption (OWE)
Answers
Suggested answer: B

Explanation:

For 'headless' devices that lack 802.1X support, Multi-Preshared Keys (mPSK) provide a more secure alternative to WPA2-Personal, which uses a single preshared key. mPSK allows for the assignment of unique PSKs to devices or groups of devices, which enhances security by not sharing a single PSK across multiple devices.

What is the recommended UXI monitoring solution in large logistic facilities?

A.
Use a special ruggedized UXI sensor.
A.
Use a special ruggedized UXI sensor.
Answers
B.
Use the UXI App on all handheld devices running on Windows CE.
B.
Use the UXI App on all handheld devices running on Windows CE.
Answers
C.
Add a UXI sensor in every aisle of the logistic space.
C.
Add a UXI sensor in every aisle of the logistic space.
Answers
D.
Use the UXI App direct on Zebra scanning devices running on Android.
D.
Use the UXI App direct on Zebra scanning devices running on Android.
Answers
Suggested answer: C

Explanation:

In large logistic facilities, to ensure comprehensive monitoring and performance analysis, it's recommended to place a User Experience Insight (UXI) sensor in every aisle. This allows for detailed and specific monitoring of network performance across the extensive coverage area of such facilities.

What describes Clearpass OnGuard? (Select two.)

A.
Onguard assings an unique identity to each device.
A.
Onguard assings an unique identity to each device.
Answers
B.
It is used for the self-registration of guest devices.
B.
It is used for the self-registration of guest devices.
Answers
C.
OnGuard is an agent, running on client systems.
C.
OnGuard is an agent, running on client systems.
Answers
D.
OnGuard is doing posture checks on client systems.
D.
OnGuard is doing posture checks on client systems.
Answers
E.
It is an intuitive portal for users to securely configure their devices.
E.
It is an intuitive portal for users to securely configure their devices.
Answers
Suggested answer: C, D

Explanation:

ClearPass OnGuard is a component of the ClearPass Policy Manager that performs health and security posture checks on devices to ensure they meet the organization's compliance requirements before allowing access to the network. It operates as an agent on client systems to perform these checks.

Based on the 'show ip route' output on an Aruba CX 8325, what type of route is '10.20.0.0/22, vrf default via 10.1.1.1, [110/200]'?

A.
connected
A.
connected
Answers
B.
local
B.
local
Answers
C.
OSPF
C.
OSPF
Answers
D.
static
D.
static
Answers
Suggested answer: C

Explanation:

The route '10.20.0.0/22, vrf default via 10.1.1.1, [110/200]' indicates that it is an OSPF route. This is evidenced by the administrative distance and metric '[110/200]' where 110 is the default administrative distance for OSPF routes.

A client connects to an Aruba AP in tunnel mode and is assigned to a VLAN based on the client's MAC address.

Which client VLAN assignment was configured?

A.
Mixed
A.
Mixed
Answers
B.
Static
B.
Static
Answers
C.
Native VLAN
C.
Native VLAN
Answers
D.
Dynamic
D.
Dynamic
Answers
Suggested answer: D

Explanation:

When a client connects to an Aruba AP in tunnel mode and is assigned to a VLAN based on the client's MAC address, this indicates a Dynamic VLAN assignment. The VLAN is determined dynamically at the time of authentication based on the client's credentials or attributes, such as its MAC address.

What is the ideal mounting position for a typical Aruba indoor AP?

A.
Horizontal, below a suspended ceiling
A.
Horizontal, below a suspended ceiling
Answers
B.
Under a office desk
B.
Under a office desk
Answers
C.
Horizontal, above a suspended ceiling
C.
Horizontal, above a suspended ceiling
Answers
D.
Vertical, at a wall
D.
Vertical, at a wall
Answers
Suggested answer: A

Explanation:

The ideal mounting position for a typical Aruba indoor AP is horizontally, below a suspended ceiling. This positioning takes advantage of the AP's antenna radiation pattern and helps provide optimal wireless coverage and performance within the indoor environment.

A network technician is testing a new SSID for a branch office. They are able to connect, get an IP address, and resolve DNS names. However, they are not able to browse the internet.

On the existing SSID at the branch, connectivity to the internet works as expected on the same VLAN as the new SSID. The wireless client should have received a new role to allow internet access.

What should the network technician verify to ensure both SSIDs function in a similar way?

A.
Verify each SSID's authentication and encryption parameters are enabled and the same.
A.
Verify each SSID's authentication and encryption parameters are enabled and the same.
Answers
B.
Verify that the implicit 'deny all' is the last entry in the firewall policies.
B.
Verify that the implicit 'deny all' is the last entry in the firewall policies.
Answers
C.
Verify the new SSID is broadcasting on all the APs at the branch office.
C.
Verify the new SSID is broadcasting on all the APs at the branch office.
Answers
D.
Verify the firewall policies assigned, making sure the rules are correct and ordered properly.
D.
Verify the firewall policies assigned, making sure the rules are correct and ordered properly.
Answers
Suggested answer: D

Explanation:

When a network technician encounters an issue where a new SSID does not allow internet access despite successful connectivity and DNS resolution, they should verify the firewall policies associated with the new SSID. The firewall policies must include rules that permit traffic to and from the internet and should be correctly ordered to ensure that they are applied as intended. Since the existing SSID functions correctly, comparing the firewall rules between the two can be a useful method of troubleshooting.

When does the 802.1x authentication process begin when connecting to a secured enterprise mode WLAN?

A.
After the firewall policies are applied to the session
A.
After the firewall policies are applied to the session
Answers
B.
After the client completes 802.11 association
B.
After the client completes 802.11 association
Answers
C.
After the captive portal authentication completes
C.
After the captive portal authentication completes
Answers
D.
After the WPA 4-Way Handshake is completed
D.
After the WPA 4-Way Handshake is completed
Answers
Suggested answer: B

Explanation:

The 802.1x authentication process begins after the client device completes the 802.11 association with the access point but before the WPA 4-Way Handshake. This is part of the EAP (Extensible Authentication Protocol) process, which authenticates the device before allowing full network access.

DRAG DROP

Match the Open Systems Interconnection (OSI) layer with its comparable member of the TCP/IP stack. (Options may be used more than once.)


Question 79
Correct answer: Question 79

You have been asked to troubleshoot failed connectivity between a local subnet in the HQ Office and a remote subnet in the Branch Office. PC1 is unable to ping PC2.

Use the provided topology and show command output to identify the reason for the failure:

A.
On Branch Office - L3-SW-2- There is no Layer 3 SVI configured in the correct subnet.
A.
On Branch Office - L3-SW-2- There is no Layer 3 SVI configured in the correct subnet.
Answers
B.
On HQ Office L3-SW-1 - There is no route to the Branch Office.
B.
On HQ Office L3-SW-1 - There is no route to the Branch Office.
Answers
C.
On HQ Office L3-SW-1 - The switch does not have a static default route to the internet.
C.
On HQ Office L3-SW-1 - The switch does not have a static default route to the internet.
Answers
D.
On Branch Office L3-SW-2- The switch does not have a static route to the HQ Office Local Subnet.
D.
On Branch Office L3-SW-2- The switch does not have a static route to the HQ Office Local Subnet.
Answers
Suggested answer: D

Explanation:

Using the provided topology and show command output, it can be determined that L3-SW-2 in the Branch Office does not have a route to reach the subnet where PC1 resides (192.168.1.0/24 in the HQ Office). L3-SW-1 in the HQ Office has a route to the Branch Office subnet (172.16.1.0/24), but without the reciprocal route on L3-SW-2, traffic from the Branch Office will not be able to reach the HQ Office subnet, hence PC1 cannot ping PC2.

Total 103 questions
Go to page: of 11