Sei sulla pagina 1di 16

ACMA_6.1 V8.

02_formatted

Exam A QUESTION 1 Where in the controller would we configure a wireless network NOT to use encryption? A. B. C. D. E. AAA profile SSID profile ARM profile Radio profile VAP profile

Correct Answer: B QUESTION 2 Firewall rules contain the following fields, except? A. B. C. D. E. Action Destination Service Mirror Policy

Correct Answer: E QUESTION 3 What are the serial console commands used to factory default an AP? A. B. C. D. E. Purge, save, reload Purge, save, boot Write erase all Purge restart Purge, write mem, reload

Correct Answer: B QUESTION 4 Which of the following parameters is not needed by Visual RF Plan in order to Plan APs on a floor region? A. B. C. D. E. AP Type PHY Type Distance to Controller Environment Desired Data Rate

Correct Answer: C QUESTION 5 Identify the benefits of using aliases when writing firewall policies (Select three) A. B. C. D. E. Makes policies more readable. Changes to policy rules that use aliases are auto updated. End users are applied to the proper role. Can be applied to a Role Simplifies repetitive configuration.

Correct Answer: ABE

QUESTION 6 Which of the following is true of an Aruba Mobility Controller acting as a layer 2 switch? (Select two): A. B. C. D. E. The Mobility Controller is the client's default router. The Mobility Controller acts as a bridge. All stations must use the same VLAN Uplink ports on the Mobility Controller can use 802.1q tagging VLANs cannot have IP addresses

Correct Answer: BD QUESTION 7 In the startup wizard the ports configuration screen allows you to do the following (Select three)? A. B. C. D. E. Identify trunk ports Configure port channels Assign VLANs Identify the native VLAN for a port Specify the IP address of the Vlan

Correct Answer: ACD QUESTION 8 The characteristics of 802.1X Authentication include (Select three): A. B. C. D. E. L3 Authentication Extensible Authentication Protocol Support of RADIUS external authentication Port based authentication EAP terminates on authenticator

Correct Answer: BCD QUESTION 9 FQLN can be set for an AP: (Select two) A. B. C. D. E. At the factory During AP provisioning Using the FQLN mapper tool By DHCP when an address is requested Using the AP wizard

Correct Answer: BC QUESTION 10 In what formats can Visual RF Plan export a Bill of Material (Select two)? A. B. C. D. E. Microsoft Excel CSV database format Microsoft Word HTML MySQL

Correct Answer: CD QUESTION 11 Which of the following is NOT available for configuration in the startup wizard?

A. B. C. D. E.

RF Plan Administrator and enable passwords Native VLANs on a per port basis WPA-PSK encryption Radius Server

Correct Answer: A QUESTION 12 Remote AP in tunnel mode, by default, uses which of the following to encrypt user traffic back to the mobility controller? A. B. C. D. E. L2TP over IPSec is used to carry user traffic and control traffic PPTP is used to tunnel user traffic The AP does not encrypt user traffic.The user's link layer encryption is used. Remote AP traffic is unencrypted Certificate based tunnel

Correct Answer: C QUESTION 13 The Guest Provisioning user account has the ability to do which of the following? A. B. C. D. E. Add a new employee to the internal database Change the oo an ??f el of t he guest pr ovi si oni ng Change the available data fields on the guest provisioning page Add a guest user to the internal database Assign a Role to a guest account

Correct Answer: D QUESTION 14 Which of the following is true about configuring a server group? A. B. C. D. E. Server rules are used to send information to the configured servers A server group can have more than 1 server If the internal database is used in the server group, then no external servers can be added If multiple servers are assigned to the server group, all except the 1st will be ignored All the servers in a server group will be used round robin style

Correct Answer: B QUESTION 15 When adding licenses in the startup wizard license screen a reboot is required: A. B. C. D. E. After each license is installed Before any other configuration can take place Only if the Policy Enforcement Firewall license is installed Once the last License is added A reboot is not required until you have completed the configuration wizard

Correct Answer: E QUESTION 16 Guest access can be provided securely by combining the following components of an Aruba system: (Select two)

A. B. C. D. E.

Use restrictive firewall policies to limit the guest user ?s accesst oi nt er nal r esour ce Providing guests their own APs and controllers Dedicated APs Authenticate users with the internal captive portal against the internal database or other server DoS guest users off of the system and make them use wired ports

Correct Answer: AD QUESTION 17 802.11n APs operate in which bands? (Select two) A. B. C. D. E. 900 MHz 2.4 GHz 2.4 MHz 5 GHz 5 MHz

Correct Answer: BD QUESTION 18 In decrypt-tunneled forwarding mode, which of the following is true? A. B. C. D. E. Client sets up an IPSEC tunnel with the controller The AP decrypts and then the 802.11 frame is sent in a GRE tunnel to the controller The AP decrypts the 802.11 frame and bridges it on the wire The AP decrypts the 802.11 frame, encrypts it as an Ethernet frame and sends it to the controller Clients decrypted traffic is sent down the GRE tunnel

Correct Answer: B QUESTION 19 WPA and WPA2 can use the following authentication methods: (Select two) A. B. C. D. E. WEP Keys PSK 802.1X Captive Portal IPSEC

Correct Answer: BC QUESTION 20 Which of the following core components of ARM enables intelligent distribution of clients across available channel capacity? A. B. C. D. E. Multi-band scan Spectrum load balancing Rogue AP detection Band steering Coordinated Access to a Single Channel

Correct Answer: B QUESTION 21 Which one of the following file types cannot be imported to Visual RF Plan?

A. B. C. D. E.

dwg jpg tiff gif bmp

Correct Answer: C QUESTION 22 Aruba's recommended best option for authenticating guest users is A. B. C. D. E. Temporary employee account Kerberos Captive Portal Windows logon Email address

Correct Answer: C QUESTION 23 Aliases are used in firewall policies to: A. B. C. D. E. Apply firewall polices to ports in a stateful manner Make firewall rules act like traditional ACLs Ease readability and maintainability for source and destination addresses Are a part of roles, not the firewall Are applied as an action in a rule

Correct Answer: C QUESTION 24 An Aruba AP 125 is capable of supporting which of the following network types? (Select three) A. B. C. D. E. 802.11b 802.11n 802.11a 802.11w 802.11p

Correct Answer: ABC QUESTION 25 What does SET ORIENTATION option do in the Visual RF Plan edit tool? A. B. C. D. E. Set the horizontal plane on each floor Give the option to resize a floor Sets the North/South orientation of the building Sets the proper vertical floor plan alignment Allows the planner to set the directional antenna orientation

Correct Answer: D QUESTION 26 Which of the following is true of an Aruba Mobility Controller acting as a layer 3 router? (Select two): A. The Mobility Controller is the client's default router. B. The Mobility Controller acts as a bridge.

C. DHCP can be provided by the network infrastructure or the Mobility Controller. D. The Mobility Controller supports BGP. E. OSPF must be configured Correct Answer: AC QUESTION 27 Which of these is NOT a valid license type? (Select two) A. B. C. D. E. RFprotect Application Security Base AOS PEF NG Content Security

Correct Answer: BC QUESTION 28 In a Campus AP deployment, an access point has been provisioned statically with an IP address, subnet mask, default gateway and Controller IP address. Control Plane Security has been disabled. Both the Controller and the Access Point are using 6.1 firmware. If a 3rd party firewall is placed in between the AP and controller, what traffic would need to be allowed for the AP to boot successfully and broadcast Wireless Networks? (Select two) A. B. C. D. E. DHCP PAPI GRE SNMP NTP

Correct Answer: BC QUESTION 29 Web based captive portal can be authenticated by the following types of databases: (Select two) A. B. C. D. E. Internal PEAP RADIUS Kerberos Tacacs

Correct Answer: AC QUESTION 30 What is the IP address of the controller when using the startup wizard? A. B. C. D. E. 192.168.1.1 172.16.0.1 10.1.1.1 172.16.0.254 10.1.10.100

Correct Answer: D QUESTION 31 When local controller is selected as the controller's operation mode in the startup wizard, which is no longer configurable?

A. B. C. D. E.

Licenses WLANs VLANs and IP addressing Controller country code Time zone

Correct Answer: B QUESTION 32 What is NOT a basic configuration in the startup wizard when configuring a WLAN? A. B. C. D. E. SSID VLAN Radio Type Antenna Type Firewall Role

Correct Answer: D QUESTION 33 Which firewall action is necessary in a guest pre-authentication role to display the captive portal login screen? A. B. C. D. E. SRC-NAT DST-NAT allow all allow CP route

Correct Answer: B QUESTION 34 When a client is blacklisted, the controller will: A. B. C. D. E. Send a message telling the client it has been blacklisted De-authenticate the client from the network but allow it to keep transmitting data Only block the client if it hasn't yet associated with an A Stop the client from associating with any SSID on the controller Block the client from the SSID he was connected to

Correct Answer: D QUESTION 35 Which of the following statements about management accounts is false? A. B. C. D. E. The root account can be used to monitor access points connected to the controller The guest-provisioning account can see the controller ?s confi gur ati on but cannot changei The read-only account cannot delete internal database entries The guest-provisioning account can make changes to the internal AP database The network-operations account cannot access configuration

Correct Answer: B QUESTION 36 802.1X authentication takes place: A. Prior to granting access to L2 media

B. C. D. E.

After the user has an IP address After the user sees the captive portal page Prior to the user associating with the AP Once the IPSEC tunnel is up

Correct Answer: A QUESTION 37 When configuring a default gateway in the startup wizard it must be a part of: A. B. C. D. E. A VLAN configured with an IP interface and assigned to a port An IP range that is not assigned to a port or VLAN A VLAN assigned to a port but without an IP interface configured A VLAN not configured on the controller The management Vlan

Correct Answer: A QUESTION 38 A Remote AP uses which type of secure tunnel to communicate with a controller: A. B. C. D. E. NAT-T IPSec PPTP GRE IP-IP

Correct Answer: B QUESTION 39 What type of authentication servers are selectable in the WLAN wizard? (Select three): A. B. C. D. E. RADIUS Kerberos LDAP Internal database Tacacs

Correct Answer: ACD QUESTION 40 Which of the following information is gathered by APs during scanning periods? (Select three) A. B. C. D. E. MAC addresses of neighboring APs Security threats in the surroundings Type of non-802.11 interference detected Interfering Clients connected to other APs 4.9 GHz devices

Correct Answer: ABD QUESTION 41 Visual RF Plan requires certain building information when defining a new building. Which one of the following is NOT a user supplied building specification? A. Building name B. Longitude and Latitude

C. Attenuation between floors D. Desired data rate E. Number of APs Correct Answer: E QUESTION 42 What are the four views available in Visual RF Plan (Select four)? A. B. C. D. E. User VIew Controller View Access Point View Floor Plan View Network, Campus and Building View

Correct Answer: ACDE QUESTION 43 When a barcode scanner connects to an AP, what is the 1st role that is assigned to it? A. B. C. D. E. MAC authentication default role 802.1X default role Server derived role Initial role User derived Role

Correct Answer: D QUESTION 44 Which of the following is NOT one of the four continuous functions of ARM? A. B. C. D. E. Monitoring the environment for the current operating and alternate channels Collecting and classifying information obtained during background scans Computing the best channel and power level to operate on Create two indices for each AP, for each channel Determining the best controller for APs to terminate

Correct Answer: E QUESTION 45 In what order does the AP dynamically discover the Master controller? A. B. C. D. E. DNS query, ADP Broadcast, ADP Multicast, DHCP option 43 DHCP option 43, ADP Multicast, ADP Broadcast, DNS query DHCP option 43, DNS query, ADP Multicast, ADP Broadcast ADP Multicast, ADP Broadcast, DHCP option 43, DNS query DHCP option 43, ADP Broadcast, ADP multicast, DNS Query

Correct Answer: B QUESTION 46 When configuring a guest WLAN via the WLAN section of the startup wizard, which security option is NOT available? A. WEP encryption B. Direct access to the internet with no captive portal C. Captive portal with authentication via credentials

D. Captive portal with email registration E. Captive Portal with no authentication or registration Correct Answer: A QUESTION 47 Which answer correctly orders the following AP boot processes as they occur? A. B. C. D. E. F. G. H. I. AP Transfers OS from controller AP builds GRE tunnel to the controller AP determines IP address of the controller AP Radio is enabled a, c, d, b. c, a, b, d. b, d, a, c. a, b, c, d. c, b, a, d.

Correct Answer: B QUESTION 48 The AP Wizard allows the selection of APs to be provisioned using which of the following methods (Select three): A. B. C. D. E. APs in particular AP Group All APs APs designated as Air Monitors APs meeting specified search criteria APs of a specific type

Correct Answer: ABD QUESTION 49 Which of the following is NOT available for configuration via startup wizard? A. B. C. D. E. Controller name Country Code Loopback IP VLAN IP Firewall Roles

Correct Answer: C QUESTION 50 Firewall policy should be written from: A. B. C. D. E. Least specific to most specific Most specific to least specific Most important resources first Order is not important Policies with the most rules 1st

Correct Answer: B QUESTION 51 How many roles should be created on a controller?

A. B. C. D. E.

One per authentication type As many as necessary The same number as firewall policies One less than the number of firewall policies The same number as SSIDs

Correct Answer: B QUESTION 52 Which of the following cannot be accomplished from the startup wizard? A. B. C. D. E. Basic controller configuration License installation VPN configuration WLAN configuration Firewall Roles

Correct Answer: C QUESTION 53 Clients connecting to a remote AP at a branch office can get an IP address through which of the following methods? (Select three) A. B. C. D. E. DHCP server connected to the Remote AP ?s contr oll e DHCP server at a branch office Address must be statically assigned DHCP server inside the Remote AP DHCP from global content server for Remote APs

Correct Answer: ABD QUESTION 54 Which of the following would be appropriate for standalone MAC Authentication? A. B. C. D. E. Guest User Internal User Barcode scanner Admin user Laptops

Correct Answer: C QUESTION 55 Which ARM function converts APs with excess capacity into Air Monitors? A. B. C. D. E. Airtime fairness Coordinated access to a single channel Co-channel interference mitigation Client aware scanning Band Steering

Correct Answer: C QUESTION 56 What is the purpose of the validuser ACL? A. When a user transmits data through the controller, the validuser ACL is used to check if the user is in

B. C. D. E.

the layer 3 user-table Before a client is added to the controller ?s user t abl e, t he vali duser ACLi s checkedt o make sur et he client has a valid IP address The validuser ACL is used during 802.1X authentication to check that the client is in the layer 3 usertable When an AP needs to transmit data to a user, it checks the validuser ACL to make sure the user has a valid IP address A list of configured MAC addresses that define the valid users

Correct Answer: B QUESTION 57 Time range is applied directly to which one of the following: A. B. C. D. E. ROLE Firewall Policy Firewall Rule Profile Interface

Correct Answer: C QUESTION 58 Which role is assigned prior to launching the captive portal splash screen? A. B. C. D. E. Pre-authentication role Post-authentication role AAA role AAA-CP role CP default role

Correct Answer: A QUESTION 59 A reboot of the controller is necessary in which of the following scenarios? (Select two) A. B. C. D. E. Changing controller IP Changing the VLAN of a Virtual AP Profile Creating of a new AP Group Changing of Controller Role Extending a license range

Correct Answer: AD QUESTION 60 What are some best practices when configuring the Aruba Firewall (Select two)?: A. B. C. D. E. Use aliases when possible Write rules from least specific to most specific Take actions like blacklisting when users violate policies Create a different policy for each unique rule Create different policies for access to different servers

Correct Answer: AC QUESTION 61 Which roles must be configured via the startup wizard when captive portal is being configured (Select Two)

A. B. C. D. E.

Roles are not used on the Aruba system Pre-Authentication role Authenticated role Unauthenticated role The Logon Role

Correct Answer: BC QUESTION 62 Which is the strongest encryption type? A. B. C. D. E. AES TKIP WEP MSCHAPv2 DES

Correct Answer: A QUESTION 63 When would you use the Reject action in a firewall policy? A. B. C. D. E. To let hackers know which ports are open on your firewall To let your users know they they are in violation of corporate policies To tell down stream routers to use a more appropriate router To aid in troubleshooting firewall policy configuration To let the system count the violations

Correct Answer: D QUESTION 64 Which of the following can be configured in the GUI setup wizard? (Select three) A. B. C. D. E. timezone WLAN VLAN Loopback address DHCP Option 43

Correct Answer: ABC QUESTION 65 Which of the following deployment types is NOT a valid option when using the AP Wizard? A. B. C. D. E. LAN Remote Roaming Remote Mesh LAN Mesh

Correct Answer: C QUESTION 66 When configuring roles under ccess Contr o in t he Cont rol l r s Conf i gurat ion page , what does t ho wr ef er enc act i on tell u

A. B. C. D. E.

Which firewall hits were detected that refer to the role Which profiles refer to the role What policies are inside the role What users are currently assigned that role What authentication methods use Roles with these policies

Correct Answer: B QUESTION 67 Which of these are supported by the Aruba Controller? (Select two) A. B. C. D. E. SNMP HSRP AES Encryption Blowfish encryption BGP

Correct Answer: AC QUESTION 68 When looking at clients in the ?Monit ori ngClients ?secti on of t he Contr oll er, whi ch of t hef oll o w i ng information is NOT visible? A. B. C. D. E. Role MAC address Output power of client radio Method of authentication Age

Correct Answer: C QUESTION 69 What Controller modes of operation are available from the startup wizard (Select three)? A. B. C. D. E. Primary Standalone Master Local Backup controller

Correct Answer: BCD QUESTION 70 What information is required by an AP in order to boot? (Select three) A. B. C. D. E. AP's IP Address, Netmask, Default Gateway AP's Name and Group Aruba Controller's Master IP Addres An established NTP connection to the Master Controller Establish an IPSEC tunnel with the Master controller

Correct Answer: ABC QUESTION 71 In Extensible Authentication Protocol (EAP) terminology the client station is called the: A. Station

B. C. D. E.

Authenticated Client Supplicant End node Client Device

Correct Answer: C QUESTION 72 When configuring the Mobility Controller's internal DHCP via the startup wizard which option is NOT available for configuration (select two)? A. B. C. D. E. Pod name Default router Option 43 Domain name Netbios name server

Correct Answer: AC

Potrebbero piacerti anche