Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

HP HPE6-A68 - Aruba Certified ClearPass Professional (ACCP) 6.7

Page: 1 / 4
Total 116 questions

Refer to the exhibit.

Based on the Access Tracker output for the user shown, which statement describes the status?

A.

The Aruba Terminate Session enforcement profile as applied because the posture check failed.

B.

A Healthy Posture Token was sent to the Policy Manager.

C.

A RADIUS-Access-Accept message is sent back to the Network Access Device.

D.

The authentication method used is EAP-PEAP.

E.

A NAP agent was used to obtain the posture token for the user.

Refer to the exhibit.

Based on the Posture Policy configuration shown, above, which statement is true?

A.

This Posture Policy can only be applied to an 802.1x wired service not 802.1x wireless.

B.

This Posture Policy checks the health status of devices running Windows, Linux and Mac OS X.

C.

This Posture Policy can use either the persistent or dissolvable Onguard agent to obtain the statement of health.

D.

This Posture Policy checks for presence of a firewall application in Windows devices.

E.

This Posture Policy checks with a Windows NPS server for posture tokens.

When is the RADIUS server certificate used? (Select two.)

A.

During dual SSID onboarding, when the client connects to the Guest network

B.

During EAP-PEAP authentication in single SSID onboarding

C.

During post-Onboard EAP-TLS authentication, when the client verifies the server certificate

D.

During Onboard Web Login Pre-Auth, when the client loads the Onboarding web page

E.

During post-Onboard EAP-TLS authentication, when the server verifies the client certificate

Refer to the exhibit.

Based on the Endpoint information shown, which collectors were used to profile the device as Apple iPad? (Select two.)

A.

HTTP User-Agent

B.

SNMP

C.

DHCP fingerprinting

D.

SmartDevice

E.

Onguard Agent

Which devices support Apple over-the-air provisioning? (Select two.)

A.

IOS 5

B.

Laptop running Mac OS X 10.8

C.

Laptop running Mac OS X 10.6

D.

Android 2.2

E.

Windows XP

Refer to the exhibit.

Based on the Guest Role Mapping Policy shown, what is the purpose of the Role Mapping Policy?

A.

to display a role name on the Self-registration receipt page

B.

to send a firewall role back to the controller based on the Guest User’s Role ID

C.

to assign Controller roles to guests

D.

to assign three roles of [Contractor], [Guest] and [Employee] to every guest user

E.

to create additional account roles for guest administrators to assign to guest accounts

A hotel chain deployed ClearPass Guest. When hotel guests connect to the Guest SSID, launch a web browser and enter the address www.google.com, they are unable to immediately see the web login page.

What are the likely causes of this? (Select two.)

A.

The ClearPass server has a trusted server certificate issued by Verisign.

B.

The ClearPass server has an untrusted server certificate issued by the internal Microsoft Certificate server.

C.

The ClearPass server does not recognize the client’s certificate.

D.

The DNS server is not replying with an IP address for www.google.com.

A guest self-registered through a Publisher’s Register page.

Which statement accurately describes how the guest’s account will be stored?

A.

It will be stored in the Publisher’s guest user repository and the Subscriber’s Onboard user repository.

B.

It will be stored in the Publisher’s local user repository and the Subscriber’s guest user repository.

C.

It will be stored in the Publisher’s guest user repository permanently, but only for 14 days in the Subscriber’s guest user repository,

D.

It will be stored in both the Publisher’s guest user repository and the Subscriber’s guest user repository.

E.

It will be stored in the Publisher’s guest user repository, but not the Subscriber’s.

A customer wants to implement Virtual IP redundancy, such that in case of a ClearPass server outage, 802.1x authentications will not be interrupted. The administrator has enabled a single Virtual IP address on two ClearPass servers.

Which statements accurately describe next steps? (Select two.)

A.

The NAD should be configured with the primary node IP address for RADIUS authentication on the 802.1x network.

B.

A new Virtual IP address should be created for each NAD.

C.

Both the primary and secondary nodes will respond to authentication requests sent to the Virtual IP address when the primary node is active.

D.

The primary node will respond to authentication requests sent to the Virtual IP address when the primary node is active.

E.

The NAD should be configured with the Virtual IP address for RADIUS authentications on the 802.1x network.

What are Operator Profiles used for?

A.

to enforce role based access control for Aruba Controllers

B.

to enforce role based access control for ClearPass Policy Manager admin users

C.

to enforce role based access control for ClearPass Guest Admin users

D.

to assign ClearPass roles to guest users

E.

to map AD attributes to admin privilege levels in ClearPass Guest