Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

HP HPE6-A85 - Aruba Certified Campus Access Associate Exam

Page: 3 / 3
Total 103 questions

A network technician at a branch office is connecting VolP phones to a newly configured AOS-CX switch. Users are complaining that voice quality is not as good as at the corporate office. Further investigation

shows the local-priority value at the branch office is 1 while at the corporate office is 5.

What describes the issue regarding the default QoS behavior on the AOS-CX switch?

A.

The QoS trust is set to DSCP by default, and the VolP phone's local-priority value is mapped to 1.

B.

The QoS trust is set to CoS by default, and the VolP phone's local-priority value is mapped to 1.

C.

The QoS trust is set to none by default, and each VolP phone's local priority is configured for CoS map entry 1.

D.

The QoS trust is set to none by default, and each VolP phone's local priority is configured for CoS map entry 0.

Review the configuration below.

Why would you configure OSPF to use the IP address 10.1.200.1 as the router ID?

A.

The IP address associated with the loopback interface is non-routable and prevents loops

B.

The loopback interface state is dependent on the management interface state and reduces routing updates.

C.

The IP address associated with the loopback interface is routable and prevents loops

D.

The loopback interface state Is independent of any physical interface and reduces routing updates.

Match the Open Systems Interconnection (OSI) layer with its comparable member of the TCP/IP stack. (Options may be used more than once.)

You need to troubleshoot an Aruba CX 6200 4-node VSF stack switch that fails to boot correctly Select the option that allows you to access the switch and see the boot options available for OS images and ServiceOS.

A.

Member 2 RJ-45 console port

B.

Member 2 switch mgmt port

C.

Conductor USB-C console port

D.

Conductor mgmt port using SSH

What is a weakness introduced into the WLAN environment when WPA2-Personal is used for security?

A.

It uses X 509 certificates generated by a Certification Authority

B.

The Pairwise Temporal Key (PTK) is specific to each session

C.

The Pairwise Master Key (PMK) is shared by ail users

D.

It does not use the WPA 4-Way Handshake

Where are wireless client roaming decisions made?

A.

Client device

B.

Virtual Controller

C.

Joint decision made by the origination and destination APs

D.

Aruba Central

Which authentication does Aruba's Captive Portal use?

A.

Layer 3 authentication

B.

MAC authentication

C.

802.1x authentication

D.

Layer 2 authentication

You are in a meeting with a customer where you are asked to explain the network redundancy feature Multiple Spanning Tree (MSTP). What is the correct statement for this feature?

A.

MSTP configuration ID revision by default as current MSTP root priority

B.

MSTP configuration ID name by default using switch IMC address

C.

MSTP configuration ID name by default using switch serial number

D.

MSTP configuration ID revision by default as switch serial number

What is an advantage of using Layer 2 MAC authentication?

A.

it matches user names to MAC address

B.

No setup is required on the client

C.

MAC allow lists are easily maintained over time

D.

MAC identifiers are hard to spoof