Which statements describe subnet scans for static IP device discovery? (Choose two.)

Which statements describe subnet scans for static IP device discovery? (Choose two.)A . To run an On-Demand Subnet Scan, you must first configure a subnet scan in the profile settings.B . The On-Demand option provides the ability to trigger a one-time scan in specified network subnets.C . The On-Demand option...

January 10, 2020 No Comments READ MORE +

when a role mapping policy should be used in an 802.1x service with Active Directory as the authentication source?

when a role mapping policy should be used in an 802.1x service with Active Directory as the authentication source?A . When you want to send roles from the AD user to enforcement policies directly from AD attributes.B . When you want to send Aruba firewall roles back to the Aruba...

January 10, 2020 No Comments READ MORE +

Which Authorization Source supports device profile enforcement?

Which Authorization Source supports device profile enforcement?A . Local User RepositoryB . OnGuard RepositoryC . Endpoints RepositoryD . Guest User RepositoryView AnswerAnswer: A

January 9, 2020 No Comments READ MORE +

Which advantages will this give?

Your boss suggests that you configure a guest self-registration page in ClearPass for the Conference Events SSID. Which advantages will this give? (Choose two.)A . It will allow guest users to create a login account for the web login page.B . It will stop employees from putting their corporate devices...

January 9, 2020 No Comments READ MORE +

Which user authentication request will match the service rules of the Policy Service shown?

Refer to the exhibit. Which user authentication request will match the service rules of the Policy Service shown?A . a wireless user connecting to an Aruba IAP on the SSID “CORP”B . a wireless user connection would fail because of miss-configured service rules.C . a wireless user connecting to any...

January 6, 2020 No Comments READ MORE +

What is the function of the primary and backup servers when configuring an authentication source in ClearPass?

What is the function of the primary and backup servers when configuring an authentication source in ClearPass?A . The primary server and backup servers can be configured for round-robin.B . The primary server can be from one Active Directory domain; the backup server can be from another.C . The primary...

January 4, 2020 No Comments READ MORE +

Which keyboard combination enables you to access the Service Processor (SP) or the Board Management Control (BMC) from the system console CLI?

Which keyboard combination enables you to access the Service Processor (SP) or the Board Management Control (BMC) from the system console CLI?A . Ctrl + DB . Ctrl + GC . Ctrl + SD . Ctrl + CView AnswerAnswer: B Explanation: Reference: https://kb.netapp.com/app/answers/answer_view/a_id/1001033/~/what-is-a-baseboard­management-controller-%28bmc%29-and-how-do-i-use-it%3F­

January 2, 2020 No Comments READ MORE +

Which most accurately describes the “Select All Matches” rule evaluation algorithm in Enforcement Policies?

Which most accurately describes the “Select All Matches” rule evaluation algorithm in Enforcement Policies?A . All rules are checked for any matching rules and their respective Enforcement profiles are applied.B . All rules is checked, and if there is no match, no Enforcement profile is applied.C . Each rule is...

December 28, 2019 No Comments READ MORE +

Which actions are necessary to set up a ClearPass guest captive portal web login page to execute with no errors? (Choose three.)

Which actions are necessary to set up a ClearPass guest captive portal web login page to execute with no errors? (Choose three.)A . Configure the vendor settings in the Network Access Device to match the web login page.B . Install a public issued HTTPS certificate in ClearPass Policy Manager.C ....

December 24, 2019 No Comments READ MORE +

Select three elements that are part of the authorization process. (Choose three.)

Select three elements that are part of the authorization process. (Choose three.)A . Send a RADIUS accept to the Access device.B . Verify client credentials against your account.C . Determine posture status.D . Validate the user account attributes.E . Filter by endpoint device type.View AnswerAnswer: ABD Explanation: Reference: http://h20628.www2.hp.com/km-ext/kmcsdirect/emr_na-c05320375-1.pdf

December 20, 2019 No Comments READ MORE +