Independence Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

HPE6-A70 Questions and Answers

Question # 6

Refer to the exhibits.

Exhibit 1

Exhibit 2

Exhibit 3

A network administrator creates a guest WLAN on an Aruba Mobility Manager (MM). The exhibits show some of the settings for the WLAN. The administrator does not change the policies for those roles.

How does the firewall control guest clients when they first connect to the WLAN?

A.

It permits them to send any DHCP traffic and DNS and web traffic to the Internet. It redirects web traffic destined to the private network to a login portal.

B.

It permits them to send any DHCP and DNS and it redirects all web traffic to a login portal.

C.

It permits them to send any DHCP and RADIUS traffic. It redirects all web traffic destined to the Internet to a login portal and drops web traffic destined to the private network.

D.

It does not permit them to send any traffic until they are authenticated.

Full Access
Question # 7

A company has an Aruba Mobility Master (MM)-based solution. Where can a network administrator look to find a list of alerts about a variety of issues on the MM or managed devices?

A.

the Potential Issues dashboard

B.

the top banner

C.

the MM Maintenance pages

D.

the Performance dashboard

Full Access
Question # 8

What is a key difference between an Aruba Air Monitor (AM) and an Aruba Spectrum Analyzer (SA)?

A.

An AM detects threats such as rogue APs, while an SA analyzes RF conditions.

B.

An AM detects rogue APs and provides data services to clients, while an SA only detects rogue APs.

C.

An AM scans on only one 802.11 frequency band, while an SA scans on both 802.11 frequency bands.

D.

An AM both detects wireless intrusion attempts and mitigates them, while an SA only detects wireless intrusion attempts.

Full Access
Question # 9

What is one difference between captive portal authentication and 802.1X authentication?

A.

802.1X authentication always authenticates the wireless client, while captive portal authentication always authenticates the wireless user.

B.

802.1X authentication occurs at Layer 2, while captive portal authentication occurs at Layer 3.

C.

802.1X authentication must use an LDAP server, while captive portal authentication can use a RADIUS server or an LDAP server.

D.

802.1X authentication is typically implemented without encryption, while captive authentication is often combined with WPA or WPA2.

Full Access
Question # 10

How can network administrator provide high availability for APs deployed in an Aruba Mobility Master (MM)-based architecture?

A.

Establish clusters of Mobility Controllers (MCs).

B.

Configure MM to provide backup AP tunnel termination in case of controller failure.

C.

Deploy all licenses locally yo APs, so that they can continue to function if they lose contact with their controller.

D.

Configure APs to convert to controller-less Instant AP mode during controller failure.

Full Access
Question # 11

A Mobility Controller (MC) runs ArubaOS 8. What is a valid reason for an administrator to set the MC to master-local mode?

A.

The company already has a partially hierarchical deployment based on the 6.x code and wants to keep the current architecture.

B.

The company needs to manage third-party network infrastructure devices with the use of the master controller interface.

C.

The company wants a deployment architecture that allows administrators to configure all MC settings from a single location.

D.

The company requires a centralized licensing architecture that provides global license pools.

Full Access
Question # 12

A network administrator creates a user account on an Aruba Mobility Master (MM) with the guest-provisioning role. Which task does this user have the rights to perform?

A.

set up portal pages

B.

create guest user accounts

C.

monitor guest clients

D.

create guest WLANs

Full Access
Question # 13

Refer to the exhibit.

A network administrator needs to use Aruba AirWave to view statistics for an AP’s 802.11ac radio. How can the administrator update the information on-demand rather than wait the typical interval?

A.

Click Poll Controller Now

B.

Click the 802.11ac link

C.

Log out of the interface and log back in

D.

Refresh the browser

Full Access
Question # 14

Which task can an Aruba Air Monitor (AM) perform?

A.

Analyze wireless traffic patterns at the application level.

B.

Optimize RF through the AP channel and transmit power plans.

C.

Analyze RF signals to determine the cause of non-802.11 interference.

D.

Prevent client connections to rogue APs.

Full Access
Question # 15

What is a role fulfilled by an Aruba Mobility Master (MM)?

A.

It forwards and routes traffic for wireless users across multiple sites.

B.

It terminates control tunnels for Aruba APs.

C.

It provides an advanced Web portal for onboarding Bring Your Own Device (BYOD) devices.

D.

It manages VLAN and routing configuration for multiple Mobility Controllers (MCs).

Full Access
Question # 16

A company has an Aruba Mobility Master (MM)-based solution. Where can network administrators look to monitor the health status of all controllers, APs, and clients?

A.

the top banner

B.

the MM Maintenance pages

C.

the Performance dashboard

D.

the Potential Issues dashboard

Full Access
Question # 17

A network administrator creates the role employees and adds the rule to it:

user any any permit

The first several wireless clients assigned to the employees role are assigned IP addresses in the 10.10.10.0/24 subnet. Several other wireless clients with the employees role are then assigned IP addresses in the 10.10.20.0/24.

When the Aruba firewall matches traffic from these clients to the user any any permit rule, what does it do?

A.

It drops traffic from wireless clients in both the 10.10.0/24 subnet and 10.10.20.0/24 subnet.

B.

It permits traffic from wireless clients in both the 10.10.10.0/24 and 10.10.20.0/24 subnet as long as the packet has a source IP.

C.

It permits the traffic from wireless clients in the 10.10.20.0/24 subnet, but drops the traffic from wireless clients in the 10.10.10.0/24 subnet.

D.

It permits the traffic from wireless clients in the 10.10.0/24 subnet, but drops the traffic from wireless clients in the 10.10.20.0/24 subnet.

Full Access
Question # 18

Network administrators use the wizard to create a WLAN that uses WPA2-Enterprise security to a RADIUS server at 10.21.98.55. They do not manually change any settings.

Which device determines the EAP type that the wireless clients must support?

A.

Mobility Master (MM)

B.

Mobility Controller (MC)

C.

RADIUS server

D.

AP

Full Access
Question # 19

A network administrator wants to implement MAC filtering for the wireless network of a local financial firm to ensure that only employees can access the wireless network. What is a potential weakness of this solution?

A.

MAC filters cannot be applied with WPA2 encryption.

B.

Authorized MAC addresses are visible in plaintext in the air and can be easily spoofed.

C.

Many popular clients do not have the capability to connect to WLANs that use MAC filters.

D.

MAC filters offer no protection against authorized users who try to connect unauthorized devices.

Full Access