Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A network administrator creates a user account on an Aruba Mobility Master (MM) with the guest-provisioning role. Which task does this user have the rights to perform?

A.

set up portal pages

B.

create guest user accounts

C.

monitor guest clients

D.

create guest WLANs

Which class of controller is more appropriate in a branch installation with up to 64 APs?

A.

7008

B.

7030

C.

7205

D.

7210

A company deploys a wireless network in a typical office environment with many surfaces where the signal can bounce. Which 802.11 technology uses the characteristics of this environment to increase wireless speeds?

A.

Channel bonding

B.

Multiple Input Multiple Output (MIMO)

C.

Transmit Power Control (TPC)

D.

QAM modulation

What is the minimum space between channels in the 2.4GHz range to prevent overlap?

A.

1 channel

B.

3 channels

C.

5 channels

D.

7 channels

An Aruba solution has a WLAN that uses WPA2-Enterprise security. How are encryption keys dynamically managed for the wireless users?

A.

The MM generates and distributes keys to clients and access points (APs).

B.

Administrators configure identical key strings on the Mobility Controllers (MCs) and wireless client 802.1X settings.

C.

Keys are generated and distributed securely during each wireless user authentication process.

D.

Keys are derived from the preshared key configured on the WLAN and on each wireless client.

A network administrator creates the role employees and adds the rule to it:

user any any permit

The first several wireless clients assigned to the employees role are assigned IP addresses in the 10.10.10.0/24 subnet. Several other wireless clients with the employees role are then assigned IP addresses in the 10.10.20.0/24.

When the Aruba firewall matches traffic from these clients to the user any any permit rule, what does it do?

A.

It drops traffic from wireless clients in both the 10.10.0/24 subnet and 10.10.20.0/24 subnet.

B.

It permits traffic from wireless clients in both the 10.10.10.0/24 and 10.10.20.0/24 subnet as long as the packet has a source IP.

C.

It permits the traffic from wireless clients in the 10.10.20.0/24 subnet, but drops the traffic from wireless clients in the 10.10.10.0/24 subnet.

D.

It permits the traffic from wireless clients in the 10.10.0/24 subnet, but drops the traffic from wireless clients in the 10.10.20.0/24 subnet.

What is an example of a Layer2 wireless threat that a wireless intrusion detection system (WIDS) should detect?

A.

802.11 association floods

B.

RF jamming

C.

Bluetooth interference

D.

spyware

A network administrator has installed PEF licenses in the global pool of a Mobility Master (MM) solution. When the administrator tries to configure roles and policies, an error indicates that the PEF licenses must be installed.

What should the administrator do to correct this issue?

A.

Ensure the PEF licenses were installed at the Managed Network and not at the MM level.

B.

Enable Building 1 as a local license pool.

C.

Enable the PEF feature in the Global Usage window.

D.

Activate the PEF licenses through an Aruba Activate account.

A company has an Aruba Mobility Master (MM)-based solution that runs ArubaOS 8 and uses the default AirMatch and Client Match settings. The ARM profile has been disabled for 5GHz radios. How are channel and transmit power settings managed for these radios?

A.

with legacy ARM

B.

with Rule Based Client Match

C.

with legacy Client Match

D.

with AirMatch

A WLAN in an Aruba Mobility Master (MM)-based solution enforces Enterprise-WPA2 security and uses the tunnel forwarding mode. The company has an external RADIUS server.

Which device exchanges RADIUS packets with the RADIUS server?

A.

Mobility Controller (MC)

B.

wireless client

C.

access point (AP)

D.

Mobility Master (MM)