Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A customer wants to implement Virtual IP redundancy, such that in case of a ClearPass server outage, 802.1x authentications will not be interrupted. The administrator has enabled a single Virtual IP address on two ClearPass servers.

Which statements accurately describe next steps? (Select two.)

A.

The NAD should be configured with the primary node IP address for RADIUS authentication on the 802.1x network.

B.

A new Virtual IP address should be created for each NAD.

C.

Both the primary and secondary nodes will respond to authentication requests sent to the Virtual IP address when the primary node is active.

D.

The primary node will respond to authentication requests sent to the Virtual IP address when the primary node is active.

E.

The NAD should be configured with the Virtual IP address for RADIUS authentications on the 802.1x network.

Refer to the exhibit.

Controllers are configured m a cluster as shown in the exhibit. These are the network details.

• A Mobility Master (MM) manages the cluster.

• The cluster contains two controllers: C l and C2.

• API and AP2 use CI as their Active AP Anchor Controller (A-AAC). with C2 as their Standby AAC (S-AAC).

• AP3 and AP4 use C2 as their A-AAC, with CI as their S-AAC.

User1 establishes a wireless connection via API, where the Active User Anchor Controller (A-UAC) assigned is CI. with C2 as the standby. What happens when User I roams the wireless network and eventually their session is handled by AP3?

A.

The AP3’s A-AAC switches to C1, and the user’s A-UAC remains on C1.

B.

The AP3’s A-AAC switches to C2, and the user’s A-UAC remains on C2.

C.

The AP3’s A-AAC switches to C1, and the user’s A-UAC remains on C2.

D.

The AP3’s A-AAC switches to C2, and the user’s A-UAC remains on C1.

Refer to the exhibit.

Based on the Attribute configuration shown, which statement accurately describes the status of attribute values?

A.

Only the attribute values of department and memberOf can be used in role mapping policies.

B.

The attribute values of department, title, memberOf, telephoneNumber, and mail are directly applied as ClearPass.

C.

Only the attribute value of company can be used in role mapping policies, not the other attributes.

D.

The attribute values of department and memberOf are directly applied as ClearPass roles.

E.

Only the attribute values of title, telephoneNumber, and mail can be used in role mapping policies.

Refer to the exhibit.

A network administrator sets up 802.1X authentication to a RADIUS server on an AOS-Switch. The RADIUS server and user devices are both set up to use REAP MSCHAPv2. The administrator tests the authentication and sees the output shown in the exhibit. Which issue could cause this output?

A.

The RADIUS shared secret does not match on the switch and the server.

B.

The administrator entered the wrong password for the test account.

C.

The switch does not have a certificate tor port-access installed on the switch.

D.

The switch port is set for user mode 801. IX. but the RADIUS server is set for port mode.

Which technologies can prevent split brain in a VSF fabric that includes Aruba 2930F switches?

A.

ARP MAD or OOBM MAD

B.

VLAN MAD or ARP MAD

C.

OOBM MAD or LLDP MAD

D.

LLDP MAD or VLAN MAD

Which protocol do Mobility Controllers (MCs) use to detect a failed Mobility Master (MM)?

A.

VRRP

B.

SNMP

C.

PAPI

D.

IPSec

A network administrator can set the OSPF metric-type on an AOS-Switch to Type 1 or Type 2. What is the difference?

A.

A Type 2 metric marks external routes that can be advertised in NSSAs, while a Type 1 metric marks external routes that can only be advertised in normal areas.

B.

A Type 2 metric assigns cost 1 to a 100 Gbps link, while a Type 1 metric assigns cost 1 to all links of 100 Mbps or higher.

C.

A Type 2 metric is assigned to multiple external routes that are aggregated together, while a Type 1 metric does not permit external route aggregation.

D.

A Type 2 metric stays the same as the external route is advertised, while a Type 1 metric increments with internal OSPF link costs.

Whichstatement is true about the Endpoint Profiler? (Select two.)

A.

The Endpoint Profiler usesDHCP fingerprinting for device categorization.

B.

Data obtained from the Endpoint Profiler can be used in Enforcement Policy.

C.

Endpoint Profiler requires a profiling license.

D.

The Endpoint Profiler requires the Onboard license to be enabled.

E.

The Endpoint Profiler can only categorize laptops and desktops.