Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A company recently deployed new Aruba Access Points at different branch offices Wireless 802.1X authentication will be against a RADIUS server in the cloud. The security team is concerned that the traffic between the AP and the RADIUS server will be exposed.

What is the appropriate solution for this scenario?

A.

Enable EAP-TLS on all wireless devices

B.

Configure RadSec on the AP and Aruba Central.

C.

Enable EAP-TTLS on all wireless devices.

D.

Configure RadSec on the AP and the RADIUS server

You are troubleshooting an issue with a pair of Aruba CX 8360 switches configured with VSX Each switch has multiple VRFs. You need to find the IP address of a particular client device with a known MAC address You run the "show arp" command on the primary switch in the pair but do not find a matching entry for the client MAC address.

The client device is connected to an Aruba CX 6100 switch by VSX LAG.

Which action can be used to find the IP address successfully?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Refer to the exhibit.

With Core-1. what is the default value for config-revision?

A.

0

B.

1

C.

1-0

D.

0. 0

With the Aruba CX switch configuration, what is the first-hop protocol feature that is used for VSX L3 gateway as per Aruba recommendation?

A.

Active Gateway

B.

Active-Active VRRP

C.

SVI with vsx-sync

D.

VRRP

A customer is looking Tor a wireless authentication solution for all of their loT devices that meet the following requirements

- The wireless traffic between the IoT devices and the Access Points must be encrypted

- Unique passphrase per device

- Use fingerprint information to perform role-based access

Which solutions will address the customer's requirements? (Select two.)

A.

MPSK and an internal RADIUS server

B.

MPSK Local with MAC Authentication

C.

ClearPass Policy Manager

D.

MPSK Local with EAP-TLS

E.

Local User Derivation Rules