Quizzzzzz
Written by
in
HPE07-01
1 / 70
You are working on a network where the customer has a dedicated router with redundant Internet connections Tor outbound high-importance real-time audio streams from their datacenter All of this traffic. • originates from a single subnet • uses a unique range of UDP ports • is required to be routed to the dedicated router All other traffic should route normally The SVI for the subnet containing the servers originating the traffic is located on the core routing switch in the datacenter What should be configured?
2 / 70
You are configuring Policy Based Routing (PBR) for a subnet that will be used to test a new default route for your network Traffic originating from 10.2.250.0/24 should use a new default route to 10.1.1.253. Other non-default routes for this subnet should not be affected by this change. What are two parts of the solution for these requirements? (Select two.) A)
B)
C)
D)
E)
3 / 70
What is a primary benefit of BSS coloring?
4 / 70
You are are doing tests in your lab and with the following equipment specifications: • AP1 has a radio that generates a 16 dBm signal. • AP2 has a radio that generates a 13 dBm signal. • AP1 has an antenna with a gain of 8 dBi. • AP2 has an antenna with a gain of 12 dBi. The antenna cable for AP1 has a 4 dB loss. The antenna cable for AP2 has a 3 dB loss. What would be the calculated Equivalent Isotropic Radiated Power (EIRP) for AP1?
5 / 70
A system engineer needs to preconfigure several Aruba CX 6300 switches that will be sent to a remote office An untrained local field technician will do the rollout of the switches and the mounting of several AP-515s and AP-575S. Cables running to theAPs are not labeled. The VLANs are already preconfigured to VLAN 100 (mgmt), VLAN 200 (clients), and VLAN 300 (guests) What is the correct configuration to ensure that APs will work properly?
A)
6 / 70
You need to create a keepalive network between two Aruba CX 8325 switches for VSX configuration. How should you establish the keepalive connection?
7 / 70
Review the exhibit
You are troubleshooting an issue with a 10 102.39 0/24 subnet which is also VLAN 1000 used Tor wireless clients on a pair of Aruba CX 8360 switches The subnet SVI is configured on the 8360 pair, and the DHCP server is a Microsoft Windows Server 2022 Standard with an IP address of 10.200.1.100. The 10.102.250.0/24 subnet is used for switch management. A large number of DHCP requests are failing You are observing sporadic DHCP behavior across clients attached to the CX 6100 switch. Which action may help fix the issue?
8 / 70
9 / 70
your customer has asked you to assign a switch management role for a new user The customer requires the user role to View switch configuration information and have access to the PUT and POST methods for REST API. Which default AOS-CX user role meets these requirements?
10 / 70
Due to a shipping error, five (5) Aruba AP-515S and one (1) Aruba CX 6300 were sent directly to your new branch office You have configured a new group persona for the new branch office devices in Central, but you do not know their MAC addresses or serial numbers The office manager is instructed via text message on their smartphone to onboard all the new hardware into Aruba Central What application must the office manager use on their phone to complete this task?
11 / 70
You need to drop excessive broadcast traffic on an ingress port or an ArubaOS-CX switch. What is the best feature to use for this task?
12 / 70
In AOS 10. which session-based ACL below will only allow ping from any wired station to wireless clients but will not allow ping from wireless clients to wired stations”? The wired host ingress traffic arrives on a trusted port.
13 / 70
Your customer has an Aruba CX 6200F VSF stack with two switches. A third member (JL726A) needs to be added to the VSF configuration. What e the configuration
A) that enables the new devices to join the VSF?
B) C) D)
14 / 70
A customer is using stacked Aruba CX 6200 and CX 6300 switches for access and a VSX pair of Aruba CX 8325 as a collapsed core 802 1X is implemented for authentication. Due to the lack of cabling, some unmanaged switches are still in use Sometimes devices behind these switches cause network outages The switch should send a warning to the Helpdesk when the problem occurs You have been asked to implement an effective solution to the problem- What is the solution for this?
15 / 70
You are setting up a customer’s 15 headless loT devices that do not support 802.1X. What should you use?
16 / 70
Describe the difference between Class of Service (CoS) and Differentiated Services Code Point (DSCP).
17 / 70
What are the requirements to ensure that WMM is working effectively’? (Select two)
18 / 70
You are configuring an SVI on an Aruba CX switch that needs to have the following characteristics:
• VLANID = 25 • IPv4 address 10 105 43 1 with mask 255 255 255.0 • IPv6 address fd00:5708::f02d:4df6 with a 64 bit prefix length • member of VRF eng • VRF eng and VLAN 25 have not yet been created
Which command lists will satisfy the requirements with the least number of commands?
A) B) C) D)
19 / 70
A customer has a site with 200 AP-515 access points 75AP-565 access points installed. The customer is rolling out new mobile phones with Wi-Fi-calling. 802.1X is in use for authentication What should be enabled to ensure the best roaming experience?
20 / 70
You are deploying Aruba CX 6300’s with the customers requirement to only allow one (1) VoIP phone and one (1) device. The following local role gets assigned to the phone port-access rote VoIP device-traffic-class voice What set of commands best fits this requirement?
21 / 70
With the Aruba CX switch configuration, what is the Active Gateway feature that is used for and is unique to VSX configuration?
22 / 70
A company deployed Dynamic Segmentation with their CX switches and Gateways After performing a security audit on their network, they discovered that the tunnels built between the CX switch and the Aruba Gateway are not encrypted. The company is concerned that bad actors could try to insert spoofed messages on the Gateway to disrupt communications or obtain information about the network.
Which action must the administrator perform to address this situation?
23 / 70
With the Aruba CX 6000 24G switch with uplinks of 1/1/25 and what does the switch do when a client port detects a loop and the do-not-disabie parameter is used?
24 / 70
Your manufacturing client is having installers deploy seventy headless scanners and fifty IP cameras in their warehouse These new devices do not support 802 1X authentication. How can HPE Aruba reduce the IT administration overhead associated with this deployment while maintaining a secure environment using MPSK?
25 / 70
A customer just upgraded aggregation layer switches and noticed traffic dropping for 120 seconds after the aggregation layer came online again. What is the best way to avoid having this traffic dropped given the topology below?
26 / 70
Which component is used by the Aruba Network Analytics Engine (NAE)?
27 / 70
A network administrator is attempting to troubleshoot a connectivity issue between a group of users and a particular server The administrator needs to examine the packets over a period of time from their desktop; however, the administrator is not directly connected to the AOS-CX switch involved with the traffic flow. What statements are correct regarding the ERSPAN session that needs to be established on an AOS- CX switch’? (Select two )
28 / 70
Your customer has asked you to assign a switch management role for a new user. The customer requires the user role to only have Web Ul access to the System > Log page and only have access to the GET method for REST API for the /logs/event resource Which default AOS-CX user role meets these requirements?
29 / 70
Which method is used to onboard a new UXI in an existing environment with 802 1X authentication?
(The sensor has no cellular connection)
30 / 70
A network administrator is troubleshooting some issues guest users are having when connecting and authenticating to the network The access switches are AOS-CX switches. What command should the administrator use to examine information on which role the guest user has been assigned?
31 / 70
You are troubleshooting an issue with a pair of Aruba CX 8360 switches configured with VSX Each switch has multiple VRFs. You need to find the IP address of a particular client device with a known MAC address You run the “show arp” command on the primary switch in the pair but do not find a matching entry for the client MAC address. The client device is connected to an Aruba CX 6100 switch by VSX LAG. Which action can be used to find the IP address successfully?
32 / 70
For an Aruba AOS10 AP in mixed mode, which factors can be used to determine the forwarding role assigned to a client? (Select two.)
33 / 70
What steps are part of the Key Management workflow when a wireless device is roaming from AP1 to AP2? (Select two.)
34 / 70
A new network design is being considered to minimize client latency in a high-density environment. The design needs to do this by eliminating contention overhead by dedicating subcarriers to clients. Which technology is the best match for this use case?
35 / 70
The customer needs a network hardware refresh to replace an aging Aruba 5406R core switch pair using spanning tree configuration with Aruba CX 8360-32YC switches What is the benefit of VSX clustering with the new solution?
36 / 70
Your Director of Security asks you to assign AOS-CX switch management roles to new employees based on their specific job requirements After the configuration was complete, it was noted that a user assigned with the administrators role did not have the appropriate level of access on the switch. The user was not limited to viewing nonsensitive configuration information and a level of 1 was not assigned to their role Which default management role should have been assigned for the user?
37 / 70
Which feature supported by SNMPv3 provides an advantage over SNMPv2c?
38 / 70
A customer is concerned about me unprotected traffic between an AOS-CX switch and a gateway, running on AOStO. What is a feasible option to protect this traffic?
39 / 70
When configuring UBT on a switch what will happen when a gateway role is not specified?
40 / 70
A customer wants to enable wired authentication across all their CX switches One of the requirements is that the switch must be able to authenticate a single computer connected through a VoIP phone. Which feature should be enabled to support this requirement?
41 / 70
Your customer is having connectivity issues with a newly-deployed Microbranch group The access points in this group are online in Aruba Central, but no VPN tunnels are forming.
What is the most likely cause of this issue?
42 / 70
What does the 802.3bz standard describe?
43 / 70
Your customer currently has Iwo (2) 5406 modular switches with MSTP configured as their core switches. You are proposing a new solution. What would you explain regarding the Aruba CX VSX switch pair when the Primary VSX node is replaced and the system MAC is replaced?
44 / 70
Refer to the image
Your customer is complaining of weak Wi-Fi coverage in their office. They mention that the office on the other side of the hall has much better signal What is the likely cause of this issue?
45 / 70
Which standard supported by some Aruba APs can enable a customer to accurately locate wireless client devices within a few meters?
46 / 70
Your Aruba CX 6300 VSF stack has OSPF adjacency over SVI 10 with LAG 1 to a neighboring device The following configuration was created on the switch:
47 / 70
A customer has a large number of food-producing machines
• All machines are connected via Aruba CX6200 switches in VLANs 100, 110 and 120 • Several external technicians are maintaining this special equipment
What are the correct commands to ensure that no rogue DHCP server will impact the network?
48 / 70
Which statements regarding Aruba NAE agents are true? (Select two )
49 / 70
A customer is looking Tor a wireless authentication solution for all of their loT devices that meet the following requirements – The wireless traffic between the IoT devices and the Access Points must be encrypted – Unique passphrase per device – Use fingerprint information to perform role-based access Which solutions will address the customer’s requirements? (Select two.)
50 / 70
You need to have different routing-table requirements With Aruba CX 6300 VSF configuration. Assuming the correct layer-2 VLAN already exists, how would you create a new SVI for a separate routing table?
51 / 70
A company recently deployed new Aruba Access Points at different branch offices Wireless 802.1X authentication will be against a RADIUS server in the cloud. The security team is concerned that the traffic between the AP and the RADIUS server will be exposed. What is the appropriate solution for this scenario?
52 / 70
You need to ensure that voice traffic sent through an ArubaOS-CX switch arrives with minimal latency What is the best scheduling technology to use for this task?
53 / 70
What is one advantage of using OCSP vs CRLs for certificate validation?
54 / 70
you are implementing ClearPass Policy Manager with EAP-TLS for authenticating all corporate-owned devices. What are two possible solutions to the problem of deploying client certificates to corporate MacBooks that are joined to a Windows domain? (Select two.)
55 / 70
Refer to the exhibit
With Core-1. what is the default value for config-revision?
56 / 70
A company has deployed 200 AP-635 access points. To but is not working as expected
What would be the correct action to fix the issue?
57 / 70
What is true regarding 802.11k?
58 / 70
Refer to Exhibit
With Access-1, What needs to be identically configured With MSTP to load-balance VLANS?
59 / 70
Using Aruba best practices what should be enabled for visitor networks where encryption is needed but authentication is not required?
60 / 70
A company recently upgraded its campus switching infrastructure with Aruba 6300 CX switches. They have implemented 802.1X authentication on edge ports where laptop and loT devices typically connect An administrator has noticed that for PoE devices the pons are delivering the maximum wattage instead of what the device actually needs Upon connecting the loT devices, the devices request their specific required wattage through information exchange
61 / 70
Which statements regarding OSPFv2 route redistribution are true for Aruba OS CX switches?
(Select two.)
62 / 70
Your Director of Security asks you to assign AOS-CX switch management roles to new employees based on their specific job requirements. After the configuration was complete, it was noted that a user assigned with the auditors role did not have the appropriate level of access on the switch. The user was not allowed to perform firmware upgrades and a privilege level of 15 was not assigned to their role. Which default management role should have been assigned for the user?
63 / 70
You are doing tests in your lab and with the following equipment specifications • AP1 has a radio that generates a 10 dBm signal • AP2 has a radio that generates a 11 dBm signal • AP1 has an antenna with a gain of 9 dBi • AP2 has an antenna with a gain of 12 dBi. • The antenna cable for AP1 has a 2 dB loss • The antenna cable for AP2 has a 3 dB loss What would be the calculated Equivalent Isotropic Radiated Power (EIRP) for APT?
64 / 70
You are deploying a bonded 40 MHz wide channel What is the difference in the noise floor perceived by a client using this bonded channel as compared to an unbonded 20MHz wide channel?
65 / 70
A client is connecting to 802.1X SSID that has been configured in tunnel mode with the default AP-group settings. After receiving Access-Accept from the RADIUS server, the Aruba Gateway will send Access-Accept to the AP through which tunnel?
66 / 70
A customer wants to provide wired security as close to the source as possible The wired security must meet the following requirements:
-allow ping from the IT management VLAN to the user VLAN -deny ping sourcing from the user VLAN to the IT management VLAN
The customer is using Aruba CX 6300s What is the correct way to implement these requirements?
67 / 70
What is an OSPF transit network?
68 / 70
Which feature allows the device to remain operational when a remote link failure occurs between a Gateway cluster and a RADIUS server that is either in the cloud or a datacenter?
69 / 70
With the Aruba CX 6200 24G switch with uplinks or 1/1/25 and 1/1/26, how do you protect client ports from forming layer-2 loops?
70 / 70
What is used to retrieve data stored in a Management Information Base (MIS)?
Your score is
The average score is 1%
Restart quiz
Your email address will not be published. Required fields are marked *
Comment *
Name *
Email *
Website
Save my name, email, and website in this browser for the next time I comment.
Leave a Reply