What wizards can be launched from the configuration window?
What wizards can be launched from the configuration window? (Choose three.) A. Mesh AP Wizard B. Remote AP Wizard C. Clearpass Integration Wizard D. AP Wizard E. WIP Wizard
What wizards can be launched from the configuration window? (Choose three.) A. Mesh AP Wizard B. Remote AP Wizard C. Clearpass Integration Wizard D. AP Wizard E. WIP Wizard
When a barcode scanner connects to an AP, what is the first role that is assigned to it? A. MAC authentication default role B. 802.1X default role C. Server derived role D. Initial role E. User derived Role
Guest access can be provided securely by combining the following components of an Aruba system: (Choose two.) A. Use restrictive firewall policies to limit the guest user’s access to internal resources B. Providing guests their own APs and controllers C.…
Which of the following statements about management accounts is false? A. The root account can be used to monitor access points connected to the controller. B. The guest-provisioning account can see the controller’s configuration but cannot change it. C. The…
The guest provisioning user account has the ability to do which of the following? A. Add a new employee to the internal database. B. change the ‘look" and "feel" of the guest provisioning page. C. Change the available data fields…
Aruba’s recommended best option for authenticating guest is users is: A. Temporary employee account B. Kerberos C. Captive Portal D. Windows logon E. Email address
Time range is applied directly to which one of the following: A. ROLE B. Firewall Policy C. Firewall Rule D. Profile E. Interface
Identify the benefits of using aliases when writing firewall policies. (Choose three.) A. Makes policies more readable. B. Changes to policy rules that use aliases are auto updated. C. End users are applied to the proper role. D. Can be…
When would you use the Reject action in a firewall policy? A. To let hackers know which ports are open on your firewall B. To let your users know they are in violation of corporate policies. C. To tell down…
802.1X authentication takes place: A. Prior to granting access to L2 media B. After the user has an IP address C. After the user sees the captive portal page D. Prior to the user associating with the AP E. Once…