Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free HP HPE6-A79 Practice Exam with Questions & Answers | Set: 2

Questions 11

Refer to the exhibit.

HPE6-A79 Question 11

HPE6-A79 Question 11

An Aruba network is deployed with L2 and L3 Mobility Master (MM) redundancy across two datacenters, as shown in the exhibit. The network administrator confirms that all Mobility Controllers (MC) are currently communicating with MM1, which is the L2 Active and, L3 Primary.

Which MM IP will MCs communicate with if MM1 fails?

Options:
A.

10.1.1.10

B.

10.1.1.12

C.

10.2.1.10

D.

10.2.1.21

HP HPE6-A79 Premium Access
Questions 12

Refer to the exhibits.

Exhibit 1

HPE6-A79 Question 12

Exhibit 2

HPE6-A79 Question 12

A network administrator integrates a current Mobility Master (MM) - Mobility Controller (MC) deployment with a RADIUS server to authenticate a wireless user, the network administrator realizes that the client machine is not failing into the it_department role, as shown the exhibits.

Which configuration is required to map the users into the proper role, based on standard attributes returned by the RADIUS server in the Access Accept message?

Options:
A.

aaa server-group Corp-Network

set role condition Filter-Id equals it-role set-value it_department

B.

aaa server-group Corp-employee

set role condition Filter-Id value-of

C.

aaa server-group Corp-employee

set role condition Filter-Id equals it-role set-value it_department

D.

aaa server-group ClearPass

set role condition Filter-Id equals it_department set-value it-role

E.

aaa server-group Corp-Network

set role condition Filter-Id equals it_department set-value it-role

Questions 13

Refer to the exhibit:

HPE6-A79 Question 13

A company acquires ten barcode scanners to run inventory tasks. These WiFi devices support WPA2-PSK security only. The network administrator deploys a WLAN named scanners using the configuration shown in the exhibit.

What must the network administrator do next to ensure that the scanner devices successfully connect to their SSID?

Options:
A.

Set internal as the MAC authentication server group.

B.

Add scanner MAC addresses in user derivation rules.

C.

Enable L2 Authentication Fail Through.

D.

Add scanner MAC addresses in the internal database.

Questions 14

Refer to the exhibit.

HPE6-A79 Question 14

A network administrator wants to allow contractors to access the WLAN named EmployeesNet. In order to restrict network access, the network administrator wants to assign this category of users to the contractor user role. To do this, the network administrator configures ClearPass in a way that it returns the Aruba-User-Role with the contractor value.

When testing the solution, the network administrator receives the wrong role.

What should the network administrator do to assign the contractor role to contractor users without affecting any other role assignment?

Options:
A.

Check the Download role from the CPPM option in the AAA profile.

B.

Set contractor as the default role in the AAA profile.

C.

Create Contractor firewall role in the M.

D.

Create server deviation rules in the server group.

Questions 15

Refer to the exhibit.

HPE6-A79 Question 15

A network administrator is evaluating a deployment to validate that a user is assigned the proper role and reviews the output in the exhibit. How is the role assigned to user?

Options:
A.

The MC assigned the role based on Aruba VSAs.

B.

The MC assigned the machine authentication default user role.

C.

The MC assigned the default role based on the authentication method.

D.

The MC assigned the role based on server derivation rules.

Questions 16

Refer to the exhibit.

HPE6-A79 Question 16

A network administrator has Mobility Master (MM) - Mobility Controller (MC) based network and has fully integrated the MCs with ClearPass for RADIUS-based AAA services. The administrator is testing different ways to run user role derivation.

Based on the show command output, what method has the administrator use for assigning the “corp” role to client with MAC xx:xx:xx:xx:xx:xx?

Options:
A.

Dynamic Authorization using VSA attributes.

B.

Dynamic Authorization using IETF attributes.

C.

Server Derivation Rules using IETF attributes.

D.

User Derivation Rules using the client's MAC.