A network administrator needs to configure firewall rules for three roles: Finance
Sales
Employee
Several rules apply to both the Employee and Sales roles, but not to the Finance role. What is the simplest way to configure these rules?
A. Define the Employee and Sales roles as internal roles, and then configure the rules as global rules for internal users.
B. Apply these rules as a subnet-based policy, and then ensure that only Employee and Sales users are assigned IP addresses in that subnet.
C. Select either the Employee or Sales role, and then configure these rules within the global policy.
D. Create a policy with these rules, and then apply that policy to the Employee and Sales roles.
A company has an Aruba Mobility Master (MM)-based solution that runs ArubaOS 8 and uses the default AirMatch and Client Match settings. The ARM profile has been disabled for 5GHz radios. How are channel and transmit power settings managed for these radios?
A. with legacy ARM
B. with Rule Based Client Match
C. with legacy Client Match
D. with AirMatch
If the decrypt-tunnel forwarding mode is selected in an employee WLAN, where is the user traffic decrypted?
A. at the switch
B. at the AP
C. at the controller
D. at the RADIUS server
A network administrator monitors an Aruba Mobility Controller with Aruba AirWave and sees the configuration status is Error. What should the administrator conclude?
A. AirWave checks the controller configuration and detects a syntax error.
B. AirWave determines that the controller configuration does not match the template for its group.
C. AirWave has a communication issue with the controller and cannot check the configuration.
D. AirWave detects a mismatch with the controller configuration and software version.
What is the difference between WPA and WPA2 encryption?
A. WPA encryption uses symmetric keys, and WPA2 encryption uses asymmetric keys.
B. WPA encryption acts at Layer 3, and WPA2 encryption acts at Layer 2.
C. WPA encryption works only with preshared key (PSK) authentication, and WPA2 encryption works with both PSK and 802.1X.
D. WPA encryption uses TKIP by default, and WPA2 encryption uses AES by default.
A company deploys an Aruba wireless solution for the first time. In which deployment is clustering supported?
A. deployment as Mobility Masters (MMs)
B. deployment as a standalone VMC
C. deployment in 7000 Series standalone mode
D. deployment in master-local mode
A company has an Aruba solution that is monitored by AirWave. Several users have recurring connectivity and performance issues with their wireless clients.
How can network administrators use AirWave to minitor these clients more easily?
A. Specify the clients as Watched Cliesnts and view the tables and graphs for these clients.
B. Click the Down icon in the Airwave banner to quickly see a list of issues with client connections.
C. Use the Client > Tags windows to tag the client for periodic checks and analysis.
D. Run Device Summary reports and filter for the client MAC addresses within the report.
An Aruba solution runs ArubaOS 8 and uses a standalone controller architecture. Which feature can administrators use to optimize the channel and power plan for the APs?
A. ARM
B. Rule Based Client Match
C. AirMatch
D. AppRF
Refer to the exhibit.
Which role must AP1 play?
A. Instant AP (IAP)
B. Mesh Point AP
C. Mesh Portal AP
D. Remote AP (RAP)
A company has many 7220 controllers in its Aruba wireless architecture. A network administrator wants to use the Traffic Analysis dashboard in order to monitor which type of applications is being used by wireless users.
What is required for this implementation?
A. Airmatch and ClientMatch must be enabled.
B. The solution must have active PEFNG licenses.
C. Firewall policies must include application filtering rules.
D. WLANs must use the decrypt-tunnel forwarding option.