Refer to the following configuration segment for this item. ipaccess-listsession anewone user network 172.16.1.0 255.255.255.0 any permit user host 172.16.1.1 any deny user any any permit
An administrator wants users to have access to all destinations except 172.16.1.1. Based on the above Aruba Mobility Controller configuration segment, which statements best describe this policy? (Choose two)
A. The rule user host 172.16.1.1 any deny is redundant because of the implicit deny all at the end.
B. The rule user network 172.16.1.0 255.255.255.0 any permit is redundant.
C. The two rules user network 172.16.1.0 255.255.255.0 any permit and user host 172.16.1.1 any deny need to be re- sequenced.
D. The last statement user any any permit is not required
E. The last statement should be any any any deny
Which command will show all client association history?
A. show mobile trail current (ip address)
B. show ip mobile trail (ip address)
C. show ap client status (mac address)
D. show current client ip (ip address)
E. show client ip (ip address) mobility
Referring to the above screen capture, on which controller can you modify APs configuration to enable ARM?
A. Controller 10.1.10.100 only
B. Controller 10.1.20.100 and 10.254.1.3 only
C. All three Controllers
D. None of the Controllers
E. On Controllers where ARM is enabled
A campus AP has been provisioned with a VAP in bridge forwarding and standard operation modes. Which of the following authentication types are supported? (Choose two)
A. 802.1X authentication
B. Open System authentication
C. Local authentication
D. Captive portal authentication
E. VPN authentication
What are the types of user derivation rules that can be applied to a user? (Choose two)
A. SSID
B. MAC
C. VLAN
D. Role
E. AP
Which is a Device Specific Attribute that can be evaluated in a user derivation rule?
A. user login name
B. authentication server
C. location by AP Name
D. controller Loopback address
E. controller IP
Which match condition can be used by a server derivation rule?(Choose two)
A. greater than
B. less than
C. inverse of
D. contains
E. equals
A user connected to a Captive Portal VAP successfully. When the user opens their browser and tries to access their homepage, they get redirected as expected to another URL on the Aruba Controller. However, they see an error message that web authentication has been disabled. What might be a cause of this?
A. Captive Portal has not been assigned in the SSID profile.
B. The Captive portal profile has not been assigned to the AAA profile.
C. A server group has not been assigned to the captive portal profile.
D. An initial role has not been assigned to the AAA profile.
E. The Captive portal profile has not been assigned to the initial role.
What are two different methods of configuring AP redundancy between 2 local controllers?(Choose two.)
A. Fast-Failover
B. Configure the locals as remote nodes
C. Use named VLANS
D. Backup LMS IP
E. AP Redundancy can only be configured between a Master and Local
Which method can APs use to discover a controller?
A. DHCP
B. Dynamic DNS (DDNS)
C. PnP
D. PAPI
E. HTTPS
Which of the following parameters can be specified in a rule for AP classification? (Choose three) A. SSID of an AP
B. Number of clients connected to an AP.
C. SNR of an AP.
D. Operating mode of an AP
E. Discovering APs
Which of the following are valid RAP operating modes?
A. Always, Backup, Standard, Persistent
B. Always, Backup, Tunnel, Persistent
C. Always, Hotel-Connect, Tunnel, Standard
D. Backup, Hotel-Connect, Standard, Persistent
E. Backup, Normal, Tunnel, Always
What are the Airtime Allocation Policy options for Airtime Fairness? (Choose three)
A. Default Access
B. Priority Access
C. Fair Access
D. Preferred Access
E. Distributed Access
Which of the following will accept named VLANs as a parameter? (Choose three)
A. a VLAN pool
B. User Role for single VLAN
C. RADIUS Server attributes for role derivation
D. Firewall session rule
E. Port trunk configuration
A Valid client laptop is attempting to associate to a Rogue AP. The AM in proximity creates a Tarpit. What are the two mechanisms that the AM can utilize to Tarpit?(Choose two)
A. Fake client's BSSID
B. Fake SSID
C. Fake Channel
D. Fake BSSID
E. Fake ESSID