HPE6-A48 無料問題集「HP Aruba Certified Mobility Expert Written」
Refer to the exhibit.

A network administrator deploys a new Mobility Master (MM)-Mobility Controller (MC) network. To test the solution, the network administrator accessess some of the AP consoles and statistically provisions them. However, these APs do not propagate the configured SSIDs. The network administrator looks at the logs and sees the output shown in the exhibit.
Which actions must the network administrator take to solve the problem?

A network administrator deploys a new Mobility Master (MM)-Mobility Controller (MC) network. To test the solution, the network administrator accessess some of the AP consoles and statistically provisions them. However, these APs do not propagate the configured SSIDs. The network administrator looks at the logs and sees the output shown in the exhibit.
Which actions must the network administrator take to solve the problem?
正解:B
解答を投票する
During master controller redundancy and failover, these steps occur:
1. Master 1 acts as the primary master and it goes down, therefore, Master 2 takes over as primary.
2. Master 1 comes back up again (reboots).
3. Master 2 continues to be the active master.
Based on this scenario, how is master redundancy configured on the controller?
1. Master 1 acts as the primary master and it goes down, therefore, Master 2 takes over as primary.
2. Master 1 comes back up again (reboots).
3. Master 2 continues to be the active master.
Based on this scenario, how is master redundancy configured on the controller?
正解:B
解答を投票する
An organization wants to deploy a WLAN infrastructure that provides connectivity to these client categories:
Employees

Contractors

Guest users

Corporate IoT legacy devices that support no authentication or encryption

Employees and contractors must authenticate with company credentials and get network access based on AD group membership. Guest users are required to authenticate with captive portal using predefined credentials. Only employees will run L2 encryption.
Which implementation plan fulfills the requirements while maximizing the channel usage?
Employees

Contractors

Guest users

Corporate IoT legacy devices that support no authentication or encryption

Employees and contractors must authenticate with company credentials and get network access based on AD group membership. Guest users are required to authenticate with captive portal using predefined credentials. Only employees will run L2 encryption.
Which implementation plan fulfills the requirements while maximizing the channel usage?
正解:A
解答を投票する
Refer to the exhibit.

A network administrator wants to configure an 802.1x supplicamt for a wireless network that includes the following:
AES encryption

EAP-MSCHAP v2-based user and machine authentication

Validation of server certificate in Microsoft Windows 10

The network administrator creates a WLAN profile and selects the change connection settings option. Then the network administrator changes the security type to Microsoft: Protected EAP (PEAP), and enables user and machine authentication under Additonal Settings.
What must the network administrator do next to accomplish the task?

A network administrator wants to configure an 802.1x supplicamt for a wireless network that includes the following:
AES encryption

EAP-MSCHAP v2-based user and machine authentication

Validation of server certificate in Microsoft Windows 10

The network administrator creates a WLAN profile and selects the change connection settings option. Then the network administrator changes the security type to Microsoft: Protected EAP (PEAP), and enables user and machine authentication under Additonal Settings.
What must the network administrator do next to accomplish the task?
正解:B
解答を投票する
Refer to the exhibit.

A network administrator completes the task to cretae a WLAN, as shown in the exhibit. The network administrator selects the options to use guest as primary usage and Internal captive portal with authentication in the security step. Next, the network administrator creates a policy that denies access to the internal network.
Which additional step must the network administrator complete in order to prevent authenticated users from reaching internal corporate resources while allowing Internet access?

A network administrator completes the task to cretae a WLAN, as shown in the exhibit. The network administrator selects the options to use guest as primary usage and Internal captive portal with authentication in the security step. Next, the network administrator creates a policy that denies access to the internal network.
Which additional step must the network administrator complete in order to prevent authenticated users from reaching internal corporate resources while allowing Internet access?
正解:D
解答を投票する
Refer to the exhibit.

A network administrator deploys a new WLAN named Corp-Network. The security suite is WPA2 with 802.1X. A new ClearPass server is used as the authentication server. Connection attempts to this WLAN are rejected, and no trace of the attempt is seen in the ClearPass Policy Manager Access Tracker.
However, the network administrator is able to see the logs shown in the exhibit.
What must the network administrator do to solve the problem?

A network administrator deploys a new WLAN named Corp-Network. The security suite is WPA2 with 802.1X. A new ClearPass server is used as the authentication server. Connection attempts to this WLAN are rejected, and no trace of the attempt is seen in the ClearPass Policy Manager Access Tracker.
However, the network administrator is able to see the logs shown in the exhibit.
What must the network administrator do to solve the problem?
正解:B
解答を投票する
Several users are connected to the same WLAN and want to play the same multicast-based video stream. The network administrator wants to reduce bandwidth consumption and at the same time increase the transmit rate to a fixed value for WMM marked video streams in a large-scale network. Broadcast Multicast Optimization (BCMCO) is already on.
Which two configuration steps does the network administrator have to perform to optimize the multicast transmissions? (Select two.)
Which two configuration steps does the network administrator have to perform to optimize the multicast transmissions? (Select two.)
正解:A、D
解答を投票する
Company 1 and Company 2 are medium-sized companies that collaborate in a joint venture. Each company owns a building, and each has their own ArubaOS 8 Mobility Master (MM)-Mobility Controller (MC) deployment. The buildings are located in front of one another. For the initial stage of the project, the companies want to interconnect their networks with fiber, and broadcast each other's SSIDs.
These are the requirements:
- Do not unify the company's network management responsibilities.
- Allow each company to take care of their own SSID setups when broadcasted in the other building.
- Terminate Company 1 user traffic on Company 1 MCs when they connect to Company 2 APs.
- Terminate Company 2 user traffic on Company 2 MCs when they connect to Company 1 APs.
What is needed to meet the solution requirements?
These are the requirements:
- Do not unify the company's network management responsibilities.
- Allow each company to take care of their own SSID setups when broadcasted in the other building.
- Terminate Company 1 user traffic on Company 1 MCs when they connect to Company 2 APs.
- Terminate Company 2 user traffic on Company 2 MCs when they connect to Company 1 APs.
What is needed to meet the solution requirements?
正解:B
解答を投票する