When local controller is selected as the controller's operation mode in the startup wizard, which is no
longer configurable?
WLANs
802.1X authentication takes place:
Prior to the granting access to L2 media
When a client is blacklisted, the controller will:
Stop the client from associating with any SSID on the controller
Which role is assigned prior to launching the captive portal splash screen?
Pre-authentication role
A reboot of the controller is necessary in which of the following scenarios? (select two)
Changing controller IP
Changing of Controller Role
Aruba's recommended best option for authenticating guest users is:
Captive Portal
When configuring a guest WLAN via the WLAN section of the startup wizard, which security option is
NOT available?
WEP encryption
The AP Wizard allows the selection of APs to be provisioned using which of the following methods?
(Select three)
APs in particular AP Group
All APs
APs meeting specified search criteria
Which of the following statements about management accounts is false?
The guest-provisioning account can see the controller's configuration but cannot change it.
When looking at clients in the 'Monitoring Clients' section of the Controller, which of the following
information is NOT visible?
Output power of client radio
Remote AP in tunnel mode, by default, uses which of the following to encrypt user traffic back to the
mobility controller?
The AP does not encrypt user traffic. The user's link layer encryption is used.
When configuring roles under 'Access Control' in the Controller's Configuration page, what does the
'show reference' action tell us?
Which profiles refer to the role
, The characteristics of 802.1X Authentication include: (Select Three)
Extensible Authentication Protocol
Support of RADIUS external authentication
Port based authentication
Guest access can be provided securely by combining the following components of an Aruba system:
(Select Two)
Use restrictive firewall policies to limit the guest user's access to the internal resources
Authenticate users with the internal captive portal against the internal database or other server
Time range applied directly to which one of the following:
Firewall Rule
802.11n APs operate in which bands? (Select Two)
2.4 GHz
5 GHz
In a Campus AP deployment, an access point has been provisioned with an IP address, subnet mask,
default gateway and Controller IP address. Control Plane Security has been disabled. Both the
Controller and the Access Point are using 6.1 firmware. If a 3rd party firewall is placed in between the
AP and controller, what traffic would need to be allowed for the AP to boot successfully and
broadcast Wireless Networks? (Select Two)
PAPI
GRE
What type of authentication servers are selectable in the WLAN wizard? (Select Three)
RADIUS
LDAP
Internal database
What are some best practices when configuring the Aruba Firewall? (Select Two)
Use aliases when possible
Take actions like blacklisting when users violate policies
Where in the controller would we configure a wireless network NOT to use encryption?
SSID profile
Which of the following cannot be accomplished from the startup wizard?
VPN Configuration
Which of the following core components of ARM enables intelligent distribution of clients across
available channel capacity?
Spectrum load balancing
The Guest Provisioning user account has the ability to do which of the following?