Latest [Nov 25, 2021] ACMA-6.3 Exam Dumps - Valid and Updated Dumps [Q22-Q46]

Share

Latest [Nov 25, 2021] ACMA-6.3 Exam Dumps - Valid and Updated Dumps

Free Sales Ending Soon - 100% Valid ACMA-6.3 Exam Dumps with 88 Questions

NEW QUESTION 22
When a client is blacklisted, the controller will:

  • A. Stop the client from associating with any SSID on the controller
  • B. Send a message telling the client it has been blacklisted
  • C. Block the client from the SSID he was connected to
  • D. Only block the client if it hasn't yet associated with an AP
  • E. De-authenticate the client from the network but allow it to keep transmitting data

Answer: A

 

NEW QUESTION 23
Guest access can be provided securely by combining the following components of an Aruba system: (Select two)

  • A. Use restrictive firewall policies to limit the guest user's access to internal resources
  • B. DoS guest users off of the system and make them use wired ports
  • C. Dedicated APs
  • D. Authenticate users with the internal captive portal against the internal database or other server
  • E. Providing guests their own APs and controllers

Answer: A,D

 

NEW QUESTION 24
WPA and WPA2 can use the following authentication methods: (Select two)

  • A. 802.1X
  • B. WEP Keys
  • C. Captive Portal
  • D. PSK
  • E. IPSEC

Answer: A,D

 

NEW QUESTION 25
Which of these are supported by the Aruba Controller? (Select two)

  • A. AES Encryption
  • B. HSRP
  • C. SNMP
  • D. Blowfish encryption
  • E. BGP

Answer: A,C

 

NEW QUESTION 26
802.1X authentication takes place:

  • A. Prior to granting access to L2 media
  • B. After the user has an IP address
  • C. After the user sees the captive portal page
  • D. Once the IPSEC tunnel is up
  • E. Prior to the user associating with the AP

Answer: A

 

NEW QUESTION 27
Which of the following would be appropriate for standalone MAC Authentication?

  • A. Laptops
  • B. Barcode scanner
  • C. Admin user
  • D. Guest User
  • E. Internal User

Answer: B

 

NEW QUESTION 28
Which of the following core components of ARM enables intelligent distribution of clients across available channel capacity?

  • A. Band steering
  • B. Rogue AP detection
  • C. Multi-band scan
  • D. Coordinated Access to a Single Channel
  • E. Spectrum load balancing

Answer: E

 

NEW QUESTION 29
In Extensible Authentication Protocol (EAP) terminology the client station is called the:

  • A. End node
  • B. Station
  • C. Authenticated Client
  • D. Client Device
  • E. Supplicant

Answer: E

 

NEW QUESTION 30
When a barcode scanner connects to an AP, what is the 1st role that is assigned to it?

  • A. Initial role
  • B. MAC authentication default role
  • C. 802.1X default role
  • D. Server derived role
  • E. User derived Role

Answer: A

 

NEW QUESTION 31
Which of the following is true of an Aruba Mobility Controller acting as a layer 2 switch? (Select two):

  • A. VLANs cannot have IP addresses
  • B. The Mobility Controller acts as a bridge.
  • C. Uplink ports on the Mobility Controller can use 802.1q tagging
  • D. All stations must use the same VLAN
  • E. The Mobility Controller is the client's default router.

Answer: B,C

 

NEW QUESTION 32
When looking at clients in the 'Monitoring Clients' section of the Controller, which of the following information is NOT visible?

  • A. Role
  • B. Output power of client radio
  • C. Method of authentication
  • D. Age
  • E. MAC address

Answer: B

 

NEW QUESTION 33
What is the purpose of the validuser ACL?

  • A. When an AP needs to transmit data to a user, it checks the validuser ACL to make sure the user has a valid IP address
  • B. Before a client is added to the controller's user table, the validuser ACL is checked to make sure the client has a valid IP address
  • C. When a user transmits data through the controller, the validuser ACL is used to check if the user is in the layer 3 user-table
  • D. The validuser ACL is used during 802.1X authentication to check that the client is in the layer 3 user-table
  • E. A list of configured MAC addresses that define the valid users

Answer: B

 

NEW QUESTION 34
In the startup wizard the ports configuration screen allows you to do the following (Select three)?

  • A. Specify the IP address of the Vlan
  • B. Configure port channels
  • C. Assign VLANs
  • D. Identify trunk ports
  • E. Identify the native VLAN for a port

Answer: C,D,E

 

NEW QUESTION 35
When configuring a guest WLAN via the WLAN section of the startup wizard, which
security option is NOT available?

  • A. WEP encryption
  • B. Captive Portal with no authentication or registration
  • C. Captive portal with email registration
  • D. Captive portal with authentication via credentials
  • E. Direct access to the internet with no captive portal

Answer: A

 

NEW QUESTION 36
A wired device is connected to an untrusted port on a controller. How can a role be assigned to the device?

  • A. Roles are assigned to devices connected to a trusted port
  • B. A default Role can be directly assigned to an untrusted port
  • C. An initial Role can be assigned directly to the VLAN
  • D. Adding a wired AAA profile to a VLAN on the untrusted port
  • E. The Role assigned to the untrusted port

Answer: D

 

NEW QUESTION 37
Which role is assigned prior to launching the captive portal splash screen?

  • A. AAA role
  • B. Pre-authentication role
  • C. Post-authentication role
  • D. CP default role
  • E. AAA-CP role

Answer: B

 

NEW QUESTION 38
View the Server group screen shot above.

A company has provisioned the same VAP, AAA and SSID profiles at both its Miami and NY offices. This Server Group is applied for 802.1x authentication at both locations. The user's credentials are only found in the Miami Radius server "RadiusMiami". There is no Radius synchronization and both servers are reachable. What happens when the user attempts to authenticate?

  • A. The request is initially sent to RadiusNY1 then RadiusNY1 redirects the controller to send the authentication request to RadiusMiami
  • B. RadiusNY1 receives the request and returns a deny. The authentication request will then be sent to RadiusMiami.
  • C. The RadiusNY1 sends the request to RadiusMiami that replies to the controller
  • D. The controller recognizes the users Domain and sends the authentication request directly to RadiusMiami.
  • E. RadiusNY1 receives the request and returns a deny. No other action is taken.

Answer: E

 

NEW QUESTION 39
Which one of the following file types cannot be imported to Visual RF Plan?

  • A. jpg
  • B. bmp
  • C. tiff
  • D. gif
  • E. dwg

Answer: C

 

NEW QUESTION 40
What are some best practices when configuring the Aruba Firewall (Select two)?:

  • A. Use aliases when possible
  • B. Take actions like blacklisting when users violate policies
  • C. Write rules from least specific to most specific
  • D. Create a different policy for each unique rule
  • E. Create different policies for access to different servers

Answer: A,B

 

NEW QUESTION 41
What are the types of user derivation rules that can be applied to a user? (Choose two)

  • A. AP
  • B. SSID
  • C. VLAN
  • D. Role
  • E. MAC

Answer: C,D

 

NEW QUESTION 42
Firewall policy should be written from:

  • A. Order is not important
  • B. Most specific to least specific
  • C. Least specific to most specific
  • D. Policies with the most rules 1st
  • E. Most important resources first

Answer: B

 

NEW QUESTION 43
When configuring roles under 'Access Control' in the Controller's Configuration page, what does the 'show reference' action tell us?

  • A. What policies are inside the role
  • B. What authentication methods use Roles with these policies
  • C. Which firewall hits were detected that refer to the role
  • D. What users are currently assigned that role
  • E. Which profiles refer to the role

Answer: E

 

NEW QUESTION 44
Identify the benefits of using aliases when writing firewall policies (Select three)

  • A. Can be applied to a Role
  • B. Makes policies more readable.
  • C. End users are applied to the proper role.
  • D. Changes to policy rules that use aliases are auto updated.
  • E. Simplifies repetitive configuration.

Answer: B,D,E

 

NEW QUESTION 45
What does SET ORIENTATION option do in the Visual RF Plan edit tool?

  • A. Give the option to resize a floor
  • B. Sets the proper vertical floor plan alignment
  • C. Sets the North/South orientation of the building
  • D. Set the horizontal plane on each floor
  • E. Allows the planner to set the directional antenna orientation

Answer: B

 

NEW QUESTION 46
......

ACMA-6.3 Exam Dumps - 100% Marks In ACMA-6.3 Exam: https://www.actual4exams.com/ACMA-6.3-valid-dump.html