Which user authentication request will match the service rules of the Policy Service shown?
Refer to the exhibit. Which user authentication request will match the service rules of the Policy Service shown? A. a wireless user connecting to an Aruba IAP on the SSID “CORP” B. a wireless user connection would fail because of miss-configured service rules. C. a wireless user connecting to any SSID on an Aruba Controller […]
Which items would ClearPass be useful for? (Choose three.)
Which items would ClearPass be useful for? (Choose three.) A. Unified wired and wireless access control B. Access control on transient networks C. Administrative access control D. User device management E. Firewall configuration management Reference: https://h20195.www2.hpe.com/v2/GetPDF.aspx/4AA6-2768ENW.pdf
Which actions are necessary to set up a ClearPass guest captive portal web login page to execute with no error
Which actions are necessary to set up a ClearPass guest captive portal web login page to execute with no errors? (Choose three.) A. Configure the vendor settings in the Network Access Device to match the web login page. B. Install a public issued HTTPS certificate in ClearPass Policy Manager. C. Install a public issued HTTPS […]
What is the function of the primary and backup servers when configuring an authentication source in ClearPass?
What is the function of the primary and backup servers when configuring an authentication source in ClearPass? A. The primary server and backup servers can be configured for round-robin. B. The primary server can be from one Active Directory domain; the backup server can be from another. C. The primary server is always authenticated first, […]
Select three elements that are part of the authorization process. (Choose three.)
Select three elements that are part of the authorization process. (Choose three.) A. Send a RADIUS accept to the Access device. B. Verify client credentials against your account. C. Determine posture status. D. Validate the user account attributes. E. Filter by endpoint device type. Reference: http://h20628.www2.hp.com/km-ext/kmcsdirect/emr_na-c05320375-1.pdf
Which statements describe subnet scans for static IP device discovery? (Choose two.)
Which statements describe subnet scans for static IP device discovery? (Choose two.) A. To run an On-Demand Subnet Scan, you must first configure a subnet scan in the profile settings. B. The On-Demand option provides the ability to trigger a one-time scan in specified network subnets. C. The On-Demand option provides the ability to scan […]
Which advantages will this give? (Choose two.)
Your boss suggests that you configure a guest self-registration page in ClearPass for the Conference Events SSID. Which advantages will this give? (Choose two.) A. It will allow guest users to create a login account for the web login page. B. It will stop employees from putting their corporate devices on the event network. C. […]