Download Aruba Certified ClearPass Professional 6.5.HPE6-A15.TestKing.2017-12-16.105q.vcex

Vendor: HP
Exam Code: HPE6-A15
Exam Name: Aruba Certified ClearPass Professional 6.5
Date: Dec 16, 2017
File Size: 16 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
  
  
An AD user’s department attribute value is configured as “QA”. The user authenticates from a laptop running MAC OS X. 
Which role is assigned to the user in ClearPass?
  1. HR Local
  2. Remote Employee
  3. [Guest]
  4. Executive
  5. IOS Device
Correct answer: C
Explanation:
None of the Listed Role Name conditions are met.
None of the Listed Role Name conditions are met.
Question 2
  
  
Based on the Attribute configuration shown, which statement accurately describes the status of attribute values?
  1. Only the attribute values of department and memberOf can be used in role mapping policies.
  2. The attribute values of department, title, memberOf, telephoneNumber, and mail are directly applied as ClearPass.
  3. Only the attribute value of company can be used in role mapping policies, not the other attributes.
  4. The attribute values of department and memberOf are directly applied as ClearPass roles.
  5. Only the attribute values of title, telephoneNumber, and mail can be used in role mapping policies.
Correct answer: D
Question 3
Which components can use Active Directory authorization attributes for the decision-making process? (Select two.)
  1. Profiling policy
  2. Certificate validation policy
  3. Role Mapping policy
  4. Enforcement policy
  5. Posture policy
Correct answer: CD
Explanation:
C: Role Mappings Page - Rules Editor Page Parameters     D: Enforcement Policy Attributes tab Parameters     References:http://www.arubanetworks.com/techdocs/ClearPass/Aruba_CPPMOnlineHelp/Content/CPPM_UserGuide/identity/RoleMappingPolicies.htmlhttp://www.arubanetworks.com/techdocs/ClearPass/Aruba_CPPMOnlineHelp/Content/CPPM_UserGuide/PolicySim/PS_Enforcement_Policy.htm
C: Role Mappings Page - Rules Editor Page Parameters
  
  
D: Enforcement Policy Attributes tab Parameters
  
  
References:
http://www.arubanetworks.com/techdocs/ClearPass/Aruba_CPPMOnlineHelp/Content/CPPM_UserGuide/identity/RoleMappingPolicies.html
http://www.arubanetworks.com/techdocs/ClearPass/Aruba_CPPMOnlineHelp/Content/CPPM_UserGuide/PolicySim/PS_Enforcement_Policy.htm
Question 4
  
  
Based on the Authentication sources configuration shown, which statement accurately describes the outcome if the user is not found?
  1. If the user is not found in the remotelab AD but is present in the local user repository, a reject message is sent back to the NAD.
  2. If the user is not found in the local user repository but is present in the remotelab AD, a reject message is sent back to the NAD.
  3. If the user is not found in the local user repository a reject message is sent back to the NAD.
  4. If the user is not found in the local user repository and remotelab AD, a reject message is sent back to the NAD.
  5. If the user is not found in the local user repository a timeout message is sent back to the NAD.
Correct answer: D
Explanation:
Policy Manager looks for the device or user by executing the first filter associated with the authentication source. After the device or user is found, Policy Manager then authenticates this entity against this authentication source. The flow is outlined below:On successful authentication, Policy Manager moves on to the next stage of policy evaluation, which collects role mapping attributes from the authorization sources. Where no authentication source is specified (for example, for unmanageable devices), Policy Manager passes the request to the next configured policy component for this service. If Policy Manager does not find the connecting entity in any of the configured authentication sources, it rejects the request. References: ClearPass Policy Manager 6.5 User Guide (October 2015), page 134https://community.arubanetworks.com/aruba/attachments/aruba/SoftwareUserReferenceGuides/52/1/ClearPass%20Policy%20Manager%206.5%20User%20Guide.pdf
Policy Manager looks for the device or user by executing the first filter associated with the authentication source. 
After the device or user is found, Policy Manager then authenticates this entity against this authentication source. The flow is outlined below:
  • On successful authentication, Policy Manager moves on to the next stage of policy evaluation, which collects role mapping attributes from the authorization sources. 
  • Where no authentication source is specified (for example, for unmanageable devices), Policy Manager passes the request to the next configured policy component for this service. 
  • If Policy Manager does not find the connecting entity in any of the configured authentication sources, it rejects the request. 
References: ClearPass Policy Manager 6.5 User Guide (October 2015), page 134
https://community.arubanetworks.com/aruba/attachments/aruba/SoftwareUserReferenceGuides/52/1/ClearPass%20Policy%20Manager%206.5%20User%20Guide.pdf
Question 5
Which authorization servers are supported by ClearPass? (Select two.)
  1. Aruba Controller
  2. LDAP server
  3. Cisco Controller
  4. Active Directory
  5. Aruba Mobility Access Switch
Correct answer: BD
Explanation:
Authentication Sources can be one or more instances of the following examples:Active Directory LDAP Directory SQL DB Token Server Policy Manager local DB References: ClearPass Policy Manager 6.5 User Guide (October 2015), page 114https://community.arubanetworks.com/aruba/attachments/aruba/SoftwareUserReferenceGuides/52/1/ClearPass%20Policy%20Manager%206.5%20User%20Guide.pdf
Authentication Sources can be one or more instances of the following examples:
  • Active Directory 
  • LDAP Directory 
  • SQL DB 
  • Token Server 
  • Policy Manager local DB 
References: ClearPass Policy Manager 6.5 User Guide (October 2015), page 114
https://community.arubanetworks.com/aruba/attachments/aruba/SoftwareUserReferenceGuides/52/1/ClearPass%20Policy%20Manager%206.5%20User%20Guide.pdf
Question 6
Which CLI command is used to upgrade the image of a ClearPass server?
  1. Image update
  2. System upgrade
  3. Upgrade image
  4. Reboot
  5. Upgrade software
Correct answer: B
Explanation:
When logged in as appadmin, you can manually install the Upgrade and Patch binaries imported via the CLI using the following commands:system update (for patches) system upgrade (for upgrades) References: ClearPass Policy Manager 6.5 User Guide (October 2015), page 564https://community.arubanetworks.com/aruba/attachments/aruba/SoftwareUserReferenceGuides/52/1/ClearPass%20Policy%20Manager%206.5%20User%20Guide.pdf
When logged in as appadmin, you can manually install the Upgrade and Patch binaries imported via the CLI using the 
following commands:
  • system update (for patches) 
  • system upgrade (for upgrades) 
References: ClearPass Policy Manager 6.5 User Guide (October 2015), page 564
https://community.arubanetworks.com/aruba/attachments/aruba/SoftwareUserReferenceGuides/52/1/ClearPass%20Policy%20Manager%206.5%20User%20Guide.pdf
Question 7
Which steps are required to use ClearPass as a TACACS+ Authentication server for a network device? (Select two.)
  1. Configure a TACACS Enforcement Profile on ClearPass for the desired privilege level.
  2. Configure a RADIUS Enforcement Profile on ClearPass for the desired privilege level.
  3. Configure ClearPass as an Authentication server on the network device.
  4. Configure ClearPass roles on the network device.
  5. Enable RADIUS accounting on the NAD.
Correct answer: AC
Explanation:
You need to make sure you modify your policy (Configuration » Enforcement » Policies » Edit - [Admin Network Login Policy]) and add your AD group settings in to the corresponding privilege level.
You need to make sure you modify your policy (Configuration » Enforcement » Policies » Edit - [Admin Network Login Policy]) and add your AD group settings in to the corresponding privilege level.
Question 8
What is the purpose of Operator Profiles?
  1. to enforce role based access control for Aruba Controllers
  2. to enforce role based access control for ClearPass Policy Manager admin users
  3. to enforce role based access control for ClearPass Guest Admin users
  4. to assign ClearPass roles to guest users
  5. to map AD attributes to admin privilege levels in ClearPass Guest
Correct answer: C
Explanation:
An operator profile determines what actions an operator is permitted to take when using ClearPass Guest. References: http://www.arubanetworks.com/techdocs/ClearPass/CPGuest_UG_HTML_6.5/Content/OperatorLogins/OperatorProfiles.htm
An operator profile determines what actions an operator is permitted to take when using ClearPass Guest. 
References: http://www.arubanetworks.com/techdocs/ClearPass/CPGuest_UG_HTML_6.5/Content/OperatorLogins/OperatorProfiles.htm
Question 9
  
  
In the Aruba RADIUS dictionary shown, what is the purpose of the RADIUS attributes?
  1. to gather and send Aruba NAD information to ClearPass
  2. to gather information about Aruba NADs for ClearPass
  3. to send information via RADIUS packets to Aruba NADs
  4. to send information via RADIUS packets to clients
  5. to send CoA packets from ClearPass to the Aruba NAD
Correct answer: C
Question 10
  
Based on the Guest Role Mapping Policy shown, what is the purpose of the Role Mapping Policy?
  1. to display a role name on the Self-registration receipt page
  2. to send a firewall role back to the controller based on the Guest User’s Role ID
  3. to assign Controller roles to guests
  4. to assign three roles of [Contractor], [Guest] and [Employee] to every guest user
  5. to create additional account roles for guest administrators to assign to guest accounts
Correct answer: C
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!