Pass4itsure > HP > Aruba ACMA > ACMA_6.1 > ACMA_6.1 Online Practice Questions and Answers

ACMA_6.1 Online Practice Questions and Answers

Questions 4

The characteristics of 802.1X Authentication include (Select three):

A. L3 Authentication

B. Extensible Authentication Protocol

C. Support of RADIUS external authentication

D. Port based authentication

E. EAP terminates on authenticator

Buy Now
Questions 5

What is the IP address of the controller when using the startup wizard?

A. 192.168.1.1

B. 172.16.0.1

C. 10.1.1.1

D. 172.16.0.254

E. 10.1.10.100

Buy Now
Questions 6

Which firewall action is necessary in a guest pre-authentication role to display the captive portal login screen?

A. SRC-NAT

B. DST-NAT

C. allow all

D. allow CP

E. route

Buy Now
Questions 7

When a client is blacklisted, the controller will:

A. Send a message telling the client it has been blacklisted

B. De-authenticate the client from the network but allow it to keep transmitting data

C. Only block the client if it hasn't yet associated with an AP

D. Stop the client from associating with any SSID on the controller

E. Block the client from the SSID he was connected to

Buy Now
Questions 8

Which of the following information is gathered by APs during scanning periods? (Select three)

A. MAC addresses of neighboring APs

B. Security threats in the surroundings

C. Type of non-802.11 interference detected

D. Interfering Clients connected to other APs

E. 4.9 GHz devices

Buy Now
Questions 9

What is the purpose of the validuser ACL?

A. When a user transmits data through the controller, the validuser ACL is used to check if the user is in the layer 3 user-table

B. Before a client is added to the controller's user table, the validuser ACL is checked to make sure the client has a valid IP address

C. The validuser ACL is used during 802.1X authentication to check that the client is in the layer 3 user-table

D. When an AP needs to transmit data to a user, it checks the validuser ACL to make sure the user has a valid IP address

E. A list of configured MAC addresses that define the valid users

Buy Now
Questions 10

Time range is applied directly to which one of the following:

A. ROLE

B. Firewall Policy

C. Firewall Rule

D. Profile

E. Interface

Buy Now
Questions 11

What are some best practices when configuring the Aruba Firewall (Select two)?:

A. Use aliases when possible

B. Write rules from least specific to most specific

C. Take actions like blacklisting when users violate policies

D. Create a different policy for each unique rule

E. Create different policies for access to different servers

Buy Now
Questions 12

When would you use the Reject action in a firewall policy?

A. To let hackers know which ports are open on your firewall

B. To let your users know they they are in violation of corporate policies

C. To tell down stream routers to use a more appropriate router

D. To aid in troubleshooting firewall policy configuration

E. To let the system count the violations

Buy Now
Questions 13

FQLN can be set for an AP:

A. During AP provisioning

B. At the factory

C. MSCHAPv2

D. By DHCP when an address is requested

E. Using the AP wizard

Buy Now
Exam Code: ACMA_6.1
Exam Name: Aruba Certified Mobility Associate 6.1
Last Update: Apr 22, 2024
Questions: 77
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99