Web based captive portal can be authenticated by the following types of databases: (Select two)
A. Internal
B. PEAP
C. RADIUS
D. Kerberos
E. Tacacs
Which of the following statements about management accounts is false?
A. The root account can be used to monitor access points connected to the controller
B. The guest-provisioning account can see the controller's configuration but cannot change it
C. The read-only account cannot delete internal database entries
D. The guest-provisioning account can make changes to the internal AP database
E. The network-operations account cannot access configuration
Which of the following is NOT available for configuration via startup wizard?
A. Controller name
B. Country Code
C. Loopback IP
D. VLAN IP
E. Firewall Roles
Which of the following cannot be accomplished from the startup wizard?
A. Basic controller configuration
B. License installation
C. VPN configuration
D. WLAN configuration
E. Firewall Roles
Which ARM function converts APs with excess capacity into Air Monitors?
A. Airtime fairness
B. Coordinated access to a single channel
C. Co-channel interference mitigation
D. Client aware scanning
E. Band Steering
Time range is applied directly to which one of the following:
A. ROLE
B. Firewall Policy
C. Firewall Rule
D. Profile
E. Interface
What are some best practices when configuring the Aruba Firewall (Select two)?:
A. Use aliases when possible
B. Write rules from least specific to most specific
C. Take actions like blacklisting when users violate policies
D. Create a different policy for each unique rule
E. Create different policies for access to different servers
Which is the strongest encryption type?
A. AES
B. TKIP
C. WEP
D. MSCHAPv2
E. DES
When would you use the Reject action in a firewall policy?
A. To let hackers know which ports are open on your firewall
B. To let your users know they they are in violation of corporate policies
C. To tell down stream routers to use a more appropriate router
D. To aid in troubleshooting firewall policy configuration
E. To let the system count the violations
Which of the following can be configured in the GUI setup wizard? (Select three)
A. timezone
B. WLAN
C. VLAN
D. Loopback address
E. DHCP Option 43