Q1. You have been asked to rind logs related to port authentication on an ArubaOS-CX switch for events logged in the past several hours But. you are having trouble searching through the logs What is one approach that you can take to find the relevant logs?
A.Add the '-C and *-c port-access' options to the 'show logging' command.
B. Configure a logging Tiller for the 'port-access' category, and apply that filter globally.
C. Enable debugging for 'portaccess' to move the relevant logs to a buffer.
D. Specify a logging facility that selects for 'port-access' messages.
Correct Answer: A
Q2. What is symmetric encryption?
A.It simultaneously creates ciphertext and a same-size MAC.
B. It any form of encryption mat ensures that thee ciphertext Is the same length as the plaintext.
C. It uses the same key to encrypt plaintext as to decrypt ciphertext.
D. It uses a Key that is double the size of the message which it encrypts.
Correct Answer: C
Q3. An ArubaOS-CX switch enforces 802.1X on a port. No fan-through options or port-access roles are configured on the port The 802 1X supplicant on a connected client has not yet completed authentication Which type of traffic does the authenticator accept from the client?
A.EAP only
B. DHCP, DNS and RADIUS only
C. RADIUS only
D. DHCP, DNS, and EAP only
Correct Answer: A
Q4. You are configuring ArubaOS-CX switches to tunnel client traffic to an Aruba Mobility Controller (MC). What should you do to enhance security for control channel communications between the switches and the MC?
A.Create one UBT zone for control traffic and a second UBT zone for clients.
B. Configure a long, random PAPI security key that matches on the switches and the MC.
C. install certificates on the switches, and make sure that CPsec is enabled on the MC
D. Make sure that the UBT client vlan is assigned to the interface on which the switches reach the MC and only that interface.
Correct Answer: C
$ 39
Reviews
There are no reviews yet.