A customer with an Aruba Controller wants to set it up to work with ClearPass Guest.
Hoe should they configure ClearPass as an authentication server in the controller so that guests are able to authenticate successfully?
AAdd ClearPass as RADIUS CoA server.
BAdd ClearPass as a TACACS+ authentication server.
CAdd ClearPass as a RADIUS authentication server.
DAdd ClearPass as a HTTPS authentication server.
Refer to the exhibit.
In the Aruba RADIUS dictionary shown, what is the purpose of the RADIUS attributes?
Ato send information via RADIUS packets to Aruba NADs
Bto gather and send Aruba NAD information to ClearPass
Cto send information via RADIUS packets to clients
Dto gather information about Aruba NADs for ClearPass
Eto send CoA packets from ClearPass to the Aruba NAD
Which statement is true about the databases in ClearPass?
AEntries in the guest user database do not expire.
BA Static host list can only contain a list of IP addresses.
CEntries in the guest user database can be deleted.
DEntries in the local user database cannot be modified.
EThe endpoints database can only be populated by manually adding MAC addresses to the table.
Refer to the exhibit.
Based on the Translation Rule configuration shown, what will be the outcome?
AAn AD user from AD group MatchAdmin will be assigned the operator profile of IT Administrators.
BA user from AD group MatchAdmin will be assigned the operator profile of IT Administrators.
CAll active directory users will be assigned the operator profile of IT Administrators.
DAll ClearPass Policy Manager admin users who are members of the Administrators AD group will be assigned the TACACS profile of IT Administrators.
Question 6
ClearPass for AAA
0
Question 7
Onboard
Question 8
ClearPass for AAA
Question 9
Onboard
Question 10
Guest
Question 11
Posture
Question 12
Posture
Question 13
Guest
Question 14
Guest
Question 15
External Authentication
Question 16
External Authentication
Question 17
Posture
Question 18
Guest
Question 19
Guest
Question 20
External Authentication
Question 21
External Authentication
Question 22
External Authentication
Question 23
Onboard
Question 24
ClearPass for AAA
Question 25
Posture
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Refer to the exhibit.
Based on the information, what is the purpose of using [Time Source] for authorization?
Ato check how long it has been since the last login authentication
Bto check whether the guest account expired
Cto check whether the MAC address is in the MAC Caching repository
Dto check whether the MAC address status is known in the endpoints table
Eto check whether the MAC address status is unknown in the endpoints table
An organization has decided to implement dual SSID Onboarding. An administrator has used the Onboard service template to create services for dual SSID
Onboarding.
Which statement is true?
AThe Onboard Authorization service is triggered when the user connects to the secure SSID.
BThe Onboard Authorization service is triggered during the Onboarding process.
CThe Onboard Authorization service is never triggered.
DThe device connects to the secure SSID for provisioning.
EThe Onboard Provisioning service is triggered when the user connects to the provisioning SSID to Onboard their device.
Refer to the exhibit.
An Enforcement Profile has been created in the Policy Manager as shown.
Which action will ClearPass take based on this Enforcement Profile?
AClearPass will count down 600 seconds and send a RADIUS CoA message to the user to end the user's session after this time is up.
BClearPass will send the Session-Timeout attribute in the RADIUS Access-Accept packet to the NAD and the NAD will end the user's session after 600 seconds.
CClearPass will count down 600 seconds and send a RADIUS CoA message to the NAD to end the user's session after this time is up.
DClearPass will send the Session-Timeout attribute in the RADIUS Access-Request packet to the NAD and the NAD will end the user's session after 600 seconds.
EClearPass will send the Session-Timeout attribute in the RADIUS Access-Accept packet to the User and the user's session will be terminated after 600 seconds.
An Android device goes through the single-SSID Onboarding process and successfully connects using EAP-TLS to the secure network.
What is the order in which services are triggered?
A bank would like to deploy ClearPass Guest with web login authentication so that their customers can self-register on the network to get network access when they have meetings with bank employees. However, they're concerned about security.
What is true? (Choose three.)
AIf HTTPS is used for the web login page, after authentication is completed guest Internet traffic will all be encrypted as well.
BDuring web login authentication, if HTTPS is used for the web login page, guest credentials will be encrypted.
CAfter authentication, an IPSEC VPN on the guest's client be used to encrypt Internet traffic.
DHTTPS should never be used for Web Login Page authentication.
EIf HTTPS is used for the web login page, after authentication is completed some guest Internet traffic may be unencrypted.
What does the Posture Token QUARANTINE imply?
AThe client is compliant. However, there is an update available to remediate the client to HEALTHY state.
BThe posture of the client is unknown.
CThe client is infected and is a threat to other systems in the network.
DThe client is out of compliance, but has HEALTHY state.
EThe client is out of compliance.
A customer wants to make enforcement decisions during 802.1x authentication based on a client's Onguard posture token.
What enforcement profile should be used in the health check service?
AQuarantine VLAN
BRADIUS CoA
CRADIUS Accept
DRADIUS Reject
EFull Access VLAN.
Refer to the exhibit.
A user logged in to the Self-Service Portal as shown.
What does the traffic received and sent statistics present?
AThese show the total amount of traffic the guest transmitted, as seen through RADIUS CoA packets from the NAD to ClearPass.
BThese show the total amount of traffic the NAD transmitted to ClearPass, as seen through RADIUS accounting messages from the NAD to ClearPass.
CThese show the total amount of traffic the guest transmitted after account expiration, as seen through RADIUS accounting messages sent from the NAD to ClearPass.
DThese show the total amount of traffic the guest transmitted, as seen through RADIUS CoA packets from the client to ClearPass.
EThese show the total amount of traffic the guest transmitted, as seen through RADIUS accounting messages sent from the NAD to ClearPass.
Refer to the exhibit.
A user who is tagged with the ClearPass roles of Role_Engineer and developer, but not testqa, connects to the network with a corporate Windows laptop.
Which Enforcement Profile is applied?
AWIRELESS_GUEST_NETWORK
BWIRELESS_CAPTIVE_NETWORK
CWIRELESS_HANDHELD_NETWORK
DWIRELESS_EMPLOYEE_NETWORK
Which statement is true about the configuration of a generic LDAP server as an External Authentication server in ClearPass? (Choose three.)
AGeneric LDAP Browser can be used to search the Base DN.
BAn administrator can customize the selection of attributes fetched from an LDAP server.
CThe bind DN can be in the administrator@domain format.
DA maximum of one generic LDAP server can be configured in ClearPass.
EA LDAP Browser can be used to search the Base DN.
Which authorization servers are supported by ClearPass? (Choose two.)
AActive Directory
BCisco Controller
CAruba Controller
DLDAP server
EAruba Mobility Access Switch
Refer to the exhibit.
Based on the Enforcement Policy configuration, when a user with Role Engineer connects to the network and the posture token assigned is Unknown, which
Enforcement Profile will be applied?
ARestrictedACL
BHR VLAN
CRemote Employee ACL
D[Deny Access Profile]
EEMPLOYEE_VLAN
Refer to the exhibit.
When configuring a Web Login Page in Clear Pass Guest, the information shown is displayed.
What is the page name field used for?
AFor Administrators to access the PHP page, but not guests.
BFor forming the Web Login Page URL.
CFor forming the Web Login Page URL where Administrators add guest users.
DFor Administrators to reference the page only.
EFor forming the Web Login Page URL and the page name that guests must configure on their laptop wireless supplicant.
Refer to the exhibit.
What is the purpose of the "˜Clock Skew Allowance' setting? (Choose tow.)
Ato ensure server certificate validation does not fail due to client clock sync issues
Bto set expiry time in client certificate to a few minutes longer that the default setting
Cto adjust clock time on client device to a few minutes before current time
Dto ensure client certificate validation does not fail due to client clock sync issues
Eto set start time in client certificate to a few minutes before current time
What is the certificate format PKCS #7, or .p7b, used for?
ABinary encoded X.509 certificate
BCertificate with an encrypted private key
CCertificate chain
DBinary encoded X.509 certificate with public key
ECertificate Signing Request
Which components can use Active Directory authorization attributes for the decision-making process? (Choose two.)
APosture policy
BRole Mapping policy
CCertificate validation policy
DProfiling policy
EEnforcement policy
Refer to the exhibit.
Based on the Attribute configuration shown, which statement accurately describes the status of attribute values?
AThe attribute values of department, title, memberOf, telephoneNumber, mail are directly applied as ClearPass roles.
BThe attribute values of department and memberOf are directly applied as ClearPass roles.
COnly the attribute value of company can be used in role mapping policies, not other attributes.
DOnly the attribute value of department and memberOf can be used in role mapping policies.
EOnly the attribute value of title, memberOf, telephoneNumber can be used in role mapping policies.
In single SSID Onboarding, which method can be used in the Enforcement Policy to distinguish between a provisioned device and a device that has not gone through the Onboard workflow?
AOnguard Agent used
BAuthentication Method used
CNetwork Access Device used
DActive Directory Attributes
EEndpoint OS Category
Refer to the exhibit.
Based on the Policy configuration shown, which VLAN will be assigned when a user with a ClearPass role Engineer authenticates to the network successfully on
Saturday using connection protocol WEBAUTH?
AFull Access VLAN
BDeny Access
CEmployee Vlan
DInternet VLAN
Refer to the exhibit.
Based on the Enforcement Profile configuration shown, which statement accurately describes what is sent?
AA limited access VLAN value is sent to the Network Access Device.
BA message is sent to the Onguard Agent on the client device.
CAn unhealthy role value is sent to the Network Access Device.
DA RADIUS CoA message is sent to bounce the client.
EA RADIUS access-accept message is sent to the Controller.