Loading questions...
Updated
Refer to the exhibits.
Exhibit 1 -
Exhibit 2 -
A network administrator integrates a current Mobility Master (MM) - Mobility Controller (MC) deployment with a RADIUS server to authenticate a wireless user, the network administrator realizes that the client machine is not failing into the it_department role, as shown the exhibits.
Which configuration is required to map the users into the proper role, based on standard attributes returned by the RADIUS server in the Access Accept message?


A network administrator is in charge of a Mobility Master (MM) – Mobility Controller (MC) based network security. Recently the Air Monitors detected a Rogue AP in the network and the administrator wants to enable “Tarpit” based wireless containment.
What profile must the administrator enable “tarpit” wireless containment on?
Refer to the exhibit.
A network administrator completes the initial configuration dialog of the Mobility Controllers (MCs) and they join the Mobility Master (MM) for the first time. After the MM-MC association process, network administrator only creates AP groups, VAPs, and roles. Next, the network administrator proceeds with the configuration of the policies and creates the policy shown in the exhibit.
Which additional steps must be done to make sure this configuration takes effect over the contractor users?

Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Create a free account to unlock all questions for this exam.
Log In / Sign UpA joint venture between two companies results in a fully functional WLAN Aruba solution. The network administrator uses the following script to integrate the WLAN solution with two radius servers, radius1 and radius2.
While all users authenticate with [email protected] type of credentials, radius1 has user accounts with the domain name portion.
Which additional configuration is required to authenticate corp1.com users with radius1 and corp2 users with radius2?





An organization owns a fully functional multi-controller Aruba network with a Virtual Mobility Master (VMM) in VLAN20. They have asked a network consultant to deploy a redundant MM on a different server. The solution must offer the lowest convergence time and require no human interaction in case of failure.
The servers host other virtual machines and are connected to different switches that implement ACLs to protect them. The organization grants the network consultant access to the servers only, and appoints a network administrator to assist with the deployment.
What must the network administrator do so the network consultant can successfully deploy the solution? (Choose two.)