Loading questions...
Updated
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
A security analyst is tasked with monitoring the network for any unusual authentication activities over the past month. They need to filter the dashboard to view this specific time range.
How should they proceed?
An IT manager is organizing files for upload to ClearPass Guest and wants to ensure they are easily identifiable later. What is the best practice they should follow before uploading the files?
An IT manager needs to ensure that a report generated using the Remote Copy option is automatically saved to a specific file location on the network without logging into Insight.
What must they configure in the administration settings?
When configuring a new custom Operator Profile in ClearPass, an administrator needs to ensure that the system properly assigns this profile to users based on their roles.
What critical step must be taken to meet this need?
An IT administrator attempts to join a ClearPass server to an Active Directory domain. They notice that the system clocks of the ClearPass server and the AD domain are not in sync. The ClearPass server is 10 minutes behind the AD domain.
What will be the likely outcome of this attempt to join the domain?
A company needs to add a new field to an existing form and wants it to appear before a specific field already on the form.
What is the correct sequence of actions to meet this need?
A company’s IT department is tasked with ensuring data replication across multiple ClearPass servers while maintaining redundancy and failover capabilities. They need to perform license management operations for the cluster.
Where should these license management operations be performed to ensure they are properly applied across the cluster?
When managing network access through ClearPass, an administrator notices that client status changes are causing repeated disconnections and re-authentications. The administrator wants to prevent the service from making the same enforcement decision without considering newly gathered information.
What action should the administrator take?
A network administrator is troubleshooting an issue where endpoints are not receiving updated enforcement decisions after a second authentication. What is the most likely configuration change needed?
An IT administrator notices that a client endpoint has failed a health check and wants to send a notification that will not only inform the user but also force the client to re-authenticate.
Which action should the administrator take?
An organization wants to ensure that all devices accessing their network meet specific security criteria. They decide to use ClearPass OnGuard to monitor and enforce compliance. During the deployment, the IT team needs to understand how ClearPass evaluates the security status of clients.
Which aspect of ClearPass OnGuard provides this functionality?
A network administrator needs to revoke a certificate for a lost device to ensure it no longer has network access. They navigate to the Certificate Authorities section in ClearPass Onboard.
What next step should they take to ensure the certificate is properly revoked and the device is blocked?
An IT manager needs to ensure that a user who has lost their smartphone can onboard a new device while blocking access to the old one.
What steps should the IT manager follow to meet this need using ClearPass Onboard?
A company wants to ensure that all BYOD devices undergo a health check before gaining full access to the network. They plan to use ClearPass OnGuard for this purpose.
Given that they have a guest network where devices initially connect to an open guest SSID before full authentication, which agent should they use?
What is the main risk associated with evaluating posture in role mappings instead of enforcement rules?
When configuring the role settings by Mobility Gateway in ClearPass, a network engineer notices that the elements required for the role are reusable.
What is the primary benefit of this reusability feature?
An organization needs to configure a secure 802.1X wired service in ClearPass to manage access on their network. They want to ensure that different device types have different security profiles.
Which feature of ClearPass should they use to achieve this?
A company is deploying new Cisco switches and wants to use SNMP enforcement for VLAN assignments. What requirement must be met for SNMP enforcement to work correctly in this scenario?
An organization wants to enforce role-based access policies across their entire network to ensure that users have appropriate access privileges regardless of their connection point.
How does ClearPass facilitate this requirement?
A network administrator is configuring a corporate network enforcement policy. The policy includes rules for corporate-issued laptops, MDM-enabled tablets, and personal smart devices. However, the administrator notices that some clients are failing all rules due to a lack of profile data.
What should the administrator do to ensure these unprofiled clients can access the profiler collectors and receive a profile using best practices?
A client connects to a network and initially has the attribute ‘IsProfiled=false’. The client is placed in a ‘Limited Access to the Profiler’ role. What sequence of events will occur next to ensure the client gains full access to the network?
An IT administrator is configuring ClearPass to send guest receipts for registrations. They want to ensure that guests receive these receipts through both email and SMS simultaneously.
What steps should the administrator follow to achieve this configuration?
An IT administrator needs to ensure that guest receipts for registrations are sent through both email and SMS simultaneously.
They have already configured the email relay.
What additional step must they take to meet this need?
A company wants to provide downloadable PDF guides for guests accessing their network. The IT team has uploaded the PDFs to the Content Manager. How should they configure these files to ensure guests can access them via the web server?
An IT administrator is setting up a captive portal for a company’s network and needs to ensure that the SSL certificate is compatible with the Aruba Instant device they are using.
Which type of certificate should the administrator install to meet this requirement?