Download Aruba Certified Clearpass Professional v6.2.ACCP-v6.2.Train4Sure.2018-06-24.83q.vcex

Vendor: Aruba
Exam Code: ACCP-v6.2
Exam Name: Aruba Certified Clearpass Professional v6.2
Date: Jun 24, 2018
File Size: 9 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
What database in the Policy Manager contains the device attributes derived by profiling? 
  1. Local Users Repository
  2. Onboard Devices Repository
  3. Endpoints Repository
  4. Guest User Repository
  5. Client Repository
Correct answer: C
Question 2
Refer to the screen capture below:
  
Based on the Endpoint Profiler output shown here, which of the following statements is true?
  1. The devices have been profiled using DHCP fingerprinting.
  2. There are 5 devices profiled in the Computer Device Category.
  3. Apple devices will be profiled in the SmartDevice category.
  4. There is only 1 Microsoft Windows device present in the network.
  5. The linux device with MAC address 000c29fd8945 has not been profiled.
Correct answer: B
Explanation:
Question 3
Which of the following conditions can be used for rule creation of an Enforcement Policy? (Choose 3)
  1. System Time
  2. Clearpass IP address
  3. Posture
  4. Switch VLAN
  5. Connection Protocol
Correct answer: ACE
Question 4
Refer to the screen capture below:
 
 
Based on the Enforcement Policy configuration, if a user with Role Engineer connects to the network and the posture token assigned is Unknown, what 
Enforcement Profile will be applied?
  1. EMPLOYEE_VLAN
  2. Remote Employee ACL
  3. RestrictedACL
  4. Deny Access Profile
  5. HR VLAN
Correct answer: D
Question 5
Refer to the screen capture below:
  
Based on the Enforcement Policy configuration, if a user with Role Remote Worker connects to the network and the posture token assigned is quarantine, what 
Enforcement Profile will be applied?
  1. EMPLOYEE_VLAN 
  2. Remote Employee ACL
  3. RestrictedACL
  4. Deny Access Profile
  5. HR VLAN
Correct answer: C
Question 6
Refer to the screen capture below:
  
Based on the Enforcement Policy configuration, if a user connects to the network using an Apple iphone, what Enforcement Profile is applied?
  1. WIRELESS_CAPTIVE_NETWORK
  2. WIRELESS_HANDHELD_NETWORK
  3. WIRELESS_GUEST_NETWORK
  4. WIRELESS_EMPLOYEE_NETWORK
  5. Deny Access
Correct answer: A
Question 7
Refer to the screen capture below:
  
A user who is tagged with the ClearPass roles of Role_Engineer and developer, but not testqa, connects to the network with a corporate Windows laptop. 
What Enforcement Profile is applied? 
  1. WIRELESS_CAPTIVE_NETWORK
  2. WIRELESS_HANDHELD_NETWORK
  3. WIRELESS_GUEST_NETWORK
  4. WIRELESS_EMPLOYEE_NETWORK
  5. Deny Access 
Correct answer: D
Question 8
Which of the following components of a Policy Service is mandatory?
  1. Enforcement
  2. Posture
  3. Profiler
  4. Role Mapping Policy
  5. Authorization Source
Correct answer: A
Question 9
Which of the following options is the correct order of steps of a Policy Service request? 
1) Clearpass tests the request against Service Rules to select a Policy Service. 
2) Clearpass applies the Enforcement Policy. 
3) Negotiation of the Authentication Method occurs between the NAD and Clearpass. 
4) Clearpass sends the Enforcement Profile attributes to the NAD. 
5) NAD forwards authentication request to Clearpass.
  1. 1, 3, 2, 4, 5
  2. 5, 1, 3, 2, 4
  3. 5, 1, 3, 4, 2
  4. 1, 2, 3, 4, 5
  5. 2, 3, 4, 5, 1 
Correct answer: B
Question 10
Which of the following information is NOT required while building a Policy Service for 802.1X authentication?
  1. Network Access Device used
  2. Authentication Method used
  3. Authentication Source used
  4. Posture Token of the client
  5. Profiling information of the client
Correct answer: D
Question 11
What database in the Policy Manager contains the device attributes derived by profiling? 
  1. Local Users Repository
  2. Onboard Devices Repository
  3. Endpoints Repository
  4. Guest User Repository
  5. Client Repository
Correct answer: C
Question 12
Refer to the screen capture below:
  
Based on the Endpoint Profiler output shown here, which of the following statements is true?
  1. The devices have been profiled using DHCP fingerprinting.
  2. There are 5 devices profiled in the Computer Device Category.
  3. Apple devices will be profiled in the SmartDevice category.
  4. There is only 1 Microsoft Windows device present in the network.
  5. The linux device with MAC address 000c29fd8945 has not been profiled.
Correct answer: B
Explanation:
Question 13
Which of the following conditions can be used for rule creation of an Enforcement Policy? (Choose 3)
  1. System Time
  2. Clearpass IP address
  3. Posture
  4. Switch VLAN
  5. Connection Protocol
Correct answer: ACE
Question 14
Refer to the screen capture below:
 
 
Based on the Enforcement Policy configuration, if a user with Role Engineer connects to the network and the posture token assigned is Unknown, what 
Enforcement Profile will be applied?
  1. EMPLOYEE_VLAN
  2. Remote Employee ACL
  3. RestrictedACL
  4. Deny Access Profile
  5. HR VLAN
Correct answer: D
Question 15
Refer to the screen capture below:
  
Based on the Enforcement Policy configuration, if a user with Role Remote Worker connects to the network and the posture token assigned is quarantine, what 
Enforcement Profile will be applied?
  1. EMPLOYEE_VLAN 
  2. Remote Employee ACL
  3. RestrictedACL
  4. Deny Access Profile
  5. HR VLAN
Correct answer: C
Question 16
Refer to the screen capture below:
  
Based on the Enforcement Policy configuration, if a user connects to the network using an Apple iphone, what Enforcement Profile is applied?
  1. WIRELESS_CAPTIVE_NETWORK
  2. WIRELESS_HANDHELD_NETWORK
  3. WIRELESS_GUEST_NETWORK
  4. WIRELESS_EMPLOYEE_NETWORK
  5. Deny Access
Correct answer: A
Question 17
Refer to the screen capture below:
  
A user who is tagged with the ClearPass roles of Role_Engineer and developer, but not testqa, connects to the network with a corporate Windows laptop. 
What Enforcement Profile is applied? 
  1. WIRELESS_CAPTIVE_NETWORK
  2. WIRELESS_HANDHELD_NETWORK
  3. WIRELESS_GUEST_NETWORK
  4. WIRELESS_EMPLOYEE_NETWORK
  5. Deny Access 
Correct answer: D
Question 18
Which of the following components of a Policy Service is mandatory?
  1. Enforcement
  2. Posture
  3. Profiler
  4. Role Mapping Policy
  5. Authorization Source
Correct answer: A
Question 19
Which of the following options is the correct order of steps of a Policy Service request? 
1) Clearpass tests the request against Service Rules to select a Policy Service. 
2) Clearpass applies the Enforcement Policy. 
3) Negotiation of the Authentication Method occurs between the NAD and Clearpass. 
4) Clearpass sends the Enforcement Profile attributes to the NAD. 
5) NAD forwards authentication request to Clearpass.
  1. 1, 3, 2, 4, 5
  2. 5, 1, 3, 2, 4
  3. 5, 1, 3, 4, 2
  4. 1, 2, 3, 4, 5
  5. 2, 3, 4, 5, 1 
Correct answer: B
Question 20
Which of the following information is NOT required while building a Policy Service for 802.1X authentication?
  1. Network Access Device used
  2. Authentication Method used
  3. Authentication Source used
  4. Posture Token of the client
  5. Profiling information of the client
Correct answer: D
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!