Download Aruba Certified Mobility Professional 6.1.ACMP-6.Lead2Pass.2017-12-18.71q.vcex

Vendor: Aruba
Exam Code: ACMP-6
Exam Name: Aruba Certified Mobility Professional 6.1
Date: Dec 18, 2017
File Size: 823 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
Which dual radio access point models support concurrent operations in the 2.4Ghz band as well as the 5Ghz band? (Choose three)
  1. AP-92
  2. AP-93
  3. AP-105
  4. AP-224
  5. AP-135
Correct answer: CDE
Question 2
By default Centralized licensing messages between master and local controllers are sent ___________________.
  1. In the clear unencrypted since the master and local controllers already share IPSEC tunnels.
  2. Using CPSec
  3. Using IPSec site to site VPN tunnels
  4. Encrypted using GRE
  5. PAPI 
Correct answer: A
Question 3
A evaluation License is valid for a maximum of ________?
  1. 30 Days
  2. 60 Days
  3. 90 Days
  4. 6 Months
  5. 12 Months
Correct answer: C
Question 4
The following licenses have been installed on these controllers:   
  • Master-1: 8 AP licenses 
  • Local-2 : 8 AP licenses 
  • Local-3 : 5 Evaluation AP Licenses 
  • Local-4 : 10 Factory installed AP licenses 
  • Central Licensing is enabled.  
What is the AP Pool capacity on the Central License Server?
  1. 8
  2. 16
  3. 21
  4. 26
  5. 31
Correct answer: C
Question 5
An administrator creates a WLAN with an unmodified default AAA profile. What is the default role the user is placed in?  
  1. default-logon
  2. logon
  3. guest-logon
  4. default-ap
  5. AP-Role
Correct answer: B
Question 6
Which describe "roles" as used on Aruba Mobility Controllers? (Choose two)
  1. Roles are assigned to users.
  2. Roles are applied to interfaces.
  3. Policies are built from roles.
  4. A user can belong to only one role at a time.
  5. Roles are a set of authentication rules
Correct answer: AD
Question 7
Which of the following could be used to set a user's post-authentication role or VLAN association? (Choose two)
  1. AAA default role for authentication method
  2. Server Derivation Rule
  3. Vendor Specific Attributes
  4. AP Derivation Rule
  5. The Global AAA profile
Correct answer: BC
Question 8
ip access-list session anewone user network 10.1.1.0 255.255.255.0 any permit user any any permit host 10.1.1.1 host 10.2.2.2 any deny  
A user sends a frame with the following attributes: 
  • Source IP: 10.1.1.1  
  • Destination IP: 10.2.2.2  
  • Destination Port: 25  
Based on the above Mobility Controller configuration file segment, what will this policy do with the user frame?
  1. The frame is discarded because of the implicit deny all at the end of the policy.
  2. The frame is discarded because of the statement:user host 10.1.1.1 host 10.2.2.2 deny.
  3. The frame is accepted because of the statement:user any any permit.
  4. The frame is accepted because of the statement:user network 10.1.1.0 255.255.255.0 any permit.
  5. This is not a valid policy.
Correct answer: C
Question 9
What is the first role a user is given when a user associates to an open WLAN?
  1. the guest post authentication role
  2. the initial role in the captive portal profile
  3. the role in the server group profile
  4. the initial role in the AAA profile
  5. The initial role in the 802.1x profile
Correct answer: D
Question 10
What are valid methods of blacklisting a device? (Choose three)
  1. Manually
  2. Firewall Rule
  3. Firewall Policy
  4. Authentication Failures
  5. Data Rate Thresholds
Correct answer: ABD
Question 11
Which dual radio access point models support concurrent operations in the 2.4Ghz band as well as the 5Ghz band? (Choose three)
  1. AP-92
  2. AP-93
  3. AP-105
  4. AP-224
  5. AP-135
Correct answer: CDE
Question 12
By default Centralized licensing messages between master and local controllers are sent ___________________.
  1. In the clear unencrypted since the master and local controllers already share IPSEC tunnels.
  2. Using CPSec
  3. Using IPSec site to site VPN tunnels
  4. Encrypted using GRE
  5. PAPI 
Correct answer: A
Question 13
A evaluation License is valid for a maximum of ________?
  1. 30 Days
  2. 60 Days
  3. 90 Days
  4. 6 Months
  5. 12 Months
Correct answer: C
Question 14
The following licenses have been installed on these controllers:   
  • Master-1: 8 AP licenses 
  • Local-2 : 8 AP licenses 
  • Local-3 : 5 Evaluation AP Licenses 
  • Local-4 : 10 Factory installed AP licenses 
  • Central Licensing is enabled.  
What is the AP Pool capacity on the Central License Server?
  1. 8
  2. 16
  3. 21
  4. 26
  5. 31
Correct answer: C
Question 15
An administrator creates a WLAN with an unmodified default AAA profile. What is the default role the user is placed in?  
  1. default-logon
  2. logon
  3. guest-logon
  4. default-ap
  5. AP-Role
Correct answer: B
Question 16
Which describe "roles" as used on Aruba Mobility Controllers? (Choose two)
  1. Roles are assigned to users.
  2. Roles are applied to interfaces.
  3. Policies are built from roles.
  4. A user can belong to only one role at a time.
  5. Roles are a set of authentication rules
Correct answer: AD
Question 17
Which of the following could be used to set a user's post-authentication role or VLAN association? (Choose two)
  1. AAA default role for authentication method
  2. Server Derivation Rule
  3. Vendor Specific Attributes
  4. AP Derivation Rule
  5. The Global AAA profile
Correct answer: BC
Question 18
ip access-list session anewone user network 10.1.1.0 255.255.255.0 any permit user any any permit host 10.1.1.1 host 10.2.2.2 any deny  
A user sends a frame with the following attributes: 
  • Source IP: 10.1.1.1  
  • Destination IP: 10.2.2.2  
  • Destination Port: 25  
Based on the above Mobility Controller configuration file segment, what will this policy do with the user frame?
  1. The frame is discarded because of the implicit deny all at the end of the policy.
  2. The frame is discarded because of the statement:user host 10.1.1.1 host 10.2.2.2 deny.
  3. The frame is accepted because of the statement:user any any permit.
  4. The frame is accepted because of the statement:user network 10.1.1.0 255.255.255.0 any permit.
  5. This is not a valid policy.
Correct answer: C
Question 19
What is the first role a user is given when a user associates to an open WLAN?
  1. the guest post authentication role
  2. the initial role in the captive portal profile
  3. the role in the server group profile
  4. the initial role in the AAA profile
  5. The initial role in the 802.1x profile
Correct answer: D
Question 20
What are valid methods of blacklisting a device? (Choose three)
  1. Manually
  2. Firewall Rule
  3. Firewall Policy
  4. Authentication Failures
  5. Data Rate Thresholds
Correct answer: ABD
Question 21
Which dual radio access point models support concurrent operations in the 2.4Ghz band as well as the 5Ghz band? (Choose three)
  1. AP-92
  2. AP-93
  3. AP-105
  4. AP-224
  5. AP-135
Correct answer: CDE
Question 22
By default Centralized licensing messages between master and local controllers are sent ___________________.
  1. In the clear unencrypted since the master and local controllers already share IPSEC tunnels.
  2. Using CPSec
  3. Using IPSec site to site VPN tunnels
  4. Encrypted using GRE
  5. PAPI 
Correct answer: A
Question 23
A evaluation License is valid for a maximum of ________?
  1. 30 Days
  2. 60 Days
  3. 90 Days
  4. 6 Months
  5. 12 Months
Correct answer: C
Question 24
The following licenses have been installed on these controllers:   
  • Master-1: 8 AP licenses 
  • Local-2 : 8 AP licenses 
  • Local-3 : 5 Evaluation AP Licenses 
  • Local-4 : 10 Factory installed AP licenses 
  • Central Licensing is enabled.  
What is the AP Pool capacity on the Central License Server?
  1. 8
  2. 16
  3. 21
  4. 26
  5. 31
Correct answer: C
Question 25
An administrator creates a WLAN with an unmodified default AAA profile. What is the default role the user is placed in?  
  1. default-logon
  2. logon
  3. guest-logon
  4. default-ap
  5. AP-Role
Correct answer: B
Question 26
Which describe "roles" as used on Aruba Mobility Controllers? (Choose two)
  1. Roles are assigned to users.
  2. Roles are applied to interfaces.
  3. Policies are built from roles.
  4. A user can belong to only one role at a time.
  5. Roles are a set of authentication rules
Correct answer: AD
Question 27
Which of the following could be used to set a user's post-authentication role or VLAN association? (Choose two)
  1. AAA default role for authentication method
  2. Server Derivation Rule
  3. Vendor Specific Attributes
  4. AP Derivation Rule
  5. The Global AAA profile
Correct answer: BC
Question 28
ip access-list session anewone user network 10.1.1.0 255.255.255.0 any permit user any any permit host 10.1.1.1 host 10.2.2.2 any deny  
A user sends a frame with the following attributes: 
  • Source IP: 10.1.1.1  
  • Destination IP: 10.2.2.2  
  • Destination Port: 25  
Based on the above Mobility Controller configuration file segment, what will this policy do with the user frame?
  1. The frame is discarded because of the implicit deny all at the end of the policy.
  2. The frame is discarded because of the statement:user host 10.1.1.1 host 10.2.2.2 deny.
  3. The frame is accepted because of the statement:user any any permit.
  4. The frame is accepted because of the statement:user network 10.1.1.0 255.255.255.0 any permit.
  5. This is not a valid policy.
Correct answer: C
Question 29
What is the first role a user is given when a user associates to an open WLAN?
  1. the guest post authentication role
  2. the initial role in the captive portal profile
  3. the role in the server group profile
  4. the initial role in the AAA profile
  5. The initial role in the 802.1x profile
Correct answer: D
Question 30
What are valid methods of blacklisting a device? (Choose three)
  1. Manually
  2. Firewall Rule
  3. Firewall Policy
  4. Authentication Failures
  5. Data Rate Thresholds
Correct answer: ABD
Question 31
Which dual radio access point models support concurrent operations in the 2.4Ghz band as well as the 5Ghz band? (Choose three)
  1. AP-92
  2. AP-93
  3. AP-105
  4. AP-224
  5. AP-135
Correct answer: CDE
Question 32
By default Centralized licensing messages between master and local controllers are sent ___________________.
  1. In the clear unencrypted since the master and local controllers already share IPSEC tunnels.
  2. Using CPSec
  3. Using IPSec site to site VPN tunnels
  4. Encrypted using GRE
  5. PAPI 
Correct answer: A
Question 33
A evaluation License is valid for a maximum of ________?
  1. 30 Days
  2. 60 Days
  3. 90 Days
  4. 6 Months
  5. 12 Months
Correct answer: C
Question 34
The following licenses have been installed on these controllers:   
  • Master-1: 8 AP licenses 
  • Local-2 : 8 AP licenses 
  • Local-3 : 5 Evaluation AP Licenses 
  • Local-4 : 10 Factory installed AP licenses 
  • Central Licensing is enabled.  
What is the AP Pool capacity on the Central License Server?
  1. 8
  2. 16
  3. 21
  4. 26
  5. 31
Correct answer: C
Question 35
An administrator creates a WLAN with an unmodified default AAA profile. What is the default role the user is placed in?  
  1. default-logon
  2. logon
  3. guest-logon
  4. default-ap
  5. AP-Role
Correct answer: B
Question 36
Which describe "roles" as used on Aruba Mobility Controllers? (Choose two)
  1. Roles are assigned to users.
  2. Roles are applied to interfaces.
  3. Policies are built from roles.
  4. A user can belong to only one role at a time.
  5. Roles are a set of authentication rules
Correct answer: AD
Question 37
Which of the following could be used to set a user's post-authentication role or VLAN association? (Choose two)
  1. AAA default role for authentication method
  2. Server Derivation Rule
  3. Vendor Specific Attributes
  4. AP Derivation Rule
  5. The Global AAA profile
Correct answer: BC
Question 38
ip access-list session anewone user network 10.1.1.0 255.255.255.0 any permit user any any permit host 10.1.1.1 host 10.2.2.2 any deny  
A user sends a frame with the following attributes: 
  • Source IP: 10.1.1.1  
  • Destination IP: 10.2.2.2  
  • Destination Port: 25  
Based on the above Mobility Controller configuration file segment, what will this policy do with the user frame?
  1. The frame is discarded because of the implicit deny all at the end of the policy.
  2. The frame is discarded because of the statement:user host 10.1.1.1 host 10.2.2.2 deny.
  3. The frame is accepted because of the statement:user any any permit.
  4. The frame is accepted because of the statement:user network 10.1.1.0 255.255.255.0 any permit.
  5. This is not a valid policy.
Correct answer: C
Question 39
What is the first role a user is given when a user associates to an open WLAN?
  1. the guest post authentication role
  2. the initial role in the captive portal profile
  3. the role in the server group profile
  4. the initial role in the AAA profile
  5. The initial role in the 802.1x profile
Correct answer: D
Question 40
What are valid methods of blacklisting a device? (Choose three)
  1. Manually
  2. Firewall Rule
  3. Firewall Policy
  4. Authentication Failures
  5. Data Rate Thresholds
Correct answer: ABD
Question 41
Which dual radio access point models support concurrent operations in the 2.4Ghz band as well as the 5Ghz band? (Choose three)
  1. AP-92
  2. AP-93
  3. AP-105
  4. AP-224
  5. AP-135
Correct answer: CDE
Question 42
By default Centralized licensing messages between master and local controllers are sent ___________________.
  1. In the clear unencrypted since the master and local controllers already share IPSEC tunnels.
  2. Using CPSec
  3. Using IPSec site to site VPN tunnels
  4. Encrypted using GRE
  5. PAPI 
Correct answer: A
Question 43
A evaluation License is valid for a maximum of ________?
  1. 30 Days
  2. 60 Days
  3. 90 Days
  4. 6 Months
  5. 12 Months
Correct answer: C
Question 44
The following licenses have been installed on these controllers:   
  • Master-1: 8 AP licenses 
  • Local-2 : 8 AP licenses 
  • Local-3 : 5 Evaluation AP Licenses 
  • Local-4 : 10 Factory installed AP licenses 
  • Central Licensing is enabled.  
What is the AP Pool capacity on the Central License Server?
  1. 8
  2. 16
  3. 21
  4. 26
  5. 31
Correct answer: C
Question 45
An administrator creates a WLAN with an unmodified default AAA profile. What is the default role the user is placed in?  
  1. default-logon
  2. logon
  3. guest-logon
  4. default-ap
  5. AP-Role
Correct answer: B
Question 46
Which describe "roles" as used on Aruba Mobility Controllers? (Choose two)
  1. Roles are assigned to users.
  2. Roles are applied to interfaces.
  3. Policies are built from roles.
  4. A user can belong to only one role at a time.
  5. Roles are a set of authentication rules
Correct answer: AD
Question 47
Which of the following could be used to set a user's post-authentication role or VLAN association? (Choose two)
  1. AAA default role for authentication method
  2. Server Derivation Rule
  3. Vendor Specific Attributes
  4. AP Derivation Rule
  5. The Global AAA profile
Correct answer: BC
Question 48
ip access-list session anewone user network 10.1.1.0 255.255.255.0 any permit user any any permit host 10.1.1.1 host 10.2.2.2 any deny  
A user sends a frame with the following attributes: 
  • Source IP: 10.1.1.1  
  • Destination IP: 10.2.2.2  
  • Destination Port: 25  
Based on the above Mobility Controller configuration file segment, what will this policy do with the user frame?
  1. The frame is discarded because of the implicit deny all at the end of the policy.
  2. The frame is discarded because of the statement:user host 10.1.1.1 host 10.2.2.2 deny.
  3. The frame is accepted because of the statement:user any any permit.
  4. The frame is accepted because of the statement:user network 10.1.1.0 255.255.255.0 any permit.
  5. This is not a valid policy.
Correct answer: C
Question 49
What is the first role a user is given when a user associates to an open WLAN?
  1. the guest post authentication role
  2. the initial role in the captive portal profile
  3. the role in the server group profile
  4. the initial role in the AAA profile
  5. The initial role in the 802.1x profile
Correct answer: D
Question 50
What are valid methods of blacklisting a device? (Choose three)
  1. Manually
  2. Firewall Rule
  3. Firewall Policy
  4. Authentication Failures
  5. Data Rate Thresholds
Correct answer: ABD
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!