Summer Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 28522818

Home > HP > Aruba Certified ClearPass Associate (ACCA) V6.7 > HPE6-A82

HPE6-A82 Aruba Certified ClearPass Associate Exam Question and Answers

Question # 4

Refer to the Endpoint in the screenshot.

What are possible ways that it was profiled? (Select two)

A.

Cisco Device Sensor

B.

Exchange Plugging agent

C.

3rd part MDM

D.

DNS fingerprinting

E.

NAD ARP listening handler

Full Access
Question # 5

Which statement is true about OnGuard? (Select two.)

A.

It is used to identify and remove any malware/viruses

B.

It is used to ensure that Antivirus/Antispyware programs are running

C.

It supports Doth Windows and Mac OS X clients

D.

It only supports 802 1X authentication

Full Access
Question # 6

What are "Known" endpoints in ClearPass?

A.

These are endpoints whose beacons have been detected but have never completed authentication

B.

The label "Known" indicates rogue endpoints labeled as "friendly" or "ignore"

C.

"Known" endpoints have be fingerprinted to determine their operating system and manufacturer.

D.

"Known" endpoints can be authenticated based on MAC address to bypass the captive portal login.

Full Access
Question # 7

Refer to the exhibit.

What is true regarding leaving the indicated option "Use cached Roles and Posture attributes from previous sessions" unchecked?

A.

The service will make the enforcement decision based upon the updated Posture regardless of caching

B.

A posture change applied to an endpoint is going to be lost each time the client re-authenticates

C.

Posturing win no longer be evaluated in determining the enforcement policy for current or future sessions.

D.

Cached posture results are no longer stored by ClearPass but instead are saved to the endpoint of the client.

Full Access
Question # 8

A customer is setting up Guest access with ClearPass. They are considering using 802.1X for both the Employee network and the Guest network. What are two issues the customer may encounter when deploying 802.1X with the Guest network? (Select two)

A.

the lack of encryption during the authentication process

B.

ClearPass win not be able to enforce individual Access Control policies.

C.

the high level of complexity for users to join the guest network

D.

Guests will not be able to be uniquely identified.

E.

difficult to maintain in an environment with a large number of transient guest users

Full Access
Question # 9

Which Authorization Source supports device profile enforcement?

A.

OnGuard Repository

B.

Endpoints Repository

C.

Guest User Repository

D.

Local User Repository

Full Access