Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > HP > Aruba Certified Professional - Campus Access > HPE7-A01

HPE7-A01 Aruba Certified Campus Access Professional Exam Question and Answers

Question # 4

Match each PoE power class to Its corresponding 802.3 standard. (Options may he used more than once or not at all)

Full Access
Question # 5

What are two advantages of splitting a larger OSPF area into a number of smaller areas? (Select two )

A.

It extends the LSDB

B.

It increases stability

C.

it simplifies the configuration.

D.

It reduces processing overhead.

E.

It reduces the total number of LSAs

Full Access
Question # 6

Which Aruba AP mode is sending captured RF data to Aruba Central for waterfall plot?

A.

Hybrid Mode

B.

Air Monitor

C.

Spectrum Monitor

D.

Dual Mode

Full Access
Question # 7

How do you allow a new VLAN 100 between VSX pair inter-switch-link 256 for port 1/45 and 2/45?

A.

vlan trunk allowed 100 for ports 1/45 and 1/46

B.

vlan trunk add 100 in LAG256

C.

vlan trunk allowed 100 in LAG256

D.

vlan trunk add 100 in MLAG256

Full Access
Question # 8

You need to have different routing-table requirements with Aruba CX 6300 VSF configuration

Assuming the correct layer-2 VLAN already exists how would you create a new OSPF configuration for a separate routing table?

A.

Create a new OSPF area, and attach VRF name.

B.

Create a new OSPF process ID with vrf name.

C.

Attach a new OSFP process ID with a custom routing table

D.

Attach OSPF process ID in the VRF configuration.

Full Access
Question # 9

A large retail client is looking to generate a rich set of contextual data based on the location information of wireless clients in their stores Which standard uses Round Trip Time (RTT) and Fine Time Measurements (FTM) to calculate the distance a client is from an AP?

A.

802.11ah

B.

802.11mc

C.

802.11be

D.

802.11V

Full Access
Question # 10

Which statements are true regarding a VXLAN implementation on Aruba Switches? (Select two.)

A.

MTU size must be increased beyond the default

B.

VNIs encapsulate and decapsulate VXLAN traffic

C.

VTEPs encapsulate and decapsulate VXLAN traffic

D.

They are only available for datacenter switches (CX 8k, 9k,10k)

E.

All Aruba CX switches support VXLAN.

Full Access
Question # 11

You are proposing new CX 8360 VSX switches to replace a customer's existing core switches. The customer is concerned about the possibility of a split-brain scenario between the VSX pair.

How is the VSX pair affected when the ISL is down and keepalive is up?

A.

The VSX pair is out-of-sync.

B.

The VSX pair nodes are still forwarding traffic.

C.

The VSX LAGs are in a degraded state.

D.

The VSX pair is not at risk.

Full Access
Question # 12

A company recently upgraded its campus switching infrastructure with Aruba 6300 CX switches. They have implemented 802.1X authentication on edge ports where laptop and loT devices typically connect An administrator has noticed that for PoE devices the pons are delivering the maximum wattage instead of what the device actually needs Upon connecting the loT devices, the devices request their specific required wattage through information exchange

A.

Concerned about this waste of electricity, what should the administrator implement to solve this problem?

B.

Enable AAA authentication to exempt LLDP and/or CDP information

C.

Globally enable the QoS trust setting for LLDP and/or CDP

D.

Create device profiles with the correct power definitions.

E.

implement a classifier policy with the correct power definitions.

Full Access
Question # 13

You are deploying Aruba CX 6300's with the customers requirement to only allow one (1) VoIP phone and one (1) device.

The following local role gets assigned to the phone

port-access rote VoIP device-traffic-class voice

What set of commands best fits this requirement?

A.

interface 1/1/1

aaa authentication port-access client-limit 2

aaa authentication port-access auth-mode client-mode

B.

interface 1/1/1

aaa authentication port-access auth-mode multi-domain

C.

interface 1/1/1

aaa authentication port-access client-limit multi-domain 2 aaa authentication port-access auth-mode multi-domain

D.

interface 1/1/1

aaa authentication port-access client-limit 1

aaa authentication port-access auth-mode device-mode

Full Access
Question # 14

A customer wants to enable wired authentication across all their CX switches One of the requirements is that the switch must be able to authenticate a single computer connected through a VoIP phone.

Which feature should be enabled to support this requirement?

A.

Multi-Domain Authentication

B.

Device-Based Mode

C.

MAC Authentication

D.

Multi-Auth Mode

Full Access
Question # 15

A customer is looking Tor a wireless authentication solution for all of their loT devices that meet the following requirements

- The wireless traffic between the IoT devices and the Access Points must be encrypted

- Unique passphrase per device

- Use fingerprint information to perform role-based access

Which solutions will address the customer's requirements? (Select two.)

A.

MPSK and an internal RADIUS server

B.

MPSK Local with MAC Authentication

C.

ClearPass Policy Manager

D.

MPSK Local with EAP-TLS

E.

Local User Derivation Rules

Full Access
Question # 16

Your manufacturing client is deploying two hundred wireless IP cameras and fifty headless scanners in their warehouse. These new devices do not support 802.1X authentication.

How can HPE Aruba enhance security for these new IP cameras in this environment?

A.

Use MPSK Local to automatically provide unique pre-shared Keys for devices.

B.

Aruba ClearPass performs the 802.1X authentication and installs a certificate.

C.

MPSK provides for each device in the WLAN to have its own unique pre-shared Key.

D.

MPSK Local will allow the cameras to share a rey and the scanners to share a different

Full Access
Question # 17

What is one advantage of using OCSP vs CRLs for certificate validation?

A.

reduces latency between the time a certificate is revoked and validation reflects this status

B.

less complex to implement

C.

higher availability for certificate validation

D.

supports longer certificate validity periods

Full Access
Question # 18

How is Dynamic Multicast Optimization (DMO) implemented in an HPE Aruba wireless network?

A.

DMO is configured individually tor each SSID in use in the network.

B.

The AP uses OOS to provide equal air time for multicast traffic,

C.

DMO is configured globally for each SSID in use in the network.

D.

The controller converts multicast streams into unicast streams.

Full Access
Question # 19

You are setting up a customer's 15 headless loT devices that do not support 802.1X. What should you use?

A.

Multiple Pre-Shared Keys (MPSK) Local

B.

Clearpass with WPA3-PSK

C.

Clearpass with WPA3-AES

D.

Multiple Pre-Shared Keys (MPSK) with WPA3-AES

Full Access
Question # 20

A customer just upgraded aggregation layer switches and noticed traffic dropping for 120 seconds after the aggregation layer came online again. What is the best way to avoid having this traffic dropped given the topology below?

A.

Configure the linkup delay timer to 240 seconds to double the amount of lime for the initial phase to sync

B.

Configure the linkup delay timer to exclude LAGS 101 and 102, which will allow time for routing adjacencies to form and to learn upstream routes

C.

Configure the linkup delay timer to include LAGs 101 and 102, which will allow time for routing adjacencies lo form and to learn upstream routes

D.

Configure the linkup delay timer to 120 seconds, which will allow the right amount of time for the initial phase to sync

Full Access
Question # 21

A customer is using a legacy application that communicates at layer-2. The customer would like to keep this application working across the campus which is connected via layer-3. The legacy devices are connected to Aruba CX 6300 switches throughout the campus.

Which technology minimizes flooding so the legacy application can work efficiently?

A.

Generic Routing Encapsulation (GRE)

B.

EVPN-VXLAN

C.

Ethernet over IP (EolP)

D.

Static VXLAN

Full Access
Question # 22

Which statements are true about VSX LAG? (Select two.)

A.

The total number of configured links may not exceed 8 for the pair or 4 per switch

B.

Outgoing traffic is switched to a port based on a hashing algorithm which may be either switch in the pair

C.

LAG traffic is passed over VSX ISL links only while upgrading firmware on the switch pair

D.

Outgoing traffic is preferentially switched to local members of the LAG.

E.

Up to 255 VSX lags can be configured on all 83xx and 84xx model switches.

Full Access
Question # 23

You must ensure the HPEAruba network you are configuring for a client is capable of plug-and-play provisioning of access points. What enables this capability?

A.

UCC Service

B.

LLDP-MED

C.

SRTP

D.

CSMA

Full Access
Question # 24

You are working on a network where the customer has a dedicated router with redundant Internet connections Tor outbound high-importance real-time audio streams from their datacenter All of this traffic.

• originates from a single subnet

• uses a unique range of UDP ports

• is required to be routed to the dedicated router

All other traffic should route normally The SVI for the subnet containing the servers originating the traffic is located on the core routing switch in the datacenter What should be configured?

A.

Configure a new OSPF area including both the core routing switch and the dedicated router

B.

Configure a BGP link between the core routing switch and the dedicated router and route filtering.

C.

Configure Policy Based Routing (PBR) on the core routing switch for the VRF with the servers’ SVI

D.

Configure a dedicated VRF on the core routing switch and make the dedicated router the default route.

Full Access
Question # 25

With the Aruba CX 6200 24G switch with uplinks or 1/1/25 and 1/1/26, how do you protect client ports from forming layer-2 loops?

A.

int 1/1/1-1/1/24, loop-protect

B.

int 1/1/1-1/1/28. loop-protect

C.

int 1/1/1-1/1/28. loop-guard

D.

int 1/1/1-1/1/24. loop-guard

Full Access
Question # 26

Your manufacturing client is having installers deploy seventy headless scanners and fifty IP cameras in their warehouse These new devices do not support 802 1X authentication.

How can HPE Aruba reduce the IT administration overhead associated with this deployment while maintaining a secure environment using MPSK?

A.

Have the installers generate keys with ClearPass Self Service Registration.

B.

Have the MPSK gateway derive the unique pre-shared keys based on the MAC OUI.

C.

Use MPSK Local to automatically provide unique pre-shared keys for devices.

D.

MPSK Local will allow the cameras to share a key and the scanners to share a different key

Full Access
Question # 27

What is the order of operations tor Key Management service for a wireless client roaming from AP1 to AP2?

Full Access
Question # 28

Which statements regarding 0SPFv2 route redistribution are true for Aruba OS CX switches? (Select two.)

A.

The "redistribute connected" command will redistribute all connected routes for the switch including local loopback addresses

B.

The "redistribute ospf" command will redistribute routes from all OSPF V2 and V3 processes

C.

The "redistribute static route-map connected-routes" command will redistribute all static routes without a matching deny in the route map "connected-routes".

D.

The "redistribute connected" command will redistribute all connected routes for the switch except local loopback addresses.

E.

The "redistribute static route-map connected-routes" command will redistribute all static routes with a matching permit in the route map "connected-routes-

Full Access
Question # 29

What is the best practice for handling voice traffic with dynamic segmentation on AOS-CX switches?

A.

Switch authentication and local forwarding of the voice traffic

B.

Switch authentication and user-based tunneling of the voice traffic.

C.

Central authentication and port-based tunneling of the voice traffic.

D.

Controller authentication and port-based tunneling of all traffic

Full Access
Question # 30

For the Aruba CX 6400 switch, what does virtual output queueing (VOQ) implement that is different from most typical campus switches?

A.

large ingress packet buffers

B.

large egress packet buffers

C.

per port ASICs

D.

VSX

Full Access
Question # 31

Your customer is having issues with Wi-Fi 6 clients staying connected to poor-performing APs when a higher throughput APs are closer. Which technology should you implement?

A.

Clearpass

B.

ClientMatch

C.

Airmatch

D.

ARM

Full Access
Question # 32

With the Aruba CX 6000 24G switch with uplinks of 1/1/25 and what does the switch do when a client port detects a loop and the do-not-disabie parameter is used?

A.

Port status will be validated once status is cleared

B.

An event log message is created.

C.

The network analytics engine is triggered.

D.

Port status led blinks in amber with 100hz.

Full Access
Question # 33

What steps are part of the Key Management workflow when a wireless device is roaming from AP1 to AP2? (Select two.)

A.

AP1 will cache the client's information and send it to the Key Management service

B.

The Key Management service receives from AirMatch a list of all AP2's neighbors

C.

The Key Management service receives a list of all AP1 s neighbors from AirMatch.

D.

The Key Management service then generates R1 keys for AP2's neighbors.

E.

A client associates and authenticates with the AP2 after roaming from AP1

Full Access
Question # 34

A customer wants to provide wired security as close to the source as possible The wired security must meet the following requirements:

-allow ping from the IT management VLAN to the user VLAN

-deny ping sourcing from the user VLAN to the IT management VLAN

The customer is using Aruba CX 6300s

What is the correct way to implement these requirements?

A.

Apply an outbound ACL on the user VLAN allowing temp echo-reply traffic toward the IT management VLAN

B.

Apply an inbound ACL on the user VLAN allowing icmp echo-reply traffic toward the IT management VLAN

C.

Apply an inbound ACL on the user VLAN denying icmp echo traffic toward the IT management VLAN

D.

Apply an outbound ACL on the user VLAN denying icmp echo traffic toward the IT management VLAN

Full Access
Question # 35

Your customer currently has Iwo (2) 5406 modular switches with MSTP configured as their core switches. You are proposing a new solution. What would you explain regarding the Aruba CX VSX switch pair when the Primary VSX node is replaced and the system MAC is replaced?

A.

VSX will select the MAC address from a node that is the lower ID.

B.

Configure vMAC on the Primary VSX node under VSX to retain MAC after hardware replacement.

C.

VSX will select the MAC address from a node that is a higher ID.

D.

During the initial VSX configuration, the system-mac is assigned with a fixed MAC based on VSX ID.

Full Access
Question # 36

With Aruba CX 6300. how do you configure ip address 10 10 10 1 for the interface in default state for interface 1/1/1?

A.

int 1/1/1. switching, ip address 10 10 10 1/24

B.

int 1/1/1. no switching, ip address 10 10 10.1/24

C.

int 1/1/1. ip address 10.10.10.1/24

D.

int 1/1/1. routing, ip address 10.10.10 1/24

Full Access
Question # 37

What is a primary benefit of BSS coloring?

A.

BSS color tags improve performance by allowing clients on the same channel to share airtime.

B.

BSS color tags are applied to client devices and can reduce the threshold for interference

C.

BSS color tags are applied to Wi-Fi channels and can reduce the threshold for interference

D.

BSS color tags improve security by identifying rogue APs and removing them from the network.

Full Access
Question # 38

You are troubleshooting an issue with a pair of Aruba CX 8360 switches configured with VSX Each switch has multiple VRFs. You need to find the IP address of a particular client device with a known MAC address You run the "show arp" command on the primary switch in the pair but do not find a matching entry for the client MAC address.

The client device is connected to an Aruba CX 6100 switch by VSX LAG.

Which action can be used to find the IP address successfully?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 39

Which standard supported by some Aruba APs can enable a customer to accurately locate wireless client devices within a few meters?

A.

802.11mc

B.

802.11W

C.

802.11k

D.

802.11r

Full Access
Question # 40

You are helping an onsite network technician bring up an Aruba 9004 gateway with ZTP for a branch office The technician was to plug in any port for the ZTP process to start Thirty minutes after the gateway was plugged in new users started to complain they were no longer able to get to the internet. One user who reported the issue stated their IP address is 172.16 0.81 However, the branch office network is supposed to be on 10.231 81.0/24.

What should the technician do to alleviate the issue and get the ZTP process started correctly?

A.

Turn off the DHCP scope on the gateway, and set DNS correctly on the gateway to reach Aruba Activate

B.

Move the cable on the gateway from port G0/0V1 tc port G0 0.0

C.

Move the cable on the gateway to G0/0/1. and add the device's MAC and Serial number in Central

D.

Factory default and reboot the gateway to restart the process.

Full Access
Question # 41

you need to have different routing-table requirements With Aruba CX 6300 VSF configuration.

Assuming the correct layer-2 VLAN already exists, how would you create a new SVI for a separate routing table?

A.

create a new VLAN, and attach the VRF to it.

B.

Create a new routing table, and attach VLANS to it

C.

Create a new SVI and use attach command.

D.

Create a new VLAN. and attach the routing table to it

Full Access