Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

HPE6-A68 Questions and Answers

Question # 6

Refer to the exhibit.

What can be concluded from the Access Tracker output shown?

A.

The client used incorrect credentials to authenticate to the network.

B.

ClearPass does not have a service enabled for MAC authentication.

C.

The client MAC address is not present in the Endpoints table in the CrearPass database.

D.

The RADIUS client on the Windows server failed to categorize the service correctly.

E.

The client wireless profile is incorrectly setup.

Full Access
Question # 7

Which statement is true? (Choose two.)

A.

Mobile device Management is the result of Onboarding.

B.

Third party Mobile Device Management solutions can be integrated with ClearPass.

C.

Mobile Device Management is the authentication that happens before Onboarding.

D.

Mobile Device Management is an application container that is used to provision work applications.

E.

Mobile Device Management is used to control device functions post-Onboarding.

Full Access
Question # 8

When a third party Mobile Device Management server is integrated with ClearPass, where is the endpoint information from the MDM server stored in ClearPass?

A.

Endpoints repository

B.

Onboard Device repository

C.

MDM repository

D.

Guest User repository

E.

Local User repository

Full Access
Question # 9

An administrator enabled the Pre-auth check for their guest self-registration.

At what stage in the registration process in this check performed?

A.

after the user clicks the login button and after the NAD sends an authentication request

B.

after the user self-registers but before the user logs in

C.

after the user clicks the login button but before the NAD sends an authentication request

D.

when a user is re-authenticating to the network

E.

before the user self-registers

Full Access
Question # 10

What is the purpose of RADIUS CoA (RFC 3576)?

A.

to force the client to re-authenticate upon roaming to a new Controller

B.

to apply firewall policies based on authentication credentials

C.

to validate a host MAC address against a whitelist or a blacklist

D.

to authenticate users or devices before granting them access to a network

E.

to transmit messages to the NAD/NAS to modify a user’s session status

Full Access
Question # 11

A university wants to deploy ClearPass with the Guest module. The university has two types that need to use web login authentication. The first type of users are students whose accounts are in an Active Directory server. The second type of users are friends of students who need to self-register to access the network.

How should the service be set up in the Policy Manager for this network?

A.

Guest User Repository and Active Directory server both as authentication sources

B.

Active Directory server as the authentication source, and Guest User Repository as the authorization source

C.

Guest User Repository as the authentication source, and Guest User Repository and Active Directory server as authorization sources

D.

Either the Guest User Repository or Active Directory server should be the single authentication source

E.

Guest User Repository as the authentication source and the Active Directory server as the authorization source

Full Access
Question # 12

Refer to the exhibit.

Which statement accurately reflects the status of the Policy Simulation test figure shown?

A.

The test verifies that a client with username test1 can authenticate using EAP-PEAP.

B.

Role mapping simulation verifies if the remote lab AD has the ClearPass server certificate.

C.

Role mapping simulation verifies that the client certificate is valid during EAP-TLS authentication.

D.

The simulation test result shows the firewall roles assigned to the client by the Aruba Controller.

E.

The roles assigned in the results tab are based on rules matched in the AD Role Mapping Policy.

Full Access
Question # 13

Refer to the exhibit.

An administrator logs in to the Guest module in ClearPass and ‘Manage Accounts’ displays as shown.

When a user with username donald@disney.com attempts to access the Web Login page, what will be the outcome?

A.

The user will be able to log in and authenticate successfully but will then be immediate disconnected.

B.

The user will be able to log in for the next 4.9. days, but then will no longer be able to log in.

C.

The user will not be able to log in and authenticate.

D.

The user will be able to log in and authenticate successfully, but will then get a quarantine role.

E.

The user will not be able to access the Web Login page.

Full Access
Question # 14

A customer wants to implement Virtual IP redundancy, such that in case of a ClearPass server outage, 802.1x authentications will not be interrupted. The administrator has enabled a single Virtual IP address on two ClearPass servers.

Which statements accurately describe next steps? (Select two.)

A.

The NAD should be configured with the primary node IP address for RADIUS authentication on the 802.1x network.

B.

A new Virtual IP address should be created for each NAD.

C.

Both the primary and secondary nodes will respond to authentication requests sent to the Virtual IP address when the primary node is active.

D.

The primary node will respond to authentication requests sent to the Virtual IP address when the primary node is active.

E.

The NAD should be configured with the Virtual IP address for RADIUS authentications on the 802.1x network.

Full Access
Question # 15

Refer to the exhibit.

Based on the configuration of a Windows 802.1X supplicant shown, what will be the outcome of selecting ‘Validate server certificate’?

A.

The server and client will perform an HTTPS SSL certificate exchange.

B.

The client will verify the server certificate against a trusted CA.

C.

The client will send its private key to the server for verification.

D.

The server will send its private key to the client for verification.

E.

The client will send its certificate to the server for verification.

Full Access
Question # 16

Which use cases will require a ClearPass Guest application license? (Select two.)

A.

Guest device fingerprinting

B.

Guest endpoint health assessment

C.

Sponsor based guest user access

D.

Guest user self-registration for access

E.

Guest personal device onboarding

Full Access
Question # 17

Refer to the exhibit.

When configuring a Web Login Page in ClearPass Guest, the information shown is displayed.

What is the page name field used for?

A.

for forming the Web Login Page URL

B.

for Administrators to access the PHP page, but not guests

C.

for Administrators to reference the page only

D.

for forming the Web Login Page URL where Administrators add guest users

E.

for informing the Web Login Page URL and the page name that guests must configure on their laptop wireless supplicant.

Full Access