Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

HPE7-A01 Questions and Answers

Question # 6

A customer is using stacked Aruba CX 6200 and CX 6300 switches for access and a VSX pair of Aruba CX 8325 as a collapsed core 802 1X is implemented for authentication. Due to the lack of cabling, some unmanaged switches are still in use Sometimes devices behind these switches cause network outages The switch should send a warning to the helpdesk when the problem occurs You have been asked to implement an effective solution to the problem

What is the solution for this?

A.

Configure spanning tree on the Aruba CX 8325 switches Set the trap-option

B.

Configure loop protection on all edge ports of the Aruba CX 6200 and CX 6300 switches No trap option is needed

C.

Configure loop protection on all edge ports of the Aruba CX 6200 and CX 6300 switches Set up the trap-option

D.

Configure spanning tree on the Aruba CX 6200 and CX 6300 switches No trap option is needed

Full Access
Question # 7

AppRF 2.0 allows you to:

A.

configure ACL and bandwidth control for applications

B.

classify web content based on reputation

C.

customize application signatures

D.

monitor applications and radio frequencies

Full Access
Question # 8

A large retail client is looking to generate a rich set of contextual data based on the location information of wireless clients in their stores Which standard uses Round Trip Time (RTT) and Fine Time Measurements (FTM) to calculate the distance a client is from an AP?

A.

802.11ah

B.

802.11mc

C.

802.11be

D.

802.11V

Full Access
Question # 9

How is Dynamic Multicast Optimization (DMO) implemented in an HPE Aruba wireless network?

A.

DMO is configured individually tor each SSID in use in the network.

B.

The AP uses OOS to provide equal air time for multicast traffic,

C.

DMO is configured globally for each SSID in use in the network.

D.

The controller converts multicast streams into unicast streams.

Full Access
Question # 10

Which statements regarding 0SPFv2 route redistribution are true for Aruba OS CX switches? (Select two.)

A.

The "redistribute connected" command will redistribute all connected routes for the switch including local loopback addresses

B.

The "redistribute ospf" command will redistribute routes from all OSPF V2 and V3 processes

C.

The "redistribute static route-map connected-routes" command will redistribute all static routes without a matching deny in the route map "connected-routes".

D.

The "redistribute connected" command will redistribute all connected routes for the switch except local loopback addresses.

E.

The "redistribute static route-map connected-routes" command will redistribute all static routes with a matching permit in the route map "connected-routes-

Full Access
Question # 11

A customer wants to enable wired authentication across all their CX switches One of the requirements is that the switch must be able to authenticate a single computer connected through a VoIP phone.

Which feature should be enabled to support this requirement?

A.

Multi-Domain Authentication

B.

Device-Based Mode

C.

MAC Authentication

D.

Multi-Auth Mode

Full Access
Question # 12

What is an Aruba-recommended best practice for hardening that only applies to Aruba CX 6300 series switches with dedicated management ports?

A.

Implement a control plane ACL to limit access to approved IPs and/or subnets

B.

Manually enable Enhanced Security Mode from a console session.

C.

Disable all management services on the default VRF.

D.

Create a dedicated management VRF, and assign the management port to it.

Full Access
Question # 13

A customer has a large number of food-producing machines

• All machines are connected via Aruba CX6200 switches in VLANs 100.110. and 120

• Several external technicians are maintaining this special equipment

What are the correct commands to ensure that no rogue DHCP server will impact the network?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 14

A customer wants to deploy a Gateway and take advantage of all the SD-WAN features. Which persona role option should be selected?

A.

ArubaOS 10 Branch

B.

ArubaOS 10 VPN Concentrator

C.

ArubaOS 10 Wireless

D.

ArubaOS 10 Mobility

Full Access
Question # 15

The customer needs a network hardware refresh to replace an aging Aruba 5406R core switch pair using spanning tree configuration with Aruba CX 8360-32YC switches What is the benefit of VSX clustering with the new solution?

A.

stacked data-plane

B.

faster MSTP converge processing

C.

dual Aruba AP LAN port connectivity for PoE redundancy

D.

dual control plane provides better resiliency

Full Access
Question # 16

What is one advantage of using OCSP vs CRLs for certificate validation?

A.

reduces latency between the time a certificate is revoked and validation reflects this status

B.

less complex to implement

C.

higher availability for certificate validation

D.

supports longer certificate validity periods

Full Access
Question # 17

What is true regarding 802.11k?

A.

It extends radio measurements to define mechanisms for wireless network management of stations

B.

It reduces roaming delay by pre-authenticating clients with multiple target APs before a client roams to an AP

C.

It provides mechanisms for APs and clients to dynamically measure the available radio resources.

D.

It considers several metrics before it determines if a client should be steered to the 5GHz band, including client RSSI

Full Access
Question # 18

A system engineer needs to preconfigure several Aruba CX 6300 switches that will be sent to a remote office An untrained local field technician will do the rollout of the switches and the mounting of several AP-515s and AP-575S. Cables running to theAPs are not labeled.

The VLANs are already preconfigured to VLAN 100 (mgmt), VLAN 200 (clients), and VLAN 300 (guests)

What is the correct configuration to ensure that APs will work properly?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 19

What is a primary benefit of BSS coloring?

A.

BSS color tags improve performance by allowing clients on the same channel to share airtime.

B.

BSS color tags are applied to client devices and can reduce the threshold for interference

C.

BSS color tags are applied to Wi-Fi channels and can reduce the threshold for interference

D.

BSS color tags improve security by identifying rogue APs and removing them from the network.

Full Access
Question # 20

Your customer is having issues with Wi-Fi 6 clients staying connected to poor-performing APs when a higher throughput APs are closer. Which technology should you implement?

A.

Clearpass

B.

ClientMatch

C.

Airmatch

D.

ARM

Full Access
Question # 21

You are doing tests in your lab and with the following equipment specifications:

• AP1 has a radio that generates a 20 dBm signal

• AP2 has a radio that generates a 8 dBm signal

• AP1 has an antenna with a gain of 7 dBI.

• AP2 has an antenna with a gain of 12 dBI.

• The antenna cable for AP1 has a 3 dB loss

• The antenna cable forAP2 has a 3 OB loss.

What would be the calculated Equivalent Isotropic Radiated Power (EIRP) for AP1?

A.

2dBm

B.

8 dBm

C.

22 dBm

D.

24 dBm

Full Access
Question # 22

A customer is looking Tor a wireless authentication solution for all of their loT devices that meet the following requirements

- The wireless traffic between the IoT devices and the Access Points must be encrypted

- Unique passphrase per device

- Use fingerprint information to perform role-based access

Which solutions will address the customer's requirements? (Select two.)

A.

MPSK and an internal RADIUS server

B.

MPSK Local with MAC Authentication

C.

ClearPass Policy Manager

D.

MPSK Local with EAP-TLS

E.

Local User Derivation Rules

Full Access
Question # 23

You are setting up a customer's 15 headless loT devices that do not support 802.1X. What should you use?

A.

Multiple Pre-Shared Keys (MPSK) Local

B.

Clearpass with WPA3-PSK

C.

Clearpass with WPA3-AES

D.

Multiple Pre-Shared Keys (MPSK) with WPA3-AES

Full Access
Question # 24

Which component is used by the Aruba Network Analytics Engine (NAE)?

A.

JSON-based scripts

B.

Lisp-based agents

C.

Ruby-based scripts

D.

Current State Database

Full Access
Question # 25

A company recently deployed new Aruba Access Points at different branch offices Wireless 802.1X authentication will be against a RADIUS server in the cloud. The security team is concerned that the traffic between the AP and the RADIUS server will be exposed.

What is the appropriate solution for this scenario?

A.

Enable EAP-TLS on all wireless devices

B.

Configure RadSec on the AP and Aruba Central.

C.

Enable EAP-TTLS on all wireless devices.

D.

Configure RadSec on the AP and the RADIUS server

Full Access
Question # 26

You are are doing tests in your lab and with the following equipment specifications:

• AP1 has a radio that generates a 16 dBm signal.

• AP2 has a radio that generates a 13 dBm signal.

• AP1 has an antenna with a gain of 8 dBi.

• AP2 has an antenna with a gain of 12 dBi. The antenna cable for AP1 has a 4 dB loss. The antenna cable for AP2 has a 3 dB loss.

What would be the calculated Equivalent Isotropic Radiated Power (EIRP) for AP1?

A.

-9 dBm

B.

20 dBm

C.

40 dBm

D.

15 dBm

Full Access
Question # 27

Which standard supported by some Aruba APs can enable a customer to accurately locate wireless client devices within a few meters?

A.

802.11mc

B.

802.11W

C.

802.11k

D.

802.11r

Full Access
Question # 28

Match the appropriate QoS concept with its definition. (Options may be used more than once or not at all.)

Full Access
Question # 29

you need to have different routing-table requirements With Aruba CX 6300 VSF configuration.

Assuming the correct layer-2 VLAN already exists, how would you create a new SVI for a separate routing table?

A.

create a new VLAN, and attach the VRF to it.

B.

Create a new routing table, and attach VLANS to it

C.

Create a new SVI and use attach command.

D.

Create a new VLAN. and attach the routing table to it

Full Access
Question # 30

Your manufacturing client is deploying twenty headless scanners in their warehouse. These new devices do not support 802.1X authentication.

How does the gateway determine the device's role and VLAN derivation-rules when using MPSK Local?

A.

From the Type-Length-Value based on the Aruba-MPSK-Key-Name.

B.

It pulls the device roles from HPE Aruba Networking Central during deployment.

C.

From the device's Calling-Station-ID in the RADIUS Access-Request.

D.

From the MPSK roles defined in HPE Aruba Networking Central's security dashboard.

Full Access
Question # 31

Which Aruba AP mode is sending captured RF data to Aruba Central for waterfall plot?

A.

Hybrid Mode

B.

Air Monitor

C.

Spectrum Monitor

D.

Dual Mode

Full Access
Question # 32

Your customer has four (4) Aruba 7200 Series Gateways and two (2) 7000 Series Gateways. The customer wants to form a cluster with these Gateways. What design consideration would prevent you from using all of those Gateways?

A.

Multiple versions between Gateways in the same cluster profile are not allowed AOS 10.x.

B.

A heterogeneous cluster is not supported in AOS 10.x.

C.

The AP load should be lowest value of worst-case scenario load.

D.

A combination of 7200 series and 7000 series gateways supports up to 4 nodes

Full Access
Question # 33

Match the solution components of HPE Aruba Networking Central NetConductor (Options may be used more than once or not at all.)

Full Access
Question # 34

List the firewall role derivation flow in the correct order

Full Access
Question # 35

How do you allow a new VLAN 100 between VSX pair inter-switch-link 256 for port 1/45 and 2/45?

A.

vlan trunk allowed 100 for ports 1/45 and 1/46

B.

vlan trunk add 100 in LAG256

C.

vlan trunk allowed 100 in LAG256

D.

vlan trunk add 100 in MLAG256

Full Access
Question # 36

With the CX 6000 48G switch with uplinks of 1/1/47 and 1/1/48, what does the switch do when a client port detects a loop and tx-disable parameter is used?

A.

The ports that confirmed the loop are disabled.

B.

The ports that transmitted and received the loop are disabled.

C.

The port that transmitted the loop is disabled.

D.

The port that received the loop is disabled.

Full Access
Question # 37

You are helping an onsite network technician bring up an Aruba 9004 gateway with ZTP for a branch office The technician was to plug in any port for the ZTP process to start Thirty minutes after the gateway was plugged in new users started to complain they were no longer able to get to the internet. One user who reported the issue stated their IP address is 172.16 0.81 However, the branch office network is supposed to be on 10.231 81.0/24.

What should the technician do to alleviate the issue and get the ZTP process started correctly?

A.

Turn off the DHCP scope on the gateway, and set DNS correctly on the gateway to reach Aruba Activate

B.

Move the cable on the gateway from port G0/0V1 tc port G0 0.0

C.

Move the cable on the gateway to G0/0/1. and add the device's MAC and Serial number in Central

D.

Factory default and reboot the gateway to restart the process.

Full Access
Question # 38

Refer to the exhibit.

In the Core-2 configuration of spanning-tree instance 2 priority 0, what needs to be configured to enable the root for VLAN 20 while VLAN 10 remains root on Core-1?

A.

Spanning-tree instance 2 VLAN 20

B.

Spanning-tree priority 0 VLAN 20

C.

Spanning-tree priority root VLAN 20

D.

Spanning-tree VLAN 20

Full Access
Question # 39

Which feature supported by SNMPv3 provides an advantage over SNMPv2c?

A.

Transport mapping

B.

Community strings

C.

GetBulk

D.

Encryption

Full Access
Question # 40

Your customer is interested in hearing more about how roles can help keep consistent policy enforcement in a distributed overlay fabric How would you explain this concept to them''

A.

Group Based Policy ID is applied on egress VTEP after device authentication and policy is enforced on ingress VTEP

B.

Role-based policies are tied to IP addresses which have an advantage over IP-based policies and role names are sent between VTEPs

C.

Group Based Policy ID is applied on ingress VTEP after device authentication and policy is enforced on egress VTEP

D.

Role-based policies enhance User Based Tunneling across the campus network and the policy traffic is protected with iPsec

Full Access
Question # 41

Which feature allows the device to remain operational when a remote link failure occurs between a Gateway cluster and a RADIUS server that is either in the cloud or a datacenter?

A.

MAC caching

B.

MAC Authentication

C.

Authentication survivability

D.

Opportunistic key caching

Full Access