Where in the controller would we configure a wireless network NOT to use encryption?
A. AAA profile
B. SSID profile
C. ARM profile
D. Radio profile
E. VAP profile
What are the serial console commands used to factory default an AP?
A. Purge, save, reload
B. Purge, save, boot
C. Write erase all
D. Purge restart
E. Purge, write mem, reload
Which of the following is true of an Aruba Mobility Controller acting as a layer 2 switch? (Select two):
A. The Mobility Controller is the client's default router.
B. The Mobility Controller acts as a bridge.
C. All stations must use the same VLAN
D. Uplink ports on the Mobility Controller can use 802.1q tagging
E. VLANs cannot have IP addresses
WPA and WPA2 can use the following authentication methods: (Select two)
A. WEP Keys
B. PSK
C. 802.1X
D. Captive Portal
E. IPSEC
Aliases are used in firewall policies to:
A. Apply firewall polices to ports in a stateful manner
B. Make firewall rules act like traditional ACLs
C. Ease readability and maintainability for source and destination addresses
D. Are a part of roles, not the firewall
E. Are applied as an action in a rule
Which of the following is NOT available for configuration via startup wizard?
A. Controller name
B. Country Code
C. Loopback IP
D. VLAN IP
E. Firewall Roles
What is the purpose of the validuser ACL?
A. When a user transmits data through the controller, the validuser ACL is used to check if the user is in the layer 3 user-table
B. Before a client is added to the controller's user table, the validuser ACL is checked to make sure the client has a valid IP address
C. The validuser ACL is used during 802.1X authentication to check that the client is in the layer 3 user-table
D. When an AP needs to transmit data to a user, it checks the validuser ACL to make sure the user has a valid IP address
E. A list of configured MAC addresses that define the valid users
Which role is assigned prior to launching the captive portal splash screen?
A. Pre-authentication role
B. Post-authentication role
C. AAA role
D. AAA-CP role
E. CP default role
Which is the strongest encryption type?
A. AES
B. TKIP
C. WEP
D. MSCHAPv2
E. DES
What information is required by an AP in order to boot? (Select three)
A. AP's IP Address, Netmask, Default Gateway
B. AP's Name and Group
C. Aruba Controller's Master IP Address
D. An established NTP connection to the Master Controller
E. Establish an IPSEC tunnel with the Master controller