What is the function of the primary and backup servers when configuring an authentication source in ClearPass?
A. The primary server and backup servers can be configured for round-robin.
B. The primary server can be from one Active Directory domain; the backup server can be from another.
C. The primary server is always authenticated first, then the backup is used if authentication fails.
D. The primary server is always authenticated first, then the backup is used if that times out.
Which actions are necessary to set up a ClearPass guest captive portal web login page to execute with no errors? (Choose three.)
A. Configure the vendor settings in the Network Access Device to match the web login page.
B. Install a public issued HTTPS certificate in ClearPass Policy Manager.
C. Install a public issued HTTPS certificate in the Network Access Device.
D. Configure the vendor settings in the Web Login Page to match the Network Access Device.
E. Install an enterprise issued HTTPS certificate in the Network Access Device.
F. Configure the external web-auth URL on the Network Access Device for HTTP.
A ClearPass deployment needs to be designed to determine which department the employee is in on the Active Directory Server and whether the user's device is a computer or smart device. Which Policy Manager components will the network administrator need to use? (Choose three.)
A. Posture
B. Onboard
C. Profiler
D. Enforcement
E. Authorization
F. Authentication
Refer to the exhibit.
An administrator has enabled `department' and `memberOf' as roles. Which effect will this have on Enforcement?
A. The user's memberOf attribute is sent back to the controller as a firewall role.
B. The user's authentication will be rejected if the user does not have a department attribute in AD.
C. The user's department and group membership must be included in role mapping rules.
D. The user's department and group membership will be available as roles for evaluation by the enforcement policy.
In ClearPass guest, which statement is true? (Choose three.)
A. All guest accounts will be assigned a role of Guest and that cannot be changed.
B. The Create Guest Account form is fully configurable and fields can be edited.
C. Account Expiration date and time cannot be edited by the administrator.
D. A guest User is automatically disconnected from the network when their account expires.
E. A guest user will be denied access to the network after their account expires but is not disconnected.
F. A visitor location data field can be added to a guest registration form.
Refer to the exhibit.
Based on the information shown, why did the Joining AD fail?
A. the GSS is wrong
B. the wrong FQDN of the AD was entered while joining
C. thewrong domain name was selected while joining the AD
D. there is a clock difference between ClearPass and AD servers
E. there is an IP communication issue
A guest user connects to an Aruba Controller wireless network and is redirected to a web login page on
ClearPass.
How is the redirection performed?
A. The user inputs the URL of theweb login page in their browser
B. The user is redirected to the securelogin.arubanetworks.com web login page.
C. ClearPass will capture web traffic and redirect the client to the Web Login page.
D. The controller will capture web traffic and redirect thetraffic to the ClearPass Web Login page.
E. The user inputs the URL of the controller's securelogin.arubanetworks.com page in their browser.
A customer wants to use the OS information of devices in the Enforcement policy. Which source should be added as an authorization source?
A. OnGuard Repository
B. Guest User Repository
C. Local User Repository
D. Endpoints Repository
E. Active Directory
Which ClearPass posture token indicates that while the client is compliant, there is an available update for the client?
A. Healthy
B. Checkup
C. Unknown
D. Remediate
E. Infected
Which collector can help to distinguish between an iPhone and an iPad?
A. MAC OUI
B. TACACS+
C. DHCP
D. RADIUS
E. HTTP