What is the primary use of the ClearPass Onboard Application?
A. Connect company-issued devices.
B. Configure network profiles for BYOD Devices.
C. Enforce endpoint device profiling.
D. Provide for system validation of client posture.
In Guest authentication without MAC caching, which statements are true? (Choose two.)
A. When the client disconnects from the network, the user will NOT be asked to login when the client reconnects.
B. The endpoint can be mapped to the correct Guest account for auditing.
C. When the guest logs in, the system will remember the client as a guest for the next login.
D. When the client disconnects from the network, the user will be asked to login when the client reconnects.
E. When the User logs into the Guest network, the endpoint will be marked as status = "known"
Which statement most accurately describes how users with Active Directory credentials authenticate with ClearPass when Active Directory is used as an authentication source for an 802.1x service in ClearPass?
A. A Kerberos request is sent from the Network Access Device to ClearPass which initiates a RADUIS request to the AD server.
B. A RADIUS request is sent from the Network Access Device to the AD server which communicates with ClearPass.
C. An LDAP request is sent from the Network AccessDevice to the AD server which communicates with ClearPass.
D. An LDAP request is sent from the Network Access Device to ClearPass which initiates a RADIUS request to the AD server.
E. A RADIUS request is sent from the Network Access Device to the ClearPasswhich communicates with the AD server.
Refer to the exhibit.
Based on the information shown, why did the Joining AD fail?
A. the GSS is wrong
B. the wrong FQDN of the AD was entered while joining
C. thewrong domain name was selected while joining the AD
D. there is a clock difference between ClearPass and AD servers
E. there is an IP communication issue
What is the purpose of using a role mapping policy in an 802.1x service with Active Directory as the authentication source?
A. to translate and combine AD attributes into ClearPass roles
B. to send roles from ClearPass to theAD user to update a user's group membership
C. to enable attributes as roles directly without needing role mapping rules
D. to send Aruba firewall roles back to the Aruba Network Access Device
E. to send details of a user's connection to the AD user to store in its database
In which stage of the Onboard process is the enterprise's root certificate installed on the iOS device?
A. During EAP authentication
B. Provisioning
C. Authentication
D. Pre-provisioning
E. Authorization
Which statement most accurately describes how the HTTP collector words for profiling?
A. HTTP packets are inspected whena user accesses any guest page on ClearPass.
B. When a user access the Aruba controller captive portal page, HTTP packets are captured by ClearPass.
C. HTTP packets are inspected only when a user accesses the ClearPass administration UI page.
D. When a user accesses any internet page, HTTP packets are captured by ClearPass.
E. HTTP packets are forwarded from the Controller to ClearPass.
What is the purpose of service rules in ClearPass?
A. applies health checks to clients
B. differentiates between different authentication requests
C. authenticates clients
D. authorizes clients against the RADIUS server
E. determines the client OS
Which policy component is the final step in the policy service flow in ClearPass?
A. Enforcement
B. Posture
C. Authorization
D. Rotes
E. Authentication
What is the primary use of the ClearPass OnGuard Application?
A. Device Profiling
B. Guest Access
C. Secure Employee Access
D. Endpoint Posture
E. Onboarding BYOD Devices