What is a requirement for the Dashboard > Traffic Analysis window on the Aruba Mobility Master (MM) to show data?
A. Airmatch and ClientMatch must be enabled.
B. The solution must have active PEFNG licenses.
C. Firewall policies must include application filtering rules.
D. WLANs must use the decrypt-tunnel forwarding option.
Which class of controller is more appropriate in a branch installation with up to 64 APs?
A. 7008
B. 7030
C. 7205
D. 7210
A network administrator has installed PEF licenses in the global pool of a Mobility Master (MM) solution. When the administrator tries to configure roles and policies, an error indicates that the PEF licenses must be installed.
What should the administrator do to correct this issue?
A. Ensure the PEF licenses were installed at the Managed Network and not at the MM level.
B. Enable Building 1 as a local license pool.
C. Enable the PEF feature in the Global Usage window.
D. Activate the PEF licenses through an Aruba Activate account.
A network manager wants to implement an Aruba wireless solution that accommodates 802.1X with EAPTLS. All wireless users will utilize Active Directory (AD) accounts to authenticate. Which device will the authenticator forward the authentication requests to in this type of solution?
A. APs
B. RADIUS server
C. Mobility Controller (MC)
D. Mobility Master (MM)
Which APs operate in an autonomous or standalone mode?
A. remote APs (RAPs)
B. spectrum analyzers (SAs)
C. mesh points (APs)
D. instant AP (IAP) clusters
Refer to the exhibits.
Exhibit 1
Exhibit 2
A network administrator configures a guest WLAN on an Aruba Mobility Master (MM)-based solution. The exhibits show some of the settings for this WLAN. Which settings must the administrator configure on each Mobility Controller (MC) at the device level for this configuration to function properly?
A. an IPsec preshared key
B. CPSec certificates
C. a portal page
D. VLAN 99 IP settings
What is the difference between WPA and WPA2 encryption?
A. WPA encryption uses symmetric keys, and WPA2 encryption uses asymmetric keys.
B. WPA encryption acts at Layer 3, and WPA2 encryption acts at Layer 2.
C. WPA encryption works only with preshared key (PSK) authentication, and WPA2 encryption works with both PSK and 802.1X.
D. WPA encryption uses TKIP by default, and WPA2 encryption uses AES by default.
Refer to the exhibit.
Which role must AP1 play?
A. Instant AP (IAP)
B. Mesh Point AP
C. Mesh Portal AP
D. Remote AP (RAP)
What is one setting that a network administrator can configure for user roles in an Aruba solution?
A. DHCP pool
B. ClientMatch rules
C. source NAT
D. Maximum session
A company has a Mobility Master (MM) solution that manages Mobility Controllers (MCs) in several
groups. The company has several WebCC licenses and wants to reserve these licenses for MCs in the
Sunnyvale group only.
How can a network administrator achieve this goal?
A. Associate the MAC addresses for the Sunnyvale MCs with the licenses when they are generated.
B. Make sure to be at the Managed Network > Sunnyvale level in the MM Interface when the licenses are installed.
C. Install the licenses on the MM, and allocate them to a dedicated local pool for the Sunnyvale group.
D. Install the licenses directly on the MCs in the Sunnyvale group, and activate the licneses locally.