Refer to the exhibit.
Where will the guests browser be redirected during a captive portal login attempt?
A. The redirect will time out and fail to resolve.
B. The captive portal page hosted on Aruba Central in the cloud.
C. The captive portal page hosted on the Aruba controller.
D. The captive portal page hosted on ClearPass.
What is an effect of the Cache Timeout setting on the authentication source settings for Active Directory?
A. ClearPass will validate the user credentials, then, for the duration of the cache, ClearPass will just fetch account attributes.
B. The Cache Timeout is designed to reduce the amount of traffic between ClearPass and the A/D server by caching the attributes.
C. ClearPass will validate the user credentials on the first attempt, then will always fetch the account attributes.
D. The Cache Timeout is designed to reduce the amount of traffic between ClearPass and the A/D server by caching the credentials.
What is the significance of using the [Allow ALL MAC AUTH] as an Authentication Method for Guests?
A. Client attempts will fail without an additional Authentication method applied.
B. All clients with unknown endpoints will be granted guest access regardless of authorization.
C. All clients with known endpoints will be granted guest access regardless of authorization.
D. This removes the reliance on the known or unknown status for MAC authentication.
Refer to the exhibit.
A user connects to an Aruba Access Point wireless SSID named "Secure-Corporate" and performs an 802.1X authentication with ClearPass as the authentication server.
Based on this service configuration, which service will be triggered?
A. No service will be triggered
B. Service Three
C. Service Two
D. Service One
Which must be taken into account if a customer wants to use the DHCP collector with 802.1X authentication?
A. When a client sends an authentication request to ClearPass, the profiler will also gather DHCP information.
B. Because DHCP fingerprinted is a Layer-3 function, it cannot be used with an 802.1X authentication service.
C. The client needs to connect to an open network first to be profiled, then shifted to the secure 802.1x network.
D. The client needs to be granted limited access before the enforcement policy can take into account the device type.
Your boss suggests configuring a guest self-registration page in ClearPass for an upcoming conference event.
What are the benefits of using guest self-registration? (Choose two.)
A. This will allow conference employees to pre-load additional device information as guests arrive and register.
B. This strategy effectively stops employees from putting their own corporate devices on the guest network.
C. This will enable additional information to be gathered about guests during the conference.
D. This allows guest users to create and manage their own login account.
E. This will allow employee personal devices to be Onboarded to the corporate network.
Refer to the exhibit.
What is true regarding leaving the indicated option "Use cached Roles and Posture attributes from previous sessions" unchecked?
A. A posture change applied to an endpoint is going to be lost each time the client re-authenticates.
B. The service will make the enforcement decision based upon the updated Posture regardless of caching.
C. Posturing will no longer be evaluated in determining the enforcement policy for current or future sessions.
D. Cached posture results are no longer stored by ClearPass but instead are saved to the endpoint of the client.
Refer to the Endpoint in the screenshot.
What are possible ways that it was profiled? (Choose two.)
A. Exchange Plugging agent
B. NAD ARP listening handler
C. 3rd part MDM
D. DNS fingerprinting
E. Cisco Device Sensor
An organization with 347 employees wants to have the guest create their own accounts for access to the public WLAN, and when guests reconnect, they do not want the guest to have to log in again.
Which ClearPass features can be used to meet these requirements?
A. Guest access with MAC caching
B. Guest self-registration with sponsor approval
C. Enforcement based on endpoint profiling
D. ClearPass Onboard Portal
An organization wants to have guests connect their own personal devices to the wireless network without requiring a receptionist setting up a guest account.
Which ClearPass feature can be used to meet the organization's requirements?
A. Policy Manager Enforcement
B. MAC authentication with profiling
C. ClearPass Onboard
D. Guest with self-registration