Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

HP HPE6-A45 Implementing Aruba Campus Switching Solutions Exam Exam Practice Test

Note! Following HPE6-A45 Exam is Retired now. Please select the alternative replacement for your Exam Certification.
Page: 1 / 17
Total 169 questions

Implementing Aruba Campus Switching Solutions Exam Questions and Answers

Question 1

A network administrator applies port security to a port with the send-alarm action. What does the switch do if it detects traffic from an unauthorized MAC address on the port?

Options:

A.

It disables the port, but sends no SNMP trap.

B.

It forwards the traffic, and it logs an event.

C.

It blocks the traffic, but sends no SNMP trap.

D.

It blocks the traffic, and it sends an SNMP trap.

Question 2

Refer to the exhibits.

Exhibit 1

Question # 2

Exhibit 2

Question # 2

The IP phone in the exhibit is set up to complete 802.1x authentication to the network. How can the netwotk administrator prevent a user on the computer from receiving network access without authentication?

Options:

A.

Set an 802.1X client limit of 2 on interface 1.

B.

Set up the MAC filter on interface 1.

C.

Enable static mode port security on interface 1.

D.

Enable MAC-based VLANs on interface 1.

Question 3

Which switches can be deployed in a mesh topology for backplane stacking?

Options:

A.

Aruba 2920 switches

B.

Aruba 2930F switches

C.

Aruba 2930M switches

D.

Aruba 3810 switches

Question 4

Refer to the exhibit.

Question # 4

AOS-Switches will enforce 802.1X authentication on edge ports. The company has two RADIUS servers, which are meant to provide redundancy and load sharing of requests. The exhibit shows the planned RADIUS setting to deploy to the switches.

Which adjustment to the plan should administrators make in order to meet the customers’ requirements?

Options:

A.

Remove the dynamic authorization setting for both RADIUS servers.

B.

Specify a different RADIUS dynamic authorization port for each of the RADIUS servers.

C.

Specify one server on half of the switches and the other server on the other half of the switches.

D.

Change the order in which the RADIUS servers are specified on half of the switches.

Question 5

A network administrator plans to apply DSCP 46 to all traffic on a port. What is required for this configuration to work?

Options:

A.

The port has trust set to default.

B.

A DSCP map that sets 46 to a priority value.

C.

The port has trust set to DSCP.

D.

A QoS policy selects traffic with DSCP 46.

Question 6

What is a reason to create a virtual link between two OSPF routers?

Options:

A.

to permit OSPF to operate between two routers that also run VRRP

B.

to create a connection between two areas that are not directly connected to Area 0

C.

to permit an OSPF adjacency between two VSF fabrics

D.

to monitor connectivity with the neighbor, but not exchange the routing table

Question 7

Refer to the exhibit.

Question # 7

Network administrators set up PIM-DM to route multicast traffic from Server 1 to clients in VLAN 24. The multicasts are not active now, but the administrators want to determine which path the multicasts will take.

What should the administrators check to help them calculate this path?

Options:

A.

If Switch-2 or Switch-3 has the highest IP address on a VLAN that runs PIM-DM.

B.

If Switch-2 or Switch-3 is listed as an RP in the Switch-1 RP set

C.

What the next hop is for the unicast route that Switch-1 uses to reach 10.2.2.2

D.

If the Switch-2 DR priority on VLAN 10 is higher than the Switch-3 DR priority on VLAN 11

Question 8

Refer to the exhibit.

Question # 8

What must the network administrator do on Switch-1 to enable this switch to advertise 192.0.2.0/24 to the router at 192.168.1.1?

Options:

A.

Redistribute OSPF routes into the BGP process

B.

Enter a static route to 192.0.2.0/24 to the black hole.

C.

Enter the network 192.168.1.0/24 command in the BGP context.

D.

Enable eBGP multihop to the 192.168.1.1 neighbor.

Question 9

What is a reason to implement PIM-DM as opposed to PIM-SM?

Options:

A.

to conserve bandwidth over WAN links

B.

to permit a higher density of rendevous point (RP) routers in the network core

C.

to control exactly which multicast groups are routed through the network

D.

to obtain the simplest setup in a network with high bandwidth

Question 10

A network administrator needs to control traffic based on TCP or UDP application, as well as IP protocol, such as GRE or ICMP. What should the administrator configure for this purpose?

Options:

A.

a standard IP ACL and an extended MAC ACL only

B.

both a standard IP ACL and an extended MAC ACL

C.

an extended IP ACL only

D.

both a standard IP ACL and a standard MAC ACL

Question 11

A network administrator can set the OSPF metric-type on an AOS-Switch to Type 1 or Type 2. What is the difference?

Options:

A.

A Type 2 metric marks external routes that can be advertised in NSSAs, while a Type 1 metric marks external routes that can only be advertised in normal areas.

B.

A Type 2 metric assigns cost 1 to a 100 Gbps link, while a Type 1 metric assigns cost 1 to all links of 100 Mbps or higher.

C.

A Type 2 metric is assigned to multiple external routes that are aggregated together, while a Type 1 metric does not permit external route aggregation.

D.

A Type 2 metric stays the same as the external route is advertised, while a Type 1 metric increments with internal OSPF link costs.

Question 12

Refer to the exhibits.

Question # 12

Exhibit 2

Question # 12

The network administrator configures the commands shown in Exhibit 2. Which mismatch will cause an issue?

Options:

A.

the mismatch between the key IDs specified in chain10 and chain11 on Switch-1

B.

the mismatch between the key-strings in the chains for VLAN 10 and VLAN 11 on Switch-1

C.

the mismatch between the chain names associated with VLAN 11 on Switch-1 and on Switch-3

D.

the mismatch between the key-strings associated with VLAN 10 on Switch-1 and on Switch-2

Question 13

The security policy for a company requires that switches use SNMPv3 and accept all read-only SNMPv2c messages. The network administrator enables SNMPv3. Which additional action should the network administrator take to comply with this policy?

Options:

A.

Disabled SNMPv3 inform timeouts.

B.

Enable SNMPv3 only operation.

C.

Enable SNMPv3 restricted mode.

D.

Disable SNMPv1/v2c.

Question 14

An AOS-Switch enforces 802.1X. It receives an Access-Accept with this HPE VSA from its Radius server:

Attribute Name and ID = HPE-User-Role (25) Value = contractor

The switch then rejects the client. What is one requirement for the switch to accept the message and authorize the client?

Options:

A.

The initial user role must be set to the factory default permit any role.

B.

User role authorization must be enabled globally on the switch.

C.

An aaa authentication local user group must have the contractor name.

D.

The RADIUS server settings must permit dynamic authorization.

Question 15

The security plan for AOS-Switches requires protection from incoming malware traffic generated from a worm-or virus-infected host.

Which feature should be implemented to provide the required protection?

Options:

A.

DHCP snooping

B.

connection-rate filtering

C.

port security

D.

proxy ARP

Question 16

Which situation requires an AOS-Switch interface to support MAC-based VLANs?

Options:

A.

The interface has an extended MAC ACL applied to it in the outbound direction, and it uses VLAN ID as one of the criteria for rules.

B.

The interface has an extended MAC ACL applied to it in the inbound direction, and it has multiple tagged VLAN assignments.

C.

The interface is configured to support Local MAC Authentication (LMA), authenticates endpoints against a non-default MAC group, and limits the address count to 1.

D.

The interface is configured to support 802.1X in user-based mode, connects to more than one endpoint at a time, and users are assigned to different dynamic VLANs.

Question 17

What is a reason for hello packets between two OSPF routers?

Options:

A.

to permit an OSPF adjacency between two VSF fabrics

B.

to monitor connectivity with the neighbor, but not exchange the routing table

C.

to establish an area that is not directly connected to the backbone Area 0

D.

to permit OSPF to operate between two routers that also run VRRP

Question 18

Refer to the exhibits.

Exhibit 1

Question # 18

Exhibit 2

Question # 18

Exhibit 1 shows a portion of the BGP routing table when the BGP solution was first deployed. Exhibit 2 shows the same portion at the current time. What can explain the current state?

Options:

A.

Due to changes in the private network, Switch-1 can no longer reach 192.168.2.1.

B.

Switch-1 can no longer reach ISP 1 at 192.168.1.1.

C.

Due to changes at ISP 1, Switch-1 now selects a different best route.

D.

An administrator has applied a route map on Switch-1 that filters advertised routes.

Question 19

A company wants to implement RADIUS authentication of all managers who log in to AOS-Switches via SSH. The RADIUS server also sends VSAs that indicate which commands users can enter, and switches must honor these.

What must the administrator do to meet the company’s requirements?

Options:

A.

Set the command access level to manager mode; also set RADIUS for aaa authentication ssh login and aaa authentication ssh enable.

B.

Set RADIUS for aaa authentication ssh login, also enable authentication privilege-login mode, which allows the switch to accept all RADIUS VSAs.

C.

Set command authorization to RADIUS, also set RADIUS for aaa authentication ssh login and aaa authentication ssh enable.

D.

Set RADIUS for aaa authentication ssh login and aaa authentication ssh enable, which allows the switch to accept all RADIUS VSAs.

Question 20

Refer to the exhibit.

Question # 20

Network administrators want the network to use PIM-DM to route multicasts from Server 1 to receivers in VLAN 24.

Which protocols should the administrators enable on which VLANs on Switch-1?

Options:

A.

PIM-DM on VLAN 24; IGMP and PIM-DM on VLAN 10

B.

IGMP on VLAN 24; IGMP on VLAN 10

C.

IGMP on VLAN 24; PIM-DM on VLAN 10

D.

IGMP and PIM-DM on VLAN 24; PIM-DM on VLAN 10

E.

IGMP and PIM-DM on VLAN 24; PIM-DM on VLAN 10

Question 21

A network administrator configures VSF settings on two Aruba 2930F switches. The switches form two separate VSF fabrics. What should the administrator check?

Options:

A.

that the domain ID matches on both switches

B.

that each switch is assigned a unique VSF priority

C.

that LLDP MAD is configured on both members

D.

that the switch with the lower priority has the lower member ID

Question 22

Refer to the exhibit.

Question # 22

A company has IP phones that are LLDP-MED capable. The exhibit shows the configuration for the VLAN to which IP phones belong, as well as the configuration for ports to which phones will connect. AOS-Switches at the access layer are set up to use LLDP-MED. The administrator wants to automatically provision the phones to send traffic with the right VLAN tag and priority.

Which additional configuration step must the administrator complete?

Options:

A.

Specify LLDP-MED as the global LLDP mode

B.

Specify the voice setting in VLAN 3

C.

Enable LMA and configure the proper LMA profiles

D.

Enable 802.1X and MAC-based VLANs on the ports

Question 23

Refer to the exhibit.

Question # 23

A network administrator needs to alter myACL so that it permits all traffic that arrives in VLAN 2 and is destined to 10.1.10.0/24. Besides this change, the ACL must continue to act as it does now. The administrator plans this new rule:

permit ip any 10.1.10.0/24

How should the administrator apply this rule to meet all requirements?

Options:

A.

Apply the new rule without a rule ID to ensure that the switch applies the automatic processing order to it.

B.

Resequence the ACL with more space, then add the new rule with a sequence ID before the ID for the current third rule.

C.

Remove the ACL from the VLAN and re-apply it as an inbound VLAN ACL (VACL). Then, add the new rule with any ID higher than 2.

D.

Enable ACL grouping on the switch. Add the new rule in a new ACL. Then, group the new ACL with myACL.

Question 24

Network administrators want to gain insight into network utilization, traffic patterns, and the types of applications in use across the network over the long term.

Which technology can help them achieve this goal?

Options:

A.

RMON

B.

sFlow

C.

SNMP traps

D.

DiffServ

Question 25

Refer to the exhibits.

Exhibit 1

Question # 25

Exhibit 2

Question # 25

The network administrator enters the commands shown in Exhibit 2. What is the spanning tree status on A1 and A2?

Options:

A.

Both A1 and A2 forward traffic.

B.

A1 forwards traffic, and A2 blocks traffic.

C.

A1 blocks traffic, and A2 forwards traffic.

D.

Both A1 and A2 block traffic.

Page: 1 / 17
Total 169 questions