Refer to the exhibit.
Based on the Enforcement Policy configuration shown, which Enforcement Profile will an employee receive when connecting an IOS device to the network or the first time using EAP-PEAP?
Which components can use Active Directory authorization attributes for the decision-making process? (Select two.)
Refer to the exhibit.
A user logged in to the Self-Service Portal as shown.
What do the traffic received and sent statistics present?
Refer to the exhibit.
Based on the guest Self-Registration with Sponsor Approval workflow shown, at which stage does the sponsor approve the user’s request?
Which use cases will require a ClearPass Guest application license? (Select two.)
Refer to the exhibit.
Based on the network topology diagram shown, how many clusters are needed for this deployment?
A university wants to deploy ClearPass with the Guest module. The university has two types that need to use web login authentication. The first type of users are students whose accounts are in an Active Directory server. The second type of users are friends of students who need to self-register to access the network.
How should the service be set up in the Policy Manager for this network?
Refer to the exhibit.
Based on the information shown on a client’s laptop, what will happen next?
Refer to the exhibit.
Based on the Aruba TACACS+ dictionary shown, how is the Aruba-Role attribute used?
Refer to the exhibit.
Based on the information shown, what will be the outcome when the administrator chooses “Deny Access to this Device? (Select two.)
Which statement accurately describes configuration of Data and Management ports on the ClearPass appliance? (Select two.)
A customer wants all guests who access a company’s guest network to have their accounts approved by the receptionist, before they are given access to the network.
How should the network administrator set this up in ClearPass? (Select two.)
An Android device goes through the single-SSID Onboarding process and successfully connects using EAP-TLS to the secure network.
What is the order in which services are triggered?
During a web login authentication, what is expected to happen as part of the Automated NAS login?
Refer to the exhibit.
An AD user’s department attribute value is configured as “QA”. The user authenticates from a laptop running MAC OS X.
Which role is assigned to the user in ClearPass?
Based on the Policy configuration shown, which VLAN will be assigned when a user with ClearPass role Engineer authenticates to the network successfully using connection protocol WEBAUTH?
Refer to the exhibit.
Based on the Enforcement Policy configuration shown, when a user with Role Engineer connects to the network and the posture token assigned is Unknown, which Enforcement Profile will be applied?
Refer to the exhibit.
What can be concluded from the Access Tracker output shown?
Under which circumstances is it necessary to use an SNMP based Enforcement profile to send a VLAN?
Which statement is true about the configuration of a generic LDAP server as an External Authentication server in ClearPass? (Choose three.)
Which types of files are stored in the Local Shared Folders database in ClearPass? (Select two.)
Refer to the exhibit.
When configuring a Web Login Page in ClearPass Guest, the information shown is displayed.
What is the page name field used for?
Refer to the exhibit.
Based on the Endpoint information shown, which collectors were used to profile the device as Apple iPad? (Select two.)
Refer to the exhibit.
Which statement accurately reflects the status of the Policy Simulation test figure shown?
A customer wants to implement Virtual IP redundancy, such that in case of a ClearPass server outage, 802.1x authentications will not be interrupted. The administrator has enabled a single Virtual IP address on two ClearPass servers.
Which statements accurately describe next steps? (Select two.)