11.11 Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

Note! Following HPE6-A45 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

HPE6-A45 Implementing Aruba Campus Switching Solutions Exam Questions and Answers

Questions 4

Refer to the exhibit.

A network administrator sets up prioritization for an application that runs between Device 1 and Device 2. However, the QoS for the application is not what the administrator expects.

How can the administrator check if the network infrastructure prioritizes traffic from Device 1 and Device 2?

Options:

A.

Run a packet capture on Device 2, run the application, and look in the packet capture for a high value DSCP in the IP header.

B.

Set up RMON alarms on the switches that trigger when a high number of packets are dropped. Then, run the application and check for the alarm.

C.

Clear interface statistics on the switches. Then, run the application and check the interface queue statistics for the switch-to-switch links.

D.

Run a packet capture on Device 1, run the application, and look in the packet capture for a high value DSCP in the IP header.

Buy Now
Questions 5

Refer to the exhibits.

Exhibit 1

Exhibit 2

A company does not require authentication for security, but AOS-Switches are set up to use local MAC authentication (LMA) to assign the correct VLAN and priority to IP phones. IP phones and computers belong to different VLANs. Each device is supposed to connect to a specific port, but sometimes users connect their devices to the wrong ports and cannot receive access without help from IT.

How can a network administrator configure the switches to eliminate this issue?

Options:

A.

Set the address limit to 2 on the switch ports that apply LMA.

B.

Create a user role that applies the user VLAN, and set this role as the initial role.

C.

Add the MAC addresses for computers to the myPhones MAC group.

D.

Apply LMA to all edge switch ports, and set the unauth VLAN to the user VLAN.

Buy Now
Questions 6

A company has AOS-Switches deployed at sites with inexperienced IT staff. The main office network administrators want to track if configurations change on branch switches.

What should be set up for this purpose?

Options:

A.

an SNMP trap

B.

an RMON alarm

C.

an IP SLA profile

D.

an auto-config server

Buy Now
Questions 7

Refer to the exhibits.

Exhibit 1

Exhibit 2

The network administrator enters the commands shown in Exhibit 2. What is the spanning tree status on A1 and A2?

Options:

A.

Both A1 and A2 forward traffic.

B.

A1 forwards traffic, and A2 blocks traffic.

C.

A1 blocks traffic, and A2 forwards traffic.

D.

Both A1 and A2 block traffic.

Buy Now
Questions 8

A network administrator configures DHCP snooping on VLAN 2. How does the switch handle DHCP traffic that arrives in this VLAN on an untrusted interface?

Options:

A.

It accepts packets from a DHCP server, but drops client packets.

B.

It drops all DHCP traffic and logs a security event.

C.

It accepts both client and server packets as long as they match the DHCP binding table.

D.

It accepts client packets, but drops packets from a DHCP server.

Buy Now
Questions 9

Refer to the exhibits.

Exhibit 1

Exhibit 2

A network administrator wants to set up mirroring of traffic from port 1 on Switch-1 to port 1 on Switch-2. Exhibit-2 shows the commands that the administrator enters. The mirroring does not work correctly.

What must the administrator do to correct the error?

Options:

A.

Change the port ID on Switch 1 to 50001, so that it is unique from the port ID on Switch-2.

B.

Re-configure the mirror endpoint command on Switch-2 with the IP addresses reversed in order.

C.

Remove the commands, and re-enter them on Switch-1 first and then on Switch-2.

D.

Specify the mirror endpoint command on Switch-1 and the mirror 1 remote-ip command on Switch-2.

Buy Now
Questions 10

A network administrator enters this command on an AOS-Switch:

Switch(config)# radius-server host 10.1.3.3 time-window 60

Which behavior will the switch show?

Options:

A.

It will wait one minute for a response from the RADIUS server before it sends another message

B.

It will reject RADIUS server change of authorization (CoA) messages with timestamps that are more than one minute old

C.

It will maintain idle user sessions for one minute before it re-authenticates the user to the RADIUS server

D.

It will give supplicants up to one minute to respond to RADIUS challenges before it considers authentication failed

Buy Now
Questions 11

A company deploys AOS-Switches at sites with inexperienced IT staff. The main office network administrators want to monitor thresholds to generate alerts on branch switches. What should be set up for this purpose?

Options:

A.

an SNMP trap

B.

an RMON alarm

C.

an auto-config server

D.

an sFlow instance

Buy Now
Questions 12

Which switches can be deployed in a mesh topology for backplane stacking?

Options:

A.

Aruba 2920 switches

B.

Aruba 2930F switches

C.

Aruba 2930M switches

D.

Aruba 3810 switches

Buy Now
Questions 13

A network administrator needs to control traffic based on TCP or UDP application, as well as IP protocol, such as GRE or ICMP. What should the administrator configure for this purpose?

Options:

A.

a standard IP ACL and an extended MAC ACL only

B.

both a standard IP ACL and an extended MAC ACL

C.

an extended IP ACL only

D.

both a standard IP ACL and a standard MAC ACL

Buy Now
Questions 14

Refer to the exhibits.

Exhibit 1

Exhibit 2

A company has attempted to implement OSPF without success. The devices in Area 1 need to be able to reach Area 2. Routes should be aggregated for advertisement in other areas. What must be changed to meet these requirements?

Options:

A.

Change Area 3 to Area 0; remove Area 1 from Switch-2 and Area 2 from Switch-1.

B.

Move the 10.1.0.0/16 range to Area 2 on Switch-1 and the 10.2.0.0/16 range to Area 1 on Switch-2.

C.

Add Area 1 and Area 2 on VLAN 100 on both Switch-1 and Switch-2. Remove Area 3.

D.

Add the 10.2.0.0/16 range on Switch-1 and the 10.1.0.0/16 range on Switch-2.

Buy Now
Questions 15

A company requires AOS-Switches at the campus core. The switches:

  • Will act as the default gateways for several campus VLANs
  • Must provide redundancy for their services and tolerate the loss of a link or an entire switch
  • Must recover from the failure of one of the switches within a second or less

VRRP and MSTP are proposed to meet these requirements. What is an issue with this proposal?

Options:

A.

VRRP provides redundancy against lost links but not a failed switch.

B.

VRRP provides routing redundancy but not default gateway redundancy.

C.

VRRP does not interoperate with MSTP.

D.

VRRP takes longer than a second to fail over.

Buy Now
Questions 16

What must an OSPF router do to ensure nonstop routing should a standby member take over as commander when the original VSF commander fails?

Options:

A.

It must run the shortest path first algorithm.

B.

It must participate in a new election for the Designated Router.

C.

It must initiate a graceful restart.

D.

It must re-establish adjacency with its Designated Router.

Buy Now
Questions 17

A network administrator sets up MAC-Auth and captive portal to Aruba ClearPass on AOS-Switches. The solution seems to work for most guests. However, some guests open their browsers and are not redirected to the captive portal.

How should the administrator address the likely cause of the issue?

Options:

A.

Set the RADIUS server time window to 0 because some guest computers likely have the incorrect system time.

B.

Replace MAC-Auth on switch ports with Web-Auth because this authentication method offers more reliability with captive portal.

C.

Reconfigure the captive portal URL hash key on some of the switches, which likely have the wrong password.

D.

Replace expired certificates on the switches and set their usage to captive portal since some guests have an HTTPS homepage.

Buy Now
Questions 18

What is a typical reason to implement MAC authentication on an AOS-Switch?

Options:

A.

to filter traffic at the edge, based on multiple criteria in the MAC header

B.

to provision switch ports to support devices such as IP phones or printers

C.

to enhance the security of an 802.1X solution

D.

to control management access to the switch CLI based on device, as well as user credentials

Buy Now
Questions 19

Refer to the exhibit.

An AOS-Switch connects to an unmanaged switch in a meeting room. The exhibit shows security settings for this port. Users report that they sometimes lose connectivity and then get it back.

Which best practice should network administrators follow to avoid this issue?

Options:

A.

The loop protection and port security actions should be set to match.

B.

Eavesdrop prevention should be disabled when port security is in limited-continuous mode.

C.

Port security and loop protection should not be enabled on the same port.

D.

Loop protection should operate in VLAN mode, rather than port mode, when port security is enabled.

Buy Now
Questions 20

Refer to the exhibit.

A network administrator wants to prevent endpoints from spoofing the MAC address of the VLAN 2 default gateway. What should the administrator configure on Switch-1?

Options:

A.

MAC lockdown of the default gateway MAC address on ports 1-20

B.

MAC lockdown of the default gateway MAC address on trk1

C.

default gateway MAC address as a port security authorized address on trk1

D.

default gateway MAC address as a port security authorized address on ports 1-20

Buy Now
Questions 21

A network administrator needs to set up an AOS-Switch to use port-based tunneled node for connected devices. However, the administrator wants the switch to forward traffic without tunneling if it cannot reach a tunneled-node server.

What should the administrator do?

Options:

A.

Apply the tunneled-node profile to ports, and set the local-switching-fallback option.

B.

Make sure that the switch has an IP address on the untagged VLAN assigned to the ports.

C.

Configure a local switching profile on the Mobility Controller that acts as tunneled-node server.

D.

Set the switch to role-based tunneled node, and make sure it uses the default initial user role.

Buy Now
Questions 22

Refer to the exhibit.

Every switch in the exhibit will route traffic. The company requires a topology in which failover for switch-to-switch links is exclusively handled by the routing protocol and occurs as quickly as possible. Which topology should the administrator use?

Options:

A.

A

B.

B

C.

C

D.

D

Buy Now
Questions 23

A network has high latency on some links. Which application is most likely to experience poor performance?

Options:

A.

File Transfer Protocol (FTP)

B.

SQL

C.

NTP

D.

Voice over IP (VoIP)

Buy Now
Questions 24

Refer to the exhibits.

Exhibit 1

Exhibit 2

Network administrators are alerted to high interface utilization on a switch by a management solution. They examine the utilization on the uplink interfaces several times an hour during problem times. The exhibit shows output typical of times of congestion. The administrators want to allocate bandwidth fairly and reduce congestion on the uplinks.

What could help meet these requirements?

Options:

A.

a per-queue rate limit on interfaces 1 and 2

B.

an outbound rate limit on each edge port

C.

a broadcast rate limit on each edge port

D.

an outbound rate limit on interfaces 1 and 2

Buy Now
Questions 25

An AOS-Switch needs to be configured to support tunneled node in role-based mode. The Mobility Controller administrators tell the switch administrators that the AOS-Switch will integrate with a cluster of Mobility Controllers. The cluster virtual IP address is 10.1.1.10.

How should switch administrator integrate the AOS-Switch with the cluster?

Options:

A.

Double-check the settings with the Mobility Controller administrators because the planned configuration is incomplete with the switch settings.

B.

Configure the virtual IP address as the tunneled-node-server address, tunneled node will work, but the clustering features will not provide redundancy.

C.

Configure the virtual IP address as the tunneled-node-server address. The switch will automatically learn controller IP addresses to which to tunnel various traffic.

D.

Configure the virtual IP address for the primary tunneled-node-server and an actual controller IP address for the backup tunneled-node-server in order to receive redundancy.

Buy Now
Exam Code: HPE6-A45
Exam Name: Implementing Aruba Campus Switching Solutions Exam
Last Update: Nov 10, 2024
Questions: 169