New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Aruba Certified Switching Expert HPE6-A69 Dumps PDF

Page: 2 / 2
Total 60 questions

Aruba Certified Switching Expert Written Exam Questions and Answers

Question 5

A network administrator has deployed the following (partial) configuration:

What is the effect of this policy?

Options:

A.

Only subnet 10.254.254.0/24 is allowed to communicate with ip-addresses configured on VRF mgmt

B.

COPP traffic is restricted to subnet 10.254.254 0/24

C.

Only ssh traffic to ip-address in VRF mgmt is restricted to 10 254 254 0/24 network

D.

Only subnet 10.254 2540/24 is allowed to communicate with CoPP-addresses configured on VRF mgmt

Question 6

The example ACL is used with Aruba CX 6400 switches to permit traffic to web servers configured on interface 1/1/1 inbound with IP 10.254.4.1/24.

How does this ACL affect the HTTPS traffic to destination 10.254.4.7 from a client 10.253.1.5 via interface 1/1/2 with IP 10 254.3.1/24?

Options:

A.

The ACL would be valid only if bound to 1/1/2 outbound.

B.

The implicit rule allows the traffic

C.

The implicit rules deny the traffic.

D.

The traffic is allowed when ACL is Pound to inbound traffic.

Question 7

You have removed a member out of the ArubaOS-CX 6300 VSF configuration. The login to the removed member falls. What is true about switch login recovery?

Options:

A.

The task requires physical access to the switch

B.

The zeroize task executes the zeroize.txt from the root of the CF card on the switch

C.

The zeroize task will remove all user passwords: the configuration remains on the switch

D.

The task can be executed remotely

Question 8

A customer with an ArubaOS-CX 6300M switch is having a performance issue on the network and has received complaints about users experiencing intermittent connectivity. After performing troubleshooting it is determined that many of the local websites on the LAN that users are unable to reach are resolved to an invalid MAC address.

What are the minimum steps that should be performed to mitigate this condition? (Select two)

Options:

A.

Implement arp ACLs to define trusted MAC address to IP bindings

B.

Enable 'arp inspection' on the end-user physical ports

C.

Enable 'arp inspections on the end-user VLAN.

D.

Implement dhcpv4-snooping

E.

Enable 'arp inspection untrusted on the end-user physical pons

Page: 2 / 2
Total 60 questions