Which items can be obtained from device profiling? (Choose three.)
A. Device Category
B. Device Family
C. Device Health
D. Device Type
E. Device Location
Which is true regarding the Cisco Device Sensor feature in ClearPass? (Choose two.)
A. Forwards DHCP and HTTP user-agent info to ClearPass using Control and Datagram Transport Layer Security (DTLS) encapsulation.
B. Requires the purchase of a supported Cisco Access Point licensed as an Aruba Monitor Mode AP, to then act as the sensor.
C. Forwards DHCP and HTTP user-agent info to ClearPass using RADIUS accounting packets.
D. Gathers raw endpoint data from Cisco Discovery Protocol (CDP) and Link Layer Discovery Protocol (LLDP).
E. Requires a Cisco Smart Net license to be installed on the Network Access Device (NAD) utilizing the feature.
Which Authorization Source supports device profile enforcement?
A. Local User Repository
B. OnGuard Repository
C. Endpoints Repository
D. Guest User Repository
Your boss suggests configuring a guest self-registration page in ClearPass for an upcoming conference event.
What are the benefits of using guest self-registration? (Choose two.)
A. This will allow conference employees to pre-load additional device information as guests arrive and register.
B. This strategy effectively stops employees from putting their own corporate devices on the guest network.
C. This will enable additional information to be gathered about guests during the conference.
D. This allows guest users to create and manage their own login account.
E. This will allow employee personal devices to be Onboarded to the corporate network.
What happens when a client successfully authenticates but does not match any Enforcement Policy rules?
A. A RADIUS reject is returned for the client.
B. A RADIUS Accept is returned with no Enforcement Profile applied.
C. A RADIUS Accept is returned, and the default Enforcement Profile is applied.
D. A RADIUS Accept is returned, and the default rule is applied to the device.
A customer with 677 employees would like to authenticate employees using a captive portal guest web login page. Employees should use their AD credentials to login on this page.
Which statement is true?
A. The customer needs to add second guest service in the policy manager for the guest network.
B. The customer needs to add the AD server as an authentication source in a guest service.
C. Employees must be taken to a separate web login page on the guest network.
D. The customer needs to add the AD servers RADIUS certificate to the guest network.
What is RADIUS Change of Authorization (CoA)?
A. It is a mechanism that enables ClearPass to assigned a User-Based Tunnel (UBT) between a switch and controller for Dynamic Segmentation.
B. It allows clients to issue a privilege escalation request to ClearPass using RADIUS to switch to TACACS+.
C. It allows ClearPass to transmit messages to the Network Attached Device/Network Attached Server (NAD/NAS) to modify a user's session status.
D. It forces the client to re-authenticate upon roaming to an access point controlled by a foreign mobility controller.
Which option supports DHCP profiling for devices in a network?
A. configuring ClearPass as a DHCP relay for the client
B. DHCP profiling is enabled on ClearPass by default; configuration of the network access devices is not necessary
C. enabling the DHCP server to profile endpoints and forward meta-data to ClearPass
D. enabling DHCP relay on our network access devices so DHCP requests are forwarded to ClearPass
What are "known" endpoints in ClearPass?
A. "Known" endpoints have be fingerprinted to determine their operating system and manufacturer.
B. These are endpoints whose beacons have been detected but have never completed authentication.
C. The label "Known" indicates rogue endpoints labeled as "friendly" or "ignore".
D. "Known" endpoints can be authenticated based on MAC address to bypass the captive portal login.
Which statement is true about OnGuard? (Choose two.)
A. It is used to ensure that Antivirus/Antispyware programs are running
B. It supports both Windows and Mac OS X clients
C. It is used to identify and remove any malware/viruses
D. It only supports 802.1X authentication
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only HP exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your HPE6-A82 exam preparations and HP certification application, do not hesitate to visit our Vcedump.com to find your solutions here.