Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

You have completed a successful VSF stack between two switches.

Without manually assigning a backup switch, what is the expected output when issuing a show vsf command?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 5

Which two statements accurately describe stacking with Aruba switches? (Choose two.)

A.

A VSF stack is allowed between an AOS-CX 6300M and 6300F switches.

B.

VSF is a core or aggregation layer stacking technology due to the high resiliency of sharing a single control plane.

C.

The VSF feature is not compatible between AOS-CX and AOS platforms.

D.

A VSF stack is allowed between an AOS 5400R and an AOS-CX 6400.

E.

VSF and VSX are stacking option with the AOS-CX 8320. 8325. 8400. and 6400 models.

Full Access
Question # 6

Match the switching term to the correct definition.

Full Access
Question # 7

What are two available options as part of a DHCP offer message? (Choose two.)

A.

SSID

B.

DNS server IP

C.

Subnet Mask

D.

LLDP-MED

E.

VLANID

Full Access
Question # 8

Refer to the exhibit.

What VSF command produces the above output?

A.

show vsf member

B.

show vsf link

C.

show vsf topology

D.

show vsf detail

Full Access
Question # 9

Which two types of routes can be found in the IP routing table of an Aruba AOS-CX switch? (Choose two.)

A.

Local

B.

EIGRP

C.

BGP

D.

ISIS

E.

RIPng

Full Access
Question # 10

Refer to the exhibit.

What does the command page result in?

A.

Starts an automatic page scrolling effect that pauses for a few seconds every 30 rows.

B.

Enables a terminal notification when a new debug event occurs for L2MAC events.

C.

Shows a new terminal window opening to allow typing while debugging occurs.

D.

Results in a page break to disable the default continuous scrolling In the console.

Full Access
Question # 11

Refer to the exhibit.

Switch-1 is not the root bridge. The ports shown are all the connected pointtopoint interfaces. What Role (hidden by the blue rectangle) will be assigned to theLag 1interface?

A.

Alternate

B.

Backup

C.

Root

D.

Designated

Full Access
Question # 12

Place the OSI Layers in the correct order. Arrange them from least to greatest, starting with Layer 1 on the top, and progressing to Layer 7 on the bottom.

Full Access
Question # 13

Match each network protocol to the correct server listening port. Not all answers will be used.

Full Access
Question # 14

Which two options are the Layer 2 protocols? (Choose two.)

A.

802.1Q

B.

IPSec

C.

STP

D.

RIP

E.

802.11af

Full Access
Question # 15

What are the commands to disable SSH and HTTPS services from the default VRF?

A.

Core-1(config)# no ssh server Core-1(config)# no https-server

B.

Core-1# no ssh server vrf default Core-1# no https-server vrf default

C.

Core-1(config)# no ssh server enable Core-1(config)# no https-server enable

D.

Core-1(config)# no ssh server vrf default Core-1(config)# no https-server vrf default

Full Access
Question # 16

Match each description to the correct term.

Full Access
Question # 17

Which two statements accurately describe the features of NetEdit? (Choose two.)

A.

NetEdit can be used to configure and validate any third-party device that supports SSH and REST access.

B.

NetEdit includes trial licensing for up to 10 nodes.

C.

NetEdit can perform configuration and compliance validation.

D.

NetEdit supports viewing and editing multiple devices using a single deployment plan.

E.

NetEdit can run on a mobile device using Android or Apple IOS.

Full Access
Question # 18

What are two methods for remotely managing an Aruba AOS-CX switch? (Choose two.)

A.

SNMPv2c

B.

HTTPS

C.

USB-C console

D.

Telnet

E.

SSH

Full Access
Question # 19

What are two OSPF attributes within the hello messages that must match to successfully establish neighbor relationships? (Choose two.)

A.

Router ID

B.

Priority

C.

Hello and Dead intervals

D.

Area ID

E.

Process ID

Full Access
Question # 20

Refer to the exhibit.

The above scenario shows a packet from the Server destined for the Firewall. Switch-A and Switch-B are bundled as VSF stack. The LAG between the VSF stack and the firewall indicates a hash function to forward the packet on port 2/1/2.

Which statement is true regarding how Switch-A will forward the packet?

A.

Switch-A will forward the packet on port 1/1/2. VSF will override the typical LAG hash function used for the physical interface selection.

B.

Switch-A will drop the packet. Multi-Chassis lag to multi-chassis lag is not a supported feature of VSF.

C.

Switch-A will encapsulate the packet using GRE to forward to Switch-B in order for the packet to egress on port 2/1/2 per the hash function.

D.

Switch-A will forward the packet along the VSF link to Switch-B so that it will egress on port 2/1/2 per the hash function.

Full Access
Question # 21

The customer has 778 developers testing computer games on the network.

Which two actions resolve Broadcast storms? (Choose two.)

A.

Manually disable the redundant link to immediately resolve the impacted portion of the network.

B.

Utilize Spanning Tree to dynamically disable all redundant links in a segment.

C.

Setting switch ports to half-duplex will resolve Broadcast storms using Carrier Sense Multiple-Access Collision Detection (CSMA/CD).

D.

Enable single Area Open Shortest Path First (OSPF) on all Layer 2 switches, but do not enable routing.

E.

Utilize Spanning Tree to dynamically block Designated ports in addition to Alternate ports.

Full Access
Question # 22

Aruba Access Points tunnel traffic in a campus to the Mobility Controller using which protocol?

A.

Control and Provisioning of Wireless Access Points (CAPWAP)

B.

Generic Routing Encapsulation (GRE)

C.

Lightweight Access Point Protocol (LWAPP)

D.

Process Application Programming Interface (PAPI)

Full Access
Question # 23

Which two port characteristics must match between LAG interfaces? (Choose two.)

A.

Port number

B.

Duplex

C.

Member ID

D.

Media type

E.

Chassis number

Full Access
Question # 24

ServiceOS login:admin

SVOS>password

Enter password:********

Confirm password:********

The login password to access an Aruba AOS-CX was lost. After connecting to the switch console port, a reboot is performed and the Service OS console is accessed as shown above.

What is the default password that is required for the admin account while under the Service OS console?

A.

No password is set for this account.

B.

"password"

C.

"forgetme!"

D.

The same login password that has lost originally.

Full Access
Question # 25

Which option correctly describes a two-tier network design?

A.

designed to avoid routing entirely and to have Layer 2 remain across Core, Distribution, and Access layers

B.

divides the Core into two layers (Core and Aggregation) with the Access Layer only handling PoE and Access Control

C.

includes a Distribution Layer to provide Layer 3 features between a routed Core and a Layer 2 Access edge

D.

divides the network into two layers (Access and Core) with the option of routing to the Access Layer

Full Access
Question # 26

Which statement is correct regarding powering an Aruba Access Point?

A.

PoE or PoE+ is only used with Ethernet that is carried over multi-mode fiber cabling.

B.

Using switchports for this reason is unnecessary, because Aruba Access Points typically use an AC to DC

power adapter to draw power.

C.

PoE or PoE+ enabled switchports are rarely used given concerns about causing electrical interference, with the data also carried over Ethernet cabling.

D.

Most administrators use PoE or PoE+ enabled switchports to provide both Ethernet connectivity and power to the AP.

Full Access
Question # 27

Match the term to the correct description.

Full Access
Question # 28

Which two statements are true regarding Checkpoints on Aruba switches? (Choose two.)

A.

Rolling back to a prior checkpoint triggers a reboot of the switch.

B.

Stacking switches using VSF or VSX will disable the Checkpoint feature.

C.

A checkpoint is a snapshot of the running-configuration and relevant metadata at the time the checkpoint was created.

D.

System-generated checkpoints are created after a configuration change and 5 minutes of inactivity.

E.

Checkpoints are available on AOS 5400R switches, as well as on all AOS-CX switches.

Full Access
Question # 29

Refer to the exhibit.

All four switches in the diagram have been configured with the region name "Aruba1".

What two other MSTP configurations must match for switches within the same MST region? (Choose two.)

A.

MST region type

B.

MST Bridge ID

C.

MST version number

D.

MST revision number

E.

MST VLAN to instance mapping

Full Access
Question # 30

What is Deep Packet Inspection?

A.

a machine learning method of packet inspection for the purpose of choosing which dynamic routing protocol to automatically assign

B.

a concept that applies to firewalls, when examining packets only up through Layer 4

C.

a function of Policy Based Routing that examines the entire IPv4 header to forward traffic based on factors other than destination address

D.

a firewall process of examining the packet header all the way to Layer 7 in order to determine if the packet should be permitted or denied

Full Access
Question # 31

Review the exhibit.

Which ports should be configured as access ports? Click in the green box to make your selection. (Select two.)

Full Access