Go Back on ACMP_6.4 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

ACMP_6.4 Practice Test


Page 5 out of 35 Pages

Topic 2: Firewall Roles and Policies2-1 - Policy Design

ip access-list session anewone
user network 10.1.1.0 255.255.255.0 any permit
user any any permit
host 10.1.1.1 host 10.2.2.2 any deny
A user sends a frame with the following attributes:
Source IP: 10.1.1.1 Destination IP: 10.2.2.2 Destination Port: 25
Based on the above Mobility Controller configuration file segment, what will this policy do
with the user frame?


A.

The frame is discarded because of the implicit deny all at the end of the policy.


B.

The frame is discarded because of the statement:user host 10.1.1.1 host 10.2.2.2 deny.


C.

The frame is accepted because of the statement:user any any permit.


D.

The frame is accepted because of the statement:user network 10.1.1.0 255.255.255.0
any permit.


E.

This is not a valid policy.





C.
  

The frame is accepted because of the statement:user any any permit.



Refer to the following configuration segment for this item.
netdestination "internal"
no invert
network 172.16.43.0 255.255.255.0 position 1
range 172.16.11.0 172.16.11.16 position 2
!
ip access-list session "My-Policy"
alias "user" alias "internal" service_any permit queue low
A user frame is evaluated against this firewall policy with the following attributes:
Source IP: 172.17.49.3 Destination IP: 10.100.86.37 Destination Port: 80
Referring to the above file segment, how will the frame be handled by this firewall policy?


A.

The frame will be dropped because of the implicit deny all at the end of the
netdestination definition.


B.

The frame will be dropped because of the implicit deny all at the end of the firewall
policy.


C.

The frame will be forwarded because of the implicit permit all at the end of the firewall
policy.


D.

The frame will be passed because there is no service specified in the firewall policy.


E.

The frame will be dropped because there is no service specified in the firewall policy.





B.
  

The frame will be dropped because of the implicit deny all at the end of the firewall
policy.



Which describe "roles" as used on Aruba Mobility Controllers? (Choose two)


A.

 Roles are assigned to users.


B.

Roles are applied to interfaces.


C.

Policies are built from roles.


D.

A user can belong to only one role at a time.


E.

Roles are a set of authentication rules





A.
  

 Roles are assigned to users.



D.
  

A user can belong to only one role at a time.



When creating a firewall rule what are valid choices for the Service/Application field?
(Choose three)


A.

Applications


B.

Applications Category


C.

Internet Protocol


D.

Internet Category


E.

Protocol





A.
  

Applications



B.
  

Applications Category



E.
  

Protocol



What are valid methods of blacklisting a device? (Choose three)


A.

Manually


B.

Firewall Rule


C.

Firewall Policy


D.

Authentication Failures


E.

Data Rate Thresholds





A.
  

Manually



B.
  

Firewall Rule



D.
  

Authentication Failures




Page 5 out of 35 Pages
Previous