Go Back on ACMP_6.4 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

ACMP_6.4 Practice Test


Page 6 out of 35 Pages

Topic 2: Firewall Roles and Policies2-1 - Policy Design

What is the blacklist default time?


A.

30 seconds


B.

1800 seconds


C.

3600 seconds


D.

No default time, it must be done manually


E.

1 day





C.
  

3600 seconds



What are aliases used for?


A.

 improve controller performance


B.

simplify the configuration process


C.

tie IP addresses to ports


D.

assign rules to policies


E.

assign policies to roles





B.
  

simplify the configuration process



Which of the following firewall rules allows a user to initiate an ICMP session to other
devices?(Choose two)


A.

 localip any svc-icmp permit


B.

user any svc-icmp permit


C.

user user svc-icmp permit


D.

any any svc-icmp permit


E.

mswitch any svc-icmp permit





B.
  

user any svc-icmp permit



D.
  

any any svc-icmp permit



Refer to the following configuration segment for this item.
ip access-list session anewone
user network 172.16.1.0 255.255.255.0 any permit
user host 172.16.1.1 any deny
user any any permit
An administrator wants users to have access to all destinations except 172.16.1.1. Based
on the above Aruba Mobility Controller configuration segment, which statements best
describe this policy? (Choose two)


A.

The rule user host 172.16.1.1 any deny is redundant because of the implicit deny all at
the end.


B.

The rule user network 172.16.1.0 255.255.255.0 any permit is redundant.


C.

The two rules user network 172.16.1.0 255.255.255.0 any permit and user host
172.16.1.1 any deny need to be re-sequenced.


D.

The last statement user any any permit is not required


E.

The last statement should be any any any deny





B.
  

The rule user network 172.16.1.0 255.255.255.0 any permit is redundant.



C.
  

The two rules user network 172.16.1.0 255.255.255.0 any permit and user host
172.16.1.1 any deny need to be re-sequenced.



Which of the following could be used to set a user's post-authentication role or VLAN
association? (Choose two)


A.

AAA default role for authentication method


B.

Server Derivation Rule


C.

Vendor Specific Attributes


D.

AP Derivation Rule


E.

The Global AAA profile





B.
  

Server Derivation Rule



C.
  

Vendor Specific Attributes




Page 6 out of 35 Pages
Previous