Weekend Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

HP HPE6-A78 Aruba Certified Network Security Associate Exam Exam Practice Test

Page: 1 / 17
Total 167 questions

Aruba Certified Network Security Associate Exam Questions and Answers

Question 1

A company has AOS-CX switches deployed in a two-tier topology that uses OSPF routing at the core.

You need to prevent ARP poisoning attacks. To meet this need, what is one technology that you could apply to user VLANs on access layer switches? (Select two.)

Options:

A.

ARP inspection

B.

OSPF passive interface

C.

BPDU guard (protection)

D.

DHCPv4 snooping

E.

BPDU filtering

Question 2

What is one benefit of enabling Enhanced Secure mode on an ArubaOS-Switch?

Options:

A.

Control Plane policing rate limits edge ports to mitigate DoS attacks on network servers.

B.

A self-signed certificate is automatically added to the switch trusted platform module (TPM).

C.

Insecure algorithms for protocol such as SSH are automatically disabled.

D.

All interfaces have 802.1X authentication enabled on them by default.

Question 3

What is one method for HPE Aruba Networking ClearPass Policy Manager (CPPM) to use DHCP to classify an endpoint?

Options:

A.

It can determine information such as the endpoint OS from the order of options listed in Option 55 of a DHCP Discover packet.

B.

It can respond to a client’s DHCP Discover with different DHCP Offers and then analyze the responses to identify the client OS.

C.

It can snoop DHCP traffic to register the clients’ IP addresses. It then knows where to direct its HTTP requests to actively probe for information about the client.

D.

It can alter the DHCP Offer to insert itself as a proxy gateway. It will then be inline in the traffic flow and can apply traffic analytics to classify clients.

Question 4

Refer to the exhibit, which shows the settings on the company's MCs.

Question # 4

You have deployed about 100 new HPE Aruba Networking 335 APs. What is required for the APs to become managed?

Options:

A.

Installing CA-signed certificates on the APs

B.

Approving the APs as authorized APs on the AP whitelist

C.

Installing self-signed certificates on the APs

D.

Configuring a PAPI key that matches on the APs and MCs

Question 5

What is an Authorized client, as defined by AOS Wireless Intrusion Prevention System (WIP)?

Options:

A.

A client that is on the WIP whitelist

B.

A client that has a certificate issued by a trusted Certification Authority (CA)

C.

A client that is NOT on the WIP blacklist

D.

A client that has successfully authenticated to an authorized AP and passed encrypted traffic

Question 6

You have been instructed to look in the ArubaOS Security Dashboard's client list. Your goal is to find clients that belong to the company and have connected to devices that might belong to hackers.

Which client fits this description?

Options:

A.

MAC address: d8:50:e6:f3:70:ab; Client Classification: Interfering; AP Classification: Rogue

B.

MAC address: d8:50:e6:f3:6e:c5; Client Classification: Interfering; AP Classification: Neighbor

C.

MAC address: d8:50:e6:f3:6e:60; Client Classification: Interfering; AP Classification: Authorized

D.

MAC address: d8:50:e6:f3:6d:a4; Client Classification: Authorized; AP Classification: Rogue

Question 7

You have an Aruba solution with multiple Mobility Controllers (MCs) and campus APs. You want to deploy a WPA3-Enterprise WLAN and authenticate users to Aruba ClearPass Policy Manager (CPPM) with EAP-TLS.

What is a guideline for ensuring a successful deployment?

Options:

A.

Avoid enabling CNSA mode on the WLAN, which requires the internal MC RADIUS server.

B.

Ensure that clients trust the root CA for the MCs’ Server Certificates.

C.

Educate users in selecting strong passwords with at least 8 characters.

D.

Deploy certificates to clients, signed by a CA that CPPM trusts.

Question 8

What is a use case for tunneling traffic between an Aruba switch and an AruDa Mobility Controller (MC)?

Options:

A.

applying firewall policies and deep packet inspection to wired clients

B.

enhancing the security of communications from the access layer to the core with data encryption

C.

securing the network infrastructure control plane by creating a virtual out-of-band-management network

D.

simplifying network infrastructure management by using the MC to push configurations to the switches

Question 9

You are deploying a new wireless solution with an HPE Aruba Networking Mobility Master (MM), Mobility Controllers (MCs), and campus APs (CAPs). The solution will include a WLAN that uses Tunnel for the forwarding mode and WPA3-Enterprise for the security option.

You have decided to assign the WLAN to VLAN 301, a new VLAN. A pair of core routing switches will act as the default router for wireless user traffic.

Which links need to carry VLAN 301?

Options:

A.

Only links on the path between APs and the core routing switches

B.

Only links on the path between APs and the MC

C.

All links in the campus LAN to ensure seamless roaming

D.

Only links between MC ports and the core routing switches

Question 10

You have been authorized to use containment to respond to rogue APs detected by ArubaOS Wireless Intrusion Prevention (WIP). What is a consideration for using tarpit containment versus traditional wireless containment?

Options:

A.

Rather than function wirelessly, tarpit containment sends ARP frames over the wired network to poison rogue APs ARP tables and prevent them from transmitting on the wired network.

B.

Rather than target all clients connected to rogue APs, tarpit containment targets only authorized clients that are connected to a rogue AP, reducing the chance of negative effects on neighbors.

C.

Tarpit containment does not require an RF Protect license to function, while traditional wireless containment does.

D.

Tarpit containment forms associations with clients to enable more effective containment with fewer disassociation frames than traditional wireless containment.

Question 11

You are managing an Aruba Mobility Controller (MC). What is a reason for adding a "Log Settings" definition in the ArubaOS Diagnostics > System > Log Settings page?

Options:

A.

Configuring the Syslog server settings for the server to which the MC forwards logs for a particular category and level

B.

Configuring the MC to generate logs for a particular event category and level, but only for a specific user or AP.

C.

Configuring a filter that you can apply to a defined Syslog server in order to filter events by subcategory

D.

Configuring the log facility and log format that the MC will use for forwarding logs to all Syslog servers

Question 12

What is one practice that can help you to maintain a digital chain or custody In your network?

Options:

A.

Enable packet capturing on Instant AP or Moodily Controller (MC) datepath on an ongoing basis

B.

Enable packet capturing on Instant AP or Mobility Controller (MC) control path on an ongoing basis.

C.

Ensure that all network infrastructure devices receive a valid clock using authenticated NTP

D.

Ensure that all network Infrastructure devices use RADIUS rather than TACACS+ to authenticate managers

Question 13

What is a correct guideline for the management protocols that you should use on ArubaOS-Switches?

Options:

A.

Disable Telnet and use TFTP instead.

B.

Disable SSH and use https instead.

C.

Disable Telnet and use SSH instead

D.

Disable HTTPS and use SSH instead

Question 14

You have been instructed to look in an AOS Security Dashboard’s client list. Your goal is to find clients that belong to the company and have connected to devices that might belong to hackers.

Which client fits this description?

Options:

A.

MAC address: d8:50:e6:f3:6d:a4; Client Classification: Authorized; AP Classification: Suspected Rogue

B.

MAC address: d8:50:e6:f3:6e:c5; Client Classification: Interfering; AP Classification: Neighbor

C.

MAC address: d8:50:e6:f3:6e:60; Client Classification: Interfering; AP Classification: Interfering

D.

MAC address: d8:50:e6:f3:70:ab; Client Classification: Interfering; AP Classification: Suspected Rogue

Question 15

What is social engineering?

Options:

A.

Hackers use Artificial Intelligence (Al) to mimic a user’s online behavior so they can infiltrate a network and launch an attack.

B.

Hackers use employees to circumvent network security and gather the information they need to launch an attack.

C.

Hackers intercept traffic between two users, eavesdrop on their messages, and pretend to be one or both users.

D.

Hackers spoof the source IP address in their communications so they appear to be a legitimate user.

Question 16

How should admins deal with vulnerabilities that they find in their systems?

Options:

A.

They should apply fixes, such as patches, to close the vulnerability before a hacker exploits it.

B.

They should add the vulnerability to their Common Vulnerabilities and Exposures (CVE).

C.

They should classify the vulnerability as malware. a DoS attack or a phishing attack.

D.

They should notify the security team as soon as possible that the network has already been breached.

Question 17

What is one difference between EAP-Tunneled Layer security (EAP-TLS) and Protected EAP (PEAP)?

Options:

A.

EAP-TLS creates a TLS tunnel for transmitting user credentials, while PEAP authenticates the server and supplicant during a TLS handshake.

B.

EAP-TLS requires the supplicant to authenticate with a certificate, hut PEAP allows the supplicant to use a username and password.

C.

EAP-TLS begins with the establishment of a TLS tunnel, but PEAP does not use a TLS tunnel as part of Its process

D.

EAP-TLS creates a TLS tunnel for transmitting user credentials securely while PEAP protects user credentials with TKIP encryption.

Question 18

What is one of the roles of the network access server (NAS) in the AAA framework?

Options:

A.

It negotiates with each user’s device to determine which EAP method is used for authentication.

B.

It determines which resources authenticated users are allowed to access and monitors each user’s session.

C.

It enforces access to network services and sends accounting information to the AAA server.

D.

It authenticates legitimate users and uses policies to determine which resources each user is allowed to access.

Question 19

Refer to the exhibit.

Question # 19

You are deploying a new HPE Aruba Networking Mobility Controller (MC), which is enforcing authentication to HPE Aruba Networking ClearPass Policy Manager (CPPM). The authentication is not working correctly, and you find the error shown in the exhibit in the CPPM Event Viewer.

What should you check?

Options:

A.

That the IP address that the MC is using to reach CPPM matches the one defined for the device on CPPM

B.

That the MC has valid admin credentials configured on it for logging into the CPPM

C.

That the MC has been added as a domain machine on the Active Directory domain with which CPPM is synchronized

D.

That the shared secret configured for the CPPM authentication server matches the one defined for the device on CPPM

Question 20

You are checking the Security Dashboard in the Web Ul for your ArubaOS solution and see that Wireless Intrusion Prevention (WIP) has discovered a rogue radio operating in ad hoc mode with open security. What correctly describes a threat that the radio could pose?

Options:

A.

It could open a backdoor into the corporate LAN for unauthorized users.

B.

It is running in a non-standard 802.11 mode and could effectively jam the wireless signal.

C.

It is flooding the air with many wireless frames in a likely attempt at a DoS attack.

D.

It could be attempting to conceal itself from detection by changing its BSSID and SSID frequently.

Question 21

A company has Aruba Mobility Controllers (MCs), Aruba campus APs, and ArubaOS-Switches. The company plans to use ClearPass Policy Manager (CPPM) to classify endpoints by type. This company is using only CPPM and no other ClearPass solutions.

The ClearPass admins tell you that they want to use HTTP User-Agent strings to help classify endpoints.

What should you do as a part of configuring the ArubaOS-Switches to support this requirement?

Options:

A.

Create a device fingerprinting policy that includes HTTP, and apply the policy to edge ports.

B.

Create remote mirrors that collect traffic on edge ports, and mirror it to CPPM's IP address.

C.

Configure CPPM as the sFlow collector, and make sure that sFlow is enabled on edge ports.

D.

Connect the switches to CPPM's span ports, and set up mirroring of HTTP traffic on the switches.

Question 22

A client has accessed an HTTPS server at myhost1.example.com using Chrome. The server sends a certificate that includes these properties:

    Subject name: myhost.example.com

    SAN: DNS: myhost.example.com; DNS: myhost1.example.com

    Extended Key Usage (EKU): Server authentication

    Issuer: MyCA_SigningThe server also sends an intermediate CA certificate for MyCA_Signing, which is signed by MyCA. The client’s Trusted CA Certificate list does not include the MyCA or MyCA_Signing certificates.Which factor or factors prevent the client from trusting the certificate?

Options:

A.

The client does not have the correct trusted CA certificates.

B.

The certificate lacks a valid SAN.

C.

The certificate lacks the correct EKU.

D.

The certificate lacks a valid SAN, and the client does not have the correct trusted CA certificates.

Question 23

Which correctly describes a way to deploy certificates to end-user devices?

Options:

A.

ClearPass Onboard can help to deploy certificates to end-user devices, whether or not they are members of a Windows domain

B.

ClearPass Device Insight can automatically discover end-user devices and deploy the proper certificates to them

C.

ClearPass OnGuard can help to deploy certificates to end-user devices, whether or not they are members of a Windows domain

D.

in a Windows domain, domain group policy objects (GPOs) can automatically install computer, but not user certificates

Question 24

Which is an accurate description of a type of malware?

Options:

A.

Worms are usually delivered in spear-phishing attacks and require users to open and run a file.

B.

Rootkits can help hackers gain elevated access to a system and often actively conceal themselves from detection.

C.

A Trojan is any type of malware that replicates itself and spreads to other systems automatically.

D.

Malvertising can only infect a system if the user encounters the malware on an untrustworthy site.

Question 25

From which solution can ClearPass Policy Manager (CPPM) receive detailed information about client device type OS and status?

Options:

A.

ClearPass Onboard

B.

ClearPass Access Tracker

C.

ClearPass OnGuard

D.

ClearPass Guest

Question 26

A user attempts to connect to an SSID configured on an AOS-8 mobility architecture with Mobility Controllers (MCs) and APs. The SSID enforces WPA3-Enterprise security and uses HPE Aruba Networking ClearPass Policy Manager (CPPM) as the authentication server. The WLAN has initial role, logon, and 802.1X default role, guest.

A user attempts to connect to the SSID, and CPPM sends an Access-Accept with an Aruba-User-Role VSA of "contractor," which exists on the MC.

What does the MC do?

Options:

A.

Applies the rules in the logon role, then guest role, and the contractor role

B.

Applies the rules in the contractor role

C.

Applies the rules in the contractor role and the logon role

D.

Applies the rules in the contractor role and guest role

Question 27

What are the roles of 802.1X authenticators and authentication servers?

Options:

A.

The authenticator stores the user account database, while the server stores access policies.

B.

The authenticator supports only EAP, while the authentication server supports only RADIUS.

C.

The authenticator is a RADIUS client and the authentication server is a RADIUS server.

D.

The authenticator makes access decisions and the server communicates them to the supplicant.

Question 28

You have deployed a new Aruba Mobility Controller (MC) and campus APs (CAPs). One of the WLANs enforces 802.IX authentication lo Aruba ClearPass Policy Manager {CPPM) When you test connecting the client to the WLAN. the test falls You check Aruba ClearPass Access Tracker and cannot find a record of the authentication attempt You ping from the MC to CPPM. and the ping is successful.

What is a good next step for troubleshooting?

Options:

A.

Renew CPPM's RADIUS/EAP certificate

B.

Reset the user credentials

C.

Check CPPM Event viewer.

D.

Check connectivity between CPPM and a backend directory server

Question 29

Device A is contacting https://arubapedia.arubanetworks.com. The web server sends a certificate chain. What does the browser do as part of validating the web server certificate?

Options:

A.

It makes sure that the key in the certificate matches the key that DeviceA uses for HTTPS.

B.

It makes sure the certificate has a DNS SAN that matches arubapedia.arubanetworks.com

C.

It makes sure that the public key in the certificate matches DeviceA's private HTTPS key.

D.

It makes sure that the public key in the certificate matches a private key stored on DeviceA.

Question 30

A company is deploying AOS-CX switches to support 114 employees, which will tunnel client traffic to an HPE Aruba Networking Mobility Controller (MC) for the MC to apply firewall policies and deep packet inspection (DPI). This MC will be dedicated to receiving traffic from the AOS-CX switches.

What are the licensing requirements for the MC?

Options:

A.

One PEF license per switch

B.

One PEF license per switch, and one WCC license per switch

C.

One AP license per switch

D.

One AP license per switch, and one PEF license per switch

Question 31

What is an example or phishing?

Options:

A.

An attacker sends TCP messages to many different ports to discover which ports are open.

B.

An attacker checks a user’s password by using trying millions of potential passwords.

C.

An attacker lures clients to connect to a software-based AP that is using a legitimate SSID.

D.

An attacker sends emails posing as a service team member to get users to disclose their passwords.

Question 32

Your Aruba Mobility Master-based solution has detected a rogue AP Among other information the ArubaOS Detected Radios page lists this Information for the AP

SSID = PubllcWiFI

BSSID = a8M27 12 34:56

Match method = Exact match

Match type = Eth-GW-wired-Mac-Table

The security team asks you to explain why this AP is classified as a rogue. What should you explain?

Options:

A.

The AP Is connected to your LAN because It is transmitting wireless traffic with your network's default gateway's MAC address as a source MAC Because it does not belong to the company, it is a rogue

B.

The ap has a BSSID mat matches authorized client MAC addresses. This indicates that the AP is spoofing the MAC address to gam unauthorized access to your company's wireless services, so It is a rogue

C.

The AP has been detected as launching a DoS attack against your company's default gateway. This qualities it as a rogue which needs to be contained with wireless association frames immediately

D.

The AP is spoofing a routers MAC address as its BSSID. This indicates mat, even though WIP cannot determine whether the AP is connected to your LAN. it is a rogue.

Question 33

Two wireless clients, client 1 and client 2, are connected to an ArubaOS Mobility Controller. Subnet 10.1.10.10/24 is a network of servers on the other side of the ArubaOS firewall. The exhibit shows all three firewall rules that apply to these clients.

Which traffic is permitted?

Options:

A.

an HTTPS request from client 1 to 10.1.10.10 and an HTTPS response from 10.1.10.10 to client 1

B.

an HTTPS request from client 1 to 10.1.10.10 and an HTTPS request from 10.1.10.11 to client 1

C.

an HTTPS request from 10.1.10.10 to client 1 and an HTTPS re-sponse from client 1 to 10.1.10.10

D.

an HTTPS request from client 1 to client 2 and an HTTPS request from client 2 to client 1

Question 34

Which endpoint classification capabilities do Aruba network infrastructure devices have on their own without ClearPass solutions?

Options:

A.

ArubaOS-CX switches can use a combination of active and passive methods to assign roles to clients.

B.

ArubaOS devices (controllers and lAPs) can use DHCP fingerprints to assign roles to clients.

C.

ArubaOS devices can use a combination of DHCP fingerprints, HTTP User-Agent strings, and Nmap to construct endpoint profiles.

D.

ArubaOS-Switches can use DHCP fingerprints to construct detailed endpoint profiles.

Question 35

What is a difference between radius and TACACS+?

Options:

A.

RADIUS combines the authentication and authorization process while TACACS+ separates them.

B.

RADIUS uses TCP for Its connection protocol, while TACACS+ uses UDP tor its connection protocol.

C.

RADIUS encrypts the complete packet, white TACACS+ only offers partial encryption.

D.

RADIUS uses Attribute Value Pairs (AVPs) in its messages, while TACACS+ does not use them.

Question 36

A company has HPE Aruba Networking Mobility Controllers (MCs), HPE Aruba Networking campus APs, and AOS-CX switches. The company plans to use HPE Aruba Networking ClearPass Policy Manager (CPPM) to classify endpoints by type. The company is contemplating the use of ClearPass's TCP fingerprinting capabilities.

What is a consideration for using those capabilities?

Options:

A.

You will need to mirror traffic to one of CPPM’s span ports from a device such as a core routing switch.

B.

ClearPass admins will need to provide the credentials of an API admin account to configure on HPE Aruba Networking devices.

C.

AOS-CX switches do not offer the support necessary for CPPM to use TCP fingerprinting on wired endpoints.

D.

TCP fingerprinting of wireless endpoints requires a third-party Mobility Device Management (MDM) solution.

Question 37

Refer to the exhibit.

How can you use the thumbprint?

Options:

A.

Install this thumbprint on management stations to use as two-factor authentication along with manager usernames and passwords, this will ensure managers connect from valid stations

B.

Copy the thumbprint to other Aruba switches to establish a consistent SSH Key for all switches this will enable managers to connect to the switches securely with less effort

C.

When you first connect to the switch with SSH from a management station, make sure that the thumbprint matches to ensure that a man-in-t he-mid die (MITM) attack is not occurring

D.

install this thumbprint on management stations the stations can then authenticate with the thumbprint instead of admins having to enter usernames and passwords.

Question 38

Your HPE Aruba Networking Mobility Master-based solution has detected a rogue AP. Among other information, the AOS Detected Radios page lists this information for the AP:

SSID = PublicWiFi

BSSID = a8:bd:27:12:34:56

Match method = Plus one

Match method = Eth-Wired-Mac-Table

The security team asks you to explain why this AP is classified as a rogue. What should you explain?

Options:

A.

The AP has been detected using multiple MAC addresses. This indicates that the AP is spoofing its MAC address, which qualifies it as a suspected rogue.

B.

The AP is probably connected to your LAN because it has a BSSID that is close to a MAC address that has been detected in your LAN. Because it does not belong to the company, it is a suspected rogue.

C.

The AP is an AP that belongs to your solution. However, the AOS has detected that it is behaving suspiciously. It might have been compromised, so it is classified as a suspected rogue.

D.

The AP has a BSSID that is close to your authorized APs’ BSSIDs. This indicates that the AP might be spoofing the corporate SSID and attempting to lure clients to it, making the AP a suspected rogue.

Question 39

Which attack is an example or social engineering?

Options:

A.

An email Is used to impersonate a Dank and trick users into entering their bank login information on a fake website page.

B.

A hacker eavesdrops on insecure communications, such as Remote Desktop Program (RDP). and discovers login credentials.

C.

A user visits a website and downloads a file that contains a worm, which sell-replicates throughout the network.

D.

An attack exploits an operating system vulnerability and locks out users until they pay the ransom.

Question 40

The monitoring admin has asked you to set up an AOS-CX switch to meet these criteria:

    Send logs to a SIEM Syslog server at 10.4.13.15 at the standard TCP port (514)

    Send a log for all events at the "warning" level or above; do not send logs with a lower level than "warning"The switch did not have any "logging" configuration on it. You then entered this command:AOS-CX(config)# logging 10.4.13.15 tcp vrf defaultWhat should you do to finish configuring to the requirements?

Options:

A.

Specify the "warning" severity level for the logging server.

B.

Add logging categories at the global level.

C.

Ask for the Syslog password and configure it on the switch.

D.

Configure logging as a debug destination.

Question 41

What is a benefit of Protected Management Frames (PMF). sometimes called Management Frame Protection (MFP)?

Options:

A.

PMF helps to protect APs and MCs from unauthorized management access by hackers.

B.

PMF ensures trial traffic between APs and Mobility Controllers (MCs) is encrypted.

C.

PMF prevents hackers from capturing the traffic between APs and Mobility Controllers.

D.

PMF protects clients from DoS attacks based on forged de-authentication frames

Question 42

What distinguishes a Distributed Denial of Service (DDoS) attack from a traditional Denial of Service (DoS) attack?

Options:

A.

A DDoS attack originates from external devices, while a DoS attack originates from internal devices.

B.

A DoS attack targets one server; a DDoS attack targets all the clients that use a server.

C.

A DDoS attack targets multiple devices, while a DoS is designed to incapacitate only one device.

D.

A DDoS attack is launched from multiple devices, while a DoS attack is launched from a single device.

Question 43

You are configuring ArubaOS-CX switches to tunnel client traffic to an Aruba Mobility Controller (MC). What should you do to enhance security for control channel communications between the switches and the MC?

Options:

A.

Create one UBT zone for control traffic and a second UBT zone for clients.

B.

Configure a long, random PAPI security key that matches on the switches and the MC.

C.

install certificates on the switches, and make sure that CPsec is enabled on the MC

D.

Make sure that the UBT client vlan is assigned to the interface on which the switches reach the MC and only that interface.

Question 44

You have an Aruba Mobility Controller (MC). for which you are already using Aruba ClearPass Policy Manager (CPPM) to authenticate access to the Web Ul with usernames and passwords You now want to enable managers to use certificates to log in to the Web Ul CPPM will continue to act as the external server to check the names in managers' certificates and tell the MC the managers' correct rote

in addition to enabling certificate authentication. what is a step that you should complete on the MC?

Options:

A.

Verify that the MC has the correct certificates, and add RadSec to the RADIUS server configuration for CPPM

B.

install all of the managers' certificates on the MC as OCSP Responder certificates

C.

Verify that the MC trusts CPPM's HTTPS certificate by uploading a trusted CA certificate Also, configure a CPPM username and password on the MC

D.

Create a local admin account mat uses certificates in the account, specify the correct trusted CA certificate and external authentication

Question 45

You have detected a Rogue AP using the Security Dashboard Which two actions should you take in responding to this event? (Select two)

Options:

A.

There is no need to locale the AP If you manually contain It.

B.

This is a serious security event, so you should always contain the AP immediately regardless of your company's specific policies.

C.

You should receive permission before containing an AP. as this action could have legal Implications.

D.

For forensic purposes, you should copy out logs with relevant information, such as the time mat the AP was detected and the AP's MAC address.

E.

There is no need to locate the AP If the Aruba solution is properly configured to automatically contain it.

Question 46

You have an Aruba Mobility Controller (MC) that is locked in a closet. What is another step that Aruba recommends to protect the MC from unauthorized access?

Options:

A.

Use local authentication rather than external authentication to authenticate admins.

B.

Change the password recovery password.

C.

Set the local admin password to a long random value that is unknown or locked up securely.

D.

Disable local authentication of administrators entirely.

Question 47

A client has accessed an HTTPS server at myhost1.example.com using Chrome. The server sends a certificate that includes these properties:

    Subject name: myhost.example.com

    SAN: DNS: myhost.example.com; DNS: myhost1.example.com

    Extended Key Usage (EKU): Server authentication

    Issuer: MyCA_SigningThe server also sends an intermediate CA certificate for MyCA_Signing, which is signed by MyCA. The client’s Trusted CA Certificate list does not include the MyCA or MyCA_Signing certificates.Which factor or factors prevent the client from trusting the certificate?

Options:

A.

The client does not have the correct trusted CA certificates.

B.

The certificate lacks a valid SAN.

C.

The certificate lacks the correct EKU.

D.

The certificate lacks a valid SAN, and the client does not have the correct trusted CA certificates.

Question 48

Refer to the exhibit, which shows the current network topology.

Question # 48

You are deploying a new wireless solution with an Aruba Mobility Master (MM). Aruba Mobility Controllers (MCs). and campus APs (CAPs). The solution will Include a WLAN that uses Tunnel for the forwarding mode and Implements WPA3-Enterprise security

What is a guideline for setting up the vlan for wireless devices connected to the WLAN?

Options:

A.

Assign the WLAN to a single new VLAN which is dedicated to wireless users

B.

Use wireless user roles to assign the devices to different VLANs in the 100-150 range

C.

Assign the WLAN to a named VLAN which specified 100-150 as the range of IDs.

D.

Use wireless user roles to assign the devices to a range of new vlan IDs.

Question 49

What are some functions of an AruDaOS user role?

Options:

A.

The role determines which authentication methods the user must pass to gain network access

B.

The role determines which firewall policies and bandwidth contract apply to the clients traffic

C.

The role determines which wireless networks (SSiDs) a user is permitted to access

D.

The role determines which control plane ACL rules apply to the client's traffic

Question 50

What is an Authorized client as defined by ArubaOS Wireless Intrusion Prevention System (WIP)?

Options:

A.

a client that has a certificate issued by a trusted Certification Authority (CA)

B.

a client that is not on the WIP blacklist

C.

a client that has successfully authenticated to an authorized AP and passed encrypted traffic

D.

a client that is on the WIP whitelist.

Page: 1 / 17
Total 167 questions