Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

HP HPE7-A02 Dumps

Page: 1 / 13
Total 130 questions

Aruba Certified Network Security Professional Exam Questions and Answers

Question 1

An admin has configured an AOS-CX switch with these settings:

port-access role employees

vlan access name employees

This switch is also configured with CPPM as its RADIUS server.

Which enforcement profile should you configure on CPPM to work with this configuration?

Options:

A.

RADIUS Enforcement type with HPE-User-Role VSA set to "employees"

B.

HPE Aruba Networking Downloadable Role Enforcement type with role name set to "employees"

C.

HPE Aruba Networking Downloadable Role Enforcement type with gateway role name set to "employees"

D.

RADIUS Enforcement type with Aruba-User-Role VSA set to "employees"

Question 2

What is a typical use case for using HPE Aruba Networking ClearPass Onboard to provision devices?

Options:

A.

Enabling unmanaged devices to succeed at certificate-based 802.1X

B.

Enabling managed Windows domain computers to succeed at certificate-based 802.1X

C.

Enhancing security for loT devices that need to authenticate with MAC-Auth

D.

Enforcing posture-based assessment on managed Windows domain computers

Question 3

A company has AOS-CX switches and HPE Aruba Networking APs, which run AOS-10 and bridge their SSIDs. Company security policies require 802.1X on all edge ports, some of which connect to APs. How should you configure the auth-mode on AOS-CX switches?

Options:

A.

Leave all edge ports in client auth-mode and configure device auth-mode in the AP role.

B.

Configure all edge ports in client auth-mode.

C.

Configure all edge ports in device auth-mode.

D.

Leave all edge ports in device auth-mode and configure client auth-mode in the AP role.

Question 4

A company has several use cases for using its AOS-CX switches' HPE Aruba Networking Network Analytics Engine (NAE).

What is one guideline to keep in mind as you plan?

Options:

A.

Each switch model has a maximum number of supported monitors, and one agent might have multiple monitors.

B.

You can install multiple scripts on a switch, but you can deploy only one agent per script.

C.

The switch will permit you to deploy as many NAE agents as you want, but they might degrade the switch functionality.

D.

When you use custom scripts, you can create as many agents from each script as you want.

Question 5

You are setting up policy rules in HPE Aruba Networking SSE. You want to create a single rule that permits users in a particular user group to access multiple applications. What is an easy way to meet this need?

Options:

A.

Associate the applications directly with the IdP used to authenticate the users; choose any for the destination in the policy rule.

B.

Apply the same tag to the applications; select the tag as a destination in the policy rule.

C.

Place all the applications in the same connector zone; select that zone as a destination in the policy rule.

D.

Select the applications within a non-default web profile; select that profile in the policy rule.

Question 6

as

The exhibit shows the 802.1X-related settings for Windows domain clients. What should admins change to make the settings follow best security practices?

Options:

A.

Specify at least two server names under the "Connect to these servers" field.

B.

Select the desired Trusted Root Certificate Authority and select the check box next to "Don't prompt users."

C.

Under the "Connect to these servers" field, use a wildcard in the server name.

D.

Clear the check box for using simple certificate selection and select the desired certificate manually.

Question 7

A company has HPE Aruba Networking APs (AOS-10), which authenticate clients to HPE Aruba Networking ClearPass Policy Manager (CPPM). CPPM is set up

to receive a variety of information about clients' profile and posture. New information can mean that CPPM should change a client's enforcement profile.

What should you set up on the APs to help the solution function correctly?

Options:

A.

In the security settings, configure dynamic denylisting.

B.

In the RADIUS server settings for CPPM, enable Dynamic Authorization.

C.

In the WLAN profiles, enable interim RADIUS accounting.

D.

In the RADIUS server settings for CPPM, enable querying the authentication status.

Question 8

You need to set up an HPE Aruba Networking VIA solution for a customer who needs to support 2100 remote employees. The customer wants employees to

download their VIA connection profile from the VPNC. Only employees who authenticate with their domain credentials to HPE Aruba Networking ClearPass Policy

Manager (CPPM) should be able to download the profile. (A RADIUS server group for CPPM is already set up on the VPNC.)

How do you configure the VPNC to enforce that requirement?

Options:

A.

Set up a VIA Authentication Profile that uses CPPM's server group; reference that profile in the VIA Web Authentication Profile.

B.

Reference CPPM's server group in an AAA profile; then, apply that profile to the VPNC's Internet-facing ports.

C.

Create a new VPN Authentication Profile and then reference CPPM's default server group in that profile.

D.

Set up a VIA Authentication Profile that uses CPPM's server group; reference that profile in the VIA Connection Profile.

Question 9

A company uses both HPE Aruba Networking ClearPass Policy Manager (CPPM) and HPE Aruba Networking ClearPass Device Insight (CPDI).

What is one way integrating the two solutions can help the company implement Zero Trust Security?

Options:

A.

CPPM can provide CPDI with custom device fingerprint definitions in order to enhance the company's total visibility.

B.

CPDI can provide CPPM with extra information about users' identity; CPPM can then use that information to apply the correct identity-based enforcement.

C.

CPPM can inform CPDI that it has assigned a particular Aruba-User-Role to a client; CPDI can then use that information to reclassify the client.

D.

CPDI can use tags to inform CPPM that clients are using prohibited applications; CPPM can then tell the network infrastructure to quarantine those clients.

Question 10

You want to examine the applications that a device is using and look for any changes in application usage over several different ranges. In which HPE Aruba Networking solution can you view this information in an easy-to-view format?

Options:

A.

HPE Aruba Networking ClearPass OnGuard agent installed on the device

B.

HPE Aruba Networking Central within a device's Live Monitoring page

C.

HPE Aruba Networking ClearPass Insight using an Active Endpoint Security report

D.

HPE Aruba Networking ClearPass Device Insight (CPDI) in the device's network activity

Question 11

A company is implementing HPE Aruba Networking Wireless IDS/IPS (WIDS/WIPS) on its AOS-10 APs, which are managed in HPE Aruba Networking Central.

What is one requirement for enabling detection of rogue APs?

Options:

A.

Each VLAN in the network assigned on at least one AP's or AM's port

B.

A Foundation with Security license for each of the APs

C.

One AM deployed for every one AP deployed

D.

A manual radio profile that enables non-regulatory channels

Question 12

A company uses HPE Aruba Networking ClearPass Policy Manager (CPPM) and HPE Aruba Networking ClearPass Device Insight (CPDI) and has integrated the

two. CPDI admins have created a tag. CPPM admins have created rules that use that tag in the wired 802.1X and wireless 802.1X services' enforcement policies.

The company requires CPPM to apply the tag-based rules to a client directly after it learns that the client has that tag.

What is one of the settings that you should verify on CPPM?

Options:

A.

The "Device Sync" setting is set to 1 in the ClearPass Device Insight Integration settings.

B.

Both 802.1X services have the "Profile Endpoints" option enabled and an appropriate CoA profile selected in the Profiler tab.

C.

Both 802.1X services have the "Use cached Role and Posture attributes from the previous sessions" setting.

D.

The "Polling Interval" is set to 1 in the ClearPass Device Insight Integration settings.

Question 13

You are establishing a cluster of HPE Aruba Networking ClearPass servers. (Assume that they are running version 6.9.).

For which type of certificate is it recommended to install a CA-signed certificate on the Subscriber before it joins the cluster?

Options:

A.

HTTPS

B.

Database

C.

RADIUS/EAP

D.

RadSec

Question 14

The security team needs you to show them information about MAC spoofing attempts detected by HPE Aruba Networking ClearPass Policy Manager (CPPM).

What should you do?

Options:

A.

Export the Access Tracker records on CPPM as an XML file.

B.

Use ClearPass Insight to run an Active Endpoint Security report.

C.

Integrate CPPM with ClearPass Device Insight (CPDI) and run a security report on CPDI.

D.

Show the security team the CPPM Endpoint Profiler dashboard.

Question 15

Which use case is fulfilled by applying a time range to a firewall rule on an AOS device?

Options:

A.

Enforcing the rule only during the specified time range

B.

Tuning the session timeout for sessions established with this rule

C.

Locking clients that violate the rule for the specified time range

D.

Setting the time range over which hit counts for the rule are aggregated

Question 16

A company has HPE Aruba Networking APs running AOS-10 that connect to AOS-CX switches. The APs will:

    Authenticate as 802.1X supplicants to HPE Aruba Networking ClearPass Policy Manager (CPPM)

    Be assigned to the "APs" role on the switches

    Have their traffic forwarded locally

What information do you need to help you determine the VLAN settings for the "APs" role?

Options:

A.

Whether the switches are using local user-roles (LURs) or downloadable user-roles (DURs).

B.

Whether the APs bridge or tunnel traffic on their SSIDs.

C.

Whether the switches have established tunnels with an HPE Aruba Networking gateway.

D.

Whether the APs have static or DHCP-assigned IP addresses.

Question 17

You need to use "Tips:Posture" conditions within an 802.1X service's enforcement policy.

Which guideline should you follow?

Options:

A.

Enable caching roles and posture attributes from previous sessions in the service's enforcement settings.

B.

Create rules that assign postures in the service's role mapping policy.

C.

Enable profiling in the service's general settings.

D.

Select the Posture Policy type for the service's enforcement policy.

Question 18

An AOS-CX switch has been configured to implement UBT to two HPE Aruba Networking gateways that implement VRRP on the users' VLAN. What correctly describes how the switch tunnels UBT users' traffic to those gateways?

Options:

A.

The switch always sends the users' traffic to the VRRP master.

B.

The switch always sends all users' traffic to the primary gateway configured in the UBT zone.

C.

The switch always load shares the users' traffic across both gateways.

D.

The switch always sends all users' traffic to the gateway assigned as the active device designed gateway.

Question 19

A company is using HPE Aruba Networking ClearPass Device Insight (CPDI) (the standalone application). In the CPDI security settings, Security Analysis is On, the Data Source is ClearPass Device Insight, and Enable Posture Assessment is On. You see that a device has a Risk Score of 90.

What can you know from this information?

Options:

A.

The posture is unknown, and CPDI has detected exactly four vulnerabilities on the device.

B.

The posture is healthy, but CPDI has detected multiple vulnerabilities on the device.

C.

The posture is unhealthy, and CPDI has also detected at least one vulnerability on the device.

D.

The posture is unhealthy, but CPDI has not detected any vulnerabilities on the device.

Question 20

A company has AOS-CX switches, which authenticate clients to HPE Aruba Networking ClearPass Policy Manager (CPPM). CPPM is set up to receive a variety of information about clients' profile and posture. New information can mean that CPPM should change a client's enforcement profile. What should you set up on the switches to help the solution function correctly?

Options:

A.

Enable RADIUS accounting to CPPM, including interim RADIUS accounting.

B.

Configure a RADIUS track that references CPPM's FQDN or IP address.

C.

Enable dynamic authorization, and specify CPPM as a dynamic authorization client.

D.

Re-configure the authentication server on the switch specifying CPPM as a TACACS server.

Question 21

What is a benefit of Online Certificate Status Protocol (OCSP)?

Options:

A.

It lets a device determine whether to trust a certificate without needing any root certificates installed.

B.

It lets a device query whether a single certificate is revoked or not.

C.

It lets a device download all the serial numbers for certificates revoked by a CA at once.

D.

It lets a device dynamically renew its certificate before the certificate expires.

Question 22

Refer to the exhibit.

as

The exhibit shows a saved packet capture, which you have opened in Wireshark. You want to focus on the complete conversation between 10.1.70.90 and 10.1.79.11 that uses source port 5448.

What is a simple way to do this in Wireshark?

Options:

A.

Apply a capture filter that selects for both the 10.1.70.90 and 10.1.79.11 IP addresses.

B.

Click the Source column and then the Destination column to sort the packets into the desired order.

C.

Apply a capture filter that selects for TCP port 5448.

D.

Right-click one of the packets between those addresses and choose to follow the stream.

Question 23

A company has HPE Aruba Networking APs running AOS-10 and managed by HPE Aruba Networking Central. The company also has AOS-CX switches. The

security team wants you to capture traffic from a particular wireless client. You should capture this client's traffic over a 15 minute time period and then send the

traffic to them in a PCAP file.

What should you do?

Options:

A.

Go to the client's AP in HPE Aruba Networking Central. Use the "Security" page to run a packet capture.

B.

Access the CLI for the client's AP. Set up a mirroring session between its radio and a management station running Wireshark.

C.

Access the CLI for the client's AP's switch. Set up a mirroring session between the AP's port and a management station running Wireshark.

D.

Go to that client in HPE Aruba Networking Central. Use the "Live Events" page to run a packet capture.

Question 24

A company wants HPE Aruba Networking ClearPass Policy Manager (CPPM) to respond to Syslog messages from its Check Point firewall. You have added the

firewall as an event source and set up an event service. However, test Syslog messages are not triggering the expected actions.

What is one CPPM setting that you should check?

Options:

A.

ClearPass Device Insight integration is disabled.

B.

The Check Point Extension is installed through ClearPass Guest.

C.

The CoA delay value is set to 0 on the server.

D.

Ingress Event Dictionaries for Check Point messages are enabled.

Question 25

as

(Note that the HPE Aruba Networking Central interface shown here might look slightly different from what you see in your HPE Aruba Networking Central

interface as versions change; however, similar concepts continue to apply.)

An HPE Aruba Networking 9x00 gateway is part of an HPE Aruba Networking Central group that has the settings shown in the exhibit. What would cause the

gateway to drop traffic as part of its IDPS settings?

Options:

A.

Its site-to-site VPN connections failing

B.

Traffic matching a rule in the active ruleset

C.

Its IDPS engine failing

D.

Traffic showing anomalous behavior

Question 26

HPE Aruba Networking Central displays a Gateway Threat Count alert in the alert list. How can you gather more information about what caused the alert to trigger?

Options:

A.

Use HPE Aruba Networking Central tools to run a Network Check on the gateway with which the alert is associated.

B.

Use Live Monitoring on the gateway to download a packet capture of recent traffic flowing through the gateway.

C.

Check the threat list for the gateway associated with the alert. Access threat details and download packet info.

D.

Check the gateway's Audit Trail in HPE Aruba Networking Central for more details about the threats that triggered the alert.

Question 27

A company has HPE Aruba Networking gateways that implement gateway IDS/IPS. Admins sometimes check the Security Dashboard, but they want a faster way to discover if a gateway starts detecting threats in traffic.

What should they do?

Options:

A.

Set up Webhooks that are attached to the HPE Aruba Networking Central Threat Dashboard.

B.

Use Syslog to integrate the gateways with HPE Aruba Networking ClearPass Policy Manager (CPPM) event processing.

C.

Set up email notifications using HPE Aruba Networking Central's global alert settings.

D.

Integrate HPE Aruba Networking ClearPass Device Insight (CPDI) with Central and schedule hourly reports.

Question 28

Refer to the Exhibit:

as

These packets have been captured from VLAN 10. which supports clients that receive their IP addresses with DHCP.

What can you interpret from the packets that you see here?

These packets have been captured from VLAN 10, which supports clients that receive their IP addresses with DHCP. What can you interpret from the packets that you see here?

Options:

A.

Someone is possibly implementing a MAC spoofing attack to gain unauthorized access.

B.

The mirroring session that captured the packets was likely misconfigured and captured duplicate traffic.

C.

An admin has likely misconfigured two clients to use the same DHCP settings.

D.

Someone is possibly implementing an ARP poisoning and MITM attack.

Question 29

A company has AOS-CX switches. The company wants to make it simpler and faster for admins to detect denial of service (DoS) attacks, such as ping or ARP floods, launched against the switches.

What can you do to support this use case?

Options:

A.

Deploy an NAE agent on the switches to monitor control plane policing (CoPP).

B.

Configure the switches to implement RADIUS accounting to HPE Aruba Networking ClearPass and enable HPE Aruba Networking ClearPass Insight.

C.

Implement ARP inspection on all VLANs that support end-user devices.

D.

Enabling debugging of security functions on the switches.

Question 30

What role can Internet Key Exchange (IKE)/IKEv2 play in an HPE Aruba Networking client-to-site VPN?

Options:

A.

It provides an alternative to IPsec that is suitable for legacy clients.

B.

It provides a more modern and secure alternative to IPsec.

C.

It helps to negotiate the IPsec SA automatically and securely.

D.

It helps remote clients download IPsec profiles for later use.

Question 31

You are using OpenSSL to obtain a certificate signed by a Certification Authority (CA). You have entered this command:

openssl req -new -out file1.pem -newkey rsa:3072 -keyout file2.pem

Enter PEM pass phrase: **********

Verifying - Enter PEM pass phrase: **********

Country Name (2 letter code) [AU]:US

State or Province Name (full name) [Some-State]:California

Locality Name (eg, city) []:Sunnyvale

Organization Name (eg, company) [Internet Widgits Pty Ltd]:example.com

Organizational Unit Name (eg, section) []:Infrastructure

Common Name (e.g. server FQDN or YOUR name) []:radius.example.com

What is one guideline for continuing to obtain a certificate?

Options:

A.

You should use a third-party tool to encrypt file2.pem before sending it and file1.pem to the CA.

B.

You should concatenate file1.pem and file2.pem into a single file, and submit that to the desired CA to sign.

C.

You should submit file1.pem, but not file2.pem, to the desired CA to sign.

D.

You should submit file2.pem, but not file1.pem, to the desired CA to sign.

Question 32

A company has HPE Aruba Networking APs, which authenticate users to HPE Aruba Networking ClearPass Policy Manager (CPPM).

What does HPE Aruba Networking recommend as the preferred method for assigning clients to a role on the AOS firewall?

Options:

A.

Configure CPPM to assign the role using a RADIUS enforcement profile with a RADIUS:IETF Username attribute.

B.

Configure CPPM to assign the role using a RADIUS enforcement profile with an Aruba-User-Role VSA.

C.

OCreate server rules on the APs to assign clients to roles based on RADIUS IETF attributes returned by CPPM.

D.

Create user rules on the APs to assign clients to roles based on a variety of criteria.

Question 33

The following firewall role is configured on HPE Aruba Networking Central-managed APs:

wlan access-rule employees

index 3

rule any any match 17 67 67 permit

rule any any match any 53 53 permit

rule 10 5 5.0 255.255 255.0 match any any any deny

rule 10.5 0.0 255.255 0.0 match 6 80 80 permit

rule 10.5 0.0 255.255.0.0 match 6 443 443 permit

rule 10.5.0.0 255.255.0.0 match any any any deny

rule any any match any any any permit

A client has authenticated and been assigned to the employees role. The client has IP address 10.2.2.2. Which correctly describes behavior in this policy?

Options:

A.

HTTPS traffic from 10.2.2.2 to 10.5.5.5 is denied.

B.

HTTPS traffic from 10.2.2.2 to 203.0.113.12 is denied.

C.

Traffic from 10.5.3.3 in an active HTTPS session between 10.2.2.2 and 10.5.3.3 is permitted.

D.

Traffic from 198.51.100.12 in an active HTTP session between 10.2.2.2 and 198.51.100.12 is denied.

Question 34

What is a benefit of Online Certificate Status Protocol (OCSP)?

Options:

A.

It lets a device query whether a single certificate is revoked or not.

B.

It lets a device dynamically renew its certificate before the certificate expires.

C.

It lets a device download all the serial numbers for certificates revoked by a CA at once.

D.

It lets a device determine whether to trust a certificate without needing any root certificates installed.

Question 35

You have run an Active Endpoint Security Report on HPE Aruba Networking ClearPass. The report indicates that hundreds of endpoints have MAC addresses but

no known IP addresses.

What is one step for addressing this issue?

Options:

A.

Set up network devices to implement RADIUS accounting to CPPM.

B.

Add CPPM's IP address to the IP helper list on routing switches.

C.

Set up switches to implement ARP inspection on client VLANs.

D.

Configure CPPM as a Syslog destination on network devices.

Question 36

Refer to Exhibit:

as

All of the switches in the exhibit are AOS-CX switches.

What is the preferred configuration on Switch-2 for preventing rogue OSPF routers in this network?

Options:

A.

Configure OSPF authentication on VLANs 10-19 in password mode.

B.

Configure OSPF authentication on Lag 1 in MD5 mode.

C.

Disable OSPF entirely on VLANs 10-19.

D.

Configure passive-interface as the OSPF default and disable OSPF passive on Lag 1.

Question 37

A company uses HPE Aruba Networking ClearPass Policy Manager (CPPM) as a TACACS+ server to authenticate managers on its AOS-CX switches. The

company wants CPPM to control which commands managers are allowed to enter. You see there is no field to enter these commands in ClearPass.

How do you start configuring the command list on CPPM?

Options:

A.

Add the Shell service to the managers' TACACS+ enforcement profiles.

B.

Edit the TACACS+ settings in the AOS-CX switches' network device entries.

C.

Create an enforcement policy with the TACACS+ type.

D.

Edit the settings for CPPM's default TACACS+ admin roles.

Question 38

A company has HPE Aruba Networking Central-managed APs. The company wants to block all clients connected through the APs from using YouTube.

Which steps should you take?

Options:

A.

Deploy gateways and have the APs tunnel traffic to the gateways. Then, enable the gateway IDS/IPS engine.

B.

Enable Client IPS at the "custom" level, and then specify the check for YouTube.

C.

Enable WebCC on all client firewall roles. Then, create WebCC category rules that deny suspicious URLs.

D.

Enable DPI. Then, create application rules to deny YouTube on the firewall roles.

Question 39

Your company wants to implement Tunneled EAP (TEAP).

How can you set up HPE Aruba Networking ClearPass Policy Manager (CPPM) to enforce certificated-based authentication for clients using TEAP?

Options:

A.

For the service using TEAP, set the authentication source to an internal database.

B.

Select a service certificate when you specify TEAP as a service's authentication method.

C.

Create an authentication method named "TEAP" with the type set to EAP-TLS.

D.

Select an EAP-TLS-type authentication method for the TEAP method's inner method.

Page: 1 / 13
Total 130 questions