Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

HPE6-A78 Exam Dumps - Aruba Certified Network Security Associate Exam

Go to page:
Question # 41

What is a guideline for managing local certificates on AOS-CX switches?

A.

Understand that the switch must use the same certificate for all usages, such as its HTTPS server and RadSec client.

B.

Create a self-signed certificate online on the switch because AOS-CX switches do not support CA-signed certificates.

C.

Before installing the local certificate, create a trust anchor (TA) profile with the root CA certificate for the certificate that you will install.

D.

Install an Online Certificate Status Protocol (OCSP) certificate to simplify the process of enrolling and re-enrolling for certificates.

Full Access
Question # 42

A company with 439 employees wants to deploy an open WLAN for guests. The company wants the experience to be as follows:

*Guests select the WLAN and connect without having to enter a password.

*Guests are redirected to a welcome web page and log in.

The company also wants to provide encryption for the network for devices that are capable. Which security options should you implement for the WLAN?

A.

Opportunistic Wireless Encryption (OWE) and WPA3-Personal

B.

WPA3-Personal and MAC-Auth

C.

Captive portal and Opportunistic Wireless Encryption (OWE) in transition mode

D.

Captive portal and WPA3-Personal

Full Access
Question # 43

How does the AOS firewall determine which rules to apply to a specific client's traffic?

A.

The firewall applies the rules in policies associated with the client's user role.

B.

The firewall applies every rule that includes the client's IP address as the source.

C.

The firewall applies the rules in policies associated with the client's WLAN.

D.

The firewall applies every rule that includes the client's IP address as the source or destination.

Full Access
Question # 44

A company has an ArubaOS controller-based solution with a WPA3-Enterprise WLAN. which authenticates wireless clients to Aruba ClearPass Policy Manager (CPPM). The company has decided to use digital certificates for authentication A user's Windows domain computer has had certificates installed on it However, the Networks and Connections window shows that authentication has tailed for the user. The Mobility Controllers (MC's) RADIUS events show that it is receiving Access-Rejects for the authentication attempt.

What is one place that you can you look for deeper insight into why this authentication attempt is failing?

A.

the reports generated by Aruba ClearPass Insight

B.

the RADIUS events within the CPPM Event Viewer

C.

the Alerts tab in the authentication record in CPPM Access Tracker

D.

the packets captured on the MC control plane destined to UDP 1812

Full Access
Question # 45

How can hackers implement a man-in-the-middle (MITM) attack against a wireless client?

A.

The hacker uses a combination of software and hardware to jam the RF band and prevent the client from connecting to any wireless networks.

B.

The hacker runs an NMap scan on the wireless client to find its MAC and IP address. The hacker then connects to another network and spoofs those addresses.

C.

The hacker connects a device to the same wireless network as the client and responds to the client’s ARP requests with the hacker device’s MAC address.

D.

The hacker uses spear-phishing to probe for the IP addresses that the client is attempting to reach. The hacker device then spoofs those IP addresses.

Full Access
Question # 46

What is one practice that can help you to maintain a digital chain of custody in your network?

A.

Enable packet capturing on Instant AP or Mobility Controller (MC) datapath on an ongoing basis.

B.

Ensure that all network infrastructure devices use RADIUS rather than TACACS+ to authenticate managers.

C.

Ensure that all network infrastructure devices receive a valid clock using authenticated NTP.

D.

Enable packet capturing on Instant AP or Mobility Controller (MC) controlpath on an ongoing basis.

Full Access
Question # 47

An organization has HPE Aruba Networking infrastructure, including AOS-CX switches and an AOS-8 mobility infrastructure with Mobility Controllers (MCs) and APs. Clients receive certificates from ClearPass Onboard. The infrastructure devices authenticate clients to ClearPass Policy Manager (CPPM). The company wants to start profiling clients to take their device type into account in their access rights.

What is a role that CPPM should play in this plan?

A.

Assigning clients to their device categories

B.

Helping to forward profiling information to the component responsible for profiling

C.

Accepting and enforcing CoA messages

D.

Enforcing access control decisions

Full Access
Question # 48

What is one difference between EAP-Tunneled Layer security (EAP-TLS) and Protected EAP (PEAP)?

A.

EAP-TLS creates a TLS tunnel for transmitting user credentials, while PEAP authenticates the server and supplicant during a TLS handshake.

B.

EAP-TLS requires the supplicant to authenticate with a certificate, hut PEAP allows the supplicant to use a username and password.

C.

EAP-TLS begins with the establishment of a TLS tunnel, but PEAP does not use a TLS tunnel as part of Its process

D.

EAP-TLS creates a TLS tunnel for transmitting user credentials securely while PEAP protects user credentials with TKIP encryption.

Full Access
Go to page: