Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

HPE6-A78 Aruba Certified Network Security Associate Exam Questions and Answers

Questions 4

Refer to the exhibit, which shows the current network topology.

You are deploying a new wireless solution with an Aruba Mobility Master (MM). Aruba Mobility Controllers (MCs). and campus APs (CAPs). The solution will Include a WLAN that uses Tunnel for the forwarding mode and Implements WPA3-Enterprise security

What is a guideline for setting up the vlan for wireless devices connected to the WLAN?

Options:

A.

Assign the WLAN to a single new VLAN which is dedicated to wireless users

B.

Use wireless user roles to assign the devices to different VLANs in the 100-150 range

C.

Assign the WLAN to a named VLAN which specified 100-150 as the range of IDs.

D.

Use wireless user roles to assign the devices to a range of new vlan IDs.

Buy Now
Questions 5

What is social engineering?

Options:

A.

Hackers use Artificial Intelligence (Al) to mimic a user’s online behavior so they can infiltrate a network and launch an attack.

B.

Hackers use employees to circumvent network security and gather the information they need to launch an attack.

C.

Hackers intercept traffic between two users, eavesdrop on their messages, and pretend to be one or both users.

D.

Hackers spoof the source IP address in their communications so they appear to be a legitimate user.

Buy Now
Questions 6

What purpose does an initialization vector (IV) serve for encryption?

Options:

A.

It enables programs to convert easily-remembered passphrases to keys of a correct length.

B.

It makes encryption algorithms more secure by ensuring that the same plaintext and key can produce different ciphertext.

C.

It helps parties to negotiate the keys and algorithms used to secure data before data transmission.

D.

It enables the conversion of asymmetric keys into keys that are suitable for symmetric encryption.

Buy Now
Questions 7

What is one thing can you determine from the exhibits?

Options:

A.

CPPM originally assigned the client to a role for non-profiled devices. It sent a CoA to the authenticator after it categorized the device.

B.

CPPM sent a CoA message to the client to prompt the client to submit information that CPPM can use to profile it.

C.

CPPM was never able to determine a device category for this device, so you need to check settings in the network infrastructure to ensure they support CPPM's endpoint classification.

D.

CPPM first assigned the client to a role based on the user's identity. Then, it discovered that the client had an invalid category, so it sent a CoA to blacklist the client.

Buy Now
Questions 8

A company has Aruba Mobility Controllers (MCs). Aruba campus APs. and ArubaOS-CX switches. The company plans to use ClearPass Policy Manager (CPPM) to classify endpoints by type The ClearPass admins tell you that they want to run Network scans as part of the solution

What should you do to configure the infrastructure to support the scans?

Options:

A.

Create a TA profile on the ArubaOS-Switches with the root CA certificate for ClearPass's HTTPS certificate

B.

Create device fingerprinting profiles on the ArubaOS-Switches that include SNMP. and apply the profiles to edge ports

C.

Create remote mirrors on the ArubaOS-Swrtches that collect traffic on edge ports, and mirror it to CPPM's IP address.

D.

Create SNMPv3 users on ArubaOS-CX switches, and make sure that the credentials match those configured on CPPM

Buy Now
Questions 9

A company has Aruba Mobility Controllers (MCs), Aruba campus APs, and ArubaOS-Switches. The company plans to use ClearPass Policy Manager (CPPM) to classify endpoints by type. This company is using only CPPM and no other ClearPass solutions.

The ClearPass admins tell you that they want to use HTTP User-Agent strings to help classify endpoints.

What should you do as a part of configuring the ArubaOS-Switches to support this requirement?

Options:

A.

Create a device fingerprinting policy that includes HTTP, and apply the policy to edge ports.

B.

Create remote mirrors that collect traffic on edge ports, and mirror it to CPPM's IP address.

C.

Configure CPPM as the sFlow collector, and make sure that sFlow is enabled on edge ports.

D.

Connect the switches to CPPM's span ports, and set up mirroring of HTTP traffic on the switches.

Buy Now
Questions 10

What is a use case for Transport Layer Security (TLS)?

Options:

A.

to establish a framework for devices to determine when to trust other devices' certificates

B.

to enable a client and a server to establish secure communications for another protocol

C.

to enable two parties to asymmetrically encrypt and authenticate all data that passes be-tween them

D.

to provide a secure alternative to certificate authentication that is easier to implement

Buy Now
Questions 11

A company has an ArubaOS solution. The company wants to prevent users assigned to the "user_group1" role from using gaming and peer-to-peer applications.

What is the recommended approach for these requirements?

Options:

A.

Make sure DPI is enabled, and add application rules that deny gaming and peer-to-peer applications to the "user_groupr role.

B.

Create ALGs for the gaming and peer-to-peer applications, and deny the "user_group1" role on the ALGs.

C.

Add access control rules to the "user_group1" role, which deny HTTP/HTTPS traffic to IP addresses associated with gaming and peer-to-peer applications.

D.

Create service aliases for the TCP ports associated with gaming and peer-to-per applications, and use those aliases in access control rules for the "user_group" rules.

Buy Now
Questions 12

What is one method for HPE Aruba Networking ClearPass Policy Manager (CPPM) to use DHCP to classify an endpoint?

Options:

A.

It can determine information such as the endpoint OS from the order of options listed in Option 55 of a DHCP Discover packet.

B.

It can respond to a client’s DHCP Discover with different DHCP Offers and then analyze the responses to identify the client OS.

C.

It can snoop DHCP traffic to register the clients’ IP addresses. It then knows where to direct its HTTP requests to actively probe for information about the client.

D.

It can alter the DHCP Offer to insert itself as a proxy gateway. It will then be inline in the traffic flow and can apply traffic analytics to classify clients.

Buy Now
Questions 13

From which solution can ClearPass Policy Manager (CPPM) receive detailed information about client device type OS and status?

Options:

A.

ClearPass Onboard

B.

ClearPass Access Tracker

C.

ClearPass OnGuard

D.

ClearPass Guest

Buy Now
Questions 14

A company with 382 employees wants to deploy an open WLAN for guests. The company wants the experience to be as follows:

The company also wants to provide encryption for the network for devices mat are capable, you implement Tor the WLAN?

Which security options should

Options:

A.

WPA3-Personal and MAC-Auth

B.

Captive portal and WPA3-Personai

C.

Captive portal and Opportunistic Wireless Encryption (OWE) in transition mode

D.

Opportunistic Wireless Encryption (OWE) and WPA3-Personal

Buy Now
Questions 15

The monitoring admin has asked you to set up an AOS-CX switch to meet these criteria:

    Send logs to a SIEM Syslog server at 10.4.13.15 at the standard TCP port (514)

    Send a log for all events at the "warning" level or above; do not send logs with a lower level than "warning"The switch did not have any "logging" configuration on it. You then entered this command:AOS-CX(config)# logging 10.4.13.15 tcp vrf defaultWhat should you do to finish configuring to the requirements?

Options:

A.

Specify the "warning" severity level for the logging server.

B.

Add logging categories at the global level.

C.

Ask for the Syslog password and configure it on the switch.

D.

Configure logging as a debug destination.

Buy Now
Questions 16

You have been instructed to look in the ArubaOS Security Dashboard's client list Your goal is to find clients mat belong to the company and have connected to devices that might belong to hackers

Which client fits this description?

Options:

A.

MAC address d8:50:e6:f3;6d;a4; Client Classification Authorized; AP Classification, interfering

B.

MAC address d8:50:e6 f3;6e;c5; Client Classification Interfering. AP Classification Neighbor

C.

MAC address d8:50:e6:f3;6e;60; Client Classification Interfering. AP Classification Interfering

D.

MAC address d8:50:e6:f3;TO;ab; Client Classification Interfering. AP Classification Rogue

Buy Now
Questions 17

How can ARP be used to launch attacks?

Options:

A.

Hackers can use ARP to change their NIC's MAC address so they can impersonate legiti-mate users.

B.

Hackers can exploit the fact that the port used for ARP must remain open and thereby gain remote access to another user's device.

C.

A hacker can use ARP to claim ownership of a CA-signed certificate that actually belongs to another device.

D.

A hacker can send gratuitous ARP messages with the default gateway IP to cause devices to redirect traffic to the hacker's MAC address.

Buy Now
Questions 18

Refer to the exhibit.

A diem is connected to an ArubaOS Mobility Controller. The exhibit snows all Tour firewall rules that apply to this diem

What correctly describes how the controller treats HTTPS packets to these two IP addresses, both of which are on the other side of the firewall

10.1 10.10

203.0.13.5

Options:

A.

It drops both of the packets

B.

It permits the packet to 10.1.10.10 and drops the packet to 203 0.13.5

C.

it permits both of the packets

D.

It drops the packet to 10.1.10.10 and permits the packet to 203.0.13.5.

Buy Now
Questions 19

An AOS-CX switch currently has no device fingerprinting settings configured on it. You want the switch to start collecting DHCP and LLDP information. You enter these commands:

Switch(config)# client device-fingerprint profile myprofile

Switch(myprofile)# dhcp

Switch(myprofile)# lldp

What else must you do to allow the switch to collect information from clients?

Options:

A.

Configure the switch as a DHCP relay

B.

Add at least one LLDP option to the policy

C.

Apply the policy to edge ports

D.

Add at least one DHCP option to the policy

Buy Now
Questions 20

What is one difference between EAP-Tunneled Layer security (EAP-TLS) and Protected EAP (PEAP)?

Options:

A.

EAP-TLS creates a TLS tunnel for transmitting user credentials, while PEAP authenticates the server and supplicant during a TLS handshake.

B.

EAP-TLS requires the supplicant to authenticate with a certificate, hut PEAP allows the supplicant to use a username and password.

C.

EAP-TLS begins with the establishment of a TLS tunnel, but PEAP does not use a TLS tunnel as part of Its process

D.

EAP-TLS creates a TLS tunnel for transmitting user credentials securely while PEAP protects user credentials with TKIP encryption.

Buy Now
Questions 21

What is a benefit of Protected Management Frames (PMF). sometimes called Management Frame Protection (MFP)?

Options:

A.

PMF helps to protect APs and MCs from unauthorized management access by hackers.

B.

PMF ensures trial traffic between APs and Mobility Controllers (MCs) is encrypted.

C.

PMF prevents hackers from capturing the traffic between APs and Mobility Controllers.

D.

PMF protects clients from DoS attacks based on forged de-authentication frames

Buy Now
Questions 22

Two wireless clients, client 1 and client 2, are connected to an ArubaOS Mobility Controller. Subnet 10.1.10.10/24 is a network of servers on the other side of the ArubaOS firewall. The exhibit shows all three firewall rules that apply to these clients.

Which traffic is permitted?

Options:

A.

an HTTPS request from client 1 to 10.1.10.10 and an HTTPS response from 10.1.10.10 to client 1

B.

an HTTPS request from client 1 to 10.1.10.10 and an HTTPS request from 10.1.10.11 to client 1

C.

an HTTPS request from 10.1.10.10 to client 1 and an HTTPS re-sponse from client 1 to 10.1.10.10

D.

an HTTPS request from client 1 to client 2 and an HTTPS request from client 2 to client 1

Buy Now
Questions 23

You are troubleshooting an authentication issue for Aruba switches that enforce 802 IX10 a cluster of Aruba ClearPass Policy Manager (CPPMs) You know that CPPM Is receiving and processing the authentication requests because the Aruba switches are showing Access-Rejects in their statistics However, you cannot find the record tor the Access-Rejects in CPPM Access Tracker

What is something you can do to look for the records?

Options:

A.

Make sure that CPPM cluster settings are configured to show Access-Rejects

B.

Verify that you are logged in to the CPPM Ul with read-write, not read-only, access

C.

Click Edit in Access viewer and make sure that the correct servers are selected.

D.

Go to the CPPM Event Viewer, because this is where RADIUS Access Rejects are stored.

Buy Now
Questions 24

You need to implement a WPA3-Enterprise network that can also support WPA2-Enterprise clients. What is a valid configuration for the WPA3-Enterprise WLAN?

Options:

A.

CNSA mode disabled with 256-bit keys

B.

CNSA mode disabled with 128-bit keys

C.

CNSA mode enabled with 256-bit keys

D.

CNSA mode enabled with 128-bit keys

Buy Now
Questions 25

What does the NIST model for digital forensics define?

Options:

A.

how to define access control policies that will properly protect a company's most sensitive data and digital resources

B.

how to properly collect, examine, and analyze logs and other data, in order to use it as evidence in a security investigation

C.

which types of architecture and security policies are best equipped to help companies establish a Zero Trust Network (ZTN)

D.

which data encryption and authentication algorithms are suitable for enterprise networks in a world that is moving toward quantum computing

Buy Now
Questions 26

The first exhibit shows roles on the MC, listed in alphabetic order. The second and third exhibits show the configuration for a WLAN to which a client connects. Which description of the role assigned to a user under various circumstances is correct?

Options:

A.

A user fails 802.1X authentication. The client remains connected, but is assigned the "guest" role.

B.

A user authenticates successfully with 802.1 X. and the RADIUS Access-Accept includes an Aruba-User-Role VSA set to "employeel.” The client’s role is "guest."

C.

A user authenticates successfully with 802.1X. and the RADIUS Access-Accept includes an Aruba-User-Role VSA set to "employee." The client’s role is "guest."

D.

A user authenticates successfully with 802.1X, and the RADIUS Access-Accept includes an Aruba-User-RoleVSA set to "employeel." The client's role is "employeel."

Buy Now
Questions 27

What is one way that Control Plane Security (CPSec) enhances security for the network?

Options:

A.

It protects management traffic between APs and Mobility Controllers (MCs) from eavesdropping.

B.

It prevents Denial of Service (DoS) attacks against Mobility Controllers' (MCs') control plane.

C.

It protects wireless clients' traffic, tunneled between APs and Mobility Controllers, from eavesdropping.

D.

It prevents access from unauthorized IP addresses to critical services, such as SSH, on Mobility Controllers (MCs).

Buy Now
Questions 28

A company is deploying AOS-CX switches to support 114 employees, which will tunnel client traffic to an HPE Aruba Networking Mobility Controller (MC) for the MC to apply firewall policies and deep packet inspection (DPI). This MC will be dedicated to receiving traffic from the AOS-CX switches.

What are the licensing requirements for the MC?

Options:

A.

One PEF license per switch

B.

One PEF license per switch, and one WCC license per switch

C.

One AP license per switch

D.

One AP license per switch, and one PEF license per switch

Buy Now
Questions 29

An admin has created a WLAN that uses the settings shown in the exhibits (and has not otherwise adjusted the settings in the AAA profile) A client connects to the WLAN Under which circumstances will a client receive the default role assignment?

Options:

A.

The client has attempted 802 1X authentication, but the MC could not contact the authentication server

B.

The client has attempted 802 1X authentication, but failed to maintain a reliable connection, leading to a timeout error

C.

The client has passed 802 1X authentication, and the value in the Aruba-User-Role VSA matches a role on the MC

D.

The client has passed 802 1X authentication and the authentication server did not send an Aruba-User-Role VSA

Buy Now
Questions 30

You are managing an Aruba Mobility Controller (MC). What is a reason for adding a "Log Settings" definition in the ArubaOS Diagnostics > System > Log Settings page?

Options:

A.

Configuring the Syslog server settings for the server to which the MC forwards logs for a particular category and level

B.

Configuring the MC to generate logs for a particular event category and level, but only for a specific user or AP.

C.

Configuring a filter that you can apply to a defined Syslog server in order to filter events by subcategory

D.

Configuring the log facility and log format that the MC will use for forwarding logs to all Syslog servers

Buy Now
Questions 31

What is an Authorized client, as defined by AOS Wireless Intrusion Prevention System (WIP)?

Options:

A.

A client that is on the WIP whitelist

B.

A client that has a certificate issued by a trusted Certification Authority (CA)

C.

A client that is NOT on the WIP blacklist

D.

A client that has successfully authenticated to an authorized AP and passed encrypted traffic

Buy Now
Questions 32

Refer to the exhibit.

This Aruba Mobility Controller (MC) should authenticate managers who access the Web Ul to ClearPass Policy Manager (CPPM) ClearPass admins have asked you to use RADIUS and explained that the MC should accept managers' roles in Aruba-Admin-Role VSAs

Which setting should you change to follow Aruba best security practices?

Options:

A.

Change the local user role to read-only

B.

Clear the MSCHAP check box

C.

Disable local authentication

D.

Change the default role to "guest-provisioning"

Buy Now
Questions 33

A customer has an AOS-10 network infrastructure. The customer is looking for a solution that can classify many different types of devices, including IoT devices. Which solution should you explain can provide these capabilities?

Options:

A.

HPE Aruba Networking EdgeConnect SD-WAN

B.

HPE Aruba Networking ClearPass OnGuard

C.

HPE Aruba Networking Central

D.

HPE Aruba Networking ClearPass Onboard

Buy Now
Questions 34

What is a benefit of deploying Aruba ClearPass Device insight?

Options:

A.

Highly accurate endpoint classification for environments with many devices types, including Internet of Things (loT)

B.

visibility into devices' 802.1X supplicant settings and automated certificate deployment

C.

Agent-based analysts of devices' security settings and health status, with the ability to implement quarantining

D.

Simpler troubleshooting of ClearPass solutions across an environment with multiple ClearPass Policy Managers

Buy Now
Questions 35

Refer to the exhibit, which shows the settings on the company’s MCs.

— Mobility Controller

Dashboard General Admin AirWave CPSec Certificates

Configuration

WLANsv Control Plane Security

Roles & PoliciesEnable CP Sec

Access PointsEnable auto cert provisioning:

You have deployed about 100 new Aruba 335-APs. What is required for the APs to become managed?

Options:

A.

installing CA-signed certificates on the APs

B.

installing self-signed certificates on the APs

C.

approving the APs as authorized APs on the AP whitelist

D.

configuring a PAPI key that matches on the APs and MCs

Buy Now
Questions 36

What is one way that WPA3-Enterprise enhances security when compared to WPA2-Enterprise?

Options:

A.

WPA3-Enterprise implements the more secure simultaneous authentication of equals (SAE), while WPA2-Enterprise uses 802.1X.

B.

WPA3-Enterprise provides built-in mechanisms that can deploy user certificates to authorized end-user devices.

C.

WPA3-Enterprise uses Diffie-Hellman in order to authenticate clients, while WPA2-Enterprise uses 802.1X authentication.

D.

WPA3-Enterprise can operate in CNSA mode, which mandates that the 802.11 association uses secure algorithms.

Buy Now
Questions 37

Refer to the exhibit.

A company has an HPE Aruba Networking Instant AP cluster. A Windows 10 client is attempting to connect to a WLAN that enforces WPA3-Enterprise with authentication to HPE Aruba Networking ClearPass Policy Manager (CPPM). CPPM is configured to require EAP-TLS. The client authentication fails. In the record for this client's authentication attempt on CPPM, you see this alert.

What is one thing that you check to resolve this issue?

Options:

A.

Whether EAP-TLS is enabled in the AAA Profile settings for the WLAN on the IAP cluster

B.

Whether the client has a valid certificate installed on it to let it support EAP-TLS

C.

Whether EAP-TLS is enabled in the SSID Profile settings for the WLAN on the IAP cluster

D.

Whether the client has a third-party 802.1X supplicant, as Windows 10 does not support EAP-TLS

Buy Now
Questions 38

Your HPE Aruba Networking Mobility Master-based solution has detected a rogue AP. Among other information, the AOS Detected Radios page lists this information for the AP:

SSID = PublicWiFi

BSSID = a8:bd:27:12:34:56

Match method = Plus one

Match method = Eth-Wired-Mac-Table

The security team asks you to explain why this AP is classified as a rogue. What should you explain?

Options:

A.

The AP has been detected using multiple MAC addresses. This indicates that the AP is spoofing its MAC address, which qualifies it as a suspected rogue.

B.

The AP is probably connected to your LAN because it has a BSSID that is close to a MAC address that has been detected in your LAN. Because it does not belong to the company, it is a suspected rogue.

C.

The AP is an AP that belongs to your solution. However, the AOS has detected that it is behaving suspiciously. It might have been compromised, so it is classified as a suspected rogue.

D.

The AP has a BSSID that is close to your authorized APs’ BSSIDs. This indicates that the AP might be spoofing the corporate SSID and attempting to lure clients to it, making the AP a suspected rogue.

Buy Now
Questions 39

What distinguishes a Distributed Denial of Service (DDoS) attack from a traditional Denial or service attack (DoS)?

Options:

A.

A DDoS attack originates from external devices, while a DoS attack originates from internal devices

B.

A DDoS attack is launched from multiple devices, while a DoS attack is launched from a single device

C.

A DoS attack targets one server, a DDoS attack targets all the clients that use a server

D.

A DDoS attack targets multiple devices, while a DoS Is designed to Incapacitate only one device

Buy Now
Questions 40

A user attempts to connect to an SSID configured on an AOS-8 mobility architecture with Mobility Controllers (MCs) and APs. The SSID enforces WPA3-Enterprise security and uses HPE Aruba Networking ClearPass Policy Manager (CPPM) as the authentication server. The WLAN has initial role, logon, and 802.1X default role, guest.

A user attempts to connect to the SSID, and CPPM sends an Access-Accept with an Aruba-User-Role VSA of "contractor," which exists on the MC.

What does the MC do?

Options:

A.

Applies the rules in the logon role, then guest role, and the contractor role

B.

Applies the rules in the contractor role

C.

Applies the rules in the contractor role and the logon role

D.

Applies the rules in the contractor role and guest role

Buy Now
Questions 41

What is an example of passive endpoint classification?

Options:

A.

TCP fingerprinting

B.

SSH scans

C.

WMI scans

D.

SNMP scans

Buy Now
Questions 42

What is one difference between EAP-Tunneled Layer Security (EAP-TLS) and Protected EAP (PEAP)?

Options:

A.

EAP-TLS begins with the establishment of a TLS tunnel, but PEAP does not use a TLS tunnel as part of its process.

B.

EAP-TLS requires the supplicant to authenticate with a certificate, but PEAP allows the supplicant to use a username and password.

C.

EAP-TLS creates a TLS tunnel for transmitting user credentials, while PEAP authenticates the server and supplicant during a TLS handshake.

D.

EAP-TLS creates a TLS tunnel for transmitting user credentials securely, while PEAP protects user credentials with TKIP encryption.

Buy Now
Questions 43

What is one way that WPA3-PerSonal enhances security when compared to WPA2-Personal?

Options:

A.

WPA3-Perscn3i is more secure against password leaking Because all users nave their own username and password

B.

WPA3-Personai prevents eavesdropping on other users' wireless traffic by a user who knows the passphrase for the WLAN.

C.

WPA3-Personai is more resistant to passphrase cracking Because it requires passphrases to be at least 12 characters

D.

WPA3-Personal is more complicated to deploy because it requires a backend authentication server

Buy Now
Questions 44

You have deployed a new Aruba Mobility Controller (MC) and campus APs (CAPs). One of the WLANs enforces 802.IX authentication lo Aruba ClearPass Policy Manager {CPPM) When you test connecting the client to the WLAN. the test falls You check Aruba ClearPass Access Tracker and cannot find a record of the authentication attempt You ping from the MC to CPPM. and the ping is successful.

What is a good next step for troubleshooting?

Options:

A.

Renew CPPM's RADIUS/EAP certificate

B.

Reset the user credentials

C.

Check CPPM Event viewer.

D.

Check connectivity between CPPM and a backend directory server

Buy Now
Questions 45

You have an AOS-8 architecture, consisting of a Mobility Conductor (MC) and Mobility Controllers (MCs). You want to monitor wireless clients’ application usage in the Traffic Analysis dashboard. What is a requirement?

Options:

A.

Configuring packet capturing on the MCs’ data plane

B.

Enabling logging on the users category on the MCs

C.

Discovering the mobility devices in HPE Aruba Networking Central

D.

Enabling firewall visibility and deep packet inspection (DPI) on the MCs

Buy Now
Questions 46

Refer to the exhibit.

You have set up a RADIUS server on an ArubaOS Mobility Controller (MC) when you created a WLAN named "MyEmployees .You now want to enable the MC to accept change of authorization (CoA) messages from this server for wireless sessions on this WLAN.

What Is a part of the setup on the MC?

Options:

A.

Create a dynamic authorization, or RFC 3576, server with the 10.5.5.5 address and correct shared secret.

B.

Install the root CA associated with the 10 5.5.5 server's certificate as a Trusted CA certificate.

C.

Configure a ClearPass username and password in the MyEmployees AAA profile.

D.

Enable the dynamic authorization setting in the "clearpass" authentication server settings.

Buy Now
Questions 47

You have been asked to send RADIUS debug messages from an ArubaOS-CX switch to a central SIEM server at 10.5.15.6. The server is already defined on the switch with this command: logging 10.5.6.12

You enter this command: debug radius all

What is the correct debug destination?

Options:

A.

console

B.

file

C.

syslog

D.

buffer

Buy Now
Questions 48

Which is a correct description of a Public Key Infrastructure (PKI)?

Options:

A.

A device uses Intermediate Certification Authorities (CAs) to enable it to trust root CAs that are different from the root CA that signed its own certificate.

B.

A user must manually choose to trust intermediate and end-entity certificates, or those certificates must be installed on the device as trusted in advance.

C.

Root Certification Authorities (CAs) primarily sign certificates, and Intermediate Certification Authorities (CAs) primarily validate signatures.

D.

A user must manually choose to trust a root Certification Authority (CA) certificate, or the root CA certificate must be installed on the device as trusted.

Buy Now
Questions 49

You have deployed a new HPE Aruba Networking Mobility Controller (MC) and campus APs (CAPs). One of the WLANs enforces 802.1X authentication to HPE Aruba Networking ClearPass Policy Manager (CPPM). When you test connecting the client to the WLAN, the test fails. You check ClearPass Access Tracker and cannot find a record of the authentication attempt. You ping from the MC to CPPM, and the ping is successful.

What is a good next step for troubleshooting?

Options:

A.

Renew CPPM's RADIUS/EAP certificate.

B.

Check connectivity between CPPM and a backend directory server.

C.

Check CPPM Event Viewer.

D.

Reset the user credentials.

Buy Now
Questions 50

Refer to the exhibit:

port-access role role1 vlan access 11

port-access role role2 vlan access 12

port-access role role3 vlan access 13

port-access role role4 vlan access 14

aaa authentication port-access dot1x authenticator

enable

interface 1/1/1

no shutdown

no routing

vlan access 1

aaa authentication port-access critical-role role1

aaa authentication port-access preauth-role role2

aaa authentication port-access auth-role role3

interface 1/1/2

no shutdown

no routing

vlan access 1

aaa authentication port-access critical-role role1

aaa authentication port-access preauth-role role2

aaa authentication port-access auth-role role3

The exhibit shows the configuration on an AOS-CX switch.

    Client1 connects to port 1/1/1 and authenticates to HPE Aruba Networking ClearPass Policy Manager (CPPM). CPPM sends an Access-Accept with this VSA: Aruba-User-Role: role4.

    Client2 connects to port 1/1/2 and does not attempt to authenticate.To which roles are the users assigned?

Options:

A.

Client1 = role3; Client2 = role2

B.

Client1 = role4; Client2 = role1

C.

Client1 = role4; Client2 = role2

D.

Client1 = role3; Client2 = role1

Buy Now
Exam Code: HPE6-A78
Exam Name: Aruba Certified Network Security Associate Exam
Last Update: May 1, 2025
Questions: 167
HPE6-A78 pdf

HPE6-A78 PDF

$25.5  $84.99
HPE6-A78 Engine

HPE6-A78 Testing Engine

$30  $99.99
HPE6-A78 PDF + Engine

HPE6-A78 PDF + Testing Engine

$40.5  $134.99