Black Friday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

HP HPE6-A78 - Aruba Certified Network Security Associate Exam

Page: 5 / 5
Total 167 questions

What is one way that Control Plane Security (CPsec) enhances security for me network?

A.

It protects wireless clients' traffic tunneled between APs and Mobility Controllers, from eavesdropping

B.

It prevents Denial of Service (DoS) attacks against Mobility Controllers' (MCs") control plane.

C.

It prevents access from unauthorized IP addresses to critical services, such as SSH on Mobility Controllers (MCs).

D.

It protects management traffic between APs and Mobility Controllers (MCs) from eavesdropping.

Which is a correct description of a stage in the Lockheed Martin kill chain?

A.

In the delivery stage, malware collects valuable data and delivers or exfilltrated it to the hacker.

B.

In the reconnaissance stage, the hacker assesses the impact of the attack and how much information was exfilltrated.

C.

In the weaponization stage, which occurs after malware has been delivered to a system, the malware executes Its function.

D.

In the exploitation and installation phases, malware creates a backdoor into the infected system for the hacker.

Why might devices use a Diffie-Hellman exchange?

A.

to agree on a shared secret in a secure manner over an insecure network

B.

to obtain a digital certificate signed by a trusted Certification Authority

C.

to prove knowledge of a passphrase without transmitting the passphrase

D.

to signal that they want to use asymmetric encryption for future communications

Which attack is an example or social engineering?

A.

An email Is used to impersonate a Dank and trick users into entering their bank login information on a fake website page.

B.

A hacker eavesdrops on insecure communications, such as Remote Desktop Program (RDP). and discovers login credentials.

C.

A user visits a website and downloads a file that contains a worm, which sell-replicates throughout the network.

D.

An attack exploits an operating system vulnerability and locks out users until they pay the ransom.

Refer to the exhibits.

A company has added a new user group. Users in the group try to connect to the WLAN and receive errors that the connection has no Internet access. The users cannot reach any resources. The first exhibit shows the record for one of the users who cannot connect. The second exhibit shows the role to which the AOS device assigned the user’s client.

What is a likely problem?

A.

The AOS device does not have the correct RADIUS dictionaries installed on it to understand the Aruba-User-Role VSA.

B.

The AOS device has a server derivation rule configured on it that has overridden the role sent by CPPM.

C.

The clients rejected the server authentication on their side because they do not have the root CA for CPPM’s RADIUS/EAP certificate.

D.

The role name that CPPM is sending does not match the role name configured on the AOS device.

What is one way a noneypot can be used to launch a man-in-the-middle (MITM) attack to wireless clients?

A.

it uses a combination or software and hardware to jam the RF band and prevent the client from connecting to any wireless networks

B.

it runs an NMap scan on the wireless client to And the clients MAC and IP address. The hacker then connects to another network and spoofs those addresses.

C.

it examines wireless clients' probes and broadcasts the SSlDs in the probes, so that wireless clients will connect to it automatically.

D.

it uses ARP poisoning to disconnect wireless clients from the legitimate wireless network and force clients to connect to the hacker's wireless network instead.

A company is deploying ArubaOS-CX switches to support 135 employees, which will tunnel client traffic to an Aruba Mobility Controller (MC) for the MC to apply firewall policies and deep packet inspection (DPI). This MC will be dedicated to receiving traffic from the ArubaOS-CX switches.

What are the licensing requirements for the MC?

A.

one AP license per-switch

B.

one PEF license per-switch

C.

one PEF license per-switch. and one WCC license per-switch

D.

one AP license per-switch. and one PEF license per-switch

You have deployed a new HPE Aruba Networking Mobility Controller (MC) and campus APs (CAPs). One of the WLANs enforces 802.1X authentication to HPE Aruba Networking ClearPass Policy Manager (CPPM). When you test connecting the client to the WLAN, the test fails. You check ClearPass Access Tracker and cannot find a record of the authentication attempt. You ping from the MC to CPPM, and the ping is successful.

What is a good next step for troubleshooting?

A.

Renew CPPM's RADIUS/EAP certificate.

B.

Check connectivity between CPPM and a backend directory server.

C.

Check CPPM Event Viewer.

D.

Reset the user credentials.

A company has an AOS controller-based solution with a WPA3-Enterprise WLAN, which authenticates wireless clients to HPE Aruba Networking ClearPass Policy Manager (CPPM). The company has decided to use digital certificates for authentication. A user's Windows domain computer has had certificates installed on it. However, the Networks and Connections window shows that authentication has failed for the user. The Mobility Controller’s (MC's) RADIUS events show that it is receiving Access-Rejects for the authentication attempt.

What is one place that you can look for deeper insight into why this authentication attempt is failing?

A.

The reports generated by HPE Aruba Networking ClearPass Insight

B.

The RADIUS events within the CPPM Event Viewer

C.

The Alerts tab in the authentication record in CPPM Access Tracker

D.

The packets captured on the MC control plane destined to UDP 1812

A user is having trouble connecting to an AP managed by a standalone Mobility Controller (MC). What can you do to get detailed logs and debugs for that user's client?

A.

In the MC CLI, set up a control plane packet capture and filter for the client's IP address.

B.

In the MC CLI, set up a data plane packet capture and filter for the client's MAC address.

C.

In the MC UI’s Traffic Analytics dashboard, look for the client's IP address.

D.

In the MC UI’s Diagnostics > Logs pages, add a "user-debug" log setting for the client's MAC address.