Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

HP HPE7-A02 - Aruba Certified Network Security Professional Exam

Page: 2 / 4
Total 130 questions

A company issues user certificates to domain computers using its Windows CA and the default user certificate template. You have set up HPE Aruba Networking

ClearPass Policy Manager (CPPM) to authenticate 802.1X clients with those certificates. However, during tests, you receive an error that authorization has failed

because the usernames do not exist in the authentication source.

What is one way to fix this issue and enable clients to successfully authenticate with certificates?

A.

Configure rules to strip the domain name from the username.

B.

Change the authentication method list to include both PEAP MSCHAPv2 and EAP-TLS.

C.

Add the ClearPass Onboard local repository to the authentication source list.

D.

Remove EAP-TLS from the authentication method list and add TEAP there instead.

A company has HPE Aruba Networking Central-managed APs. The company wants to block all clients connected through the APs from using YouTube.

Which steps should you take?

A.

Deploy gateways and have the APs tunnel traffic to the gateways. Then, enable the gateway IDS/IPS engine.

B.

Enable Client IPS at the "custom" level, and then specify the check for YouTube.

C.

Enable WebCC on all client firewall roles. Then, create WebCC category rules that deny suspicious URLs.

D.

Enable DPI. Then, create application rules to deny YouTube on the firewall roles.

HPE Aruba Networking Central displays an alert about an Infrastructure Attack that was detected. You go to the Security > RAPIDS events and see that the attack

was "Detect adhoc using Valid SSID."

What is one possible next step?

A.

Use HPE Aruba Networking Central floorplans or the detecting AP identities to locate the general area for the threat.

B.

Look for the IP address associated with the offender and then check for that IP address among HPE Aruba Networking Central clients.

C.

Make sure that you have tuned the threshold for that check, as false positives are common for it.

D.

Make sure that clients have updated drivers, as faulty drivers are a common explanation for this attack type.

You are setting up policy rules in HPE Aruba Networking SSE. You want to create a single rule that permits users in a particular user group to access multiple applications. What is an easy way to meet this need?

A.

Associate the applications directly with the IdP used to authenticate the users; choose any for the destination in the policy rule.

B.

Apply the same tag to the applications; select the tag as a destination in the policy rule.

C.

Place all the applications in the same connector zone; select that zone as a destination in the policy rule.

D.

Select the applications within a non-default web profile; select that profile in the policy rule.

Refer to the Exhibit:

These packets have been captured from VLAN 10. which supports clients that receive their IP addresses with DHCP.

What can you interpret from the packets that you see here?

These packets have been captured from VLAN 10, which supports clients that receive their IP addresses with DHCP. What can you interpret from the packets that you see here?

A.

Someone is possibly implementing a MAC spoofing attack to gain unauthorized access.

B.

The mirroring session that captured the packets was likely misconfigured and captured duplicate traffic.

C.

An admin has likely misconfigured two clients to use the same DHCP settings.

D.

Someone is possibly implementing an ARP poisoning and MITM attack.

You have run an Active Endpoint Security Report on HPE Aruba Networking ClearPass. The report indicates that hundreds of endpoints have MAC addresses but

no known IP addresses.

What is one step for addressing this issue?

A.

Set up network devices to implement RADIUS accounting to CPPM.

B.

Add CPPM's IP address to the IP helper list on routing switches.

C.

Set up switches to implement ARP inspection on client VLANs.

D.

Configure CPPM as a Syslog destination on network devices.

A company needs you to integrate HPE Aruba Networking ClearPass Policy Manager (CPPM) with HPE Aruba Networking ClearPass Device Insight (CPDI).

What is one task you should do to prepare?

A.

Install the root CA for CPPM's HTTPS certificate as trusted in the CPDI application.

B.

Configure WMI, SSH, and SNMP external accounts for device scanning on CPPM.

C.

Enable Insight in the CPPM server configuration settings.

D.

Collect a Data Collector token from HPE Aruba Networking Central.

You have downloaded a packet capture that you generated on HPE Aruba Networking Central. When you open the capture in Wireshark, you see the output shown in the

exhibit.

What should you do in Wireshark so that you can better interpret the packets?

A.

Choose to decode UDP port 5555 packets as ARUBA_ERM and set the Aruba ERM Type to 0.

B.

Edit preferences for IEEE 802.11 and chose to ignore the Protection bit with IV.

C.

Apply the following display filter: wlan.fc.type == 1.

D.

Edit the Enabled Protocols and make sure that 802.11, GRE, and Aruba_ERM are enabled.

A company has AOS-CX switches, which authenticate clients to HPE Aruba Networking ClearPass Policy Manager (CPPM). CPPM is set up to receive a variety of information about clients' profile and posture. New information can mean that CPPM should change a client's enforcement profile. What should you set up on the switches to help the solution function correctly?

A.

Enable RADIUS accounting to CPPM, including interim RADIUS accounting.

B.

Configure a RADIUS track that references CPPM's FQDN or IP address.

C.

Enable dynamic authorization, and specify CPPM as a dynamic authorization client.

D.

Re-configure the authentication server on the switch specifying CPPM as a TACACS server.

Refer to the exhibit:

The exhibit shows the TACACS+ enforcement profile that HPE Aruba Networking ClearPass Policy Manager (CPPM) assigns to a manager. When this manager logs into an AOS-CX switch, what does the switch do?

A.

Assigns the manager operator-level privileges

B.

Assigns the manager administrator-level privileges

C.

Rejects the manager with an error message

D.

Assigns the manager auditor-level privileges