Month End Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

HP HPE7-A02 - Aruba Certified Network Security Professional Exam

Page: 1 / 4
Total 135 questions

A company wants you to integrate HPE Aruba Networking ClearPass Policy Manager (CPPM) with HPE Aruba Networking ClearPass Device Insight (CPDI).

What is one aspect of the integration that you should explain?

A.

CPPM no longer supports any Device Profiler features and relies on CPDI for this profile information.

B.

CPDI must be configured as an audit server on CPPM for the integration to be successful.

C.

CPDI must have security analysis disabled on it for the integration to be successful.

D.

CPPM can submit profile information to CPDI, but if CPDI derives a different classification, CPDI takes precedence.

You are proposing HPE Aruba Networking ZTNA to an organization that currently uses a third-party, IPsec-based client-to-site VPN.

What is one advantage of ZTNA that you should emphasize?

A.

ZTNA improves security for SaaS applications, which now make up the majority of remote user traffic.

B.

ZTNA offers no greater security than the current solution, but it makes it much easier for admins to create and maintain consistent policies.

C.

ZTNA is specifically designed to enhance security for Internet of Things (IoT) devices, which traditional client-to-site VPNs cannot address.

D.

ZTNA shrinks the attack surface, eliminating publicly exposed ports and reducing the extent of the private network exposed to remote users.

(Note that the HPE Aruba Networking Central interface shown here might look slightly different from what you see in your HPE Aruba Networking Central

interface as versions change; however, similar concepts continue to apply.)

An HPE Aruba Networking 9x00 gateway is part of an HPE Aruba Networking Central group that has the settings shown in the exhibit. What would cause the

gateway to drop traffic as part of its IDPS settings?

A.

Its site-to-site VPN connections failing

B.

Traffic matching a rule in the active ruleset

C.

Its IDPS engine failing

D.

Traffic showing anomalous behavior

You are using OpenSSL to obtain a certificate signed by a Certification Authority (CA). You have entered this command:

openssl req -new -out file1.pem -newkey rsa:3072 -keyout file2.pem

Enter PEM pass phrase: **********

Verifying - Enter PEM pass phrase: **********

Country Name (2 letter code) [AU]:US

State or Province Name (full name) [Some-State]:California

Locality Name (eg, city) []:Sunnyvale

Organization Name (eg, company) [Internet Widgits Pty Ltd]:example.com

Organizational Unit Name (eg, section) []:Infrastructure

Common Name (e.g. server FQDN or YOUR name) []:radius.example.com

What is one guideline for continuing to obtain a certificate?

A.

You should use a third-party tool to encrypt file2.pem before sending it and file1.pem to the CA.

B.

You should concatenate file1.pem and file2.pem into a single file, and submit that to the desired CA to sign.

C.

You should submit file1.pem, but not file2.pem, to the desired CA to sign.

D.

You should submit file2.pem, but not file1.pem, to the desired CA to sign.

A company wants to use the HPE Aruba Networking ClearPass OnGuard agent to assign posture to clients.

How do you define the conditions by which a client receives a particular posture?

A.

Create rules within a posture policy

B.

Create rules within a WebAuth enforcement policy

C.

Create the rules directly in a service’s Enforcement tab

D.

Create rules directly in a service’s Posture tab

A company uses both HPE Aruba Networking ClearPass Policy Manager (CPPM) and HPE Aruba Networking ClearPass Device Insight (CPDI).

What is one way integrating the two solutions can help the company implement Zero Trust Security?

A.

CPPM can provide CPDI with custom device fingerprint definitions in order to enhance the company's total visibility.

B.

CPDI can provide CPPM with extra information about users' identity; CPPM can then use that information to apply the correct identity-based enforcement.

C.

CPPM can inform CPDI that it has assigned a particular Aruba-User-Role to a client; CPDI can then use that information to reclassify the client.

D.

CPDI can use tags to inform CPPM that clients are using prohibited applications; CPPM can then tell the network infrastructure to quarantine those clients.

An AOS-CX switch has this admin user account configured on it:

netadmin in the operators group.

You have configured these commands on an AOS-CX switch:

tacacs-server host cp.example.com key plaintext &12xl,powmay7855

aaa authentication login ssh group tacacs local

aaa authentication allow-fail-through

A user accesses the switch with SSH and logs in as netadmin with the correct password. When the switch sends a TACACS+ request to the ClearPass server at cp.example.com, the server does not send a response. Authentication times out.

What happens?

A.

The user is logged in and granted operator access.

B.

The user is logged in and allowed to enter auditor commands only.

C.

The user is logged in and granted administrators access.

D.

The user is not allowed to log in.

Refer to Exhibit.

A company is using HPE Aruba Networking ClearPass Device Insight (CPDI) (the standalone application). In the CPDI interface, you go to the Generic Devices

page and see the view shown in the exhibit.

What correctly describes what you see?

A.

Each cluster is a group of unclassified devices that CPDI's machine learning has discovered to have similar attributes.

B.

Each cluster is a group of devices that match one of the tags configured by admins.

C.

Each cluster is all the devices that have been assigned to the same category by one of CPDI's built-in system rules.

D.

Each cluster is a group of devices that have been classified with user rules, but for which CPDI offers different recommendations.

A company has several use cases for using its AOS-CX switches' HPE Aruba Networking Network Analytics Engine (NAE).

What is one guideline to keep in mind as you plan?

A.

Each switch model has a maximum number of supported monitors, and one agent might have multiple monitors.

B.

You can install multiple scripts on a switch, but you can deploy only one agent per script.

C.

The switch will permit you to deploy as many NAE agents as you want, but they might degrade the switch functionality.

D.

When you use custom scripts, you can create as many agents from each script as you want.

You have installed an HPE Aruba Networking Network Analytic Engine (NAE) script on an AOS-CX switch to monitor a particular function.

Which additional step must you complete to start the monitoring?

A.

Reboot the switch.

B.

Enable NAE, which is disabled by default.

C.

Edit the script to define monitor parameters.

D.

Create an agent from the script.