Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

HP HPE7-A02 Aruba Certified Network Security Professional Exam Exam Practice Test

Demo: 39 questions
Total 130 questions

Aruba Certified Network Security Professional Exam Questions and Answers

Question 1

Which issue can an HPE Aruba Networking Secure Web Gateway (SWG) solution help customers address?

Options:

A.

The organization needs a faster way to quarantine clients that have generated threats, as detected by third-party firewalls.

B.

Hybrid workers are exposing their computers to risky internet sites and infection by malware when they work from home.

C.

Remote workers need access to private data center applications without exposing those applications to unauthorized users.

D.

The organization currently has no way to prevent users from exfiltrating sensitive data from SaaS applications.

Question 2

A company has HPE Aruba Networking APs running AOS-10 that connect to AOS-CX switches. The APs will:

. Authenticate as 802.1X supplicants to HPE Aruba Networking ClearPass Policy Manager (CPPM)

. Be assigned to the "APs" role on the switches

. Have their traffic forwarded locally

What information do you need to help you determine the VLAN settings for the "APs" role?

Options:

A.

Whether the APs have static or DHCP-assigned IP addresses

B.

Whether the switches are using local user-roles (LURs) or downloadable user-roles (DURs)

C.

Whether the switches have established tunnels with an HPE Aruba Networking gateway

D.

Whether the APs bridge or tunnel traffic on their SSIDs

Question 3

(Note that the HPE Aruba Networking Central interface shown here might look slightly different from what you see in your HPE Aruba Networking Central

interface as versions change; however, similar concepts continue to apply.)

An HPE Aruba Networking 9x00 gateway is part of an HPE Aruba Networking Central group that has the settings shown in the exhibit. What would cause the

gateway to drop traffic as part of its IDPS settings?

Options:

A.

Its site-to-site VPN connections failing

B.

Traffic matching a rule in the active ruleset

C.

Its IDPS engine failing

D.

Traffic showing anomalous behavior

Question 4

You are setting up policy rules in HPE Aruba Networking SSE. You want to create a single rule that permits users in a particular user group to access multiple applications. What is an easy way to meet this need?

Options:

A.

Associate the applications directly with the IdP used to authenticate the users; choose any for the destination in the policy rule.

B.

Apply the same tag to the applications; select the tag as a destination in the policy rule.

C.

Place all the applications in the same connector zone; select that zone as a destination in the policy rule.

D.

Select the applications within a non-default web profile; select that profile in the policy rule.

Question 5

Your company wants to implement Tunneled EAP (TEAP).

How can you set up HPE Aruba Networking ClearPass Policy Manager (CPPM) to enforce certificated-based authentication for clients using TEAP?

Options:

A.

For the service using TEAP, set the authentication source to an internal database.

B.

Select a service certificate when you specify TEAP as a service's authentication method.

C.

Create an authentication method named "TEAP" with the type set to EAP-TLS.

D.

Select an EAP-TLS-type authentication method for the TEAP method's inner method.

Question 6

A company is using HPE Aruba Networking Central SD-WAN Orchestrator to establish a hub-spoke VPN between branch gateways (BGWs) at 1164 site and VPNCs at multiple data centers. What is part of the configuration that admins need to complete?

Options:

A.

In VPNCs’ groups, establish VPN pools to control which branches connect to which VPNCs.

B.

In BGWs’ and VPNCs’ groups, create default IKE policies for the SD-WAN Orchestrator to use.

C.

In BGWs’ groups, select the VPNCs to which to connect in a DC preference list.

D.

At the global level, create default IPsec policies for the SD-WAN Orchestrator to use.

Question 7

You have downloaded a packet capture that you generated on HPE Aruba Networking Central. When you open the capture in Wireshark, you see the output shown in the

exhibit.

What should you do in Wireshark so that you can better interpret the packets?

Options:

A.

Choose to decode UDP port 5555 packets as ARUBA_ERM and set the Aruba ERM Type to 0.

B.

Edit preferences for IEEE 802.11 and chose to ignore the Protection bit with IV.

C.

Apply the following display filter: wlan.fc.type == 1.

D.

Edit the Enabled Protocols and make sure that 802.11, GRE, and Aruba_ERM are enabled.

Question 8

A company has HPE Aruba Networking APs and AOS-CX switches, as well as HPE Aruba Networking ClearPass. The company wants CPPM to have HTTP User-

Agent strings to use in profiling devices.

What can you do to support these requirements?

Options:

A.

Add the CPPM server's IP address to the IP helper list in all client VLANs on routing switches.

B.

Schedule periodic subnet scans of all client subnets on CPPM.

C.

Configure mirror sessions on the APs and switches to copy client HTTP traffic to CPPM.

D.

On the APs and switches, configure a redirect to ClearPass Guest in the role for devices being profiled.

Question 9

A company assigns a different block of VLAN IDs to each of its access layer AOS-CX switches. The switches run version 10.07. The IDs are used for standard

purposes, such as for employees, VolP phones, and cameras. The company wants to apply 802.1X authentication to HPE Aruba Networking ClearPass Policy

Manager (CPPM) and then steer clients to the correct VLANs for local forwarding.

What can you do to simplify setting up this solution?

Options:

A.

Assign consistent names to VLANs of the same type across the AOS-CX switches and have user-roles reference names.

B.

Use the trunk allowed VLAN setting to assign multiple VLAN IDs to the same role.

C.

Change the VLAN IDs across the AOS-CX switches so that they are consistent.

D.

Avoid configuring the VLAN in the role; use trunk VLANs to assign multiple VLANs to the port instead.

Question 10

You are configuring the HPE Aruba Networking ClearPass Device Insight Integration settings on ClearPass Policy Manager (CPPM). For which use case should you set the 'Tag Updates Action" to "apply for all tag updates"?

Options:

A.

When the Device Insight integration poll interval is set to a relatively long interval but you still want CPPM to be informed quickly about devices' new tags.

B.

When Device Insight tags are only used to identify dangerous devices, and you want to disconnect those devices without having to set up new rules in enforcement policies.

C.

When CPPM is gathering posture information for CPDI, and you want CPDI to always have access to the most up-to-date information.

D.

When you plan to have CPPM issue CoAs for clients with new tags, but do not want to have to list those specific tags in the Device Integration settings in advance.

Question 11

An AOS-CX switch has this admin user account configured on it:

netadmin in the operators group.

You have configured these commands on an AOS-CX switch:

tacacs-server host cp.example.com key plaintext &12xl,powmay7855

aaa authentication login ssh group tacacs local

aaa authentication allow-fail-through

A user accesses the switch with SSH and logs in as netadmin with the correct password. When the switch sends a TACACS+ request to the ClearPass server at cp.example.com, the server does not send a response. Authentication times out.

What happens?

Options:

A.

The user is logged in and granted operator access.

B.

The user is logged in and allowed to enter auditor commands only.

C.

The user is logged in and granted administrators access.

D.

The user is not allowed to log in.

Question 12

A company wants to apply a standard configuration to all AOS-CX switch ports and have the ports dynamically adjust their configuration based on the identity of

the user or device that connects. They want to centralize configuration of the identity-based settings as much as possible.

What should you recommend?

Options:

A.

Having HPE Aruba Networking ClearPass Policy Manager (CPPM) send standard RADIUS AVPs to customize port settings

B.

Having switches pull port configurations dynamically from HPE Aruba Networking Activate

C.

Having switches download user-roles from HPE Aruba Networking gateways

D.

Having switches download user-roles from HPE Aruba Networking ClearPass Policy Manager (CPPM)

Question 13

What is a use case for the HPE Aruba Networking ClearPass OnGuard dissolvable agent?

Options:

A.

Continuously monitoring Windows domain clients for compliance

B.

Implementing a one-time compliance scan

C.

Auto-remediating posture issues on clients

D.

Periodically scanning Linux clients for security issues

Question 14

You have configured an AOS-CX switch to implement 802.1X on edge ports. Assume ports operate in the default auth-mode. VolP phones are assigned to the

"voice" role and need to send traffic that is tagged for VLAN 12.

Where should you configure VLAN 12?

Options:

A.

As the trunk native VLAN on edge ports and the trunk native VLAN on the "voice" role

B.

As a trunk allowed VLAN on edge ports and the trunk native VLAN in the "voice" role

C.

As the trunk native VLAN in the "voice" role (and not in the edge port settings)

D.

As the allowed trunk VLAN in the "voice" role (and not in the edge port settings)

Question 15

Which use case is fulfilled by applying a time range to a firewall rule on an AOS device?

Options:

A.

Enforcing the rule only during the specified time range

B.

Tuning the session timeout for sessions established with this rule

C.

Locking clients that violate the rule for the specified time range

D.

Setting the time range over which hit counts for the rule are aggregated

Question 16

A company uses HPE Aruba Networking ClearPass Device Insight (CPDI) (the standalone application option). In the details for a generic device cluster, you see a

recommendation for "Windows 8/10" with 70% accuracy.

What does this mean?

Options:

A.

CPDI has detected that these devices match about 70% of the system rule for defining "Windows 8/10" devices.

B.

CPDI has matched these devices against several, conflicting system rules. 70% of those rules are for "Windows 8/10" devices.

C.

CPDI has grouped this cluster with similar classified devices. 70% of those classified devices are "Windows 8/10."

D.

CPDI has used MAC OUI to group these devices together. The average device's MAC address matches 70% of the "Windows 8/10" OUI.

Question 17

Refer to the exhibit.

The exhibit shows a saved packet capture, which you have opened in Wireshark. You want to focus on the complete conversation between 10.1.70.90 and 10.1.79.11 that uses source port 5448.

What is a simple way to do this in Wireshark?

Options:

A.

Apply a capture filter that selects for both the 10.1.70.90 and 10.1.79.11 IP addresses.

B.

Click the Source column and then the Destination column to sort the packets into the desired order.

C.

Apply a capture filter that selects for TCP port 5448.

D.

Right-click one of the packets between those addresses and choose to follow the stream.

Question 18

A company has a variety of HPE Aruba Networking solutions, including an HPE Aruba Networking infrastructure and HPE Aruba Networking ClearPass Policy Manager (CPPM). The company passes traffic from the corporate LAN destined to the data center through a third-party SRX firewall. The company would like to further protect itself from internal threats. What is one solution that you can recommend?

Options:

A.

Have the third-party firewall send Syslogs to CPPM, which can work with network devices to lock internal attackers out of the network.

B.

Add ClearPass Device Insight (CPDI) to the solution, integrate it with the third-party firewall to develop more complete device profiles.

C.

Configure CPPM to poll the third-party firewall for a broad array of information about internal clients, such as profile and posture.

D.

Use tunnel mode SSIDs and user-based tunneling (UBT) on AOS-CX switches to pass all internal traffic directly through the third-party firewall.

Question 19

The security team needs you to show them information about MAC spoofing attempts detected by HPE Aruba Networking ClearPass Policy Manager (CPPM).

What should you do?

Options:

A.

Export the Access Tracker records on CPPM as an XML file.

B.

Use ClearPass Insight to run an Active Endpoint Security report.

C.

Integrate CPPM with ClearPass Device Insight (CPDI) and run a security report on CPDI.

D.

Show the security team the CPPM Endpoint Profiler dashboard.

Question 20

What is a typical use case for using HPE Aruba Networking ClearPass Onboard to provision devices?

Options:

A.

Enabling unmanaged devices to succeed at certificate-based 802.1X

B.

Enabling managed Windows domain computers to succeed at certificate-based 802.1X

C.

Enhancing security for loT devices that need to authenticate with MAC-Auth

D.

Enforcing posture-based assessment on managed Windows domain computers

Question 21

You are setting up user-based tunneling (UBT) between access layer AOS-CX switches and AOS-10 gateways. You have selected reserved (local) VLAN mode.

Tunneled devices include IoT devices, which should be assigned to:

    Roles: iot on the switches and iot-wired on the gateways

    VLAN: 64, for which the gateways route traffic.

IoT devices connect to the access layer switches' edge ports, and the access layer switches reach the gateways on their uplinks.

Where must you configure VLAN 64?

Options:

A.

In the iot-wired role and on no physical interfaces

B.

In the iot role and the iot-wired role and on no physical interfaces

C.

In the iot-wired role and the access switch uplinks

D.

In the iot role and the access switch uplinks

Question 22

HPE Aruba Networking Central displays a Gateway Threat Count alert in the alert list. How can you gather more information about what caused the alert to trigger?

Options:

A.

Use HPE Aruba Networking Central tools to run a Network Check on the gateway with which the alert is associated.

B.

Use Live Monitoring on the gateway to download a packet capture of recent traffic flowing through the gateway.

C.

Check the threat list for the gateway associated with the alert. Access threat details and download packet info.

D.

Check the gateway's Audit Trail in HPE Aruba Networking Central for more details about the threats that triggered the alert.

Question 23

A company uses HPE Aruba Networking ClearPass Policy Manager (CPPM) as a TACACS+ server to authenticate managers on its AOS-CX switches. The

company wants CPPM to control which commands managers are allowed to enter. You see there is no field to enter these commands in ClearPass.

How do you start configuring the command list on CPPM?

Options:

A.

Add the Shell service to the managers' TACACS+ enforcement profiles.

B.

Edit the TACACS+ settings in the AOS-CX switches' network device entries.

C.

Create an enforcement policy with the TACACS+ type.

D.

Edit the settings for CPPM's default TACACS+ admin roles.

Question 24

You have created a Web-based Health Check Service that references a posture policy. You want the service to trigger a RADIUS change of authorization (CoA) when a client receives a Healthy or Quarantine posture. Where do you configure those rules?

Options:

A.

In a RADIUS enforcement policy

B.

In the Agents and Software Updates > OnGuard Settings

C.

In the posture policy

D.

In a WEBAUTH enforcement policy

Question 25

A company has AOS-CX switches, which authenticate clients to HPE Aruba Networking ClearPass Policy Manager (CPPM). CPPM is set up to receive a variety of information about clients' profile and posture. New information can mean that CPPM should change a client's enforcement profile. What should you set up on the switches to help the solution function correctly?

Options:

A.

Enable RADIUS accounting to CPPM, including interim RADIUS accounting.

B.

Configure a RADIUS track that references CPPM's FQDN or IP address.

C.

Enable dynamic authorization, and specify CPPM as a dynamic authorization client.

D.

Re-configure the authentication server on the switch specifying CPPM as a TACACS server.

Question 26

A company wants to implement Virtual Network based Tunneling (VNBT) on a particular group of users and assign those users to an overlay network with VNI

3000.

Assume that an AOS-CX switch is already set up to:

. Implement 802.1X to HPE Aruba Networking ClearPass Policy Manager (CPPM)

. Participate in an EVPN VXLAN solution that includes VNI 3000

Which setting should you configure in the users' AOS-CX role to apply VNBT to them when they connect?

Options:

A.

Gateway zone set to "3000" with no gateway role set

B.

Gateway zone set to "vni-3000" with no gateway role set

C.

Access VLAN set to the VLAN mapped to VNI 3000

D.

Access VLAN ID set to "3000"

Question 27

Refer to the Exhibit:

These packets have been captured from VLAN 10. which supports clients that receive their IP addresses with DHCP.

What can you interpret from the packets that you see here?

These packets have been captured from VLAN 10, which supports clients that receive their IP addresses with DHCP. What can you interpret from the packets that you see here?

Options:

A.

Someone is possibly implementing a MAC spoofing attack to gain unauthorized access.

B.

The mirroring session that captured the packets was likely misconfigured and captured duplicate traffic.

C.

An admin has likely misconfigured two clients to use the same DHCP settings.

D.

Someone is possibly implementing an ARP poisoning and MITM attack.

Question 28

HPE Aruba Networking Central displays an alert about an Infrastructure Attack that was detected. You go to the Security > RAPIDS events and see that the attack

was "Detect adhoc using Valid SSID."

What is one possible next step?

Options:

A.

Use HPE Aruba Networking Central floorplans or the detecting AP identities to locate the general area for the threat.

B.

Look for the IP address associated with the offender and then check for that IP address among HPE Aruba Networking Central clients.

C.

Make sure that you have tuned the threshold for that check, as false positives are common for it.

D.

Make sure that clients have updated drivers, as faulty drivers are a common explanation for this attack type.

Question 29

You need to use "Tips:Posture" conditions within an 802.1X service's enforcement policy.

Which guideline should you follow?

Options:

A.

Enable caching roles and posture attributes from previous sessions in the service's enforcement settings.

B.

Create rules that assign postures in the service's role mapping policy.

C.

Enable profiling in the service's general settings.

D.

Select the Posture Policy type for the service's enforcement policy.

Question 30

A company has AOS-CX switches and HPE Aruba Networking ClearPass Policy Manager (CPPM). The company wants switches to implement 802.1X

authentication to CPPM and download user roles.

What is one task that you must complete on the switches to support this use case?

Options:

A.

Specify CPPM as the RADIUS server with the exact CN in CPPM's HTTPS certificate.

B.

Install the root CA certificate for CPPM's RADIUS certificate in a TA profile on the switches.

C.

Configure empty user-roles with names that match enforcement profile names on CPPM.

D.

Specify a ClearPass username and password that match the name and RADIUS secret in a CPPM network device entry.

Question 31

You are using OpenSSL to obtain a certificate signed by a Certification Authority (CA). You have entered this command:

openssl req -new -out file1.pem -newkey rsa:3072 -keyout file2.pem

Enter PEM pass phrase: **********

Verifying - Enter PEM pass phrase: **********

Country Name (2 letter code) [AU]:US

State or Province Name (full name) [Some-State]:California

Locality Name (eg, city) []:Sunnyvale

Organization Name (eg, company) [Internet Widgits Pty Ltd]:example.com

Organizational Unit Name (eg, section) []:Infrastructure

Common Name (e.g. server FQDN or YOUR name) []:radius.example.com

What is one guideline for continuing to obtain a certificate?

Options:

A.

You should use a third-party tool to encrypt file2.pem before sending it and file1.pem to the CA.

B.

You should concatenate file1.pem and file2.pem into a single file, and submit that to the desired CA to sign.

C.

You should submit file1.pem, but not file2.pem, to the desired CA to sign.

D.

You should submit file2.pem, but not file1.pem, to the desired CA to sign.

Question 32

A company needs you to integrate HPE Aruba Networking ClearPass Policy Manager (CPPM) with HPE Aruba Networking ClearPass Device Insight (CPDI).

What is one task you should do to prepare?

Options:

A.

Install the root CA for CPPM's HTTPS certificate as trusted in the CPDI application.

B.

Configure WMI, SSH, and SNMP external accounts for device scanning on CPPM.

C.

Enable Insight in the CPPM server configuration settings.

D.

Collect a Data Collector token from HPE Aruba Networking Central.

Question 33

A company has wired VolP phones, which transmit tagged traffic and connect to AOS-CX switches. The company wants to tunnel the phones' traffic to an HPE

Aruba Networking gateway for applying security policies.

What is part of the correct configuration on the AOS-CX switches?

Options:

A.

UBT mode set to VLAN extend

B.

A VXLAN VNI mapped to the VLAN assigned to the VolP phones

C.

VLANs assigned to the VolP phones configured on the switch uplinks

D.

A UBT reserved VLAN set to a VLAN dedicated for that purpose

Question 34

A company has been running Gateway IDS/IPS on its gateways in IDS mode for several weeks. The company wants to transition to IPS mode.

What is one step you should recommend?

Options:

A.

Disable traffic inspection and reboot before re-enabling traffic inspection with the new mode.

B.

Change the mode on one gateway at a time to establish a smoother transition period.

C.

Consider applying a stricter IPS policy to minimize issues during the transition period.

D.

Check for legitimate traffic that has been flagged as a threat and allow list the associated rules.

Question 35

An AOS-CX switch has been configured to implement UBT to two HPE Aruba Networking gateways that implement VRRP on the users' VLAN. What correctly describes how the switch tunnels UBT users' traffic to those gateways?

Options:

A.

The switch always sends the users' traffic to the VRRP master.

B.

The switch always sends all users' traffic to the primary gateway configured in the UBT zone.

C.

The switch always load shares the users' traffic across both gateways.

D.

The switch always sends all users' traffic to the gateway assigned as the active device designed gateway.

Question 36

You are using Wireshark to view packets captured from HPE Aruba Networking infrastructure, but you’re not sure that the packets are displaying correctly. In which circumstance does it make sense to configure Wireshark to ignore protection bits with the IV for the 802.11 protocol?

Options:

A.

When the traffic was captured on the data plane of an HPE Aruba Networking gateway and sent to a remote IP.

B.

When the traffic was mirrored from an AOS-CX switch port connected to an AP.

C.

When the traffic was captured from an AP with HPE Aruba Networking Central.

D.

When the traffic was captured on the control plane of an HPE Aruba Networking MC and sent to a remote IP.

Question 37

You have installed an HPE Aruba Networking Network Analytic Engine (NAE) script on an AOS-CX switch to monitor a particular function.

Which additional step must you complete to start the monitoring?

Options:

A.

Reboot the switch.

B.

Enable NAE, which is disabled by default.

C.

Edit the script to define monitor parameters.

D.

Create an agent from the script.

Question 38

A company is using HPE Aruba Networking ClearPass Device Insight (CPDI) (the standalone application). In the CPDI security settings, Security Analysis is On,

the Data Source is ClearPass Devices Insight, and Enable Posture Assessment is On. You see that device has a Risk Score of 90.

What can you know from this information?

Options:

A.

The posture is unhealthy, and CPDI has also detected at least one vulnerability on the device.

B.

The posture is unhealthy, but CPDI has not detected any vulnerabilities on the device.

C.

The posture is healthy, but CPDI has detected multiple vulnerabilities on the device.

D.

The posture is unknown, and CPDI has detected exactly four vulnerabilities on the device.

Question 39

HPE Aruba Networking ClearPass Policy Manager (CPPM) uses a service to authenticate clients. You are now adding the Endpoints Repository as an

authorization source for the service, and you want to add rules to the service's policies that apply different access levels based, in part, on a client's device

category. You need to ensure that CPPM can apply the new correct access level after discovering new clients' categories.

What should you enable on the service?

Options:

A.

The Posture Compliance option in the Service tab

B.

The Profile Endpoints option in the Service tab

C.

The Use cached Roles and Posture attributes from previous sessions option in the Enforcement tab

D.

The Audit End-host option in the Service tab

Demo: 39 questions
Total 130 questions