Exam4Training

HP HPE6-A78 Aruba Certified Network Security Associate Exam Online Training

Question #1

You have been asked to rind logs related to port authentication on an ArubaOS-CX switch for events logged in the past several hours But. you are having trouble searching through the logs.

What is one approach that you can take to find the relevant logs?

  • A . Add the "-C and *-c port-access" options to the "show logging" command.
  • B . Configure a logging Tiller for the "port-access" category, and apply that filter globally.
  • C . Enable debugging for "portaccess" to move the relevant logs to a buffer.
  • D . Specify a logging facility that selects for "port-access" messages.

Reveal Solution Hide Solution

Correct Answer: A
Question #2

What is symmetric encryption?

  • A . It simultaneously creates ciphertext and a same-size MAC.
  • B . It any form of encryption mat ensures that thee ciphertext Is the same length as the plaintext.
  • C . It uses the same key to encrypt plaintext as to decrypt ciphertext.
  • D . It uses a Key that is double the size of the message which it encrypts.

Reveal Solution Hide Solution

Correct Answer: C
Question #3

What is one of the roles of the network access server (NAS) in the AAA framewonx?

  • A . It authenticates legitimate users and uses policies to determine which resources each user is allowed to access.
  • B . It negotiates with each user’s device to determine which EAP method is used for authentication
  • C . It enforces access to network services and sends accounting information to the AAA server
  • D . It determines which resources authenticated users are allowed to access and monitors each users session

Reveal Solution Hide Solution

Correct Answer: A
Question #4

You have detected a Rogue AP using the Security Dashboard Which two actions should you take in responding to this event? (Select two)

  • A . There is no need to locale the AP If you manually contain It.
  • B . This is a serious security event, so you should always contain the AP immediately regardless of your company’s specific policies.
  • C . You should receive permission before containing an AP. as this action could have legal Implications.
  • D . For forensic purposes, you should copy out logs with relevant information, such as the time mat the AP was detected and the AP’s MAC address.
  • E . There is no need to locate the AP If the Aruba solution is properly configured to automatically contain it.

Reveal Solution Hide Solution

Correct Answer: B,D
Question #5

What role does the Aruba ClearPass Device Insight Analyzer play in the Device Insight architecture?

  • A . It resides in the cloud and manages licensing and configuration for Collectors
  • B . It resides on-prem and provides the span port to which traffic is mirrored for deep analytics.
  • C . It resides on-prem and is responsible for running active SNMP and Nmap scans
  • D . It resides In the cloud and applies machine learning and supervised crowdsourcing to metadata sent by Collectors

Reveal Solution Hide Solution

Correct Answer: D
Question #6

Which correctly describes a way to deploy certificates to end-user devices?

  • A . ClearPass Onboard can help to deploy certificates to end-user devices, whether or not they are members of a Windows domain
  • B . ClearPass Device Insight can automatically discover end-user devices and deploy the proper certificates to them
  • C . ClearPass OnGuard can help to deploy certificates to end-user devices, whether or not they are members of a Windows domain
  • D . in a Windows domain, domain group policy objects (GPOs) can automatically install computer, but not user certificates

Reveal Solution Hide Solution

Correct Answer: A
Question #7

How should admins deal with vulnerabilities that they find in their systems?

  • A . They should apply fixes, such as patches, to close the vulnerability before a hacker exploits it.
  • B . They should add the vulnerability to their Common Vulnerabilities and Exposures (CVE).
  • C . They should classify the vulnerability as malware. a DoS attack or a phishing attack.
  • D . They should notify the security team as soon as possible that the network has already been breached.

Reveal Solution Hide Solution

Correct Answer: A
Question #8

Refer to the exhibit.

You need to ensure that only management stations in subnet 192.168.1.0/24 can access the ArubaOS-Switches’ CLI. Web Ul. and REST interfaces. The company also wants to let managers use these stations to access other parts of the network.

What should you do?

  • A . Establish a Control Plane Policing class that selects traffic from 192.168 1.0/24.
  • B . Specify 192.168.1.0.255.255.255.0 as authorized IP manager address
  • C . Configure the switch to listen for these protocols on OOBM only.
  • D . Specify vlan 100 as the management vlan for the switches.

Reveal Solution Hide Solution

Correct Answer: A
Question #9

CORRECT TEXT

What is a use case for tunneling traffic between an Aruba switch and an AruDa Mobility Controller (MC)?

  • A . applying firewall policies and deep packet inspection to wired clients
  • B . enhancing the security of communications from the access layer to the core with data encryption
  • C . securing the network infrastructure control plane by creating a virtual out-of-band-management network
  • D . simplifying network infrastructure management by using the MC to push configurations to the switches

Reveal Solution Hide Solution

Correct Answer: A
Question #10

Your Aruba Mobility Master-based solution has detected a rogue AP Among other information the ArubaOS Detected Radios page lists this Information for the AP

SSID = PubllcWiFI

BSSID = a8M27 12 34:56

Match method = Exact match

Match type = Eth-GW-wired-Mac-Table

The security team asks you to explain why this AP is classified as a rogue .

What should you explain?

  • A . The AP Is connected to your LAN because It is transmitting wireless traffic with your network’s default gateway’s MAC address as a source MAC Because it does not belong to the company, it is a rogue
  • B . The ap has a BSSID mat matches authorized client MAC addresses. This indicates that the AP is spoofing the MAC address to gam unauthorized access to your company’s
    wireless services, so It is a rogue
  • C . The AP has been detected as launching a DoS attack against your company’s default gateway. This qualities it as a rogue which needs to be contained with wireless association frames immediately
  • D . The AP is spoofing a routers MAC address as its BSSID. This indicates mat, even though WIP cannot determine whether the AP is connected to your LAN. it is a rogue.

Reveal Solution Hide Solution

Correct Answer: D

Question #11

What is a Key feature of me ArubaOS firewall?

  • A . The firewall is stateful which means that n can track client sessions and automatically allow return traffic for permitted sessions
  • B . The firewall Includes application layer gateways (ALGs). which it uses to filter Web traffic based on the reputation of the destination web site.
  • C . The firewall examines all traffic at Layer 2 through Layer 4 and uses source IP addresses as the primary way to determine how to control traffic.
  • D . The firewall is designed to fitter traffic primarily based on wireless 802.11 headers, making it ideal for mobility environments

Reveal Solution Hide Solution

Correct Answer: B
Question #12

What is a benefit or using network aliases in ArubaOS firewall policies?

  • A . You can associate a reputation score with the network alias to create rules that filler traffic based on reputation rather than IP.
  • B . You can use the aliases to translate client IP addresses to other IP addresses on the other side of the firewall
  • C . You can adjust the IP addresses in the aliases, and the rules using those aliases automatically update
  • D . You can use the aliases to conceal the true IP addresses of servers from potentially untrusted clients.

Reveal Solution Hide Solution

Correct Answer: A
Question #13

What is a guideline for creating certificate signing requests (CSRs) and deploying server Certificates on ArubaOS Mobility Controllers (MCs)?

  • A . Create the CSR online using the MC Web Ul if your company requires you to archive the private key.
  • B . if you create the CSR and public/private Keypair offline, create a matching private key online on the MC.
  • C . Create the CSR and public/private keypair offline If you want to install the same certificate on multiple MCs.
  • D . Generate the private key online, but the public key and CSR offline, to install the same certificate on multiple MCs.

Reveal Solution Hide Solution

Correct Answer: A
Question #14

You have an Aruba Mobility Controller (MC). for which you are already using Aruba ClearPass Policy Manager (CPPM) to authenticate access to the Web Ul with usernames and passwords You now want to enable managers to use certificates to log in to the Web Ul CPPM will continue to act as the external server to check the names in managers’ certificates and tell the MC the managers’ correct rote in addition to enabling certificate authentication.

What is a step that you should complete on the MC?

  • A . Verify that the MC has the correct certificates, and add RadSec to the RADIUS server configuration for CPPM
  • B . install all of the managers’ certificates on the MC as OCSP Responder certificates
  • C . Verify that the MC trusts CPPM’s HTTPS certificate by uploading a trusted CA certificate Also, configure a CPPM username and password on the MC
  • D . Create a local admin account mat uses certificates in the account, specify the correct trusted CA certificate and external authentication

Reveal Solution Hide Solution

Correct Answer: A
Question #15

What is a guideline for managing local certificates on an ArubaOS-Switch?

  • A . Before installing the local certificate, create a trust anchor (TA) profile with the root CA certificate for the certificate that you will install
  • B . Install an Online Certificate Status Protocol (OCSP) certificate to simplify the process of
    enrolling and re-enrolling for certificate
  • C . Generate the certificate signing request (CSR) with a program offline, then, install both the certificate and the private key on the switch in a single file.
  • D . Create a self-signed certificate online on the switch because ArubaOS-Switches do not support CA-signed certificates.

Reveal Solution Hide Solution

Correct Answer: C
Question #16

You have deployed a new Aruba Mobility Controller (MC) and campus APs (CAPs). One of the WLANs enforces 802.IX authentication lo Aruba ClearPass Policy Manager {CPPM) When you test connecting the client to the WLAN. the test falls You check Aruba ClearPass Access Tracker and cannot find a record of the authentication attempt You ping from the MC to CPPM. and the ping is successful.

What is a good next step for troubleshooting?

  • A . Renew CPPM’s RADIUS/EAP certificate
  • B . Reset the user credentials
  • C . Check CPPM Event viewer.
  • D . Check connectivity between CPPM and a backend directory server

Reveal Solution Hide Solution

Correct Answer: C
Question #17

What is a benefit of Opportunistic Wireless Encryption (OWE)?

  • A . It allows both WPA2-capabie and WPA3-capable clients to authenticate to the same WPA-Personal WLAN
  • B . It offers more control over who can connect to the wireless network when compared with WPA2-Personal
  • C . It allows anyone lo connect, but provides better protection against eavesdropping than a traditional open network
  • D . It provides protection for wireless clients against both honeypot APs and man-in-the-middle (MUM) attacks

Reveal Solution Hide Solution

Correct Answer: C
Question #18

Refer to the exhibit.

How can you use the thumbprint?

  • A . Install this thumbprint on management stations to use as two-factor authentication along with manager usernames and passwords, this will ensure managers connect from valid stations
  • B . Copy the thumbprint to other Aruba switches to establish a consistent SSH Key for all switches this will enable managers to connect to the switches securely with less effort
  • C . When you first connect to the switch with SSH from a management station, make sure that the thumbprint matches to ensure that a man-in-t he-mid die (MITM) attack is not occurring
  • D . install this thumbprint on management stations the stations can then authenticate with the thumbprint instead of admins having to enter usernames and passwords.

Reveal Solution Hide Solution

Correct Answer: C
Question #19

You need to deploy an Aruba instant AP where users can physically reach It .

What are two recommended options for enhancing security for management access to the AP? (Select two)

  • A . Disable Its console ports
  • B . Place a Tamper Evident Label (TELS) over its console port
  • C . Disable the Web Ul.
  • D . Configure WPA3-Enterpnse security on the AP
  • E . install a CA-signed certificate

Reveal Solution Hide Solution

Correct Answer: B,E
Question #20

Refer to the exhibit.

You are deploying a new ArubaOS Mobility Controller (MC), which is enforcing authentication to Aruba ClearPass Policy Manager (CPPM). The authentication is not working correctly, and you find the error shown In the exhibit in the CPPM Event Viewer.

What should you check?

  • A . that the MC has been added as a domain machine on the Active Directory domain with which CPPM is synchronized
  • B . that the snared secret configured for the CPPM authentication server matches the one defined for the device on CPPM
  • C . that the IP address that the MC is using to reach CPPM matches the one defined for the device on CPPM
  • D . that the MC has valid admin credentials configured on it for logging into the CPPM

Reveal Solution Hide Solution

Correct Answer: C
Exit mobile version