Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

HP HPE6-A78 Aruba Certified Network Security Associate Exam Exam Practice Test

Demo: 50 questions
Total 167 questions

Aruba Certified Network Security Associate Exam Questions and Answers

Question 1

A company with 439 employees wants to deploy an open WLAN for guests. The company wants the experience to be as follows:

*Guests select the WLAN and connect without having to enter a password.

*Guests are redirected to a welcome web page and log in.

The company also wants to provide encryption for the network for devices that are capable. Which security options should you implement for the WLAN?

Options:

A.

Opportunistic Wireless Encryption (OWE) and WPA3-Personal

B.

WPA3-Personal and MAC-Auth

C.

Captive portal and Opportunistic Wireless Encryption (OWE) in transition mode

D.

Captive portal and WPA3-Personal

Question 2

What is a guideline for deploying Aruba ClearPass Device Insight?

Options:

A.

Deploy a Device Insight Collector at every site in the corporate WAN to reduce the impact on WAN links.

B.

Make sure that Aruba devices trust the root CA certificate for the ClearPass Device Insight Analyzer's HTTPS certificate.

C.

Configure remote mirroring on access layer Aruba switches, using Device Insight Analyzer as the destination IP.

D.

For companies with multiple sites, deploy a pair of Device Insight Collectors at the HQ or the central data center.

Question 3

What is a difference between passive and active endpoint classification?

Options:

A.

Passive classification refers exclusively to MAC OUI-based classification, while active classification refers to any other classification method.

B.

Passive classification classifies endpoints based on entries in dictionaries, while active classification uses admin-defined rules to classify endpoints.

C.

Passive classification is only suitable for profiling endpoints in small business environments, while enterprises should use active classification exclusively.

D.

Passive classification analyzes traffic that endpoints send as part of their normal functions; active classification involves sending requests to endpoints.

Question 4

You have been asked to rind logs related to port authentication on an ArubaOS-CX switch for events logged in the past several hours But. you are having trouble searching through the logs What is one approach that you can take to find the relevant logs?

Options:

A.

Add the "-C and *-c port-access" options to the "show logging" command.

B.

Configure a logging Tiller for the "port-access" category, and apply that filter globally.

C.

Enable debugging for "portaccess" to move the relevant logs to a buffer.

D.

Specify a logging facility that selects for "port-access" messages.

Question 5

Why might devices use a Diffie-Hellman exchange?

Options:

A.

to agree on a shared secret in a secure manner over an insecure network

B.

to obtain a digital certificate signed by a trusted Certification Authority

C.

to prove knowledge of a passphrase without transmitting the passphrase

D.

to signal that they want to use asymmetric encryption for future communications

Question 6

What is a use case for implementing RadSec instead of RADIUS?

Options:

A.

A university wants to protect communications between the students' devices and the network access server.

B.

A corporation wants to implement EAP-TLS to authenticate wireless users at their main office.

C.

A school district wants to protect messages sent between RADIUS clients and servers over an untrusted network.

D.

A organization wants to strengthen the encryption used to protect RADIUS communications without increasing complexity.

Question 7

You need to deploy an Aruba instant AP where users can physically reach It. What are two recommended options for enhancing security for management access to the AP? (Select two )

Options:

A.

Disable Its console ports

B.

Place a Tamper Evident Label (TELS) over its console port

C.

Disable the Web Ul.

D.

Configure WPA3-Enterpnse security on the AP

E.

install a CA-signed certificate

Question 8

What is a correct description of a stage in the Lockheed Martin kill chain?

Options:

A.

In the delivery stage, the hacker delivers malware to targeted users, often with spear phishing methods.

B.

In the installation phase, hackers seek to install vulnerabilities in operating systems across the network.

C.

In the weaponization stage, malware installed in the targeted network seeks to attack intrusion prevention systems (IPS).

D.

In the exploitation phase, hackers conduct social engineering attacks to exploit weak algorithms and crack user accounts.

Question 9

What distinguishes a Distributed Denial of Service (DDoS) attack from a traditional Denial or service attack (DoS)?

Options:

A.

A DDoS attack originates from external devices, while a DoS attack originates from internal devices

B.

A DDoS attack is launched from multiple devices, while a DoS attack is launched from a single device

C.

A DoS attack targets one server, a DDoS attack targets all the clients that use a server

D.

A DDoS attack targets multiple devices, while a DoS Is designed to Incapacitate only one device

Question 10

What is one difference between EAP-Tunneled Layer Security (EAP-TLS) and Protected EAP (PEAP)?

Options:

A.

EAP-TLS begins with the establishment of a TLS tunnel, but PEAP does not use a TLS tunnel as part of its process.

B.

EAP-TLS requires the supplicant to authenticate with a certificate, but PEAP allows the supplicant to use a username and password.

C.

EAP-TLS creates a TLS tunnel for transmitting user credentials, while PEAP authenticates the server and supplicant during a TLS handshake.

D.

EAP-TLS creates a TLS tunnel for transmitting user credentials securely, while PEAP protects user credentials with TKIP encryption.

Question 11

An MC has a WLAN that enforces WPA3-Enterprise with authentication to HPE Aruba Networking ClearPass Policy Manager (CPPM). The WLAN's default role is set to guest. A Mobility Controller (MC) has these roles configured on it:

    authenticated

    denyall

    guest

    general-access

    guest-logon

    logon

    stateful-dot1x

    switch-logon

    voiceA client authenticates. CPPM returns an Access-Accept with an Aruba-User-Role VSA set to general_access. What role does the client receive?

Options:

A.

guest

B.

logon

C.

general-access

D.

authenticated

Question 12

You are configuring ArubaOS-CX switches to tunnel client traffic to an Aruba Mobility Controller (MC). What should you do to enhance security for control channel communications between the switches and the MC?

Options:

A.

Create one UBT zone for control traffic and a second UBT zone for clients.

B.

Configure a long, random PAPI security key that matches on the switches and the MC.

C.

install certificates on the switches, and make sure that CPsec is enabled on the MC

D.

Make sure that the UBT client vlan is assigned to the interface on which the switches reach the MC and only that interface.

Question 13

Refer to the exhibit.

You need to ensure that only management stations in subnet 192.168.1.0/24 can access the ArubaOS-Switches' CLI. Web Ul. and REST interfaces The company also wants to let managers use these stations to access other parts of the network What should you do?

Options:

A.

Establish a Control Plane Policing class that selects traffic from 192.168 1.0/24.

B.

Specify 192.168.1.0.255.255.255.0 as authorized IP manager address

C.

Configure the switch to listen for these protocols on OOBM only.

D.

Specify vlan 100 as the management vlan for the switches.

Question 14

What are some functions of an AruDaOS user role?

Options:

A.

The role determines which authentication methods the user must pass to gain network access

B.

The role determines which firewall policies and bandwidth contract apply to the clients traffic

C.

The role determines which wireless networks (SSiDs) a user is permitted to access

D.

The role determines which control plane ACL rules apply to the client's traffic

Question 15

What are the roles of 802.1X authenticators and authentication servers?

Options:

A.

The authenticator stores the user account database, while the server stores access policies.

B.

The authenticator supports only EAP, while the authentication server supports only RADIUS.

C.

The authenticator is a RADIUS client and the authentication server is a RADIUS server.

D.

The authenticator makes access decisions and the server communicates them to the supplicant.

Question 16

What is social engineering?

Options:

A.

Hackers use Artificial Intelligence (Al) to mimic a user’s online behavior so they can infiltrate a network and launch an attack.

B.

Hackers use employees to circumvent network security and gather the information they need to launch an attack.

C.

Hackers intercept traffic between two users, eavesdrop on their messages, and pretend to be one or both users.

D.

Hackers spoof the source IP address in their communications so they appear to be a legitimate user.

Question 17

You have configured a WLAN to use Enterprise security with the WPA3 version.

How does the WLAN handle encryption?

Options:

A.

Traffic is encrypted with TKIP and keys derived from a PMK shared by all clients on the WLAN.

B.

Traffic is encrypted with TKIP and keys derived from a unique PMK per client.

C.

Traffic is encrypted with AES and keys derived from a PMK shared by all clients on the WLAN.

D.

Traffic is encrypted with AES and keys derived from a unique PMK per client.

Question 18

You have been asked to send RADIUS debug messages from an AOS-CX switch to a central SIEM server at 10.5.15.6. The server is already defined on the switch with this command:

logging 10.5.15.6

You enter this command:

debug radius all

What is the correct debug destination?

Options:

A.

file

B.

console

C.

buffer

D.

syslog

Question 19

What is a use case for Transport Layer Security (TLS)?

Options:

A.

to establish a framework for devices to determine when to trust other devices' certificates

B.

to enable a client and a server to establish secure communications for another protocol

C.

to enable two parties to asymmetrically encrypt and authenticate all data that passes be-tween them

D.

to provide a secure alternative to certificate authentication that is easier to implement

Question 20

What is one method for HPE Aruba Networking ClearPass Policy Manager (CPPM) to use DHCP to classify an endpoint?

Options:

A.

It can determine information such as the endpoint OS from the order of options listed in Option 55 of a DHCP Discover packet.

B.

It can respond to a client’s DHCP Discover with different DHCP Offers and then analyze the responses to identify the client OS.

C.

It can snoop DHCP traffic to register the clients’ IP addresses. It then knows where to direct its HTTP requests to actively probe for information about the client.

D.

It can alter the DHCP Offer to insert itself as a proxy gateway. It will then be inline in the traffic flow and can apply traffic analytics to classify clients.

Question 21

Your HPE Aruba Networking Mobility Master-based solution has detected a rogue AP. Among other information, the AOS Detected Radios page lists this information for the AP:

SSID = PublicWiFi

BSSID = a8:bd:27:12:34:56

Match method = Plus one

Match method = Eth-Wired-Mac-Table

The security team asks you to explain why this AP is classified as a rogue. What should you explain?

Options:

A.

The AP has been detected using multiple MAC addresses. This indicates that the AP is spoofing its MAC address, which qualifies it as a suspected rogue.

B.

The AP is probably connected to your LAN because it has a BSSID that is close to a MAC address that has been detected in your LAN. Because it does not belong to the company, it is a suspected rogue.

C.

The AP is an AP that belongs to your solution. However, the AOS has detected that it is behaving suspiciously. It might have been compromised, so it is classified as a suspected rogue.

D.

The AP has a BSSID that is close to your authorized APs’ BSSIDs. This indicates that the AP might be spoofing the corporate SSID and attempting to lure clients to it, making the AP a suspected rogue.

Question 22

Which is a correct description of a stage in the Lockheed Martin kill chain?

Options:

A.

In the weaponization stage, which occurs after malware has been delivered to a system, the malware executes its function.

B.

In the exploitation and installation phases, malware creates a backdoor into the infected system for the hacker.

C.

In the reconnaissance stage, the hacker assesses the impact of the attack and how much information was exfiltrated.

D.

In the delivery stage, malware collects valuable data and delivers or exfiltrates it to the hacker.

Question 23

A company is deploying ArubaOS-CX switches to support 135 employees, which will tunnel client traffic to an Aruba Mobility Controller (MC) for the MC to apply firewall policies and deep packet inspection (DPI). This MC will be dedicated to receiving traffic from the ArubaOS-CX switches.

What are the licensing requirements for the MC?

Options:

A.

one AP license per-switch

B.

one PEF license per-switch

C.

one PEF license per-switch. and one WCC license per-switch

D.

one AP license per-switch. and one PEF license per-switch

Question 24

Refer to the exhibit.

You are deploying a new ArubaOS Mobility Controller (MC), which is enforcing authentication to Aruba ClearPass Policy Manager (CPPM). The authentication is not working correctly, and you find the error shown In the exhibit in the CPPM Event Viewer.

What should you check?

Options:

A.

that the MC has been added as a domain machine on the Active Directory domain with which CPPM is synchronized

B.

that the snared secret configured for the CPPM authentication server matches the one defined for the device on CPPM

C.

that the IP address that the MC is using to reach CPPM matches the one defined for the device on CPPM

D.

that the MC has valid admin credentials configured on it for logging into the CPPM

Question 25

What is one of the roles of the network access server (NAS) in the AAA framework?

Options:

A.

It negotiates with each user’s device to determine which EAP method is used for authentication.

B.

It determines which resources authenticated users are allowed to access and monitors each user’s session.

C.

It enforces access to network services and sends accounting information to the AAA server.

D.

It authenticates legitimate users and uses policies to determine which resources each user is allowed to access.

Question 26

You have deployed a new Aruba Mobility Controller (MC) and campus APs (CAPs). One of the WLANs enforces 802.IX authentication lo Aruba ClearPass Policy Manager {CPPM) When you test connecting the client to the WLAN. the test falls You check Aruba ClearPass Access Tracker and cannot find a record of the authentication attempt You ping from the MC to CPPM. and the ping is successful.

What is a good next step for troubleshooting?

Options:

A.

Renew CPPM's RADIUS/EAP certificate

B.

Reset the user credentials

C.

Check CPPM Event viewer.

D.

Check connectivity between CPPM and a backend directory server

Question 27

You are deploying an Aruba Mobility Controller (MC). What is a best practice for setting up secure management access to the ArubaOS Web UP

Options:

A.

Avoid using external manager authentication tor the Web UI.

B.

Change the default 4343 port tor the web UI to TCP 443.

C.

Install a CA-signed certificate to use for the Web UI server certificate.

D.

Make sure to enable HTTPS for the Web UI and select the self-signed certificate Installed in the factory.

Question 28

You have a network with ArubaOS-Switches for which Aruba ClearPass Policy Manager (CPPM) is acting as a TACACS+ server to authenticate managers. CPPM assigns the admins a TACACS+ privilege level, either manager or operator. You are now adding ArubaOS-CX switches to the network. ClearPass admins want to use the same CPPM service and policies to authenticate managers on the new switches.

What should you explain?

Options:

A.

This approach cannot work because the ArubaOS-CX switches do not accept standard TACACS+ privilege levels.

B.

This approach cannot work because the ArubaOS-CX switches do not support TACACS+.

C.

This approach will work, but will need to be adjusted later if you want to assign managers to the default auditors group.

D.

This approach will work to assign admins to the default "administrators" group, but not to the default "operators" group.

Question 29

You have been asked to send RADIUS debug messages from an ArubaOS-CX switch to a central SIEM server at 10.5.15.6. The server is already defined on the switch with this command: logging 10.5.6.12

You enter this command: debug radius all

What is the correct debug destination?

Options:

A.

console

B.

file

C.

syslog

D.

buffer

Question 30

What is a correct guideline for the management protocols that you should use on AOS-CX switches?

Options:

A.

Make sure that SSH is disabled and use HTTPS instead.

B.

Make sure that Telnet is disabled and use SSH instead.

C.

Make sure that Telnet is disabled and use TFTP instead.

D.

Make sure that HTTPS is disabled and use SSH instead.

Question 31

How does the ArubaOS firewall determine which rules to apply to a specific client's traffic?

Options:

A.

The firewall applies every rule that includes the dent's IP address as the source.

B.

The firewall applies the rules in policies associated with the client's wlan

C.

The firewall applies thee rules in policies associated with the client's user role.

D.

The firewall applies every rule that includes the client's IP address as the source or destination.

Question 32

An ArubaOS-CX switch enforces 802.1X on a port. No fan-through options or port-access roles are configured on the port The 802 1X supplicant on a connected client has not yet completed authentication

Which type of traffic does the authenticator accept from the client?

Options:

A.

EAP only

B.

DHCP, DNS and RADIUS only

C.

RADIUS only

D.

DHCP, DNS, and EAP only

Question 33

A company has Aruba Mobility Controllers (MCs), Aruba campus APs, and ArubaOS-Switches. The company plans to use ClearPass Policy Manager (CPPM) to classify endpoints by type. This company is using only CPPM and no other ClearPass solutions.

The ClearPass admins tell you that they want to use HTTP User-Agent strings to help classify endpoints.

What should you do as a part of configuring the ArubaOS-Switches to support this requirement?

Options:

A.

Create a device fingerprinting policy that includes HTTP, and apply the policy to edge ports.

B.

Create remote mirrors that collect traffic on edge ports, and mirror it to CPPM's IP address.

C.

Configure CPPM as the sFlow collector, and make sure that sFlow is enabled on edge ports.

D.

Connect the switches to CPPM's span ports, and set up mirroring of HTTP traffic on the switches.

Question 34

What is a vulnerability of an unauthenticated Dime-Heliman exchange?

Options:

A.

A hacker can replace the public values exchanged by the legitimate peers and launch an MITM attack.

B.

A brute force attack can relatively quickly derive Diffie-Hellman private values if they are able to obtain public values

C.

Diffie-Hellman with elliptic curve values is no longer considered secure in modem networks, based on NIST recommendations.

D.

Participants must agree on a passphrase in advance, which can limit the usefulness of Diffie- Hell man in practical contexts.

Question 35

You have been instructed to look in the ArubaOS Security Dashboard's client list. Your goal is to find clients that belong to the company and have connected to devices that might belong to hackers.

Which client fits this description?

Options:

A.

MAC address: d8:50:e6:f3:70:ab; Client Classification: Interfering; AP Classification: Rogue

B.

MAC address: d8:50:e6:f3:6e:c5; Client Classification: Interfering; AP Classification: Neighbor

C.

MAC address: d8:50:e6:f3:6e:60; Client Classification: Interfering; AP Classification: Authorized

D.

MAC address: d8:50:e6:f3:6d:a4; Client Classification: Authorized; AP Classification: Rogue

Question 36

Device A is contacting https://arubapedia.arubanetworks.com. The web server sends a certificate chain. What does the browser do as part of validating the web server certificate?

Options:

A.

It makes sure that the key in the certificate matches the key that DeviceA uses for HTTPS.

B.

It makes sure the certificate has a DNS SAN that matches arubapedia.arubanetworks.com

C.

It makes sure that the public key in the certificate matches DeviceA's private HTTPS key.

D.

It makes sure that the public key in the certificate matches a private key stored on DeviceA.

Question 37

Which endpoint classification capabilities do Aruba network infrastructure devices have on their own without ClearPass solutions?

Options:

A.

ArubaOS-CX switches can use a combination of active and passive methods to assign roles to clients.

B.

ArubaOS devices (controllers and lAPs) can use DHCP fingerprints to assign roles to clients.

C.

ArubaOS devices can use a combination of DHCP fingerprints, HTTP User-Agent strings, and Nmap to construct endpoint profiles.

D.

ArubaOS-Switches can use DHCP fingerprints to construct detailed endpoint profiles.

Question 38

What is a consideration for using MAC authentication (MAC-Auth) to secure a wired or wireless connection?

Options:

A.

As a Layer 2 authentication method, MAC-Auth cannot be used to authenticate devices to an external authentication server.

B.

It is very easy for hackers to spoof their MAC addresses and get around MAC authentication.

C.

MAC-Auth can add a degree of security to an open WLAN by enabling the generation of a PMK to encrypt traffic.

D.

Headless devices, such as Internet of Things (loT) devices, must be configured in advance to support MAC-Auth.

Question 39

Which attack is an example or social engineering?

Options:

A.

An email Is used to impersonate a Dank and trick users into entering their bank login information on a fake website page.

B.

A hacker eavesdrops on insecure communications, such as Remote Desktop Program (RDP). and discovers login credentials.

C.

A user visits a website and downloads a file that contains a worm, which sell-replicates throughout the network.

D.

An attack exploits an operating system vulnerability and locks out users until they pay the ransom.

Question 40

Refer to the exhibit.

A company has an HPE Aruba Networking Instant AP cluster. A Windows 10 client is attempting to connect to a WLAN that enforces WPA3-Enterprise with authentication to HPE Aruba Networking ClearPass Policy Manager (CPPM). CPPM is configured to require EAP-TLS. The client authentication fails. In the record for this client's authentication attempt on CPPM, you see this alert.

What is one thing that you check to resolve this issue?

Options:

A.

Whether EAP-TLS is enabled in the AAA Profile settings for the WLAN on the IAP cluster

B.

Whether the client has a valid certificate installed on it to let it support EAP-TLS

C.

Whether EAP-TLS is enabled in the SSID Profile settings for the WLAN on the IAP cluster

D.

Whether the client has a third-party 802.1X supplicant, as Windows 10 does not support EAP-TLS

Question 41

Refer to the exhibit.

A diem is connected to an ArubaOS Mobility Controller. The exhibit snows all Tour firewall rules that apply to this diem

What correctly describes how the controller treats HTTPS packets to these two IP addresses, both of which are on the other side of the firewall

10.1 10.10

203.0.13.5

Options:

A.

It drops both of the packets

B.

It permits the packet to 10.1.10.10 and drops the packet to 203 0.13.5

C.

it permits both of the packets

D.

It drops the packet to 10.1.10.10 and permits the packet to 203.0.13.5.

Question 42

A company has a WLAN that uses Tunnel forwarding mode and WPA3-Enterprise security, supported by an Aruba Mobility Controller (MC) and campus APs (CAPs). You have been asked to capture packets from a wireless client connected to this WLAN and submit the packets to the security team.

What is a guideline for this capture?

Options:

A.

You should use an Air Monitor (AM) to capture the packets in the air.

B.

You should capture the traffic on the MC dataplane to obtain unencrypted traffic.

C.

You should mirror traffic from the switch port that connects to the AP out on a port connected to a packet analyzer.

D.

You should capture the traffic on the AP, so that the capture is as close to the source as possible.

Question 43

A company has an ArubaOS solution. The company wants to prevent users assigned to the "user_group1" role from using gaming and peer-to-peer applications.

What is the recommended approach for these requirements?

Options:

A.

Make sure DPI is enabled, and add application rules that deny gaming and peer-to-peer applications to the "user_groupr role.

B.

Create ALGs for the gaming and peer-to-peer applications, and deny the "user_group1" role on the ALGs.

C.

Add access control rules to the "user_group1" role, which deny HTTP/HTTPS traffic to IP addresses associated with gaming and peer-to-peer applications.

D.

Create service aliases for the TCP ports associated with gaming and peer-to-per applications, and use those aliases in access control rules for the "user_group" rules.

Question 44

A user attempts to connect to an SSID configured on an AOS-8 mobility architecture with Mobility Controllers (MCs) and APs. The SSID enforces WPA3-Enterprise security and uses HPE Aruba Networking ClearPass Policy Manager (CPPM) as the authentication server. The WLAN has initial role, logon, and 802.1X default role, guest.

A user attempts to connect to the SSID, and CPPM sends an Access-Accept with an Aruba-User-Role VSA of "contractor," which exists on the MC.

What does the MC do?

Options:

A.

Applies the rules in the logon role, then guest role, and the contractor role

B.

Applies the rules in the contractor role

C.

Applies the rules in the contractor role and the logon role

D.

Applies the rules in the contractor role and guest role

Question 45

This company has AOS-CX switches. The exhibit shows one access layer switch, Switch-2, as an example, but the campus actually has more switches. Switch-1 is a core switch that acts as the default router for end-user devices.

What is a correct way to configure the switches to protect against exploits from untrusted end-user devices?

Options:

A.

On Switch-1, enable ARP inspection on VLAN 100 and DHCP snooping on VLANs 15 and 25.

B.

On Switch-2, enable DHCP snooping globally and on VLANs 15 and 25. Later, enable ARP inspection on the same VLANs.

C.

On Switch-2, enable BPDU filtering on all edge ports in order to prevent eavesdropping attacks by untrusted devices.

D.

On Switch-1, enable DHCP snooping on VLAN 100 and ARP inspection on VLANs 15 and 25.

Question 46

What is one practice that can help you to maintain a digital chain or custody In your network?

Options:

A.

Enable packet capturing on Instant AP or Moodily Controller (MC) datepath on an ongoing basis

B.

Enable packet capturing on Instant AP or Mobility Controller (MC) control path on an ongoing basis.

C.

Ensure that all network infrastructure devices receive a valid clock using authenticated NTP

D.

Ensure that all network Infrastructure devices use RADIUS rather than TACACS+ to authenticate managers

Question 47

A customer has an AOS-10 network infrastructure. The customer is looking for a solution that can classify many different types of devices, including IoT devices. Which solution should you explain can provide these capabilities?

Options:

A.

HPE Aruba Networking EdgeConnect SD-WAN

B.

HPE Aruba Networking ClearPass OnGuard

C.

HPE Aruba Networking Central

D.

HPE Aruba Networking ClearPass Onboard

Question 48

What is one thing can you determine from the exhibits?

Options:

A.

CPPM originally assigned the client to a role for non-profiled devices. It sent a CoA to the authenticator after it categorized the device.

B.

CPPM sent a CoA message to the client to prompt the client to submit information that CPPM can use to profile it.

C.

CPPM was never able to determine a device category for this device, so you need to check settings in the network infrastructure to ensure they support CPPM's endpoint classification.

D.

CPPM first assigned the client to a role based on the user's identity. Then, it discovered that the client had an invalid category, so it sent a CoA to blacklist the client.

Question 49

Which scenario requires the Aruba Mobility Controller to use a Server Certificate?

Options:

A.

Obtain downloadable user roles (DURs) from ClearPass.

B.

Synchronize its clock with an NTP server that requires authentication.

C.

Use RadSec for enforcing 802.1X authentication to ClearPass.

D.

Use RADIUS for enforcing 802.1X authentication to ClearPass.

Question 50

What is a reason to set up a packet capture on an Aruba Mobility Controller (MC)?

Options:

A.

The company wants to use ClearPass Policy Manager (CPPM) to profile devices and needs to receive HTTP User-Agent strings from the MC.

B.

The security team believes that a wireless endpoint connected to the MC is launching an attack and wants to examine the traffic more closely.

C.

You want the MC to analyze wireless clients' traffic at a lower level, so that the ArubaOS firewall can control the traffic I based on application.

D.

You want the MC to analyze wireless clients' traffic at a lower level, so that the ArubaOS firewall can control Web traffic based on the destination URL.

Demo: 50 questions
Total 167 questions