Big Cyber Monday Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

HP HPE7-A02 Aruba Certified Network Security Professional Exam Exam Practice Test

Demo: 40 questions
Total 135 questions

Aruba Certified Network Security Professional Exam Questions and Answers

Question 1

A company wants to use the HPE Aruba Networking ClearPass OnGuard agent to assign posture to clients.

How do you define the conditions by which a client receives a particular posture?

Options:

A.

Create rules within a posture policy

B.

Create rules within a WebAuth enforcement policy

C.

Create the rules directly in a service’s Enforcement tab

D.

Create rules directly in a service’s Posture tab

Question 2

A company uses HPE Aruba Networking ClearPass Policy Manager (CPPM) as a TACACS+ server to authenticate managers on its AOS-CX switches. The

company wants CPPM to control which commands managers are allowed to enter. You see there is no field to enter these commands in ClearPass.

How do you start configuring the command list on CPPM?

Options:

A.

Add the Shell service to the managers' TACACS+ enforcement profiles.

B.

Edit the TACACS+ settings in the AOS-CX switches' network device entries.

C.

Create an enforcement policy with the TACACS+ type.

D.

Edit the settings for CPPM's default TACACS+ admin roles.

Question 3

A company has a variety of HPE Aruba Networking solutions, including an HPE Aruba Networking infrastructure and HPE Aruba Networking ClearPass Policy Manager (CPPM). The company passes traffic from the corporate LAN destined to the data center through a third-party SRX firewall. The company would like to further protect itself from internal threats. What is one solution that you can recommend?

Options:

A.

Have the third-party firewall send Syslogs to CPPM, which can work with network devices to lock internal attackers out of the network.

B.

Add ClearPass Device Insight (CPDI) to the solution, integrate it with the third-party firewall to develop more complete device profiles.

C.

Configure CPPM to poll the third-party firewall for a broad array of information about internal clients, such as profile and posture.

D.

Use tunnel mode SSIDs and user-based tunneling (UBT) on AOS-CX switches to pass all internal traffic directly through the third-party firewall.

Question 4

You manage AOS-10 APs with HPE Aruba Networking Central. A role is configured on these APs with these rules (in order):

    Allow UDP on port 67 to any destination

    Allow any to network 10.1.4.0/23

    Deny any to network 10.1.0.0/18 + log

    Deny any to network 10.0.0.0/8

    Allow any to any destination

You add this new rule immediately before rule 4:

    Deny SSH to network 10.1.0.0/21 + denylist

After this change, what happens when a client assigned to this role sends SSH traffic to 10.1.7.12?

Options:

A.

The traffic is permitted

B.

The traffic is dropped and logged

C.

The traffic is dropped, and the client is denylisted

D.

The traffic is dropped (without any logging or further action against the client)

Question 5

You are using OpenSSL to obtain a certificate signed by a Certification Authority (CA). You have entered this command:

openssl req -new -out file1.pem -newkey rsa:3072 -keyout file2.pem

Enter PEM pass phrase: **********

Verifying - Enter PEM pass phrase: **********

Country Name (2 letter code) [AU]:US

State or Province Name (full name) [Some-State]:California

Locality Name (eg, city) []:Sunnyvale

Organization Name (eg, company) [Internet Widgits Pty Ltd]:example.com

Organizational Unit Name (eg, section) []:Infrastructure

Common Name (e.g. server FQDN or YOUR name) []:radius.example.com

What is one guideline for continuing to obtain a certificate?

Options:

A.

You should use a third-party tool to encrypt file2.pem before sending it and file1.pem to the CA.

B.

You should concatenate file1.pem and file2.pem into a single file, and submit that to the desired CA to sign.

C.

You should submit file1.pem, but not file2.pem, to the desired CA to sign.

D.

You should submit file2.pem, but not file1.pem, to the desired CA to sign.

Question 6

You are setting up an HPE Aruba Networking VIA solution for a company. You have already created a VPN pool with IP addresses for the remote clients. During

tests, however, the clients do not receive IP addresses from that pool.

What is one setting to check?

Options:

A.

That the pool uses valid, public IP addresses that are assigned to the company

B.

That the pool is associated with the role to which the VIA clients are being assigned

C.

That the pool uses an IP subnet that is different from any subnet configured on the VPNC

D.

That the pool is referenced in the clients' VIA Connection Profile

Question 7

A company is using HPE Aruba Networking Central SD-WAN Orchestrator to establish a hub-spoke VPN between branch gateways (BGWs) at 1164 site and VPNCs at multiple data centers. What is part of the configuration that admins need to complete?

Options:

A.

In VPNCs’ groups, establish VPN pools to control which branches connect to which VPNCs.

B.

In BGWs’ and VPNCs’ groups, create default IKE policies for the SD-WAN Orchestrator to use.

C.

In BGWs’ groups, select the VPNCs to which to connect in a DC preference list.

D.

At the global level, create default IPsec policies for the SD-WAN Orchestrator to use.

Question 8

A company uses HPE Aruba Networking ClearPass Policy Manager (CPPM) as a TACACS+ server to authenticate managers on its AOS-CX switches. The company wants CPPM to control which commands managers are allowed to enter.

Which service must you add to the managers' TACACS+ enforcement profile?

Options:

A.

Cpass:HTTP

B.

Shell

C.

ARAP

D.

Aruba:Common

Question 9

You are using Wireshark to view packets captured from HPE Aruba Networking infrastructure, but you are not sure that the packets are displaying correctly.

In which circumstance does it make sense to ensure that Wireshark has GRE enabled as one of its analyzed protocols?

Options:

A.

When the traffic was captured on an HPE Aruba Networking gateway and sent to a remote IP

B.

When the traffic was captured on an HPE Aruba Networking gateway dataplane and saved to a file

C.

When the traffic was captured on an HPE Aruba Networking Mobility Controller (MC) control plane and saved to a file

D.

When the traffic was captured on an HPE Aruba Networking MC dataplane and saved to a file

Question 10

A company has been running Gateway IDS/IPS on its gateways in IDS mode for several weeks. The company wants to transition to IPS mode.

What is one step you should recommend?

Options:

A.

Disable traffic inspection and reboot before re-enabling traffic inspection with the new mode.

B.

Change the mode on one gateway at a time to establish a smoother transition period.

C.

Consider applying a stricter IPS policy to minimize issues during the transition period.

D.

Check for legitimate traffic that has been flagged as a threat and allow list the associated rules.

Question 11

A company has an HPE Aruba Networking ClearPass cluster with several servers. ClearPass Policy Manager (CPPM) is set up to:

. Update client attributes based on Syslog messages from third-party appliances

. Have the clients reauthenticate and apply new profiles to the clients based on the updates

To ensure that the correct profiles apply, what is one step you should take?

Options:

A.

Configure a CoA action for all tag updates in the ClearPass Device Insight integration settings.

B.

Tune the CoA delay on the ClearPass servers to a value of 5 seconds or greater.

C.

Set the cluster's Endpoint Context Servers polling interval to a value of 5 seconds or less.

D.

Configure the cluster to periodically clean up (delete) unknown endpoints.

Question 12

You are helping an organization deploy HPE Aruba Networking SSE. What is one reason to recommend that the company install agents on remote users' devices?

Options:

A.

To run posture checks and apply different permissions based on those checks.

B.

To permit admins to manage the HPE Aruba Networking SSE policy rules.

C.

To permit users to access private servers using SSH.

D.

To run threat inspection on clients in a local sandbox rather than in the cloud.

Question 13

The following firewall role is configured on HPE Aruba Networking Central-managed APs:

wlan access-rule employees

index 3

rule any any match 17 67 67 permit

rule any any match any 53 53 permit

rule 10 5 5.0 255.255 255.0 match any any any deny

rule 10.5 0.0 255.255 0.0 match 6 80 80 permit

rule 10.5 0.0 255.255.0.0 match 6 443 443 permit

rule 10.5.0.0 255.255.0.0 match any any any deny

rule any any match any any any permit

A client has authenticated and been assigned to the employees role. The client has IP address 10.2.2.2. Which correctly describes behavior in this policy?

Options:

A.

HTTPS traffic from 10.2.2.2 to 10.5.5.5 is denied.

B.

HTTPS traffic from 10.2.2.2 to 203.0.113.12 is denied.

C.

Traffic from 10.5.3.3 in an active HTTPS session between 10.2.2.2 and 10.5.3.3 is permitted.

D.

Traffic from 198.51.100.12 in an active HTTP session between 10.2.2.2 and 198.51.100.12 is denied.

Question 14

You have created this rule in an HPE Aruba Networking ClearPass Policy Manager (CPPM) service’s enforcement policy:

IF Authorization [Endpoints Repository] Conflict EQUALS true

THEN apply "quarantine_profile"

What information can help you determine whether you need to configure cluster-wide profiler parameters to ignore some conflicts?

Options:

A.

Whether some devices are running legacy operating systems

B.

Whether the company has rare Internet of Things (IoT) devices

C.

Whether some devices are incapable of captive portal or 802.1X authentication

D.

Whether the company has devices that use PXE boot

Question 15

A company wants you to integrate HPE Aruba Networking ClearPass Policy Manager (CPPM) with HPE Aruba Networking ClearPass Device Insight (CPDI).

What is one aspect of the integration that you should explain?

Options:

A.

CPPM no longer supports any Device Profiler features and relies on CPDI for this profile information.

B.

CPDI must be configured as an audit server on CPPM for the integration to be successful.

C.

CPDI must have security analysis disabled on it for the integration to be successful.

D.

CPPM can submit profile information to CPDI, but if CPDI derives a different classification, CPDI takes precedence.

Question 16

You need to create a rule in an HPE Aruba Networking ClearPass Policy Manager (CPPM) role mapping policy that references a ClearPass Device Insight Tag.

Which Type (namespace) should you specify for the rule?

Options:

A.

Application

B.

Tips

C.

Device

D.

Endpoint

Question 17

What is a typical use case for using HPE Aruba Networking ClearPass Onboard to provision devices?

Options:

A.

Enabling unmanaged devices to succeed at certificate-based 802.1X

B.

Enabling managed Windows domain computers to succeed at certificate-based 802.1X

C.

Enhancing security for loT devices that need to authenticate with MAC-Auth

D.

Enforcing posture-based assessment on managed Windows domain computers

Question 18

What is one benefit of integrating HPE Aruba Networking ClearPass Policy Manager (CPPM) with third-party solutions such as Mobility Device Management (MDM) and firewalls?

Options:

A.

CPPM can exchange contextual information about clients with third-party solutions, which helps make better decisions.

B.

CPPM can make the third-party solutions more secure by adding signature-based threat detection capabilities.

C.

CPPM can offload policy decisions to the third-party solutions, enabling CPPM to respond to authentication requests more quickly.

D.

CPPM can take over filtering internal traffic so that the third-party solutions have more processing power to devote to filtering external traffic.

Question 19

HPE Aruba Networking Central displays a Gateway Threat Count alert in the alert list. How can you gather more information about what caused the alert to trigger?

Options:

A.

Use HPE Aruba Networking Central tools to run a Network Check on the gateway with which the alert is associated.

B.

Use Live Monitoring on the gateway to download a packet capture of recent traffic flowing through the gateway.

C.

Check the threat list for the gateway associated with the alert. Access threat details and download packet info.

D.

Check the gateway's Audit Trail in HPE Aruba Networking Central for more details about the threats that triggered the alert.

Question 20

You have installed an HPE Aruba Networking Network Analytic Engine (NAE) script on an AOS-CX switch to monitor a particular function.

Which additional step must you complete to start the monitoring?

Options:

A.

Reboot the switch.

B.

Enable NAE, which is disabled by default.

C.

Edit the script to define monitor parameters.

D.

Create an agent from the script.

Question 21

A company has HPE Aruba Networking APs, which authenticate users to HPE Aruba Networking ClearPass Policy Manager (CPPM).

What does HPE Aruba Networking recommend as the preferred method for assigning clients to a role on the AOS firewall?

Options:

A.

Configure CPPM to assign the role using a RADIUS enforcement profile with a RADIUS:IETF Username attribute.

B.

Configure CPPM to assign the role using a RADIUS enforcement profile with an Aruba-User-Role VSA.

C.

OCreate server rules on the APs to assign clients to roles based on RADIUS IETF attributes returned by CPPM.

D.

Create user rules on the APs to assign clients to roles based on a variety of criteria.

Question 22

Which use case is fulfilled by applying a time range to a firewall rule on an AOS device?

Options:

A.

Enforcing the rule only during the specified time range

B.

Tuning the session timeout for sessions established with this rule

C.

Locking clients that violate the rule for the specified time range

D.

Setting the time range over which hit counts for the rule are aggregated

Question 23

A company is implementing a client-to-site VPN based on tunnel-mode IPsec.

Which devices are responsible for the IPsec encapsulation?

Options:

A.

Gateways at the remote clients' locations and devices accessed by the clients at the main site

B.

The remote clients and devices accessed by the clients at the main site

C.

The remote clients and a gateway at the main site

D.

Gateways at the remote clients' locations and a gateway at the main site

Question 24

You are establishing a cluster of HPE Aruba Networking ClearPass servers. (Assume that they are running version 6.9.).

For which type of certificate is it recommended to install a CA-signed certificate on the Subscriber before it joins the cluster?

Options:

A.

HTTPS

B.

Database

C.

RADIUS/EAP

D.

RadSec

Question 25

You need to set up an HPE Aruba Networking VIA solution for a customer who needs to support 2100 remote employees. The customer wants employees to

download their VIA connection profile from the VPNC. Only employees who authenticate with their domain credentials to HPE Aruba Networking ClearPass Policy

Manager (CPPM) should be able to download the profile. (A RADIUS server group for CPPM is already set up on the VPNC.)

How do you configure the VPNC to enforce that requirement?

Options:

A.

Set up a VIA Authentication Profile that uses CPPM's server group; reference that profile in the VIA Web Authentication Profile.

B.

Reference CPPM's server group in an AAA profile; then, apply that profile to the VPNC's Internet-facing ports.

C.

Create a new VPN Authentication Profile and then reference CPPM's default server group in that profile.

D.

Set up a VIA Authentication Profile that uses CPPM's server group; reference that profile in the VIA Connection Profile.

Question 26

Refer to Exhibit:

All of the switches in the exhibit are AOS-CX switches.

What is the preferred configuration on Switch-2 for preventing rogue OSPF routers in this network?

Options:

A.

Configure OSPF authentication on VLANs 10-19 in password mode.

B.

Configure OSPF authentication on Lag 1 in MD5 mode.

C.

Disable OSPF entirely on VLANs 10-19.

D.

Configure passive-interface as the OSPF default and disable OSPF passive on Lag 1.

Question 27

A company wants you to create a custom device fingerprint on CPPM with rules for profiling a group of specialized devices. What is one requirement?

Options:

A.

Connecting a known device of this type and getting it discovered in CPPM's Endpoints Repository.

B.

Enabling HPE Aruba Networking ClearPass Device Insight integration with the correct Data Collector token.

C.

Pre-defining the desired attributes and rules in an XML format file.

D.

Disabling the "Automatically download Endpoint Profiler Fingerprints" feature in cluster-wide parameters.

Question 28

HPE Aruba Networking switches are implementing MAC-Auth to HPE Aruba Networking ClearPass Policy Manager (CPPM) for a company's printers. The company wants to quarantine a client that spoofs a legitimate printer's MAC address. You plan to add a rule to the MAC-Auth service enforcement policy for this purpose. What condition should you include?

Options:

A.

Endpoint Compliance EQUALS false

B.

Endpoint Device Insight Tag EXISTS

C.

Authorization: [Endpoints Repository] Compromised EQUALS true

D.

Authorization: [Endpoints Repository] Conflict EQUALS true

Question 29

HPE Aruba Networking ClearPass Policy Manager (CPPM) uses a service to authenticate clients. You are now adding the Endpoints Repository as an

authorization source for the service, and you want to add rules to the service's policies that apply different access levels based, in part, on a client's device

category. You need to ensure that CPPM can apply the new correct access level after discovering new clients' categories.

What should you enable on the service?

Options:

A.

The Posture Compliance option in the Service tab

B.

The Profile Endpoints option in the Service tab

C.

The Use cached Roles and Posture attributes from previous sessions option in the Enforcement tab

D.

The Audit End-host option in the Service tab

Question 30

An admin has configured an AOS-CX switch with these settings:

port-access role employees

vlan access name employees

This switch is also configured with CPPM as its RADIUS server.

Which enforcement profile should you configure on CPPM to work with this configuration?

Options:

A.

RADIUS Enforcement type with HPE-User-Role VSA set to "employees"

B.

HPE Aruba Networking Downloadable Role Enforcement type with role name set to "employees"

C.

HPE Aruba Networking Downloadable Role Enforcement type with gateway role name set to "employees"

D.

RADIUS Enforcement type with Aruba-User-Role VSA set to "employees"

Question 31

A company has Aruba APs that are controlled by Central and that implement WIDS. When you check WIDS events, you see a "detect valid SSID misuse" event. What can you interpret from this event, and what steps should you take?

Options:

A.

Clients are failing to authenticate to corporate SSIDs. You should first check for misconfigured authentication settings and then investigate a possible threat.

B.

Admins have likely misconfigured SSID security settings on some of the company's APs. You should have them check those settings.

C.

Hackers are likely trying to pose as authorized APs. You should use the detecting radio information and immediately track down the device that triggered the event.

D.

This event might be a threat but is almost always a false positive. You should wait to see the event over several days before following up on it.

Question 32

As part of setting up an HPE Aruba Networking ClearPass Onboard solution for wireless clients, you created Network Settings, a Configuration Profile, and a Provisioning Settings object in ClearPass Onboard. You also ran the ClearPass Onboard Service Only Template on ClearPass Policy Manager (CPPM).

You now need to ensure that only domain users are authenticated and allowed to log into the ClearPass Onboard portal.

Which component should you edit?

Options:

A.

The Network Settings on ClearPass Onboard

B.

The ClearPass Onboard Service Pre-Auth service on CPPM

C.

The 802.1X services on CPPM used for wireless clients

D.

The Provisioning profile on ClearPass Onboard

Question 33

You need to create a rule in an HPE Aruba Networking ClearPass Policy Manager (CPPM) role mapping policy that references a ClearPass Device Insight Tag. Which Type (namespace) should you specify for the rule?

Options:

A.

Endpoint

B.

TIPS

C.

Device

D.

Application

Question 34

A company has HPE Aruba Networking APs running AOS-10 that connect to AOS-CX switches. The APs will:

    Authenticate as 802.1X supplicants to HPE Aruba Networking ClearPass Policy Manager (CPPM)

    Be assigned to the "APs" role on the switches

    Have their traffic forwarded locally

What information do you need to help you determine the VLAN settings for the "APs" role?

Options:

A.

Whether the switches are using local user-roles (LURs) or downloadable user-roles (DURs).

B.

Whether the APs bridge or tunnel traffic on their SSIDs.

C.

Whether the switches have established tunnels with an HPE Aruba Networking gateway.

D.

Whether the APs have static or DHCP-assigned IP addresses.

Question 35

A company uses both HPE Aruba Networking ClearPass Policy Manager (CPPM) and HPE Aruba Networking ClearPass Device Insight (CPDI). What is one way integrating the two solutions can help the company implement Zero Trust Security?

Options:

A.

CPPM can inform CPDI that it has assigned a particular Aruba-User-Role to a client; CPDI can then use that information to reclassify the client.

B.

CPDI can use tags to inform CPPM that clients are using prohibited applications. CPPM can then tell the network infrastructure to quarantine those clients.

C.

CPPM can provide CPDI with custom device fingerprint definitions in order to enhance the company's total visibility.

D.

CPDI can provide CPPM with extra information about users' identity. CPPM can then use that information to apply the correct identity-based enforcement.

Question 36

You have run an Active Endpoint Security Report on HPE Aruba Networking ClearPass. The report indicates that hundreds of endpoints have MAC addresses but

no known IP addresses.

What is one step for addressing this issue?

Options:

A.

Set up network devices to implement RADIUS accounting to CPPM.

B.

Add CPPM's IP address to the IP helper list on routing switches.

C.

Set up switches to implement ARP inspection on client VLANs.

D.

Configure CPPM as a Syslog destination on network devices.

Question 37

A company needs to enforce 802.1X authentication for its Windows domain computers to HPE Aruba Networking ClearPass Policy Manager (CPPM). The

company needs the computers to authenticate as both machines and users in the same session.

Which authentication method should you set up on CPPM?

Options:

A.

TEAP

B.

PEAP MSCHAPv2

C.

EAP-TTLS

D.

EAP-TLS

Question 38

You are setting up HPE Aruba Networking SSE to detect threats as remote users browse the internet.

What is part of this process?

Options:

A.

Creating a non-default file security profile

B.

Integrating HPE Aruba Networking SSE with a supported third-party antivirus provider

C.

Deploying a connector that can reach the remote users

D.

Creating an external web profile that enables SSL inspection

Question 39

A company is implementing HPE Aruba Networking Wireless IDS/IPS (WIDS/WIPS) on its AOS-10 APs, which are managed in HPE Aruba Networking Central.

What is one requirement for enabling detection of rogue APs?

Options:

A.

Each VLAN in the network assigned on at least one AP's or AM's port

B.

A Foundation with Security license for each of the APs

C.

One AM deployed for every one AP deployed

D.

A manual radio profile that enables non-regulatory channels

Question 40

A company has wired VolP phones, which transmit tagged traffic and connect to AOS-CX switches. The company wants to tunnel the phones' traffic to an HPE

Aruba Networking gateway for applying security policies.

What is part of the correct configuration on the AOS-CX switches?

Options:

A.

UBT mode set to VLAN extend

B.

A VXLAN VNI mapped to the VLAN assigned to the VolP phones

C.

VLANs assigned to the VolP phones configured on the switch uplinks

D.

A UBT reserved VLAN set to a VLAN dedicated for that purpose

Demo: 40 questions
Total 135 questions