Pass the HP Aruba-ACNSA HPE6-A78 Questions and answers with CertsForce

Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions
Questions # 1:

An AOS-CX switch currently has no device fingerprinting settings configured on it. You want the switch to start collecting DHCP and LLDP information. You enter these commands:

Switch(config)# client device-fingerprint profile myprofile

Switch(myprofile)# dhcp

Switch(myprofile)# lldp

What else must you do to allow the switch to collect information from clients?

Options:

A.

Configure the switch as a DHCP relay


B.

Add at least one LLDP option to the policy


C.

Apply the policy to edge ports


D.

Add at least one DHCP option to the policy


Expert Solution
Questions # 2:

Which endpoint classification capabilities do Aruba network infrastructure devices have on their own without ClearPass solutions?

Options:

A.

ArubaOS-CX switches can use a combination of active and passive methods to assign roles to clients.


B.

ArubaOS devices (controllers and lAPs) can use DHCP fingerprints to assign roles to clients.


C.

ArubaOS devices can use a combination of DHCP fingerprints, HTTP User-Agent strings, and Nmap to construct endpoint profiles.


D.

ArubaOS-Switches can use DHCP fingerprints to construct detailed endpoint profiles.


Expert Solution
Questions # 3:

You have been instructed to look in the ArubaOS Security Dashboard's client list Your goal is to find clients mat belong to the company and have connected to devices that might belong to hackers

Which client fits this description?

Options:

A.

MAC address d8:50:e6:f3;6d;a4; Client Classification Authorized; AP Classification, interfering


B.

MAC address d8:50:e6 f3;6e;c5; Client Classification Interfering. AP Classification Neighbor


C.

MAC address d8:50:e6:f3;6e;60; Client Classification Interfering. AP Classification Interfering


D.

MAC address d8:50:e6:f3;TO;ab; Client Classification Interfering. AP Classification Rogue


Expert Solution
Questions # 4:

Which is a use case for enabling Control Plane Policing on Aruba switches?

Options:

A.

to prevent unauthorized network devices from sending routing updates


B.

to prevent the switch from accepting routing updates from unauthorized users


C.

to encrypt traffic between tunneled node switches and Mobility Controllers (MCs)


D.

to mitigate Denial of Service (Dos) attacks on the switch


Expert Solution
Questions # 5:

You need to set up Aruba network infrastructure devices for management with SNMP. The SNMP server has this SNMPv3 user configured on it: username: airwave auth algorithm: sha auth key: fyluqp18@S!9a priv algorithm: aes priv key: 761oxaiaoeu19&

What correctly describes the setup on the infrastructure device?

Options:

A.

You must configure a user with the same name and keys, but can choose algorithms that meet the device's needs.


B.

You must configure the "airwave" server as an authorized user. Then, configure a separate user for this device with its own keys.


C.

You must configure a user with the same name and algorithms, but the keys should be unique to this device.


D.

You must configure a user with exactly the same name, algorithms, and keys.


Expert Solution
Questions # 6:

What role does the Aruba ClearPass Device Insight Analyzer play in the Device Insight architecture?

Options:

A.

It resides in the cloud and manages licensing and configuration for Collectors


B.

It resides on-prem and provides the span port to which traffic is mirrored for deep analytics.


C.

It resides on-prem and is responsible for running active SNMP and Nmap scans


D.

It resides In the cloud and applies machine learning and supervised crowdsourcing to metadata sent by Collectors


Expert Solution
Questions # 7:

You have been instructed to look in the ArubaOS Security Dashboard's client list. Your goal is to find clients that belong to the company and have connected to devices that might belong to hackers.

Which client fits this description?

Options:

A.

MAC address: d8:50:e6:f3:70:ab; Client Classification: Interfering; AP Classification: Rogue


B.

MAC address: d8:50:e6:f3:6e:c5; Client Classification: Interfering; AP Classification: Neighbor


C.

MAC address: d8:50:e6:f3:6e:60; Client Classification: Interfering; AP Classification: Authorized


D.

MAC address: d8:50:e6:f3:6d:a4; Client Classification: Authorized; AP Classification: Rogue


Expert Solution
Questions # 8:

What is a consideration for using MAC authentication (MAC-Auth) to secure a wired or wireless connection?

Options:

A.

As a Layer 2 authentication method, MAC-Auth cannot be used to authenticate devices to an external authentication server.


B.

It is very easy for hackers to spoof their MAC addresses and get around MAC authentication.


C.

MAC-Auth can add a degree of security to an open WLAN by enabling the generation of a PMK to encrypt traffic.


D.

Headless devices, such as Internet of Things (loT) devices, must be configured in advance to support MAC-Auth.


Expert Solution
Questions # 9:

Refer to the exhibit, which shows the settings on the company's MCs.

Question # 9

You have deployed about 100 new HPE Aruba Networking 335 APs. What is required for the APs to become managed?

Options:

A.

Installing CA-signed certificates on the APs


B.

Approving the APs as authorized APs on the AP whitelist


C.

Installing self-signed certificates on the APs


D.

Configuring a PAPI key that matches on the APs and MCs


Expert Solution
Questions # 10:

Which correctly describes one of HPE Aruba Networking ClearPass Policy Manager's (CPPM's) device profiling methods?

Options:

A.

CPPM can use Wireshark to actively probe devices, analyze their traffic patterns, and construct an endpoint profile.


B.

CPPM can use SNMP to configure Aruba switches and mobility devices to mirror client traffic to CPPM for analysis.


C.

CPPM can analyze settings such as TTL and time window size in endpoints' TCP traffic in order to fingerprint the OS.


D.

CPPM can analyze settings such as TCP/UDP ports used for HTTP, DHCP, and DNS in endpoints' traffic to fingerprint the OS.


Expert Solution
Viewing page 1 out of 5 pages
Viewing questions 1-10 out of questions