Pass the HP Aruba-ACNSA HPE6-A78 Questions and answers with CertsForce

Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions
Questions # 21:

You have been asked to send RADIUS debug messages from an AOS-CX switch to a central SIEM server at 10.5.15.6. The server is already defined on the switch with this command:

logging 10.5.15.6

You enter this command:

debug radius all

What is the correct debug destination?

Options:

A.

file


B.

console


C.

buffer


D.

syslog


Expert Solution
Questions # 22:

Refer to the exhibits.

Question # 22

A company has added a new user group. Users in the group try to connect to the WLAN and receive errors that the connection has no Internet access. The users cannot reach any resources. The first exhibit shows the record for one of the users who cannot connect. The second exhibit shows the role to which the AOS device assigned the user’s client.

What is a likely problem?

Options:

A.

The AOS device does not have the correct RADIUS dictionaries installed on it to understand the Aruba-User-Role VSA.


B.

The AOS device has a server derivation rule configured on it that has overridden the role sent by CPPM.


C.

The clients rejected the server authentication on their side because they do not have the root CA for CPPM’s RADIUS/EAP certificate.


D.

The role name that CPPM is sending does not match the role name configured on the AOS device.


Expert Solution
Questions # 23:

What purpose does an initialization vector (IV) serve for encryption?

Options:

A.

It enables programs to convert easily-remembered passphrases to keys of a correct length.


B.

It makes encryption algorithms more secure by ensuring that the same plaintext and key can produce different ciphertext.


C.

It helps parties to negotiate the keys and algorithms used to secure data before data transmission.


D.

It enables the conversion of asymmetric keys into keys that are suitable for symmetric encryption.


Expert Solution
Questions # 24:

What is a difference between radius and TACACS+?

Options:

A.

RADIUS combines the authentication and authorization process while TACACS+ separates them.


B.

RADIUS uses TCP for Its connection protocol, while TACACS+ uses UDP tor its connection protocol.


C.

RADIUS encrypts the complete packet, white TACACS+ only offers partial encryption.


D.

RADIUS uses Attribute Value Pairs (AVPs) in its messages, while TACACS+ does not use them.


Expert Solution
Questions # 25:

Your AOS solution has detected a rogue AP with Wireless Intrusion Prevention (WIP). Which information about the detected radio can best help you to locate the rogue device?

Options:

A.

The detecting devices


B.

The match method


C.

The confidence level


D.

The match type


Expert Solution
Questions # 26:

You are managing an Aruba Mobility Controller (MC). What is a reason for adding a "Log Settings" definition in the ArubaOS Diagnostics > System > Log Settings page?

Options:

A.

Configuring the Syslog server settings for the server to which the MC forwards logs for a particular category and level


B.

Configuring the MC to generate logs for a particular event category and level, but only for a specific user or AP.


C.

Configuring a filter that you can apply to a defined Syslog server in order to filter events by subcategory


D.

Configuring the log facility and log format that the MC will use for forwarding logs to all Syslog servers


Expert Solution
Questions # 27:

A client has accessed an HTTPS server at myhost1.example.com using Chrome. The server sends a certificate that includes these properties:

    Subject name: myhost.example.com

    SAN: DNS: myhost.example.com; DNS: myhost1.example.com

    Extended Key Usage (EKU): Server authentication

    Issuer: MyCA_SigningThe server also sends an intermediate CA certificate for MyCA_Signing, which is signed by MyCA. The client’s Trusted CA Certificate list does not include the MyCA or MyCA_Signing certificates.Which factor or factors prevent the client from trusting the certificate?

Options:

A.

The client does not have the correct trusted CA certificates.


B.

The certificate lacks a valid SAN.


C.

The certificate lacks the correct EKU.


D.

The certificate lacks a valid SAN, and the client does not have the correct trusted CA certificates.


Expert Solution
Questions # 28:

Which is a correct description of a stage in the Lockheed Martin kill chain?

Options:

A.

In the delivery stage, malware collects valuable data and delivers or exfilltrated it to the hacker.


B.

In the reconnaissance stage, the hacker assesses the impact of the attack and how much information was exfilltrated.


C.

In the weaponization stage, which occurs after malware has been delivered to a system, the malware executes Its function.


D.

In the exploitation and installation phases, malware creates a backdoor into the infected system for the hacker.


Expert Solution
Questions # 29:

What is one practice that can help you to maintain a digital chain or custody In your network?

Options:

A.

Enable packet capturing on Instant AP or Moodily Controller (MC) datepath on an ongoing basis


B.

Enable packet capturing on Instant AP or Mobility Controller (MC) control path on an ongoing basis.


C.

Ensure that all network infrastructure devices receive a valid clock using authenticated NTP


D.

Ensure that all network Infrastructure devices use RADIUS rather than TACACS+ to authenticate managers


Expert Solution
Questions # 30:

A company has Aruba Mobility Controllers (MCs). Aruba campus APs. and ArubaOS-CX switches. The company plans to use ClearPass Policy Manager (CPPM) to classify endpoints by type The ClearPass admins tell you that they want to run Network scans as part of the solution

What should you do to configure the infrastructure to support the scans?

Options:

A.

Create a TA profile on the ArubaOS-Switches with the root CA certificate for ClearPass's HTTPS certificate


B.

Create device fingerprinting profiles on the ArubaOS-Switches that include SNMP. and apply the profiles to edge ports


C.

Create remote mirrors on the ArubaOS-Swrtches that collect traffic on edge ports, and mirror it to CPPM's IP address.


D.

Create SNMPv3 users on ArubaOS-CX switches, and make sure that the credentials match those configured on CPPM


Expert Solution
Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions