Pass the HP Aruba-ACNSA HPE6-A78 Questions and answers with CertsForce

Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which is a correct description of a Public Key Infrastructure (PKI)?

Options:

A.

A device uses Intermediate Certification Authorities (CAs) to enable it to trust root CAs that are different from the root CA that signed its own certificate.


B.

A user must manually choose to trust intermediate and end-entity certificates, or those certificates must be installed on the device as trusted in advance.


C.

Root Certification Authorities (CAs) primarily sign certificates, and Intermediate Certification Authorities (CAs) primarily validate signatures.


D.

A user must manually choose to trust a root Certification Authority (CA) certificate, or the root CA certificate must be installed on the device as trusted.


Expert Solution
Questions # 32:

What is one difference between EAP-Tunneled Layer security (EAP-TLS) and Protected EAP (PEAP)?

Options:

A.

EAP-TLS creates a TLS tunnel for transmitting user credentials, while PEAP authenticates the server and supplicant during a TLS handshake.


B.

EAP-TLS requires the supplicant to authenticate with a certificate, hut PEAP allows the supplicant to use a username and password.


C.

EAP-TLS begins with the establishment of a TLS tunnel, but PEAP does not use a TLS tunnel as part of Its process


D.

EAP-TLS creates a TLS tunnel for transmitting user credentials securely while PEAP protects user credentials with TKIP encryption.


Expert Solution
Questions # 33:

The first exhibit shows roles on the MC, listed in alphabetic order. The second and third exhibits show the configuration for a WLAN to which a client connects. Which description of the role assigned to a user under various circumstances is correct?

Question # 33

Options:

A.

A user fails 802.1X authentication. The client remains connected, but is assigned the "guest" role.


B.

A user authenticates successfully with 802.1 X. and the RADIUS Access-Accept includes an Aruba-User-Role VSA set to "employeel.” The client’s role is "guest."


C.

A user authenticates successfully with 802.1X. and the RADIUS Access-Accept includes an Aruba-User-Role VSA set to "employee." The client’s role is "guest."


D.

A user authenticates successfully with 802.1X, and the RADIUS Access-Accept includes an Aruba-User-RoleVSA set to "employeel." The client's role is "employeel."


Expert Solution
Questions # 34:

What is one way that Control Plane Security (CPSec) enhances security for the network?

Options:

A.

It protects management traffic between APs and Mobility Controllers (MCs) from eavesdropping.


B.

It prevents Denial of Service (DoS) attacks against Mobility Controllers' (MCs') control plane.


C.

It protects wireless clients' traffic, tunneled between APs and Mobility Controllers, from eavesdropping.


D.

It prevents access from unauthorized IP addresses to critical services, such as SSH, on Mobility Controllers (MCs).


Expert Solution
Questions # 35:

What is one way that WPA3-PerSonal enhances security when compared to WPA2-Personal?

Options:

A.

WPA3-Perscn3i is more secure against password leaking Because all users nave their own username and password


B.

WPA3-Personai prevents eavesdropping on other users' wireless traffic by a user who knows the passphrase for the WLAN.


C.

WPA3-Personai is more resistant to passphrase cracking Because it requires passphrases to be at least 12 characters


D.

WPA3-Personal is more complicated to deploy because it requires a backend authentication server


Expert Solution
Questions # 36:

Your Aruba Mobility Master-based solution has detected a suspected rogue AP. Among other information, the ArubaOS Detected Radios page lists this information for the AP:

SSID = PublicWiFi

BSSID = a8:bd:27:12:34:56

Match method = Plus one

Match method = Eth-Wired-Mac-Table

The security team asks you to explain why this AP is classified as a rogue. What should you explain?

Options:

A.

The AP has a BSSID that is close to your authorized APs' BSSIDs. This indicates that the AP might be spoofing the corporate SSID and attempting to lure clients to it, making the AP a suspected rogue.


B.

The AP is probably connected to your LAN because it has a BSSID that is close to a MAC address that has been detected in your LAN. Because it does not belong to the company, it is a suspected rogue.


C.

The AP has been detected using multiple MAC addresses. This indicates that the AP is spoofing its MAC address, which qualifies it as a suspected rogue.


D.

The AP is an AP that belongs to your solution. However, the ArubaOS has detected that it is behaving suspiciously. It might have been compromised, so it is classified as a suspected rogue.


Expert Solution
Questions # 37:

Which correctly describes a way to deploy certificates to end-user devices?

Options:

A.

ClearPass Onboard can help to deploy certificates to end-user devices, whether or not they are members of a Windows domain


B.

ClearPass Device Insight can automatically discover end-user devices and deploy the proper certificates to them


C.

ClearPass OnGuard can help to deploy certificates to end-user devices, whether or not they are members of a Windows domain


D.

in a Windows domain, domain group policy objects (GPOs) can automatically install computer, but not user certificates


Expert Solution
Questions # 38:

What are some functions of an AruDaOS user role?

Options:

A.

The role determines which authentication methods the user must pass to gain network access


B.

The role determines which firewall policies and bandwidth contract apply to the clients traffic


C.

The role determines which wireless networks (SSiDs) a user is permitted to access


D.

The role determines which control plane ACL rules apply to the client's traffic


Expert Solution
Questions # 39:

This company has AOS-CX switches. The exhibit shows one access layer switch, Switch-2, as an example, but the campus actually has more switches. Switch-1 is a core switch that acts as the default router for end-user devices.

Question # 39

What is a correct way to configure the switches to protect against exploits from untrusted end-user devices?

Options:

A.

On Switch-1, enable ARP inspection on VLAN 100 and DHCP snooping on VLANs 15 and 25.


B.

On Switch-2, enable DHCP snooping globally and on VLANs 15 and 25. Later, enable ARP inspection on the same VLANs.


C.

On Switch-2, enable BPDU filtering on all edge ports in order to prevent eavesdropping attacks by untrusted devices.


D.

On Switch-1, enable DHCP snooping on VLAN 100 and ARP inspection on VLANs 15 and 25.


Expert Solution
Questions # 40:

What is a benefit of deploying HPE Aruba Networking ClearPass Device Insight?

Options:

A.

Highly accurate endpoint classification for environments with many device types, including Internet of Things (IoT)


B.

Simpler troubleshooting of ClearPass solutions across an environment with multiple ClearPass Policy Managers


C.

Visibility into devices’ 802.1X supplicant settings and automated certificate deployment


D.

Agent-based analysis of devices’ security settings and health status, with the ability to implement quarantining


Expert Solution
Viewing page 4 out of 5 pages
Viewing questions 31-40 out of questions