Pass the HP Aruba-ACNSA HPE6-A78 Questions and answers with CertsForce

Viewing page 5 out of 5 pages
Viewing questions 41-50 out of questions
Questions # 41:

What is one way a noneypot can be used to launch a man-in-the-middle (MITM) attack to wireless clients?

Options:

A.

it uses a combination or software and hardware to jam the RF band and prevent the client from connecting to any wireless networks


B.

it runs an NMap scan on the wireless client to And the clients MAC and IP address. The hacker then connects to another network and spoofs those addresses.


C.

it examines wireless clients' probes and broadcasts the SSlDs in the probes, so that wireless clients will connect to it automatically.


D.

it uses ARP poisoning to disconnect wireless clients from the legitimate wireless network and force clients to connect to the hacker's wireless network instead.


Expert Solution
Questions # 42:

Refer to the exhibit.

Question # 42

You need to ensure that only management stations in subnet 192.168.1.0/24 can access the ArubaOS-Switches' CLI. Web Ul. and REST interfaces The company also wants to let managers use these stations to access other parts of the network What should you do?

Options:

A.

Establish a Control Plane Policing class that selects traffic from 192.168 1.0/24.


B.

Specify 192.168.1.0.255.255.255.0 as authorized IP manager address


C.

Configure the switch to listen for these protocols on OOBM only.


D.

Specify vlan 100 as the management vlan for the switches.


Expert Solution
Questions # 43:

You have an Aruba solution with multiple Mobility Controllers (MCs) and campus APs. You want to deploy a WPA3-Enterprise WLAN and authenticate users to Aruba ClearPass Policy Manager (CPPM) with EAP-TLS.

What is a guideline for ensuring a successful deployment?

Options:

A.

Avoid enabling CNSA mode on the WLAN, which requires the internal MC RADIUS server.


B.

Ensure that clients trust the root CA for the MCs’ Server Certificates.


C.

Educate users in selecting strong passwords with at least 8 characters.


D.

Deploy certificates to clients, signed by a CA that CPPM trusts.


Expert Solution
Questions # 44:

A company has a WLAN that uses Tunnel forwarding mode and WPA3-Enterprise security, supported by an Aruba Mobility Controller (MC) and campus APs (CAPs). You have been asked to capture packets from a wireless client connected to this WLAN and submit the packets to the security team.

What is a guideline for this capture?

Options:

A.

You should use an Air Monitor (AM) to capture the packets in the air.


B.

You should capture the traffic on the MC dataplane to obtain unencrypted traffic.


C.

You should mirror traffic from the switch port that connects to the AP out on a port connected to a packet analyzer.


D.

You should capture the traffic on the AP, so that the capture is as close to the source as possible.


Expert Solution
Questions # 45:

You have been asked to send RADIUS debug messages from an ArubaOS-CX switch to a central SIEM server at 10.5.15.6. The server is already defined on the switch with this command: logging 10.5.6.12

You enter this command: debug radius all

What is the correct debug destination?

Options:

A.

console


B.

file


C.

syslog


D.

buffer


Expert Solution
Questions # 46:

You have been asked to rind logs related to port authentication on an ArubaOS-CX switch for events logged in the past several hours But. you are having trouble searching through the logs What is one approach that you can take to find the relevant logs?

Options:

A.

Add the "-C and *-c port-access" options to the "show logging" command.


B.

Configure a logging Tiller for the "port-access" category, and apply that filter globally.


C.

Enable debugging for "portaccess" to move the relevant logs to a buffer.


D.

Specify a logging facility that selects for "port-access" messages.


Expert Solution
Questions # 47:

What is a reason to set up a packet capture on an Aruba Mobility Controller (MC)?

Options:

A.

The company wants to use ClearPass Policy Manager (CPPM) to profile devices and needs to receive HTTP User-Agent strings from the MC.


B.

The security team believes that a wireless endpoint connected to the MC is launching an attack and wants to examine the traffic more closely.


C.

You want the MC to analyze wireless clients' traffic at a lower level, so that the ArubaOS firewall can control the traffic I based on application.


D.

You want the MC to analyze wireless clients' traffic at a lower level, so that the ArubaOS firewall can control Web traffic based on the destination URL.


Expert Solution
Questions # 48:

A company has an ArubaOS solution. The company wants to prevent users assigned to the "user_group1" role from using gaming and peer-to-peer applications.

What is the recommended approach for these requirements?

Options:

A.

Make sure DPI is enabled, and add application rules that deny gaming and peer-to-peer applications to the "user_groupr role.


B.

Create ALGs for the gaming and peer-to-peer applications, and deny the "user_group1" role on the ALGs.


C.

Add access control rules to the "user_group1" role, which deny HTTP/HTTPS traffic to IP addresses associated with gaming and peer-to-peer applications.


D.

Create service aliases for the TCP ports associated with gaming and peer-to-per applications, and use those aliases in access control rules for the "user_group" rules.


Expert Solution
Questions # 49:

What is an example of passive endpoint classification?

Options:

A.

TCP fingerprinting


B.

SSH scans


C.

WMI scans


D.

SNMP scans


Expert Solution
Questions # 50:

A client has accessed an HTTPS server at myhost1.example.com using Chrome. The server sends a certificate that includes these properties:

    Subject name: myhost.example.com

    SAN: DNS: myhost.example.com; DNS: myhost1.example.com

    Extended Key Usage (EKU): Server authentication

    Issuer: MyCA_SigningThe server also sends an intermediate CA certificate for MyCA_Signing, which is signed by MyCA. The client’s Trusted CA Certificate list does not include the MyCA or MyCA_Signing certificates.Which factor or factors prevent the client from trusting the certificate?

Options:

A.

The client does not have the correct trusted CA certificates.


B.

The certificate lacks a valid SAN.


C.

The certificate lacks the correct EKU.


D.

The certificate lacks a valid SAN, and the client does not have the correct trusted CA certificates.


Expert Solution
Viewing page 5 out of 5 pages
Viewing questions 41-50 out of questions