New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the HP ACA - Network Security HPE6-A84 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Refer to the exhibit.

Question # 1

A customer requires protection against ARP poisoning in VLAN 4. Below are listed all settings for VLAN 4 and the VLAN 4 associated physical interfaces on the AOS-CX access layer switch:

Question # 1

What is one issue with this configuration?

Options:

A.

ARP proxy is not enabled on VLAN 4.


B.

LAG 1 is configured as trusted for ARP inspection but should be untrusted.


C.

DHCP snooping is not enabled on VLAN 4.


D.

Edge ports are not configured as untrusted for ARP inspection.


Expert Solution
Questions # 2:

A customer requires a secure solution for connecting remote users to the corporate main site. You are designing a client-to-site virtual private network (VPN) based on Aruba VIA and Aruba Mobility Controllers acting as VPN Concentrators (VPNCs). Remote users will first use the VIA client to contact the VPNCs and obtain connection settings.

The users should only be allowed to receive the settings if they are the customer's “RemoteEmployees” AD group. After receiving the settings, the VIA clients will automatically establish VPN connections, authenticating to CPPM with certificates.

What should you do to help ensure that only authorized users obtain VIA connection settings?

Options:

A.

Set up the VPNCs' VIA web authentication profile to use CPPM as the authentication server; set up a service on CPPM that uses AD as the authentication source.


B.

Set up the VPNCs' VIA web authentication profile to use an AD domain controller as the LDAP server.


C.

Set up the VPNCs' VIA connection profile to use two authentication profiles, one RADIUS profile to CPPM and one LDAP profile to AD.


D.

Set up the VPNCs' VIA connection profile to use one authentication profile, which is set to the AD domain controller's hostname.


Expert Solution
Questions # 3:

You are designing an Aruba ClearPass Policy Manager (CPPM) solution for a customer. You learn that the customer has a Palo Alto firewall that filters traffic between clients in the campus and the data center.

Which integration can you suggest?

Options:

A.

Sending Syslogs from the firewall to CPPM to signal CPPM to change the authentication status for misbehaving clients


B.

Importing clients' MAC addresses to configure known clients for MAC authentication more quickly


C.

Establishing a double layer of authentication at both the campus edge and the data center DMZ


D.

Importing the firewall's rules to program downloadable user roles for AOS-CX switches more quickly


Expert Solution
Questions # 4:

You want to use Device Insight tags as conditions within CPPM role mapping or enforcement policy rules.

What guidelines should you follow?

Options:

A.

Create an HTTP authentication source to the Central API that queries for the tags. To use that source as the type for rule conditions, add it an authorization source for the service in question.


B.

Use the Application type for the rule conditions; no extra authorization source is required for services that use policies with these rules.


C.

Use the Endpoints Repository type for the rule conditions; Add Endpoints Repository as a secondary authentication source for services that use policies with these rules.


D.

Use the Endpoint type for the rule conditions; no extra authorization source is required for services that use policies with these rules.


Expert Solution
Questions # 5:

You need to install a certificate on a standalone Aruba Mobility Controller (MC). The MC will need to use the certificate for the Web UI and for implementing RadSec with Aruba ClearPass Policy Manager. You have been given a certificate with these settings:

Question # 5Subject: CN=mc41.site94.example.com

Question # 5No SANs

Question # 5Issuer: CN=ca41.example.com

Question # 5EKUs: Server Authentication, Client Authentication

What issue does this certificate have for the purposes for which the certificate is intended?

Options:

A.

It has conflicting EKUs.


B.

It is issued by a private CA.


C.

It specifies domain info in the CN field instead of the DC field.


D.

It lacks a DNS SAN.


Expert Solution
Questions # 6:

You are working with a developer to design a custom NAE script for a customer. You are helping the developer find the correct REST API resource to monitor.

Refer to the exhibit below.

Question # 6

What should you do before proceeding?

Options:

A.

Go to the v1 API documentation interface instead of the v10.10 interface.


B.

Use your Aruba passport account and collect a token to use when trying out API calls.


C.

Enable the switch to listen to REST API calls on the default VRF.


D.

Make sure that your browser is set up to store authentication tokens and cookies.


Expert Solution
Questions # 7:

Refer to the scenario.

# Introduction to the customer

You are helping a company add Aruba ClearPass to their network, which uses Aruba network infrastructure devices.

The company currently has a Windows domain and Windows CA. The Window CA issues certificates to domain computers, domain users, and servers such as domain controllers. An example of a certificate issued by the Windows CA is shown here.

Question # 7

Question # 7

The company is in the process of adding Microsoft Endpoint Manager (Intune) to manage its mobile clients. The customer is maintaining the on-prem AD for now and uses Azure AD Connect to sync with Azure AD.

# Requirements for issuing certificates to mobile clients

The company wants to use ClearPass Onboard to deploy certificates automatically to mobile clients enrolled in Intune. During this process, Onboard should communicate with Azure AD to validate the clients. High availability should also be provided for this scenario; in other words, clients should be able to get certificates from Subscriber 2 if Subscriber 1 is down.

The Intune admins intend to create certificate profiles that include a UPN SAN with the UPN of the user who enrolled the device.

# Requirements for authenticating clients

The customer requires all types of clients to connect and authenticate on the same corporate SSID.

The company wants CPPM to use these authentication methods:

Question # 7EAP-TLS to authenticate users on mobile clients registered in Intune

Question # 7TEAR, with EAP-TLS as the inner method to authenticate Windows domain computers and the users on them

To succeed, EAP-TLS (standalone or as a TEAP method) clients must meet these requirements:

Question # 7Their certificate is valid and is not revoked, as validated by OCSP

Question # 7The client’s username matches an account in AD

# Requirements for assigning clients to roles

After authentication, the customer wants the CPPM to assign clients to ClearPass roles based on the following rules:

Question # 7Clients with certificates issued by Onboard are assigned the “mobile-onboarded” role

Question # 7Clients that have passed TEAP Method 1 are assigned the “domain-computer” role

Question # 7Clients in the AD group “Medical” are assigned the “medical-staff” role

Question # 7Clients in the AD group “Reception” are assigned to the “reception-staff” role

The customer requires CPPM to assign authenticated clients to AOS firewall roles as follows:

Question # 7Assign medical staff on mobile-onboarded clients to the “medical-mobile” firewall role

Question # 7Assign other mobile-onboarded clients to the “mobile-other” firewall role

Question # 7Assign medical staff on domain computers to the “medical-domain” firewall role

Question # 7All reception staff on domain computers to the “reception-domain” firewall role

Question # 7All domain computers with no valid user logged in to the “computer-only” firewall role

Question # 7Deny other clients access

# Other requirements

Communications between ClearPass servers and on-prem AD domain controllers must be encrypted.

# Network topology

For the network infrastructure, this customer has Aruba APs and Aruba gateways, which are managed by Central. APs use tunneled WLANs, which tunnel traffic to the gateway cluster. The customer also has AOS-CX switches that are not managed by Central at this point.

Question # 7

# ClearPass cluster IP addressing and hostnames

A customer’s ClearPass cluster has these IP addresses:

Question # 7Publisher = 10.47.47.5

Question # 7Subscriber 1 = 10.47.47.6

Question # 7Subscriber 2 = 10.47.47.7

Question # 7Virtual IP with Subscriber 1 and Subscriber 2 = 10.47.47.8

The customer’s DNS server has these entries

Question # 7cp.acnsxtest.com = 10.47.47.5

Question # 7cps1.acnsxtest.com = 10.47.47.6

Question # 7cps2.acnsxtest.com = 10.47.47.7

Question # 7radius.acnsxtest.com = 10.47.47.8

Question # 7onboard.acnsxtest.com = 10.47.47.8

The customer needs a secure way for users to enroll their new wireless clients in Intune. You are recommending a new WLAN that will provide the users with limited access for the enrollment.

You have set up captive portal for clients on this WLAN to a web page with instructions for enrolling devices. You will need to add several hostnames to the captive portal allowlist manually.

What is one of those hostnames?

Options:

A.

The hostname used by ClearPass Policy ManaGer's RADIUS services


B.

The ClearPass Onboard hostname referenced in an Onboard provisioninG profile


C.

The ClearPass Onboard hostname referenced in Intune SCEP profiles


D.

The hostname used by the on-prem domain controllers


Expert Solution
Questions # 8:

Refer to the scenario.

A customer has an Aruba ClearPass cluster. The customer has AOS-CX switches that implement 802.1X authentication to ClearPass Policy Manager (CPPM).

Switches are using local port-access policies.

The customer wants to start tunneling wired clients that pass user authentication only to an Aruba gateway cluster. The gateway cluster should assign these clients to the “eth-internet" role. The gateway should also handle assigning clients to their VLAN, which is VLAN 20.

The plan for the enforcement policy and profiles is shown below:

Question # 8

The gateway cluster has two gateways with these IP addresses:

• Gateway 1

o VLAN 4085 (system IP) = 10.20.4.21

o VLAN 20 (users) = 10.20.20.1

o VLAN 4094 (WAN) = 198.51.100.14

• Gateway 2

o VLAN 4085 (system IP) = 10.20.4.22

o VLAN 20 (users) = 10.20.20.2

o VLAN 4094 (WAN) = 198.51.100.12

• VRRP on VLAN 20 = 10.20.20.254

The customer requires high availability for the tunnels between the switches and the gateway cluster. If one gateway falls, the other gateway should take over its tunnels. Also, the switch should be able to discover the gateway cluster regardless of whether one of the gateways is in the cluster.

Assume that you have configured the correct UBT zone and port-access role settings. However, the solution is not working.

What else should you make sure to do?

Options:

A.

Assign VLAN 20 as the access VLAN on any edge ports to which tunneled clients might connect.


B.

Create a new VLAN on the AOS-CX switch and configure that VLAN as the UBT client VLAN.


C.

Assign sufficient VIA licenses to the gateways based on the number of wired clients that will connect.


D.

Change the port-access auth-mode mode to client-mode on any edge ports to which tunneled clients might connect.


Expert Solution
Questions # 9:

A customer has an AOS 10-based mobility solution, which authenticates clients to Aruba ClearPass Policy Manager (CPPM). The customer has some wireless devices that support WPA2 in personal mode only.

How can you meet these devices’ needs but improve security?

Options:

A.

Use MPSK on the WLAN to which the devices connect.


B.

Configure WIDS policies that apply extra monitoring to these particular devices.


C.

Connect these devices to the same WLAN to which 802.1X-capable clients connect, using MAC-Auth fallback.


D.

Enable dynamic authorization (RFC 3576) in the AAA profile for the devices.


Expert Solution
Questions # 10:

A customer wants CPPM to authenticate non-802.1X-capable devices. An admin has created the service shown in the exhibits below:

Question # 10

What is one recommendation to improve security?

Options:

A.

Adding an enforcement policy rule that denies access to endpoints with the Conflict flaq


B.

Using Active Directory as the authentication source


C.

Creating and using a custom MAC-Auth authentication method


D.

Enabling caching of posture and roles


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions