Pass the HP ACA - Network Security HPE6-A84 Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

How does Aruba Central handle security for site-to-site connections between AOS 10 gateways?

Options:

A.

It uses an Aruba proprietary integrity and encryption technologies to secure site-to-site connections, making them resistant to zero day attacks.


B.

It automatically establishes IPsec tunnels for all site-to-site (all HUBs and Branches) connections using keys securely distributed by Central.


C.

It automatically steers traffic away from Internet-based connections to more secure MPLS connections to reduce encryption overhead.


D.

It automatically establishes simple-to-manage and highly secure TLSv1.3 tunnels between gateways.


Expert Solution
Questions # 2:

Refer to the scenario.

A customer requires these rights for clients in the “medical-mobile” AOS firewall role on Aruba Mobility Controllers (MCs):

Question # 2Permitted to receive IP addresses with DHCP

Question # 2Permitted access to DNS services from 10.8.9.7 and no other server

Question # 2Permitted access to all subnets in the 10.1.0.0/16 range except denied access to 10.1.12.0/22

Question # 2Denied access to other 10.0.0.0/8 subnets

Question # 2Permitted access to the Internet

Question # 2Denied access to the WLAN for a period of time if they send any SSH traffic

Question # 2Denied access to the WLAN for a period of time if they send any Telnet traffic

Question # 2Denied access to all high-risk websites

External devices should not be permitted to initiate sessions with “medical-mobile” clients, only send return traffic.

The exhibits below show the configuration for the role.

Question # 2

What setting not shown in the exhibit must you check to ensure that the requirements of the scenario are met?

Options:

A.

That denylisting is enabled globally on the MCs’ firewalls


B.

That stateful handling of traffic is enabled globally on the MCs’ firewalls and on the medical-mobile role.


C.

That AppRF and WebCC are enabled globally and on the medical-mobile role


D.

That the MCs are assigned RF Protect licenses


Expert Solution
Questions # 3:

Refer to the scenario.

An organization wants the AOS-CX switch to trigger an alert if its RADIUS server (cp.acnsxtest.local) rejects an unusual number of client authentication requests per hour. After some discussions with other Aruba admins, you are still not sure how many rejections are usual or unusual. You expect that the value could be different on each switch.

You are helping the developer understand how to develop an NAE script for this use case.

The developer explains that they plan to define the rule with logic like this:

monitor > value

However, the developer asks you what value to include.

What should you recommend?

Options:

A.

Checking one of the access switches' RADIUS statistics and adding 10 to the number listed for rejects


B.

Defining a baseline and referring to it for the value


C.

Using 10 (per hour) as a good starting point for the value


D.

Defining a parameter and referring to it (self ^ramsfname]) for the value


Expert Solution
Questions # 4:

Refer to the exhibit.

Question # 4

A customer requires protection against ARP poisoning in VLAN 4. Below are listed all settings for VLAN 4 and the VLAN 4 associated physical interfaces on the AOS-CX access layer switch:

Question # 4

What is one issue with this configuration?

Options:

A.

ARP proxy is not enabled on VLAN 4.


B.

LAG 1 is configured as trusted for ARP inspection but should be untrusted.


C.

DHCP snooping is not enabled on VLAN 4.


D.

Edge ports are not configured as untrusted for ARP inspection.


Expert Solution
Questions # 5:

A customer's admins have added RF Protect licenses and enabled WIDS for a customer's AOS 8-based solution. The customer wants to use the built-in capabilities of APs without deploying dedicated air monitors (AMs). Admins tested rogue AP detection by connecting an unauthorized wireless AP to a switch. The rogue AP was not detected even after several hours.

What is one point about which you should ask?

Options:

A.

Whether APs' switch ports support all the VLANs that are accessible at the edge


B.

Whether admins enabled wireless containment


C.

Whether admins set at least one radio on each AP to air monitor mode


D.

Whether the customer is using non-standard Wi-Fi channels in the deployment


Expert Solution
Questions # 6:

You want to use Device Insight tags as conditions within CPPM role mapping or enforcement policy rules.

What guidelines should you follow?

Options:

A.

Create an HTTP authentication source to the Central API that queries for the tags. To use that source as the type for rule conditions, add it an authorization source for the service in question.


B.

Use the Application type for the rule conditions; no extra authorization source is required for services that use policies with these rules.


C.

Use the Endpoints Repository type for the rule conditions; Add Endpoints Repository as a secondary authentication source for services that use policies with these rules.


D.

Use the Endpoint type for the rule conditions; no extra authorization source is required for services that use policies with these rules.


Expert Solution
Questions # 7:

Refer to the scenario.

A customer is using an AOS 10 architecture with Aruba APs and Aruba gateways (two per site). Admins have implemented auto-site clustering for gateways with the default gateway mode disabled. WLANs use tunneled mode to the gateways.

The WLAN security is WPA3-Enterprise with authentication to an Aruba ClearPass Policy Manager (CPPM) cluster VIP. RADIUS communications use RADIUS, not RadSec.

For which devices does CPPM require network device entries?

Options:

A.

Forgateways' actual IP addresses and dynamic authorization VRRP addresses


B.

For gateways' actual IP addresses and AP clusters' virtual IP addresses for dynamic authorization


C.

For APs' actual IP addresses


D.

ForAP clusters'virtual IP addresses


Expert Solution
Questions # 8:

A customer has an AOS 10 architecture, consisting of Aruba AP and AOS-CX switches, managed by Aruba Central. The customer wants to obtain information about the clients, such as their general category and OS.

What should you explain?

Options:

A.

The customer must deploy Aruba gateways in order to receive any client profiling information.


B.

You will need to set up Aruba Central as a secondary IP helper for client VLANs, but this will not interfere with existing operations.


C.

Aruba Central will automatically derive this information using telemetry from the Aruba devices.


D.

The customer should set up a dedicated switch VSX group to sniff packets and direct them to Aruba Central.


Expert Solution
Questions # 9:

A customer wants CPPM to authenticate non-802.1X-capable devices. An admin has created the service shown in the exhibits below:

Question # 9

What is one recommendation to improve security?

Options:

A.

Adding an enforcement policy rule that denies access to endpoints with the Conflict flaq


B.

Using Active Directory as the authentication source


C.

Creating and using a custom MAC-Auth authentication method


D.

Enabling caching of posture and roles


Expert Solution
Questions # 10:

Refer to the scenario.

A customer has an Aruba ClearPass cluster. The customer has AOS-CX switches that implement 802.1X authentication to ClearPass Policy Manager (CPPM).

Switches are using local port-access policies.

The customer wants to start tunneling wired clients that pass user authentication only to an Aruba gateway cluster. The gateway cluster should assign these clients to the “eth-internet" role. The gateway should also handle assigning clients to their VLAN, which is VLAN 20.

The plan for the enforcement policy and profiles is shown below:

Question # 10

The gateway cluster has two gateways with these IP addresses:

• Gateway 1

o VLAN 4085 (system IP) = 10.20.4.21

o VLAN 20 (users) = 10.20.20.1

o VLAN 4094 (WAN) = 198.51.100.14

• Gateway 2

o VLAN 4085 (system IP) = 10.20.4.22

o VLAN 20 (users) = 10.20.20.2

o VLAN 4094 (WAN) = 198.51.100.12

• VRRP on VLAN 20 = 10.20.20.254

The customer requires high availability for the tunnels between the switches and the gateway cluster. If one gateway falls, the other gateway should take over its tunnels. Also, the switch should be able to discover the gateway cluster regardless of whether one of the gateways is in the cluster.

You are setting up the UBT zone on an AOS-CX switch.

Which IP addresses should you define in the zone?

Options:

A.

Primary controller = 10.20.4.21; backup controller = 10.20.4.22


B.

[Primary controller = 198.51.100.14; backup controller = 10.20.4.21


C.

Primary controller = 10 20 4 21: backup controller not defined


D.

Primary controller = 10.20.20.254; backup controller, not defined


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions