New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the HP ACNSP HPE7-A02 Questions and answers with CertsForce

Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
Questions # 1:

You are setting up HPE Aruba Networking SSE to detect threats as remote users browse the internet.

What is part of this process?

Options:

A.

Creating a non-default file security profile


B.

Integrating HPE Aruba Networking SSE with a supported third-party antivirus provider


C.

Deploying a connector that can reach the remote users


D.

Creating an external web profile that enables SSL inspection


Expert Solution
Questions # 2:

A company has a variety of HPE Aruba Networking solutions, including an HPE Aruba Networking infrastructure and HPE Aruba Networking ClearPass Policy

Manager (CPPM). The company passes traffic from the corporate LAN destined to the data center through a third-party SRX firewall. The company would like to

further protect itself from internal threats.

What is one solution that you can recommend?

Options:

A.

Have the third-party firewall send Syslogs to CPPM, which can work with network devices to lock internal attackers out of the network.


B.

Use tunnel mode SSIDs and user-based tunneling (UBT) on AOS-CX switches to pass all internal traffic directly through the third-party firewall.


C.

Add ClearPass Device Insight (CPDI) to the solution; integrate it with the third-party firewall to develop more complete device profiles.


D.

Configure CPPM to poll the third-party firewall for a broad array of information about internal clients, such as profile and posture.


Expert Solution
Questions # 3:

A company wants you to create a custom device fingerprint on CPPM with rules for profiling a group of specialized devices. What is one requirement?

Options:

A.

Connecting a known device of this type and getting it discovered in CPPM's Endpoints Repository.


B.

Enabling HPE Aruba Networking ClearPass Device Insight integration with the correct Data Collector token.


C.

Pre-defining the desired attributes and rules in an XML format file.


D.

Disabling the "Automatically download Endpoint Profiler Fingerprints" feature in cluster-wide parameters.


Expert Solution
Questions # 4:

A company wants to turn on Wireless IDS/IPS infrastructure and client detection at the high level on HPE Aruba Networking APs. The company does not want to

enable any prevention settings.

What should you explain about HPE Aruba Networking recommendations?

Options:

A.

HPE Aruba Networking recommends turning on both wired and wireless prevention whenever you enable detection at high.


B.

HPE Aruba Networking recommends using hybrid AP mode, as opposed to Air Monitors (AMs), when implementing detection without prevention.


C.

HPE Aruba Networking recommends disabling client detection when you configure infrastructure detection at high, as infrastructure detection includes all the client checks and more.


D.

HPE Aruba Networking recommends configuring infrastructure and client detection at a custom level and disabling or tuning some of the settings that are likely to produce false positives.


Expert Solution
Questions # 5:

A company has a third-party security appliance deployed in its data center. The company wants to pass all traffic for certain clients through that device before forwarding that traffic toward its ultimate destination.

Which AOS-CX switch technology fulfills this use case?

Options:

A.

Virtual Network Based Tunneling (VNBT)


B.

MC-LAG


C.

Network Analytics Engine (NAE)


D.

Device profiles


Expert Solution
Questions # 6:

HPE Aruba Networking switches are implementing MAC-Auth to HPE Aruba Networking ClearPass Policy Manager (CPPM) for a company's printers. The company wants to quarantine a client that spoofs a legitimate printer's MAC address. You plan to add a rule to the MAC-Auth service enforcement policy for this purpose. What condition should you include?

Options:

A.

Endpoint Compliance EQUALS false


B.

Endpoint Device Insight Tag EXISTS


C.

Authorization: [Endpoints Repository] Compromised EQUALS true


D.

Authorization: [Endpoints Repository] Conflict EQUALS true


Expert Solution
Questions # 7:

A company needs to enforce 802.1X authentication for its Windows domain computers to HPE Aruba Networking ClearPass Policy Manager (CPPM). The

company needs the computers to authenticate as both machines and users in the same session.

Which authentication method should you set up on CPPM?

Options:

A.

TEAP


B.

PEAP MSCHAPv2


C.

EAP-TTLS


D.

EAP-TLS


Expert Solution
Questions # 8:

A company lacks visibility into the many different types of user and loT devices deployed in its internal network, making it hard for the security team to address

those devices.

Which HPE Aruba Networking solution should you recommend to resolve this issue?

Options:

A.

HPE Aruba Networking ClearPass Device Insight (CPDI)


B.

HPE Aruba Networking Network Analytics Engine (NAE)


C.

HPE Aruba Networking Mobility Conductor


D.

HPE Aruba Networking ClearPass OnBoard


Expert Solution
Questions # 9:

HPE Aruba Networking ClearPass Device Insight (CPDI) could not classify some endpoints using system and user rules. Using machine learning, it did assign those endpoints to a cluster and discover a recommendation. In which of these circumstances does CPDI automatically classify the endpoints based on that recommendation?

Options:

A.

The recommendation has 96% confidence, and it is based on 13 classified devices.


B.

The recommendation has 98% confidence, and it is based on 5 classified devices.


C.

The recommendation has 93% confidence, and it is based on 36 classified devices.


D.

The recommendation has 100% confidence, and it is based on 4 classified devices.


Expert Solution
Questions # 10:

The security team needs you to show them information about MAC spoofing attempts detected by HPE Aruba Networking ClearPass Policy Manager (CPPM).

What should you do?

Options:

A.

Export the Access Tracker records on CPPM as an XML file.


B.

Use ClearPass Insight to run an Active Endpoint Security report.


C.

Integrate CPPM with ClearPass Device Insight (CPDI) and run a security report on CPDI.


D.

Show the security team the CPPM Endpoint Profiler dashboard.


Expert Solution
Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions