Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the HP ACNSP HPE7-A02 Questions and answers with CertsForce

Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions
Questions # 21:

You are setting up policy rules in HPE Aruba Networking SSE. You want to create a single rule that permits users in a particular user group to access multiple applications. What is an easy way to meet this need?

Options:

A.

Associate the applications directly with the IdP used to authenticate the users; choose any for the destination in the policy rule.


B.

Apply the same tag to the applications; select the tag as a destination in the policy rule.


C.

Place all the applications in the same connector zone; select that zone as a destination in the policy rule.


D.

Select the applications within a non-default web profile; select that profile in the policy rule.


Expert Solution
Questions # 22:

A company has AOS-CX switches. The company wants to make it simpler and faster for admins to detect denial of service (DoS) attacks, such as ping or ARP floods, launched against the switches.

What can you do to support this use case?

Options:

A.

Deploy an NAE agent on the switches to monitor control plane policing (CoPP).


B.

Configure the switches to implement RADIUS accounting to HPE Aruba Networking ClearPass and enable HPE Aruba Networking ClearPass Insight.


C.

Implement ARP inspection on all VLANs that support end-user devices.


D.

Enabling debugging of security functions on the switches.


Expert Solution
Questions # 23:

A company uses both HPE Aruba Networking ClearPass Policy Manager (CPPM) and HPE Aruba Networking ClearPass Device Insight (CPDI). What is one way integrating the two solutions can help the company implement Zero Trust Security?

Options:

A.

CPPM can inform CPDI that it has assigned a particular Aruba-User-Role to a client; CPDI can then use that information to reclassify the client.


B.

CPDI can use tags to inform CPPM that clients are using prohibited applications. CPPM can then tell the network infrastructure to quarantine those clients.


C.

CPPM can provide CPDI with custom device fingerprint definitions in order to enhance the company's total visibility.


D.

CPDI can provide CPPM with extra information about users' identity. CPPM can then use that information to apply the correct identity-based enforcement.


Expert Solution
Questions # 24:

A company wants HPE Aruba Networking ClearPass Policy Manager (CPPM) to respond to Syslog messages from its Check Point firewall. You have added the

firewall as an event source and set up an event service. However, test Syslog messages are not triggering the expected actions.

What is one CPPM setting that you should check?

Options:

A.

ClearPass Device Insight integration is disabled.


B.

The Check Point Extension is installed through ClearPass Guest.


C.

The CoA delay value is set to 0 on the server.


D.

Ingress Event Dictionaries for Check Point messages are enabled.


Expert Solution
Questions # 25:

A company issues user certificates to domain computers using its Windows CA and the default user certificate template. You have set up HPE Aruba Networking

ClearPass Policy Manager (CPPM) to authenticate 802.1X clients with those certificates. However, during tests, you receive an error that authorization has failed

because the usernames do not exist in the authentication source.

What is one way to fix this issue and enable clients to successfully authenticate with certificates?

Options:

A.

Configure rules to strip the domain name from the username.


B.

Change the authentication method list to include both PEAP MSCHAPv2 and EAP-TLS.


C.

Add the ClearPass Onboard local repository to the authentication source list.


D.

Remove EAP-TLS from the authentication method list and add TEAP there instead.


Expert Solution
Questions # 26:

A company wants to apply role-based access control lists (ACLs) on AOS-CX switches, which are implementing authentication to HPE Aruba Networking ClearPass Policy Manager (CPPM). The company wants to centralize configuration as much as possible. Which correctly describes your options?

Options:

A.

You can configure the role on CPPM; however, the CPPM role must reference a policy name that is configured on the switch.


B.

You can configure the role name on CPPM; however, the role settings, including policy and classes, must be configured locally on the switch.


C.

You can configure the role, its policy, and the classes referenced in the policy all on CPPM.


D.

You can configure the role and its policy on CPPM; however, the classes referenced in the policy must be configured locally on the switch.


Expert Solution
Questions # 27:

An AOS-CX switch has been configured to implement UBT to a cluster of three HPE Aruba Networking gateways.

How does the switch determine to which gateways to tunnel UBT users' traffic?

Options:

A.

The switch tunnels all users' traffic to the gateway configured as the primary gateway in the UBT zone, unless that gateway fails.


B.

The switch tunnels each user's traffic to the particular gateway assigned as that user's active user designed gateway.


C.

The switch load balances client traffic across the primary and standby gateway configured in the UBT zone.


D.

The switch tunnels all users' traffic to the gateway assigned as the switch's active device designated gateway.


Expert Solution
Questions # 28:

You have set up a mirroring session between an AOS-CX switch and a management station, running Wireshark. You want to capture just the traffic sent in the

mirroring session, not the management station's other traffic.

What should you do?

Options:

A.

Apply this capture filter: ip proto 47


B.

Edit protocol preferences and enable ARUBA_ERM.


C.

Edit protocol preferences and enable HPE_ERM.


D.

Apply this capture filter: udp port 5555


Expert Solution
Questions # 29:

You are using Wireshark to view packets captured from HPE Aruba Networking infrastructure, but you’re not sure that the packets are displaying correctly. In which circumstance does it make sense to configure Wireshark to ignore protection bits with the IV for the 802.11 protocol?

Options:

A.

When the traffic was captured on the data plane of an HPE Aruba Networking gateway and sent to a remote IP.


B.

When the traffic was mirrored from an AOS-CX switch port connected to an AP.


C.

When the traffic was captured from an AP with HPE Aruba Networking Central.


D.

When the traffic was captured on the control plane of an HPE Aruba Networking MC and sent to a remote IP.


Expert Solution
Questions # 30:

A company has HPE Aruba Networking APs (AOS-10), which authenticate clients to HPE Aruba Networking ClearPass Policy Manager (CPPM). CPPM is set up

to receive a variety of information about clients' profile and posture. New information can mean that CPPM should change a client's enforcement profile.

What should you set up on the APs to help the solution function correctly?

Options:

A.

In the security settings, configure dynamic denylisting.


B.

In the RADIUS server settings for CPPM, enable Dynamic Authorization.


C.

In the WLAN profiles, enable interim RADIUS accounting.


D.

In the RADIUS server settings for CPPM, enable querying the authentication status.


Expert Solution
Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions