Pass the HP ACNSP HPE7-A02 Questions and answers with CertsForce

Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which statement describes Zero Trust Security?

Options:

A.

Companies must apply the same access controls to all users, regardless of identity.


B.

Companies that support remote workers cannot achieve zero trust security and must determine if the benefits outweigh the cost.


C.

Companies should focus on protecting their resources rather than on protecting the boundaries of their internal network.


D.

Companies can achieve zero trust security by strengthening their perimeter security to detect a wider range of threats.


Expert Solution
Questions # 32:

A company assigns a different block of VLAN IDs to each of its access layer AOS-CX switches. The switches run version 10.07. The IDs are used for standard

purposes, such as for employees, VolP phones, and cameras. The company wants to apply 802.1X authentication to HPE Aruba Networking ClearPass Policy

Manager (CPPM) and then steer clients to the correct VLANs for local forwarding.

What can you do to simplify setting up this solution?

Options:

A.

Assign consistent names to VLANs of the same type across the AOS-CX switches and have user-roles reference names.


B.

Use the trunk allowed VLAN setting to assign multiple VLAN IDs to the same role.


C.

Change the VLAN IDs across the AOS-CX switches so that they are consistent.


D.

Avoid configuring the VLAN in the role; use trunk VLANs to assign multiple VLANs to the port instead.


Expert Solution
Questions # 33:

What is a benefit of Online Certificate Status Protocol (OCSP)?

Options:

A.

It lets a device query whether a single certificate is revoked or not.


B.

It lets a device dynamically renew its certificate before the certificate expires.


C.

It lets a device download all the serial numbers for certificates revoked by a CA at once.


D.

It lets a device determine whether to trust a certificate without needing any root certificates installed.


Expert Solution
Questions # 34:

HPE Aruba Networking Central displays an alert about an Infrastructure Attack that was detected. You go to the Security > RAPIDS events and see that the attack

was "Detect adhoc using Valid SSID."

What is one possible next step?

Options:

A.

Use HPE Aruba Networking Central floorplans or the detecting AP identities to locate the general area for the threat.


B.

Look for the IP address associated with the offender and then check for that IP address among HPE Aruba Networking Central clients.


C.

Make sure that you have tuned the threshold for that check, as false positives are common for it.


D.

Make sure that clients have updated drivers, as faulty drivers are a common explanation for this attack type.


Expert Solution
Questions # 35:

The following firewall role is configured on HPE Aruba Networking Central-managed APs:

wlan access-rule employees

index 3

rule any any match 17 67 67 permit

rule any any match any 53 53 permit

rule 10 5 5.0 255.255 255.0 match any any any deny

rule 10.5 0.0 255.255 0.0 match 6 80 80 permit

rule 10.5 0.0 255.255.0.0 match 6 443 443 permit

rule 10.5.0.0 255.255.0.0 match any any any deny

rule any any match any any any permit

A client has authenticated and been assigned to the employees role. The client has IP address 10.2.2.2. Which correctly describes behavior in this policy?

Options:

A.

HTTPS traffic from 10.2.2.2 to 10.5.5.5 is denied.


B.

HTTPS traffic from 10.2.2.2 to 203.0.113.12 is denied.


C.

Traffic from 10.5.3.3 in an active HTTPS session between 10.2.2.2 and 10.5.3.3 is permitted.


D.

Traffic from 198.51.100.12 in an active HTTP session between 10.2.2.2 and 198.51.100.12 is denied.


Expert Solution
Questions # 36:

A company has AOS-CX switches and HPE Aruba Networking APs, which run AOS-10 and bridge their SSIDs. Company security policies require 802.1X on all

edge ports, some of which connect to APs.

How should you configure the auth-mode on AOS-CX switches?

Options:

A.

Configure all edge ports in device auth-mode.


B.

Leave all edge ports in client auth-mode and configure device auth-mode in the AP role.


C.

Configure all edge ports in client auth-mode.


D.

Leave all edge ports in device auth-mode and configure client auth-mode in the AP role.


Expert Solution
Questions # 37:

A company uses HPE Aruba Networking ClearPass Policy Manager (CPPM) as a TACACS+ server to authenticate managers on its AOS-CX switches. The

company wants CPPM to control which commands managers are allowed to enter. You see there is no field to enter these commands in ClearPass.

How do you start configuring the command list on CPPM?

Options:

A.

Add the Shell service to the managers' TACACS+ enforcement profiles.


B.

Edit the TACACS+ settings in the AOS-CX switches' network device entries.


C.

Create an enforcement policy with the TACACS+ type.


D.

Edit the settings for CPPM's default TACACS+ admin roles.


Expert Solution
Questions # 38:

You are deploying a virtual Data Collector for use with HPE Aruba Networking ClearPass Device Insight (CPDI). You have identified VLAN 101 in the data center

as the VLAN to which the Data Collector should connect to receive its IP address and connect to HPE Aruba Networking Central.

Which Data Collector virtual ports should you tell the virtual admins to connect to VLAN 101?

Options:

A.

The one with the lowest MAC address


B.

The one with the highest port ID


C.

The one with the highest MAC address


D.

The one with the lowest port ID


Expert Solution
Questions # 39:

A company has a variety of HPE Aruba Networking solutions, including an HPE Aruba Networking infrastructure and HPE Aruba Networking ClearPass Policy

Manager (CPPM). The company passes traffic from the corporate LAN destined to the data center through a third-party SRX firewall. The company would like to

further protect itself from internal threats.

What is one solution that you can recommend?

Options:

A.

Have the third-party firewall send Syslogs to CPPM, which can work with network devices to lock internal attackers out of the network.


B.

Use tunnel mode SSIDs and user-based tunneling (UBT) on AOS-CX switches to pass all internal traffic directly through the third-party firewall.


C.

Add ClearPass Device Insight (CPDI) to the solution; integrate it with the third-party firewall to develop more complete device profiles.


D.

Configure CPPM to poll the third-party firewall for a broad array of information about internal clients, such as profile and posture.


Expert Solution
Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions