Black Friday Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > HP > Aruba-ACNSA > HPE6-A78

HPE6-A78 Aruba Certified Network Security Associate Exam Question and Answers

Question # 4

What role does the Aruba ClearPass Device Insight Analyzer play in the Device Insight architecture?

A.

It resides in the cloud and manages licensing and configuration for Collectors

B.

It resides on-prem and provides the span port to which traffic is mirrored for deep analytics.

C.

It resides on-prem and is responsible for running active SNMP and Nmap scans

D.

It resides In the cloud and applies machine learning and supervised crowdsourcing to metadata sent by Collectors

Full Access
Question # 5

What is another setting that you must configure on the switch to meet these requirements?

A.

Set the aaa authentication login method for SSH to the "radius" server-group (with local as backup).

B.

Configure a CPPM username and password that match a CPPM admin account.

C.

Create port-access roles with the same names of the roles that CPPM will send in Aruba-Admin-Role VSAs.

D.

Disable SSH on the default VRF and enable it on the mgmt VRF instead.

Full Access
Question # 6

You are deploying a new wireless solution with an Aruba Mobility Master (MM). Aruba Mobility Controllers (MCs), and campus APs (CAPs). The solution will include a WLAN that uses Tunnel for the forwarding mode and WPA3-Enterprise for the security option.

You have decided to assign the WLAN to VLAN 301, a new VLAN. A pair of core routing switches will act as the default router for wireless user traffic.

Which links need to carry VLAN 301?

A.

only links in the campus LAN to ensure seamless roaming

B.

only links between MC ports and the core routing switches

C.

only links on the path between APs and the core routing switches

D.

only links on the path between APs and the MC

Full Access
Question # 7

You need to implement a WPA3-Enterprise network that can also support WPA2-Enterprise clients. What is a valid configuration for the WPA3-Enterprise WLAN?

A.

CNSA mode disabled with 256-bit keys

B.

CNSA mode disabled with 128-bit keys

C.

CNSA mode enabled with 256-bit keys

D.

CNSA mode enabled with 128-bit keys

Full Access
Question # 8

What are the roles of 802.1X authenticators and authentication servers?

A.

The authenticator stores the user account database, while the server stores access policies.

B.

The authenticator supports only EAP, while the authentication server supports only RADIUS.

C.

The authenticator is a RADIUS client and the authentication server is a RADIUS server.

D.

The authenticator makes access decisions and the server communicates them to the supplicant.

Full Access
Question # 9

What is a correct use case for using the specified certificate file format?

A.

using a PKCS7 file to install a certificate plus and its private key on a device

B.

using a PKCS12 file to install a certificate plus its private key on a device

C.

using a PEM file to install a binary encoded certificate on a device

D.

using a PKCS7 file to install a binary encoded private key on a device

Full Access
Question # 10

An admin has created a WLAN that uses the settings shown in the exhibits (and has not otherwise adjusted the settings in the AAA profile) A client connects to the WLAN Under which circumstances will a client receive the default role assignment?

A.

The client has attempted 802 1X authentication, but the MC could not contact the authentication server

B.

The client has attempted 802 1X authentication, but failed to maintain a reliable connection, leading to a timeout error

C.

The client has passed 802 1X authentication, and the value in the Aruba-User-Role VSA matches a role on the MC

D.

The client has passed 802 1X authentication and the authentication server did not send an Aruba-User-Role VSA

Full Access
Question # 11

Refer to the exhibit.

How can you use the thumbprint?

A.

Install this thumbprint on management stations to use as two-factor authentication along with manager usernames and passwords, this will ensure managers connect from valid stations

B.

Copy the thumbprint to other Aruba switches to establish a consistent SSH Key for all switches this will enable managers to connect to the switches securely with less effort

C.

When you first connect to the switch with SSH from a management station, make sure that the thumbprint matches to ensure that a man-in-t he-mid die (MITM) attack is not occurring

D.

install this thumbprint on management stations the stations can then authenticate with the thumbprint instead of admins having to enter usernames and passwords.

Full Access
Question # 12

What is a Key feature of me ArubaOS firewall?

A.

The firewall is stateful which means that n can track client sessions and automatically allow return traffic for permitted sessions

B.

The firewall Includes application layer gateways (ALGs). which it uses to filter Web traffic based on the reputation of the destination web site.

C.

The firewall examines all traffic at Layer 2 through Layer 4 and uses source IP addresses as the primary way to determine how to control traffic.

D.

The firewall is designed to fitter traffic primarily based on wireless 802.11 headers, making it ideal for mobility environments

Full Access
Question # 13

How can ARP be used to launch attacks?

A.

Hackers can use ARP to change their NIC's MAC address so they can impersonate legiti-mate users.

B.

Hackers can exploit the fact that the port used for ARP must remain open and thereby gain remote access to another user's device.

C.

A hacker can use ARP to claim ownership of a CA-signed certificate that actually belongs to another device.

D.

A hacker can send gratuitous ARP messages with the default gateway IP to cause devices to redirect traffic to the hacker's MAC address.

Full Access
Question # 14

You have deployed a new Aruba Mobility Controller (MC) and campus APs (CAPs). One of the WLANs enforces 802.IX authentication lo Aruba ClearPass Policy Manager {CPPM) When you test connecting the client to the WLAN. the test falls You check Aruba ClearPass Access Tracker and cannot find a record of the authentication attempt You ping from the MC to CPPM. and the ping is successful.

What is a good next step for troubleshooting?

A.

Renew CPPM's RADIUS/EAP certificate

B.

Reset the user credentials

C.

Check CPPM Event viewer.

D.

Check connectivity between CPPM and a backend directory server

Full Access
Question # 15

Which scenario requires the Aruba Mobility Controller to use a Server Certificate?

A.

Obtain downloadable user roles (DURs) from ClearPass.

B.

Synchronize its clock with an NTP server that requires authentication.

C.

Use RadSec for enforcing 802.1X authentication to ClearPass.

D.

Use RADIUS for enforcing 802.1X authentication to ClearPass.

Full Access
Question # 16

What is a benefit of Opportunistic Wireless Encryption (OWE)?

A.

It allows both WPA2-capabie and WPA3-capable clients to authenticate to the same WPA-Personal WLAN

B.

It offers more control over who can connect to the wireless network when compared with WPA2-Personal

C.

It allows anyone lo connect, but provides better protection against eavesdropping than a traditional open network

D.

It provides protection for wireless clients against both honeypot APs and man-in-the-middle (MUM) attacks

Full Access
Question # 17

What is a benefit of Protected Management Frames (PMF). sometimes called Management Frame Protection (MFP)?

A.

PMF helps to protect APs and MCs from unauthorized management access by hackers.

B.

PMF ensures trial traffic between APs and Mobility Controllers (MCs) is encrypted.

C.

PMF prevents hackers from capturing the traffic between APs and Mobility Controllers.

D.

PMF protects clients from DoS attacks based on forged de-authentication frames

Full Access
Question # 18

You have an Aruba solution with multiple Mobility Controllers (MCs) and campus APs. You want to deploy a WPA3-Enterprise WLAN and authenticate users to Aruba ClearPass Policy Manager (CPPM) with EAP-TLS.

What is a guideline for ensuring a successful deployment?

A.

Avoid enabling CNSA mode on the WLAN, which requires the internal MC RADIUS server.

B.

Ensure that clients trust the root CA for the MCs’ Server Certificates.

C.

Educate users in selecting strong passwords with at least 8 characters.

D.

Deploy certificates to clients, signed by a CA that CPPM trusts.

Full Access
Question # 19

A company has Aruba Mobility Controllers (MCs), Aruba campus APs, and ArubaOS-CX switches. The company plans to use ClearPass Policy Manager (CPPM) to classify endpoints by type. The company is contemplating the use of ClearPass’s TCP fingerprinting capabilities.

What is a consideration for using those capabilities?

A.

ClearPass admins will need to provide the credentials of an API admin account to configure on Aruba devices.

B.

You will need to mirror traffic to one of CPPM's span ports from a device such as a core routing switch.

C.

ArubaOS-CX switches do not offer the support necessary for CPPM to use TCP fingerprinting on wired endpoints.

D.

TCP fingerprinting of wireless endpoints requires a third-party Mobility Device Management (MDM) solution.

Full Access
Question # 20

Your Aruba Mobility Master-based solution has detected a rogue AP Among other information the ArubaOS Detected Radios page lists this Information for the AP

SSID = PubllcWiFI

BSSID = a8M27 12 34:56

Match method = Exact match

Match type = Eth-GW-wired-Mac-Table

The security team asks you to explain why this AP is classified as a rogue. What should you explain?

A.

The AP Is connected to your LAN because It is transmitting wireless traffic with your network's default gateway's MAC address as a source MAC Because it does not belong to the company, it is a rogue

B.

The ap has a BSSID mat matches authorized client MAC addresses. This indicates that the AP is spoofing the MAC address to gam unauthorized access to your company's wireless services, so It is a rogue

C.

The AP has been detected as launching a DoS attack against your company's default gateway. This qualities it as a rogue which needs to be contained with wireless association frames immediately

D.

The AP is spoofing a routers MAC address as its BSSID. This indicates mat, even though WIP cannot determine whether the AP is connected to your LAN. it is a rogue.

Full Access
Question # 21

What correctly describes the Pairwise Master Key (PMK) in thee specified wireless security protocol?

A.

In WPA3-Enterprise, the PMK is unique per session and derived using Simultaneous Authentication of Equals.

B.

In WPA3-Personal, the PMK is unique per session and derived using Simultaneous Authentication of Equals.

C.

In WPA3-Personal, the PMK is derived directly from the passphrase and is the same tor every session.

D.

In WPA3-Personal, the PMK is the same for each session and is communicated to clients that authenticate

Full Access
Question # 22

You are checking the Security Dashboard in the Web Ul for your ArubaOS solution and see that Wireless Intrusion Prevention (WIP) has discovered a rogue radio operating in ad hoc mode with open security. What correctly describes a threat that the radio could pose?

A.

It could open a backdoor into the corporate LAN for unauthorized users.

B.

It is running in a non-standard 802.11 mode and could effectively jam the wireless signal.

C.

It is flooding the air with many wireless frames in a likely attempt at a DoS attack.

D.

It could be attempting to conceal itself from detection by changing its BSSID and SSID frequently.

Full Access
Question # 23

Refer to the exhibit.

This Aruba Mobility Controller (MC) should authenticate managers who access the Web Ul to ClearPass Policy Manager (CPPM) ClearPass admins have asked you to use RADIUS and explained that the MC should accept managers' roles in Aruba-Admin-Role VSAs

Which setting should you change to follow Aruba best security practices?

A.

Change the local user role to read-only

B.

Clear the MSCHAP check box

C.

Disable local authentication

D.

Change the default role to "guest-provisioning"

Full Access
Question # 24

What is one way that Control Plane Security (CPsec) enhances security for me network?

A.

It protects wireless clients' traffic tunneled between APs and Mobility Controllers, from eavesdropping

B.

It prevents Denial of Service (DoS) attacks against Mobility Controllers' (MCs") control plane.

C.

It prevents access from unauthorized IP addresses to critical services, such as SSH on Mobility Controllers (MCs).

D.

It protects management traffic between APs and Mobility Controllers (MCs) from eavesdropping.

Full Access
Question # 25

You need to set up Aruba network infrastructure devices for management with SNMP. The SNMP server has this SNMPv3 user configured on it: username: airwave auth algorithm: sha auth key: fyluqp18@S!9a priv algorithm: aes priv key: 761oxaiaoeu19&

What correctly describes the setup on the infrastructure device?

A.

You must configure a user with the same name and keys, but can choose algorithms that meet the device's needs.

B.

You must configure the "airwave" server as an authorized user. Then, configure a separate user for this device with its own keys.

C.

You must configure a user with the same name and algorithms, but the keys should be unique to this device.

D.

You must configure a user with exactly the same name, algorithms, and keys.

Full Access
Question # 26

What are some functions of an AruDaOS user role?

A.

The role determines which authentication methods the user must pass to gain network access

B.

The role determines which firewall policies and bandwidth contract apply to the clients traffic

C.

The role determines which wireless networks (SSiDs) a user is permitted to access

D.

The role determines which control plane ACL rules apply to the client's traffic

Full Access
Question # 27

Your company policies require you to encrypt logs between network infrastructure devices and Syslog servers. What should you do to meet these requirements on an ArubaOS-CX switch?

A.

Specify the Syslog server with the TLS option and make sure the switch has a valid certificate.

B.

Specify the Syslog server with the UDP option and then add an CPsec tunnel that selects Syslog.

C.

Specify a priv key with the Syslog settings that matches a priv key on the Syslog server.

D.

Set up RadSec and then enable Syslog as a protocol carried by the RadSec tunnel.

Full Access
Question # 28

You are deploying an Aruba Mobility Controller (MC). What is a best practice for setting up secure management access to the ArubaOS Web UP

A.

Avoid using external manager authentication tor the Web UI.

B.

Change the default 4343 port tor the web UI to TCP 443.

C.

Install a CA-signed certificate to use for the Web UI server certificate.

D.

Make sure to enable HTTPS for the Web UI and select the self-signed certificate Installed in the factory.

Full Access
Question # 29

You are managing an Aruba Mobility Controller (MC). What is a reason for adding a "Log Settings" definition in the ArubaOS Diagnostics > System > Log Settings page?

A.

Configuring the Syslog server settings for the server to which the MC forwards logs for a particular category and level

B.

Configuring the MC to generate logs for a particular event category and level, but only for a specific user or AP.

C.

Configuring a filter that you can apply to a defined Syslog server in order to filter events by subcategory

D.

Configuring the log facility and log format that the MC will use for forwarding logs to all Syslog servers

Full Access
Question # 30

What is the purpose of an Enrollment over Secure Transport (EST) server?

A.

It acts as an intermediate Certification Authority (CA) that signs end-entity certificates.

B.

It helps admins to avoid expired certificates with less management effort.

C.

It provides a secure central repository for private keys associated with devices' digital certif-icates.

D.

It provides a more secure alternative to private CAs at less cost than a public CA.

Full Access
Question # 31

You are setting up an Aruba mobility solution which includes a Mobility Master (MM), Mobility Controllers (MCs), and campus APs (CAPs) for a university. The university plans to enforce WPA2-Enterprise for all users' connections. The university wants to apply one set of access control rules to faculty users' traffic and a different set of rules to students' traffic.

What is the best approach for applying the correct rules to each group?

A.

Create two VLANs, one for faculty and one for students. Create one set of firewall access control rules that specify faculty IP addresses for the source and a second set of rules that specify the student IP addresses for the source. Apply the rules to the WLAN.

B.

Create two roles, a "faculty" role and a "student" role. Apply firewall policies with the correct rules for each group to each role.

C.

Create two WLANs, one for faculty and one for students. Apply firewall policies with the correct rules for each group to each WLAN.

D.

Create two VLANs, one for faculty and one for students. Apply firewall policies with the correct rules for each group to each VLAN.

Full Access