New Year Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > HP > HP Certification > HPE7-A02

HPE7-A02 Aruba Certified Network Security Professional Exam Question and Answers

Question # 4

A company has HPE Aruba Networking APs managed by HPE Aruba Networking Central. You have set up a WLAN to enforce WPA3 with 802.1X authentication.

What happens if the client fails authentication?

A.

The AP assigns the client to the WLAN's default role.

B.

The AP drops the client because authentication aborts.

C.

The AP assigns the client to the WLAN's critical role.

D.

The AP assigns the client to the WLAN's initial role.

Full Access
Question # 5

What is one use case that companies can fulfill using HPE Aruba Networking ClearPass Policy Manager's (CPPM's) Device Profiler?

A.

OIdentifying device security vulnerabilities by CVE ID and receiving remediation recommendations

B.

Leveraging artificial intelligence to more accurately identify Internet of Things (loT) devices

C.

Quarantining devices that do not have the required antivirus software installed on them

D.

Assigning different AOS firewall roles to users on computers and the same users on smartphones

Full Access
Question # 6

You have configured an AOS-CX switch to implement 802.1X on edge ports. Assume ports operate in the default auth-mode. VoIP phones are assigned to the "voice" role and need to send traffic that is tagged for VLAN 12. Where should you configure VLAN 12?

A.

As the trunk native VLAN on edge ports and the trunk native VLAN on the "voice" role.

B.

As the allowed trunk VLAN in the "voice" role (and not in the edge port settings).

C.

As a trunk allowed VLAN on edge ports and the trunk native VLAN in the "voice" role.

D.

As the trunk native VLAN in the "voice" role (and not in the edge port settings).

Full Access
Question # 7

A company uses HPE Aruba Networking ClearPass Policy Manager (CPPM) as a TACACS+ server to authenticate managers on its AOS-CX switches. The

company wants CPPM to control which commands managers are allowed to enter. You see there is no field to enter these commands in ClearPass.

How do you start configuring the command list on CPPM?

A.

Add the Shell service to the managers' TACACS+ enforcement profiles.

B.

Edit the TACACS+ settings in the AOS-CX switches' network device entries.

C.

Create an enforcement policy with the TACACS+ type.

D.

Edit the settings for CPPM's default TACACS+ admin roles.

Full Access
Question # 8

A company has AOS-CX switches. The company wants to make it simpler and faster for admins to detect denial of service (DoS) attacks, such as ping or ARP floods, launched against the switches.

What can you do to support this use case?

A.

Deploy an NAE agent on the switches to monitor control plane policing (CoPP).

B.

Configure the switches to implement RADIUS accounting to HPE Aruba Networking ClearPass and enable HPE Aruba Networking ClearPass Insight.

C.

Implement ARP inspection on all VLANs that support end-user devices.

D.

Enabling debugging of security functions on the switches.

Full Access
Question # 9

Refer to the exhibit:

The exhibit shows the TACACS+ enforcement profile that HPE Aruba Networking ClearPass Policy Manager (CPPM) assigns to a manager. When this manager logs into an AOS-CX switch, what does the switch do?

A.

Assigns the manager operator-level privileges

B.

Assigns the manager administrator-level privileges

C.

Rejects the manager with an error message

D.

Assigns the manager auditor-level privileges

Full Access
Question # 10

What is one benefit of integrating HPE Aruba Networking ClearPass Policy Manager (CPPM) with third-party solutions such as Mobility Device Management (MDM) and firewalls?

A.

CPPM can exchange contextual information about clients with third-party solutions, which helps make better decisions.

B.

CPPM can make the third-party solutions more secure by adding signature-based threat detection capabilities.

C.

CPPM can offload policy decisions to the third-party solutions, enabling CPPM to respond to authentication requests more quickly.

D.

CPPM can take over filtering internal traffic so that the third-party solutions have more processing power to devote to filtering external traffic.

Full Access
Question # 11

HPE Aruba Networking switches are implementing MAC-Auth to HPE Aruba Networking ClearPass Policy Manager (CPPM) for a company's printers. The company wants to quarantine a client that spoofs a legitimate printer's MAC address. You plan to add a rule to the MAC-Auth service enforcement policy for this purpose. What condition should you include?

A.

Endpoint Compliance EQUALS false

B.

Endpoint Device Insight Tag EXISTS

C.

Authorization: [Endpoints Repository] Compromised EQUALS true

D.

Authorization: [Endpoints Repository] Conflict EQUALS true

Full Access
Question # 12

A company is implementing a client-to-site VPN based on tunnel-mode IPsec.

Which devices are responsible for the IPsec encapsulation?

A.

Gateways at the remote clients' locations and devices accessed by the clients at the main site

B.

The remote clients and devices accessed by the clients at the main site

C.

The remote clients and a gateway at the main site

D.

Gateways at the remote clients' locations and a gateway at the main site

Full Access
Question # 13

You need to set up HPE Aruba Networking ClearPass Policy Manager (CPPM) to provide certificate-based authentication of 802.1X supplicants. How should you upload the root CA certificate for the supplicants’ certificates?

A.

As a ClearPass Server certificate with the RADIUS/EAP usage.

B.

As a ClearPass Server certificate with the Database usage.

C.

As a Trusted CA with the AD/LDAP usage.

D.

As a Trusted CA with the EAP usage.

Full Access
Question # 14

What is a benefit of Online Certificate Status Protocol (OCSP)?

A.

It lets a device query whether a single certificate is revoked or not.

B.

It lets a device dynamically renew its certificate before the certificate expires.

C.

It lets a device download all the serial numbers for certificates revoked by a CA at once.

D.

It lets a device determine whether to trust a certificate without needing any root certificates installed.

Full Access
Question # 15

A company wants to apply a standard configuration to all AOS-CX switch ports and have the ports dynamically adjust their configuration based on the identity of

the user or device that connects. They want to centralize configuration of the identity-based settings as much as possible.

What should you recommend?

A.

Having HPE Aruba Networking ClearPass Policy Manager (CPPM) send standard RADIUS AVPs to customize port settings

B.

Having switches pull port configurations dynamically from HPE Aruba Networking Activate

C.

Having switches download user-roles from HPE Aruba Networking gateways

D.

Having switches download user-roles from HPE Aruba Networking ClearPass Policy Manager (CPPM)

Full Access
Question # 16

A company uses HPE Aruba Networking ClearPass Device Insight (CPDI) (the standalone application option). In the details for a generic device cluster, you see a

recommendation for "Windows 8/10" with 70% accuracy.

What does this mean?

A.

CPDI has detected that these devices match about 70% of the system rule for defining "Windows 8/10" devices.

B.

CPDI has matched these devices against several, conflicting system rules. 70% of those rules are for "Windows 8/10" devices.

C.

CPDI has grouped this cluster with similar classified devices. 70% of those classified devices are "Windows 8/10."

D.

CPDI has used MAC OUI to group these devices together. The average device's MAC address matches 70% of the "Windows 8/10" OUI.

Full Access
Question # 17

A company wants to apply role-based access control lists (ACLs) on AOS-CX switches, which are implementing authentication to HPE Aruba Networking ClearPass Policy Manager (CPPM). The company wants to centralize configuration as much as possible. Which correctly describes your options?

A.

You can configure the role on CPPM; however, the CPPM role must reference a policy name that is configured on the switch.

B.

You can configure the role name on CPPM; however, the role settings, including policy and classes, must be configured locally on the switch.

C.

You can configure the role, its policy, and the classes referenced in the policy all on CPPM.

D.

You can configure the role and its policy on CPPM; however, the classes referenced in the policy must be configured locally on the switch.

Full Access
Question # 18

A company is implementing HPE Aruba Networking Wireless IDS/IPS (WIDS/WIPS) on its AOS-10 APs, which are managed in HPE Aruba Networking Central.

What is one requirement for enabling detection of rogue APs?

A.

Each VLAN in the network assigned on at least one AP's or AM's port

B.

A Foundation with Security license for each of the APs

C.

One AM deployed for every one AP deployed

D.

A manual radio profile that enables non-regulatory channels

Full Access
Question # 19

You have created a Web-based Health Check Service that references a posture policy. You want the service to trigger a RADIUS change of authorization (CoA) when a client receives a Healthy or Quarantine posture. Where do you configure those rules?

A.

In a RADIUS enforcement policy

B.

In the Agents and Software Updates > OnGuard Settings

C.

In the posture policy

D.

In a WEBAUTH enforcement policy

Full Access
Question # 20

You are setting up HPE Aruba Networking SSE. Which use case requires you to apply a non-default device posture in a rule?

A.

Applying threat inspection to users when they access certain websites

B.

Checking whether a client has antivirus software as a condition for receiving access to resources

C.

Redirecting compromised clients to a remediation server

D.

Integrating with HPE Aruba Networking ClearPass OnGuard

Full Access
Question # 21

You have configured an AOS-CX switch to implement 802.1X on edge ports. Assume ports operate in the default auth-mode. VolP phones are assigned to the

"voice" role and need to send traffic that is tagged for VLAN 12.

Where should you configure VLAN 12?

A.

As the trunk native VLAN on edge ports and the trunk native VLAN on the "voice" role

B.

As a trunk allowed VLAN on edge ports and the trunk native VLAN in the "voice" role

C.

As the trunk native VLAN in the "voice" role (and not in the edge port settings)

D.

As the allowed trunk VLAN in the "voice" role (and not in the edge port settings)

Full Access
Question # 22

You are deploying a virtual Data Collector for use with HPE Aruba Networking ClearPass Device Insight (CPDI). You have identified VLAN 101 in the data center

as the VLAN to which the Data Collector should connect to receive its IP address and connect to HPE Aruba Networking Central.

Which Data Collector virtual ports should you tell the virtual admins to connect to VLAN 101?

A.

The one with the lowest MAC address

B.

The one with the highest port ID

C.

The one with the highest MAC address

D.

The one with the lowest port ID

Full Access
Question # 23

A company uses both HPE Aruba Networking ClearPass Policy Manager (CPPM) and HPE Aruba Networking ClearPass Device Insight (CPDI). What is one way integrating the two solutions can help the company implement Zero Trust Security?

A.

CPPM can inform CPDI that it has assigned a particular Aruba-User-Role to a client; CPDI can then use that information to reclassify the client.

B.

CPDI can use tags to inform CPPM that clients are using prohibited applications. CPPM can then tell the network infrastructure to quarantine those clients.

C.

CPPM can provide CPDI with custom device fingerprint definitions in order to enhance the company's total visibility.

D.

CPDI can provide CPPM with extra information about users' identity. CPPM can then use that information to apply the correct identity-based enforcement.

Full Access
Question # 24

A company issues user certificates to domain computers using its Windows CA and the default user certificate template. You have set up HPE Aruba Networking

ClearPass Policy Manager (CPPM) to authenticate 802.1X clients with those certificates. However, during tests, you receive an error that authorization has failed

because the usernames do not exist in the authentication source.

What is one way to fix this issue and enable clients to successfully authenticate with certificates?

A.

Configure rules to strip the domain name from the username.

B.

Change the authentication method list to include both PEAP MSCHAPv2 and EAP-TLS.

C.

Add the ClearPass Onboard local repository to the authentication source list.

D.

Remove EAP-TLS from the authentication method list and add TEAP there instead.

Full Access
Question # 25

You have run an Active Endpoint Security Report on HPE Aruba Networking ClearPass. The report indicates that hundreds of endpoints have MAC addresses but

no known IP addresses.

What is one step for addressing this issue?

A.

Set up network devices to implement RADIUS accounting to CPPM.

B.

Add CPPM's IP address to the IP helper list on routing switches.

C.

Set up switches to implement ARP inspection on client VLANs.

D.

Configure CPPM as a Syslog destination on network devices.

Full Access
Question # 26

You are using Wireshark to view packets captured from HPE Aruba Networking infrastructure, but you’re not sure that the packets are displaying correctly. In which circumstance does it make sense to configure Wireshark to ignore protection bits with the IV for the 802.11 protocol?

A.

When the traffic was captured on the data plane of an HPE Aruba Networking gateway and sent to a remote IP.

B.

When the traffic was mirrored from an AOS-CX switch port connected to an AP.

C.

When the traffic was captured from an AP with HPE Aruba Networking Central.

D.

When the traffic was captured on the control plane of an HPE Aruba Networking MC and sent to a remote IP.

Full Access
Question # 27

Admins have recently turned on Wireless IDS/IPS infrastructure detection at the high level on HPE Aruba Networking APs. When you check WIDS events, you

see several RTS rate and CTS rate anomalies, which were triggered by neighboring APs.

What can you interpret from this event?

A.

These neighboring APs are likely to be wireless clients that are inappropriately bridging their wired and wireless NICs; you should track down and remove them.

B.

These neighboring APs might be hackers trying to launch a DoS, but are more likely operating normally; you should start by tuning the event thresholds.

C.

These neighboring APs are actually rogue APs, and you should enable wireless tarpit containment on them.

D.

These neighboring APs are actually rogue APs, and you should enable wireless de-authentication containment on them.

Full Access
Question # 28

A company needs you to integrate HPE Aruba Networking ClearPass Policy Manager (CPPM) with HPE Aruba Networking ClearPass Device Insight (CPDI). What is one task you should do to prepare?

A.

Install the root CA for CPPM’s HTTPS certificate as trusted in the CPDI application.

B.

Enable Insight in the CPPM server configuration settings.

C.

Configure WMI, SSH, and SNMP external accounts for device scanning on CPPM.

D.

Collect a Data Collector token from HPE Aruba Networking Central.

Full Access
Question # 29

A company uses HPE Aruba Networking ClearPass Policy Manager (CPPM) as a TACACS+ server to authenticate managers on its AOS-CX switches. You want

to assign managers to groups on the AOS-CX switch by name.

How do you configure this setting in a CPPM TACACS+ enforcement profile?

A.

Add the Shell service and set autocmd to the group name.

B.

Add the Shell service and set priv-Ivl to the group name.

C.

Add the Aruba:Common service and set Aruba-Admin-Role to the group name.

D.

Add the Aruba:Common service and set Aruba-Priv-Admin-User to the group name.

Full Access
Question # 30

HPE Aruba Networking Central displays an alert about an Infrastructure Attack that was detected. You go to the Security > RAPIDS events and see that the attack

was "Detect adhoc using Valid SSID."

What is one possible next step?

A.

Use HPE Aruba Networking Central floorplans or the detecting AP identities to locate the general area for the threat.

B.

Look for the IP address associated with the offender and then check for that IP address among HPE Aruba Networking Central clients.

C.

Make sure that you have tuned the threshold for that check, as false positives are common for it.

D.

Make sure that clients have updated drivers, as faulty drivers are a common explanation for this attack type.

Full Access
Question # 31

A company has been running Gateway IDS/IPS on its gateways in IDS mode for several weeks. The company wants to transition to IPS mode.

What is one step you should recommend?

A.

Disable traffic inspection and reboot before re-enabling traffic inspection with the new mode.

B.

Change the mode on one gateway at a time to establish a smoother transition period.

C.

Consider applying a stricter IPS policy to minimize issues during the transition period.

D.

Check for legitimate traffic that has been flagged as a threat and allow list the associated rules.

Full Access
Question # 32

Assume that an AOS-CX switch is already implementing DHCP snooping and ARP inspection successfully on several VLANs.

What should you do to help minimize disruption time if the switch reboots?

A.

Configure the switch to act as an ARP proxy.

B.

Create static IP-to-MAC bindings for the DHCP and DNS servers.

C.

Save the IP-to-MAC bindings to external storage.

D.

Configure the IP helper address on this switch, rather than a core routing switch.

Full Access
Question # 33

You have downloaded a packet capture that you generated on HPE Aruba Networking Central. When you open the capture in Wireshark, you see the output shown in the

exhibit.

What should you do in Wireshark so that you can better interpret the packets?

A.

Choose to decode UDP port 5555 packets as ARUBA_ERM and set the Aruba ERM Type to 0.

B.

Edit preferences for IEEE 802.11 and chose to ignore the Protection bit with IV.

C.

Apply the following display filter: wlan.fc.type == 1.

D.

Edit the Enabled Protocols and make sure that 802.11, GRE, and Aruba_ERM are enabled.

Full Access
Question # 34

A company has AOS-CX switches, which authenticate clients to HPE Aruba Networking ClearPass Policy Manager (CPPM). CPPM is set up to receive a variety of information about clients' profile and posture. New information can mean that CPPM should change a client's enforcement profile. What should you set up on the switches to help the solution function correctly?

A.

Enable RADIUS accounting to CPPM, including interim RADIUS accounting.

B.

Configure a RADIUS track that references CPPM's FQDN or IP address.

C.

Enable dynamic authorization, and specify CPPM as a dynamic authorization client.

D.

Re-configure the authentication server on the switch specifying CPPM as a TACACS server.

Full Access
Question # 35

Which use case is fulfilled by applying a time range to a firewall rule on an AOS device?

A.

Enforcing the rule only during the specified time range

B.

Tuning the session timeout for sessions established with this rule

C.

Locking clients that violate the rule for the specified time range

D.

Setting the time range over which hit counts for the rule are aggregated

Full Access
Question # 36

Refer to Exhibit.

A company is using HPE Aruba Networking ClearPass Device Insight (CPDI) (the standalone application). In the CPDI interface, you go to the Generic Devices

page and see the view shown in the exhibit.

What correctly describes what you see?

A.

Each cluster is a group of unclassified devices that CPDI's machine learning has discovered to have similar attributes.

B.

Each cluster is a group of devices that match one of the tags configured by admins.

C.

Each cluster is all the devices that have been assigned to the same category by one of CPDI's built-in system rules.

D.

Each cluster is a group of devices that have been classified with user rules, but for which CPDI offers different recommendations.

Full Access
Question # 37

A company has AOS-CX switches and HPE Aruba Networking APs, which run AOS-10 and bridge their SSIDs. Company security policies require 802.1X on all

edge ports, some of which connect to APs.

How should you configure the auth-mode on AOS-CX switches?

A.

Configure all edge ports in device auth-mode.

B.

Leave all edge ports in client auth-mode and configure device auth-mode in the AP role.

C.

Configure all edge ports in client auth-mode.

D.

Leave all edge ports in device auth-mode and configure client auth-mode in the AP role.

Full Access
Question # 38

You have set up a mirroring session between an AOS-CX switch and a management station, running Wireshark. You want to capture just the traffic sent in the

mirroring session, not the management station's other traffic.

What should you do?

A.

Apply this capture filter: ip proto 47

B.

Edit protocol preferences and enable ARUBA_ERM.

C.

Edit protocol preferences and enable HPE_ERM.

D.

Apply this capture filter: udp port 5555

Full Access
Question # 39

HPE Aruba Networking Central displays a Gateway Threat Count alert in the alert list. How can you gather more information about what caused the alert to trigger?

A.

Use HPE Aruba Networking Central tools to run a Network Check on the gateway with which the alert is associated.

B.

Use Live Monitoring on the gateway to download a packet capture of recent traffic flowing through the gateway.

C.

Check the threat list for the gateway associated with the alert. Access threat details and download packet info.

D.

Check the gateway's Audit Trail in HPE Aruba Networking Central for more details about the threats that triggered the alert.

Full Access