Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > HP > ACNSP > HPE7-A02

HPE7-A02 Aruba Certified Network Security Professional Exam Question and Answers

Question # 4

A company has HPE Aruba Networking APs (AOS-10), which authenticate clients to HPE Aruba Networking ClearPass Policy Manager (CPPM). CPPM is set up

to receive a variety of information about clients ' profile and posture. New information can mean that CPPM should change a client ' s enforcement profile.

What should you set up on the APs to help the solution function correctly?

A.

In the security settings, configure dynamic denylisting.

B.

In the RADIUS server settings for CPPM, enable Dynamic Authorization.

C.

In the WLAN profiles, enable interim RADIUS accounting.

D.

In the RADIUS server settings for CPPM, enable querying the authentication status.

Full Access
Question # 5

Your company wants to implement Tunneled EAP (TEAP).

How can you set up HPE Aruba Networking ClearPass Policy Manager (CPPM) to enforce certificated-based authentication for clients using TEAP?

A.

For the service using TEAP, set the authentication source to an internal database.

B.

Select a service certificate when you specify TEAP as a service ' s authentication method.

C.

Create an authentication method named " TEAP " with the type set to EAP-TLS.

D.

Select an EAP-TLS-type authentication method for the TEAP method ' s inner method.

Full Access
Question # 6

A company requires a centralized audit trail for commands that managers enter on AOS-CX switches.

What can you set up on the switches to meet this requirement?

A.

RADIUS start-stop and interim accounting with the port-access option

B.

Command authorization to HPE Aruba Networking ClearPass Policy Manager (CPPM) acting as a TACACS+ server

C.

SSH public key authentication for all managers who access the AOS-CX switches

D.

Logging to a Syslog server with the severity set at error level

Full Access
Question # 7

You need to set up HPE Aruba Networking ClearPass Policy Manager (CPPM) to provide certificate-based authentication of 802.1X supplicants.

How should you upload the root CA certificate for the supplicants ' certificates?

A.

As a ClearPass Server certificate with the RADIUS/EAP usage

B.

As a Trusted CA with the AD/LDAP usage

C.

As a Trusted CA with the EAP usage

D.

As a ClearPass Server certificate with the Database usage

Full Access
Question # 8

You need to set up an HPE Aruba Networking VIA solution for a customer who needs to support 2100 remote employees. The customer wants employees to

download their VIA connection profile from the VPNC. Only employees who authenticate with their domain credentials to HPE Aruba Networking ClearPass Policy

Manager (CPPM) should be able to download the profile. (A RADIUS server group for CPPM is already set up on the VPNC.)

How do you configure the VPNC to enforce that requirement?

A.

Set up a VIA Authentication Profile that uses CPPM ' s server group; reference that profile in the VIA Web Authentication Profile.

B.

Reference CPPM ' s server group in an AAA profile; then, apply that profile to the VPNC ' s Internet-facing ports.

C.

Create a new VPN Authentication Profile and then reference CPPM ' s default server group in that profile.

D.

Set up a VIA Authentication Profile that uses CPPM ' s server group; reference that profile in the VIA Connection Profile.

Full Access
Question # 9

Refer to the exhibit.

You have verified that AOS-CX Switch-1 has constructed an IP-to-MAC binding table in VLANs 10-19. Now you need to enable ARP inspection for the endpoint connected to Switch-1. What must you do first to prevent traffic disruption?

A.

Configure ARP inspection on VLANs 10-19 on Switch-2.

B.

Configure DHCP snooping on VLANs 10-19 on Switch-2.

C.

Configure Switch-1 uplinks as trusted ARP inspection ports.

D.

Create a static IP-to-MAC binding on Switch-1 for the DHCP server.

Full Access
Question # 10

A company has a variety of HPE Aruba Networking solutions, including an HPE Aruba Networking infrastructure and HPE Aruba Networking ClearPass Policy

Manager (CPPM). The company passes traffic from the corporate LAN destined to the data center through a third-party SRX firewall. The company would like to

further protect itself from internal threats.

What is one solution that you can recommend?

A.

Have the third-party firewall send Syslogs to CPPM, which can work with network devices to lock internal attackers out of the network.

B.

Use tunnel mode SSIDs and user-based tunneling (UBT) on AOS-CX switches to pass all internal traffic directly through the third-party firewall.

C.

Add ClearPass Device Insight (CPDI) to the solution; integrate it with the third-party firewall to develop more complete device profiles.

D.

Configure CPPM to poll the third-party firewall for a broad array of information about internal clients, such as profile and posture.

Full Access
Question # 11

Refer to the exhibits.

You are setting up HPE Aruba Networking ClearPass Policy Manager (CPPM) to authenticate wireless clients with EAP-TLS and 802.1X. CPPM should assign clients to an AOS firewall role named contractors-fullaccess if the clients meet these requirements:

    AD account is enabled: AccountStatus 512

    Security group name is Contractors

What should you do to make these policies meet these requirements?

A.

In the role mapping policy rule 2, change “role2” to a role named “contractors-fullaccess.”

B.

Add this rule to the enforcement policy: IF Tips:Role EQUALS role2 , THEN profile = RADIUS enforcement profile with the Aruba-User-Role attribute set to contractors-fullaccess .

C.

In the enforcement policy rule 1, remove the second condition; also change the profile to one named “contractors-fullaccess.”

D.

In the enforcement policy rule 1, change the profile to a RADIUS enforcement profile with the Aruba-User-Role attribute set to contractors-fullaccess .

Full Access
Question # 12

You have set up a mirroring session between an AOS-CX switch and a management station, running Wireshark. You want to capture just the traffic sent in the

mirroring session, not the management station ' s other traffic.

What should you do?

A.

Apply this capture filter: ip proto 47

B.

Edit protocol preferences and enable ARUBA_ERM.

C.

Edit protocol preferences and enable HPE_ERM.

D.

Apply this capture filter: udp port 5555

Full Access
Question # 13

You manage AOS-10 APs with HPE Aruba Networking Central. A role is configured on these APs with the following rules:

Allow UDP on port 67 to any destination

Allow any to network 10.1.6.0/23

Deny any to network 10.1.0.0/16 + log

Deny any to network 10.0.0.0/8

Allow any to any destination

You add this new rule immediately before rule 2:

Deny SSH to network 10.1.4.0/23 + denylist

What happens when a client assigned to this role sends SSH traffic to 10.1.11.42?

A.

The traffic is permitted.

B.

The traffic is dropped and logged.

C.

The traffic is dropped (without any logging or further action against the client).

D.

The traffic is dropped, and the client is denylisted.

Full Access
Question # 14

A company is implementing HPE Aruba Networking Wireless IDS/IPS (WIDS/WIPS) on its AOS-10 APs, which are managed in HPE Aruba Networking Central.

What is one requirement for enabling detection of rogue APs?

A.

Each VLAN in the network assigned on at least one AP ' s or AM ' s port

B.

A Foundation with Security license for each of the APs

C.

One AM deployed for every one AP deployed

D.

A manual radio profile that enables non-regulatory channels

Full Access
Question # 15

You are setting up an HPE Aruba Networking VIA solution for a company. You have already created a VPN pool with IP addresses for the remote clients. During

tests, however, the clients do not receive IP addresses from that pool.

What is one setting to check?

A.

That the pool uses valid, public IP addresses that are assigned to the company

B.

That the pool is associated with the role to which the VIA clients are being assigned

C.

That the pool uses an IP subnet that is different from any subnet configured on the VPNC

D.

That the pool is referenced in the clients ' VIA Connection Profile

Full Access
Question # 16

Refer to Exhibit:

All of the switches in the exhibit are AOS-CX switches.

What is the preferred configuration on Switch-2 for preventing rogue OSPF routers in this network?

A.

Configure OSPF authentication on VLANs 10-19 in password mode.

B.

Configure OSPF authentication on Lag 1 in MD5 mode.

C.

Disable OSPF entirely on VLANs 10-19.

D.

Configure passive-interface as the OSPF default and disable OSPF passive on Lag 1.

Full Access
Question # 17

You need to set up HPE Aruba Networking ClearPass Policy Manager (CPPM) to provide certificate-based authentication of 802.1X supplicants. How should you upload the root CA certificate for the supplicants’ certificates?

A.

As a ClearPass Server certificate with the RADIUS/EAP usage.

B.

As a ClearPass Server certificate with the Database usage.

C.

As a Trusted CA with the AD/LDAP usage.

D.

As a Trusted CA with the EAP usage.

Full Access
Question # 18

A company has HPE Aruba Networking APs and AOS-CX switches, as well as HPE Aruba Networking ClearPass. The company wants CPPM to have HTTP User-

Agent strings to use in profiling devices.

What can you do to support these requirements?

A.

Add the CPPM server ' s IP address to the IP helper list in all client VLANs on routing switches.

B.

Schedule periodic subnet scans of all client subnets on CPPM.

C.

Configure mirror sessions on the APs and switches to copy client HTTP traffic to CPPM.

D.

On the APs and switches, configure a redirect to ClearPass Guest in the role for devices being profiled.

Full Access
Question # 19

You are setting up policy rules in HPE Aruba Networking SSE. You want to create a single rule that permits users in a particular user group to access multiple applications. What is an easy way to meet this need?

A.

Associate the applications directly with the IdP used to authenticate the users; choose any for the destination in the policy rule.

B.

Apply the same tag to the applications; select the tag as a destination in the policy rule.

C.

Place all the applications in the same connector zone; select that zone as a destination in the policy rule.

D.

Select the applications within a non-default web profile; select that profile in the policy rule.

Full Access
Question # 20

A security team needs to track a device ' s communication patterns and identify patterns such as how many destinations the device is accessing.

Which Aruba solution can show this information at a glance?

A.

HPE Aruba Networking ClearPass Insight Endpoints and Network Dashboards

B.

HPE Aruba Networking ClearPass Policy Manager (CPPM) live monitoring Access Tracker

C.

HPE Aruba Networking ClearPass Device Insight (CPDI) under a device ' s network activity

D.

AOS-CX Analytics Dashboard using the system-installed NAE agent

Full Access
Question # 21

A company wants to use HPE Aruba Networking ClearPass Policy Manager (CPPM) to profile Linux devices. You have decided to schedule a subnet scan of the devices ' subnets. Which additional step should you complete before scheduling the scan?

A.

Set up SSH accounts on CPPM and map them to the Linux devices ' subnets.

B.

Enable WMI probing in the cluster-wide parameters.

C.

Enable the Data Port in the ClearPass server settings and connect that port to the network.

D.

Configure SNMP in the network device settings for the switches that support the Linux devices.

Full Access
Question # 22

You need to create a rule in an HPE Aruba Networking ClearPass Policy Manager (CPPM) role mapping policy that references a ClearPass Device Insight Tag.

Which Type (namespace) should you specify for the rule?

A.

Application

B.

Tips

C.

Device

D.

Endpoint

Full Access
Question # 23

You have installed an HPE Aruba Networking Network Analytic Engine (NAE) script on an AOS-CX switch to monitor a particular function.

Which additional step must you complete to start the monitoring?

A.

Reboot the switch.

B.

Enable NAE, which is disabled by default.

C.

Edit the script to define monitor parameters.

D.

Create an agent from the script.

Full Access
Question # 24

Refer to Exhibit.

A company is using HPE Aruba Networking ClearPass Device Insight (CPDI) (the standalone application). In the CPDI interface, you go to the Generic Devices

page and see the view shown in the exhibit.

What correctly describes what you see?

A.

Each cluster is a group of unclassified devices that CPDI ' s machine learning has discovered to have similar attributes.

B.

Each cluster is a group of devices that match one of the tags configured by admins.

C.

Each cluster is all the devices that have been assigned to the same category by one of CPDI ' s built-in system rules.

D.

Each cluster is a group of devices that have been classified with user rules, but for which CPDI offers different recommendations.

Full Access
Question # 25

What information can admins view in an AOS-CX switch’s Analytics Dashboard?

A.

A view of clients’ authentication status, role, and UBT state

B.

Alerts triggered by NAE agents deployed on the switch

C.

A list of all TACACS+, RADIUS, and other authentication events

D.

All debugging information collected since the last switch reboot

Full Access
Question # 26

A company wants HPE Aruba Networking ClearPass Policy Manager (CPPM) to respond to Syslog messages from its Palo Alto Next Generation Firewall (NGFW)

by quarantining clients involved in security incidents.

Which step must you complete to enable CPPM to process the Syslogs properly?

A.

Configure the Palo Alto as a context server on CPPM.

B.

Install a Palo Alto Extension through ClearPass Guest.

C.

Enable Insight and ingress event processing on the CPPM server.

D.

Configure CPPM to trust the root CA certificate for the NGFW.

Full Access
Question # 27

A company has AOS-CX switches and HPE Aruba Networking APs, which run AOS-10 and bridge their SSIDs. Company security policies require 802.1X on all edge ports, some of which connect to APs. How should you configure the auth-mode on AOS-CX switches?

A.

Leave all edge ports in client auth-mode and configure device auth-mode in the AP role.

B.

Configure all edge ports in client auth-mode.

C.

Configure all edge ports in device auth-mode.

D.

Leave all edge ports in device auth-mode and configure client auth-mode in the AP role.

Full Access
Question # 28

A company wants to implement Virtual Network based Tunneling (VNBT) on a particular group of users and assign those users to an overlay network with VNI

3000.

Assume that an AOS-CX switch is already set up to:

. Implement 802.1X to HPE Aruba Networking ClearPass Policy Manager (CPPM)

. Participate in an EVPN VXLAN solution that includes VNI 3000

Which setting should you configure in the users ' AOS-CX role to apply VNBT to them when they connect?

A.

Gateway zone set to " 3000 " with no gateway role set

B.

Gateway zone set to " vni-3000 " with no gateway role set

C.

Access VLAN set to the VLAN mapped to VNI 3000

D.

Access VLAN ID set to " 3000 "

Full Access
Question # 29

HPE Aruba Networking ClearPass Device Insight (CPDI) could not classify some endpoints using system and user rules. Using machine learning, it did assign those endpoints to a cluster and discover a recommendation. In which of these circumstances does CPDI automatically classify the endpoints based on that recommendation?

A.

The recommendation has 96% confidence, and it is based on 13 classified devices.

B.

The recommendation has 98% confidence, and it is based on 5 classified devices.

C.

The recommendation has 93% confidence, and it is based on 36 classified devices.

D.

The recommendation has 100% confidence, and it is based on 4 classified devices.

Full Access
Question # 30

A company is implementing a client-to-site VPN based on tunnel-mode IPsec.

Which devices are responsible for the IPsec encapsulation?

A.

Gateways at the remote clients ' locations and devices accessed by the clients at the main site

B.

The remote clients and devices accessed by the clients at the main site

C.

The remote clients and a gateway at the main site

D.

Gateways at the remote clients ' locations and a gateway at the main site

Full Access
Question # 31

You want to examine the applications that a device is using and look for any changes in application usage over several different ranges. In which HPE Aruba Networking solution can you view this information in an easy-to-view format?

A.

HPE Aruba Networking ClearPass OnGuard agent installed on the device

B.

HPE Aruba Networking Central within a device ' s Live Monitoring page

C.

HPE Aruba Networking ClearPass Insight using an Active Endpoint Security report

D.

HPE Aruba Networking ClearPass Device Insight (CPDI) in the device ' s network activity

Full Access
Question # 32

You are helping an organization deploy HPE Aruba Networking SSE. What is one reason to recommend that the company install agents on remote users ' devices?

A.

To run posture checks and apply different permissions based on those checks.

B.

To permit admins to manage the HPE Aruba Networking SSE policy rules.

C.

To permit users to access private servers using SSH.

D.

To run threat inspection on clients in a local sandbox rather than in the cloud.

Full Access
Question # 33

You have configured an AOS-CX switch to implement 802.1X on edge ports. Assume ports operate in the default auth-mode. VoIP phones are assigned to the " voice " role and need to send traffic that is tagged for VLAN 12. Where should you configure VLAN 12?

A.

As the trunk native VLAN on edge ports and the trunk native VLAN on the " voice " role.

B.

As the allowed trunk VLAN in the " voice " role (and not in the edge port settings).

C.

As a trunk allowed VLAN on edge ports and the trunk native VLAN in the " voice " role.

D.

As the trunk native VLAN in the " voice " role (and not in the edge port settings).

Full Access
Question # 34

Which issue can an HPE Aruba Networking Secure Web Gateway (SWG) solution help customers address?

A.

The organization needs a faster way to quarantine clients that have generated threats, as detected by third-party firewalls.

B.

Hybrid workers are exposing their computers to risky internet sites and infection by malware when they work from home.

C.

Remote workers need access to private data center applications without exposing those applications to unauthorized users.

D.

The organization currently has no way to prevent users from exfiltrating sensitive data from SaaS applications.

Full Access
Question # 35

(Note that the HPE Aruba Networking Central interface shown here might look slightly different from what you see in your HPE Aruba Networking Central

interface as versions change; however, similar concepts continue to apply.)

An HPE Aruba Networking 9x00 gateway is part of an HPE Aruba Networking Central group that has the settings shown in the exhibit. What would cause the

gateway to drop traffic as part of its IDPS settings?

A.

Its site-to-site VPN connections failing

B.

Traffic matching a rule in the active ruleset

C.

Its IDPS engine failing

D.

Traffic showing anomalous behavior

Full Access
Question # 36

You manage AOS-10 APs with HPE Aruba Networking Central. A role is configured on these APs with these rules (in order):

Allow UDP on port 67 to any destination

Allow any to network 10.1.4.0/23

Deny any to network 10.1.0.0/18 + log

Deny any to network 10.0.0.0/8

Allow any to any destination

You add this new rule immediately before rule 4:

Deny SSH to network 10.1.0.0/21 + denylist

After this change, what happens when a client assigned to this role sends SSH traffic to 10.1.7.12?

A.

The traffic is permitted

B.

The traffic is dropped and logged

C.

The traffic is dropped, and the client is denylisted

D.

The traffic is dropped (without any logging or further action against the client)

Full Access
Question # 37

HPE Aruba Networking Central displays an alert about an Infrastructure Attack that was detected. You go to the Security > RAPIDS events and see that the attack

was " Detect adhoc using Valid SSID. "

What is one possible next step?

A.

Use HPE Aruba Networking Central floorplans or the detecting AP identities to locate the general area for the threat.

B.

Look for the IP address associated with the offender and then check for that IP address among HPE Aruba Networking Central clients.

C.

Make sure that you have tuned the threshold for that check, as false positives are common for it.

D.

Make sure that clients have updated drivers, as faulty drivers are a common explanation for this attack type.

Full Access
Question # 38

Which use case is fulfilled by applying a time range to a firewall rule on an AOS device?

A.

Enforcing the rule only during the specified time range

B.

Tuning the session timeout for sessions established with this rule

C.

Locking clients that violate the rule for the specified time range

D.

Setting the time range over which hit counts for the rule are aggregated

Full Access
Question # 39

What is a use case for running periodic subnet scans on devices from HPE Aruba Networking ClearPass Policy Manager (CPPM)?

A.

Using DHCP fingerprints to determine a client ' s device category and OS

B.

Detecting devices that fail to comply with rules defined in CPPM posture policies

C.

Identifying issues with authenticating and authorizing clients

D.

Using WMI to collect additional information about Windows domain clients

Full Access
Question # 40

A company is using HPE Aruba Networking Central SD-WAN Orchestrator to establish a hub-spoke VPN between branch gateways (BGWs) at 1164 site and VPNCs at multiple data centers. What is part of the configuration that admins need to complete?

A.

In VPNCs’ groups, establish VPN pools to control which branches connect to which VPNCs.

B.

In BGWs’ and VPNCs’ groups, create default IKE policies for the SD-WAN Orchestrator to use.

C.

In BGWs’ groups, select the VPNCs to which to connect in a DC preference list.

D.

At the global level, create default IPsec policies for the SD-WAN Orchestrator to use.

Full Access
Question # 41

A ClearPass Policy Manager (CPPM) service includes these settings:

Role Mapping Policy:

Evaluate: Select first

Rule 1 conditions:

Authorization:AD:Groups EQUALS Managers

Authentication:TEAP-Method-1-Status EQUALS Success

Rule 1 role: manager

Rule 2 conditions:

Authentication:TEAP-Method-1-Status EQUALS Success

Rule 2 role: domain-comp

Default role: [Other]

Enforcement Policy:

Evaluate: Select first

Rule 1 conditions:

Tips Role EQUALS manager AND Tips Role EQUALS domain-comp

Rule 1 profile list: domain-manager

Rule 2 conditions:

Tips Role EQUALS manager

Rule 2 profile list: manager-only

Rule 3 conditions:

Tips Role EQUALS domain-comp

Rule 3 profile list: domain-only

Default profile: [Deny access]

A client is authenticated by the service. CPPM collects attributes indicating that the user is in the Contractors group, and the client passed both TEAP methods.

Which enforcement policy will be applied?

A.

[Deny Access Profile]

B.

manager-only

C.

domain-manager

D.

domain-only

Full Access
Question # 42

A company has been running Gateway IDS/IPS on its gateways in IDS mode for several weeks. The company wants to transition to IPS mode.

What is one step you should recommend?

A.

Disable traffic inspection and reboot before re-enabling traffic inspection with the new mode.

B.

Change the mode on one gateway at a time to establish a smoother transition period.

C.

Consider applying a stricter IPS policy to minimize issues during the transition period.

D.

Check for legitimate traffic that has been flagged as a threat and allow list the associated rules.

Full Access
Question # 43

A company wants to turn on Wireless IDS/IPS infrastructure and client detection at the high level on HPE Aruba Networking APs. The company does not want to

enable any prevention settings.

What should you explain about HPE Aruba Networking recommendations?

A.

HPE Aruba Networking recommends turning on both wired and wireless prevention whenever you enable detection at high.

B.

HPE Aruba Networking recommends using hybrid AP mode, as opposed to Air Monitors (AMs), when implementing detection without prevention.

C.

HPE Aruba Networking recommends disabling client detection when you configure infrastructure detection at high, as infrastructure detection includes all the client checks and more.

D.

HPE Aruba Networking recommends configuring infrastructure and client detection at a custom level and disabling or tuning some of the settings that are likely to produce false positives.

Full Access
Question # 44

You have created this rule in an HPE Aruba Networking ClearPass Policy Manager (CPPM) service ' s enforcement policy: IF Authorization [Endpoints Repository]

Conflict EQUALS true THEN apply " quarantine_profile "

What information can help you determine whether you need to configure cluster-wide profiler parameters to ignore some conflicts?

A.

Whether the company has rare Internet of Things (loT) devices

B.

Whether some devices are incapable of captive portal or 802.1X authentication

C.

Whether the company has devices that use PXE boot

D.

Whether some devices are running legacy operating systems

Full Access
Question # 45

Refer to the exhibit.

The exhibit shows a saved packet capture, which you have opened in Wireshark. You want to focus on the complete conversation between 10.1.70.90 and 10.1.79.11 that uses source port 5448.

What is a simple way to do this in Wireshark?

A.

Apply a capture filter that selects for both the 10.1.70.90 and 10.1.79.11 IP addresses.

B.

Click the Source column and then the Destination column to sort the packets into the desired order.

C.

Apply a capture filter that selects for TCP port 5448.

D.

Right-click one of the packets between those addresses and choose to follow the stream.

Full Access
Question # 46

You need to create a rule in an HPE Aruba Networking ClearPass Policy Manager (CPPM) role mapping policy that references a ClearPass Device Insight Tag. Which Type (namespace) should you specify for the rule?

A.

Endpoint

B.

TIPS

C.

Device

D.

Application

Full Access