New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

HP HPE7-A02 Aruba Certified Network Security Professional Exam Exam Practice Test

Page: 1 / 7
Total 70 questions

Aruba Certified Network Security Professional Exam Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

The security team needs you to show them information about MAC spoofing attempts detected by HPE Aruba Networking ClearPass Policy Manager (CPPM).

What should you do?

Options:

A.

Export the Access Tracker records on CPPM as an XML file.

B.

Use ClearPass Insight to run an Active Endpoint Security report.

C.

Integrate CPPM with ClearPass Device Insight (CPDI) and run a security report on CPDI.

D.

Show the security team the CPPM Endpoint Profiler dashboard.

Question 2

A company uses HPE Aruba Networking ClearPass Policy Manager (CPPM) as a TACACS+ server to authenticate managers on its AOS-CX switches. The

company wants CPPM to control which commands managers are allowed to enter. You see there is no field to enter these commands in ClearPass.

How do you start configuring the command list on CPPM?

Options:

A.

Add the Shell service to the managers' TACACS+ enforcement profiles.

B.

Edit the TACACS+ settings in the AOS-CX switches' network device entries.

C.

Create an enforcement policy with the TACACS+ type.

D.

Edit the settings for CPPM's default TACACS+ admin roles.

Question 3

An admin has configured an AOS-CX switch with these settings:

port-access role employees

vlan access name employees

This switch is also configured with CPPM as its RADIUS server.

Which enforcement profile should you configure on CPPM to work with this configuration?

Options:

A.

RADIUS Enforcement type with HPE-User-Role VSA set to "employees"

B.

HPE Aruba Networking Downloadable Role Enforcement type with role name set to "employees"

C.

HPE Aruba Networking Downloadable Role Enforcement type with gateway role name set to "employees"

D.

RADIUS Enforcement type with Aruba-User-Role VSA set to "employees"

Question 4

What is a use case for the HPE Aruba Networking ClearPass OnGuard dissolvable agent?

Options:

A.

Continuously monitoring Windows domain clients for compliance

B.

Implementing a one-time compliance scan

C.

Auto-remediating posture issues on clients

D.

Periodically scanning Linux clients for security issues

Question 5

A company has a variety of HPE Aruba Networking solutions, including an HPE Aruba Networking infrastructure and HPE Aruba Networking ClearPass Policy Manager (CPPM). The company passes traffic from the corporate LAN destined to the data center through a third-party SRX firewall. The company would like to further protect itself from internal threats. What is one solution that you can recommend?

Options:

A.

Have the third-party firewall send Syslogs to CPPM, which can work with network devices to lock internal attackers out of the network.

B.

Add ClearPass Device Insight (CPDI) to the solution, integrate it with the third-party firewall to develop more complete device profiles.

C.

Configure CPPM to poll the third-party firewall for a broad array of information about internal clients, such as profile and posture.

D.

Use tunnel mode SSIDs and user-based tunneling (UBT) on AOS-CX switches to pass all internal traffic directly through the third-party firewall.

Question 6

A company has HPE Aruba Networking Central-managed APs. The company wants to block all clients connected through the APs from using YouTube.

Which steps should you take?

Options:

A.

Deploy gateways and have the APs tunnel traffic to the gateways. Then, enable the gateway IDS/IPS engine.

B.

Enable Client IPS at the "custom" level, and then specify the check for YouTube.

C.

Enable WebCC on all client firewall roles. Then, create WebCC category rules that deny suspicious URLs.

D.

Enable DPI. Then, create application rules to deny YouTube on the firewall roles.

Question 7

A company has Aruba APs that are controlled by Central and that implement WIDS. When you check WIDS events, you see a "detect valid SSID misuse" event. What can you interpret from this event, and what steps should you take?

Options:

A.

Clients are failing to authenticate to corporate SSIDs. You should first check for misconfigured authentication settings and then investigate a possible threat.

B.

Admins have likely misconfigured SSID security settings on some of the company's APs. You should have them check those settings.

C.

Hackers are likely trying to pose as authorized APs. You should use the detecting radio information and immediately track down the device that triggered the event.

D.

This event might be a threat but is almost always a false positive. You should wait to see the event over several days before following up on it.

Question 8

You are setting up an HPE Aruba Networking VIA solution for a company. You need to configure access control policies for applications and resources that remote

clients can access when connected to the VPN.

Where on the VPNC should you configure these policies?

Options:

A.

In the tunneled network settings within the VIA Connection Profile

B.

In the cloud security settings using IPsec maps

C.

In the roles to which VIA clients are assigned after IKE authentication

D.

In the roles to which VIA clients are assigned after VIA Web authentication

Question 9

What is one benefit of integrating HPE Aruba Networking ClearPass Policy Manager (CPPM) with third-party solutions such as Mobility Device Management (MDM) and firewalls?

Options:

A.

CPPM can exchange contextual information about clients with third-party solutions, which helps make better decisions.

B.

CPPM can make the third-party solutions more secure by adding signature-based threat detection capabilities.

C.

CPPM can offload policy decisions to the third-party solutions, enabling CPPM to respond to authentication requests more quickly.

D.

CPPM can take over filtering internal traffic so that the third-party solutions have more processing power to devote to filtering external traffic.

Question 10

You need to create a rule in an HPE Aruba Networking ClearPass Policy Manager (CPPM) role mapping policy that references a ClearPass Device Insight Tag. Which Type (namespace) should you specify for the rule?

Options:

A.

Endpoint

B.

TIPS

C.

Device

D.

Application

Question 11

A company has a third-party security appliance deployed in its data center. The company wants to pass all traffic for certain clients through that device before forwarding that traffic toward its ultimate destination.

Which AOS-CX switch technology fulfills this use case?

Options:

A.

Virtual Network Based Tunneling (VNBT)

B.

MC-LAG

C.

Network Analytics Engine (NAE)

D.

Device profiles

Question 12

HPE Aruba Networking Central displays an alert about an Infrastructure Attack that was detected. You go to the Security > RAPIDS events and see that the attack

was "Detect adhoc using Valid SSID."

What is one possible next step?

Options:

A.

Use HPE Aruba Networking Central floorplans or the detecting AP identities to locate the general area for the threat.

B.

Look for the IP address associated with the offender and then check for that IP address among HPE Aruba Networking Central clients.

C.

Make sure that you have tuned the threshold for that check, as false positives are common for it.

D.

Make sure that clients have updated drivers, as faulty drivers are a common explanation for this attack type.

Question 13

A company wants to apply role-based access control lists (ACLs) on AOS-CX switches, which are implementing authentication to HPE Aruba Networking ClearPass Policy Manager (CPPM). The company wants to centralize configuration as much as possible. Which correctly describes your options?

Options:

A.

You can configure the role on CPPM; however, the CPPM role must reference a policy name that is configured on the switch.

B.

You can configure the role name on CPPM; however, the role settings, including policy and classes, must be configured locally on the switch.

C.

You can configure the role, its policy, and the classes referenced in the policy all on CPPM.

D.

You can configure the role and its policy on CPPM; however, the classes referenced in the policy must be configured locally on the switch.

Question 14

What role can Internet Key Exchange (IKE)/IKEv2 play in an HPE Aruba Networking client-to-site VPN?

Options:

A.

It provides an alternative to IPsec that is suitable for legacy clients.

B.

It provides a more modern and secure alternative to IPsec.

C.

It helps to negotiate the IPsec SA automatically and securely.

D.

It helps remote clients download IPsec profiles for later use.

Question 15

A company is using HPE Aruba Networking ClearPass Device Insight (CPDI) (the standalone application). In the CPDI security settings, Security Analysis is On, the Data Source is ClearPass Device Insight, and Enable Posture Assessment is On. You see that a device has a Risk Score of 90.

What can you know from this information?

Options:

A.

The posture is unknown, and CPDI has detected exactly four vulnerabilities on the device.

B.

The posture is healthy, but CPDI has detected multiple vulnerabilities on the device.

C.

The posture is unhealthy, and CPDI has also detected at least one vulnerability on the device.

D.

The posture is unhealthy, but CPDI has not detected any vulnerabilities on the device.

Question 16

A company wants to implement Virtual Network based Tunneling (VNBT) on a particular group of users and assign those users to an overlay network with VNI

3000.

Assume that an AOS-CX switch is already set up to:

. Implement 802.1X to HPE Aruba Networking ClearPass Policy Manager (CPPM)

. Participate in an EVPN VXLAN solution that includes VNI 3000

Which setting should you configure in the users' AOS-CX role to apply VNBT to them when they connect?

Options:

A.

Gateway zone set to "3000" with no gateway role set

B.

Gateway zone set to "vni-3000" with no gateway role set

C.

Access VLAN set to the VLAN mapped to VNI 3000

D.

Access VLAN ID set to "3000"

Question 17

You have configured an AOS-CX switch to implement 802.1X on edge ports. Assume ports operate in the default auth-mode. VolP phones are assigned to the

"voice" role and need to send traffic that is tagged for VLAN 12.

Where should you configure VLAN 12?

Options:

A.

As the trunk native VLAN on edge ports and the trunk native VLAN on the "voice" role

B.

As a trunk allowed VLAN on edge ports and the trunk native VLAN in the "voice" role

C.

As the trunk native VLAN in the "voice" role (and not in the edge port settings)

D.

As the allowed trunk VLAN in the "voice" role (and not in the edge port settings)

Question 18

A company uses HPE Aruba Networking ClearPass Policy Manager (CPPM) as a TACACS+ server to authenticate managers on its AOS-CX switches. You want

to assign managers to groups on the AOS-CX switch by name.

How do you configure this setting in a CPPM TACACS+ enforcement profile?

Options:

A.

Add the Shell service and set autocmd to the group name.

B.

Add the Shell service and set priv-Ivl to the group name.

C.

Add the Aruba:Common service and set Aruba-Admin-Role to the group name.

D.

Add the Aruba:Common service and set Aruba-Priv-Admin-User to the group name.

Question 19

You are setting up policy rules in HPE Aruba Networking SSE. You want to create a single rule that permits users in a particular user group to access multiple applications. What is an easy way to meet this need?

Options:

A.

Associate the applications directly with the IdP used to authenticate the users; choose any for the destination in the policy rule.

B.

Apply the same tag to the applications; select the tag as a destination in the policy rule.

C.

Place all the applications in the same connector zone; select that zone as a destination in the policy rule.

D.

Select the applications within a non-default web profile; select that profile in the policy rule.

Question 20

An AOS-CX switch has been configured to implement UBT to a cluster of three HPE Aruba Networking gateways.

How does the switch determine to which gateways to tunnel UBT users' traffic?

Options:

A.

The switch tunnels all users' traffic to the gateway configured as the primary gateway in the UBT zone, unless that gateway fails.

B.

The switch tunnels each user's traffic to the particular gateway assigned as that user's active user designed gateway.

C.

The switch load balances client traffic across the primary and standby gateway configured in the UBT zone.

D.

The switch tunnels all users' traffic to the gateway assigned as the switch's active device designated gateway.

Question 21

A company is using HPE Aruba Networking Central SD-WAN Orchestrator to establish a hub-spoke VPN between branch gateways (BGWs) at 1444 site and

VPNCs at multiple data centers.

What is part of the configuration that admins need to complete?

Options:

A.

At the global level, create default IPsec policies for the SD-WAN Orchestrator to use.

B.

In BGWs' groups, select the VPNCs to which to connect in a DC preference list.

C.

In VPNCs' groups, establish VPN pools to control which branches connect to which VPNCs.

D.

In BGWs' and VPNCs' groups, create default IKE policies for the SD-WAN Orchestrator to use.

Question 22

You want to examine the applications that a device is using and look for any changes in application usage over several different ranges. In which HPE Aruba Networking solution can you view this information in an easy-to-view format?

Options:

A.

HPE Aruba Networking ClearPass OnGuard agent installed on the device

B.

HPE Aruba Networking Central within a device's Live Monitoring page

C.

HPE Aruba Networking ClearPass Insight using an Active Endpoint Security report

D.

HPE Aruba Networking ClearPass Device Insight (CPDI) in the device's network activity

Question 23

A company has HPE Aruba Networking gateways that implement gateway IDS/IPS. Admins sometimes check the Security Dashboard, but they want a faster way

to discover if a gateway starts detecting threats in traffic.

What should they do?

Options:

A.

Use Syslog to integrate the gateways with HPE Aruba Networking ClearPass Policy Manager (CPPM) event processing.

B.

Integrate HPE Aruba Networking ClearPass Device Insight (CPDI) with Central and schedule hourly reports.

C.

Set up email notifications using HPE Aruba Networking Central's global alert settings.

D.

Set up Webhooks that are attached to the HPE Aruba Networking Central Threat Dashboard.

Question 24

A company assigns a different block of VLAN IDs to each of its access layer AOS-CX switches. The switches run version 10.07. The IDs are used for standard

purposes, such as for employees, VolP phones, and cameras. The company wants to apply 802.1X authentication to HPE Aruba Networking ClearPass Policy

Manager (CPPM) and then steer clients to the correct VLANs for local forwarding.

What can you do to simplify setting up this solution?

Options:

A.

Assign consistent names to VLANs of the same type across the AOS-CX switches and have user-roles reference names.

B.

Use the trunk allowed VLAN setting to assign multiple VLAN IDs to the same role.

C.

Change the VLAN IDs across the AOS-CX switches so that they are consistent.

D.

Avoid configuring the VLAN in the role; use trunk VLANs to assign multiple VLANs to the port instead.

Question 25

What is a use case for running periodic subnet scans on devices from HPE Aruba Networking ClearPass Policy Manager (CPPM)?

Options:

A.

Using DHCP fingerprints to determine a client's device category and OS

B.

Detecting devices that fail to comply with rules defined in CPPM posture policies

C.

Identifying issues with authenticating and authorizing clients

D.

Using WMI to collect additional information about Windows domain clients

Question 26

Refer to the exhibit.

You have verified that AOS-CX Switch-1 has constructed an IP-to-MAC binding table in VLANs 10-19. Now you need to enable ARP inspection for the endpoint connected to Switch-1. What must you do first to prevent traffic disruption?

Options:

A.

Configure ARP inspection on VLANs 10-19 on Switch-2.

B.

Configure DHCP snooping on VLANs 10-19 on Switch-2.

C.

Configure Switch-1 uplinks as trusted ARP inspection ports.

D.

Create a static IP-to-MAC binding on Switch-1 for the DHCP server.

Question 27

You have created a Web-based Health Check Service that references a posture policy. You want the service to trigger a RADIUS change of authorization (CoA) when a client receives a Healthy or Quarantine posture. Where do you configure those rules?

Options:

A.

In a RADIUS enforcement policy

B.

In the Agents and Software Updates > OnGuard Settings

C.

In the posture policy

D.

In a WEBAUTH enforcement policy

Question 28

What is a typical use case for using HPE Aruba Networking ClearPass Onboard to provision devices?

Options:

A.

Enabling unmanaged devices to succeed at certificate-based 802.1X

B.

Enabling managed Windows domain computers to succeed at certificate-based 802.1X

C.

Enhancing security for loT devices that need to authenticate with MAC-Auth

D.

Enforcing posture-based assessment on managed Windows domain computers

Question 29

A company has AOS-CX switches. The company wants to make it simpler and faster for admins to detect denial of service (DoS) attacks, such as ping or ARP floods, launched against the switches.

What can you do to support this use case?

Options:

A.

Deploy an NAE agent on the switches to monitor control plane policing (CoPP).

B.

Configure the switches to implement RADIUS accounting to HPE Aruba Networking ClearPass and enable HPE Aruba Networking ClearPass Insight.

C.

Implement ARP inspection on all VLANs that support end-user devices.

D.

Enabling debugging of security functions on the switches.

Question 30

A company has HPE Aruba Networking infrastructure devices. The devices authenticate clients to HPE Aruba Networking ClearPass Policy Manager (CPPM). You want CPPM to track information about clients, such as their IP addresses and their network bandwidth utilization. What should you set up on the network infrastructure devices to help that happen?

Options:

A.

Logging with CPPM configured as a Syslog server.

B.

Dynamic authorization enabled in the RADIUS settings for CPPM.

C.

RADIUS accounting to CPPM, including interim updates.

D.

An IF-MAP interface with CPPM as the destination.

Question 31

A company wants you to integrate HPE Aruba Networking ClearPass Policy Manager (CPPM) with HPE Aruba Networking ClearPass Device Insight (CPDI).

What is one aspect of the integration that you should explain?

Options:

A.

CPPM no longer supports any Device Profiler features and relies on CPDI for this profile information.

B.

CPDI must be configured as an audit server on CPPM for the integration to be successful.

C.

CPDI must have security analysis disabled on it for the integration to be successful.

D.

CPPM can submit profile information to CPDI, but if CPDI derives a different classification, CPDI takes precedence.

Question 32

A company has AOS-CX switches and HPE Aruba Networking ClearPass Policy Manager (CPPM). The company wants switches to implement 802.1X

authentication to CPPM and download user roles.

What is one task that you must complete on the switches to support this use case?

Options:

A.

Specify CPPM as the RADIUS server with the exact CN in CPPM's HTTPS certificate.

B.

Install the root CA certificate for CPPM's RADIUS certificate in a TA profile on the switches.

C.

Configure empty user-roles with names that match enforcement profile names on CPPM.

D.

Specify a ClearPass username and password that match the name and RADIUS secret in a CPPM network device entry.

Question 33

You are establishing a cluster of HPE Aruba Networking ClearPass servers. (Assume that they are running version 6.9.).

For which type of certificate it is recommended to install a CA-signed certificate on the Subscriber before it joins the cluster?

Options:

A.

Database

B.

HTTPS

C.

RADIUS/EAP

D.

RadSec

Question 34

You are setting up HPE Aruba Networking SSE to prohibit users from uploading and downloading files from Dropbox. What is part of the process?

Options:

A.

Adding a web category that includes Dropbox

B.

Installing the HPE Aruba Networking SSE root certificate on clients

C.

Deploying a connector that can reach the remote users

D.

Deploying a connector that can reach Dropbox

Question 35

A company lacks visibility into the many different types of user and loT devices deployed in its internal network, making it hard for the security team to address

those devices.

Which HPE Aruba Networking solution should you recommend to resolve this issue?

Options:

A.

HPE Aruba Networking ClearPass Device Insight (CPDI)

B.

HPE Aruba Networking Network Analytics Engine (NAE)

C.

HPE Aruba Networking Mobility Conductor

D.

HPE Aruba Networking ClearPass OnBoard

Question 36

A company uses HPE Aruba Networking ClearPass Policy Manager (CPPM) as a TACACS+ server to authenticate managers on its AOS-CX switches. The company wants CPPM to control which commands managers are allowed to enter.

Which service must you add to the managers' TACACS+ enforcement profile?

Options:

A.

Cpass:HTTP

B.

Shell

C.

ARAP

D.

Aruba:Common

Question 37

A company needs to enforce 802.1X authentication for its Windows domain computers to HPE Aruba Networking ClearPass Policy Manager (CPPM). The

company needs the computers to authenticate as both machines and users in the same session.

Which authentication method should you set up on CPPM?

Options:

A.

TEAP

B.

PEAP MSCHAPv2

C.

EAP-TTLS

D.

EAP-TLS

Question 38

Which statement describes Zero Trust Security?

Options:

A.

Companies must apply the same access controls to all users, regardless of identity.

B.

Companies that support remote workers cannot achieve zero trust security and must determine if the benefits outweigh the cost.

C.

Companies should focus on protecting their resources rather than on protecting the boundaries of their internal network.

D.

Companies can achieve zero trust security by strengthening their perimeter security to detect a wider range of threats.

Question 39

A company wants to use HPE Aruba Networking ClearPass Policy Manager (CPPM) to profile Linux devices. You have decided to schedule a subnet scan of the devices' subnets. Which additional step should you complete before scheduling the scan?

Options:

A.

Set up SSH accounts on CPPM and map them to the Linux devices' subnets.

B.

Enable WMI probing in the cluster-wide parameters.

C.

Enable the Data Port in the ClearPass server settings and connect that port to the network.

D.

Configure SNMP in the network device settings for the switches that support the Linux devices.

Page: 1 / 7
Total 70 questions