New Year Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

HP HPE6-A78 Aruba Certified Network Security Associate Exam Exam Practice Test

Page: 1 / 11
Total 106 questions

Aruba Certified Network Security Associate Exam Questions and Answers

Question 1

What is a correct use case for using the specified certificate file format?

Options:

A.

using a PKCS7 file to install a certificate plus and its private key on a device

B.

using a PKCS12 file to install a certificate plus its private key on a device

C.

using a PEM file to install a binary encoded certificate on a device

D.

using a PKCS7 file to install a binary encoded private key on a device

Question 2

What is a benefit or using network aliases in ArubaOS firewall policies?

Options:

A.

You can associate a reputation score with the network alias to create rules that filler traffic based on reputation rather than IP.

B.

You can use the aliases to translate client IP addresses to other IP addresses on the other side of the firewall

C.

You can adjust the IP addresses in the aliases, and the rules using those aliases automatically update

D.

You can use the aliases to conceal the true IP addresses of servers from potentially untrusted clients.

Question 3

What is a guideline for managing local certificates on an ArubaOS-Switch?

Options:

A.

Before installing the local certificate, create a trust anchor (TA) profile with the root CA certificate for the certificate that you will install

B.

Install an Online Certificate Status Protocol (OCSP) certificate to simplify the process of enrolling and re-enrolling for certificate

C.

Generate the certificate signing request (CSR) with a program offline, then, install both the certificate and the private key on the switch in a single file.

D.

Create a self-signed certificate online on the switch because ArubaOS-Switches do not support CA-signed certificates.

Question 4

A company has a WLAN that uses Tunnel forwarding mode and WPA3-Enterprise security, supported by an Aruba Mobility Controller (MC) and campus APs (CAPs). You have been asked to capture packets from a wireless client connected to this WLAN and submit the packets to the security team.

What is a guideline for this capture?

Options:

A.

You should use an Air Monitor (AM) to capture the packets in the air.

B.

You should capture the traffic on the MC dataplane to obtain unencrypted traffic.

C.

You should mirror traffic from the switch port that connects to the AP out on a port connected to a packet analyzer.

D.

You should capture the traffic on the AP, so that the capture is as close to the source as possible.

Question 5

You are troubleshooting an authentication issue for Aruba switches that enforce 802 IX10 a cluster of Aruba ClearPass Policy Manager (CPPMs) You know that CPPM Is receiving and processing the authentication requests because the Aruba switches are showing Access-Rejects in their statistics However, you cannot find the record tor the Access-Rejects in CPPM Access Tracker

What is something you can do to look for the records?

Options:

A.

Make sure that CPPM cluster settings are configured to show Access-Rejects

B.

Verify that you are logged in to the CPPM Ul with read-write, not read-only, access

C.

Click Edit in Access viewer and make sure that the correct servers are selected.

D.

Go to the CPPM Event Viewer, because this is where RADIUS Access Rejects are stored.

Question 6

What purpose does an initialization vector (IV) serve for encryption?

Options:

A.

It helps parties to negotiate the keys and algorithms used to secure data before data transmission.

B.

It makes encryption algorithms more secure by ensuring that same plaintext and key can produce different ciphertext.

C.

It enables programs to convert easily-remembered passphrases to keys of a correct length.

D.

It enables the conversion of asymmetric keys into keys that are suitable for symmetric encryption.

Question 7

Why might devices use a Diffie-Hellman exchange?

Options:

A.

to agree on a shared secret in a secure manner over an insecure network

B.

to obtain a digital certificate signed by a trusted Certification Authority

C.

to prove knowledge of a passphrase without transmitting the passphrase

D.

to signal that they want to use asymmetric encryption for future communications

Question 8

What is an Authorized client as defined by ArubaOS Wireless Intrusion Prevention System (WIP)?

Options:

A.

a client that has a certificate issued by a trusted Certification Authority (CA)

B.

a client that is not on the WIP blacklist

C.

a client that has successfully authenticated to an authorized AP and passed encrypted traffic

D.

a client that is on the WIP whitelist.

Question 9

What is one difference between EAP-Tunneled Layer security (EAP-TLS) and Protected EAP (PEAP)?

Options:

A.

EAP-TLS creates a TLS tunnel for transmitting user credentials, while PEAP authenticates the server and supplicant during a TLS handshake.

B.

EAP-TLS requires the supplicant to authenticate with a certificate, hut PEAP allows the supplicant to use a username and password.

C.

EAP-TLS begins with the establishment of a TLS tunnel, but PEAP does not use a TLS tunnel as part of Its process

D.

EAP-TLS creates a TLS tunnel for transmitting user credentials securely while PEAP protects user credentials with TKIP encryption.

Question 10

A company has Aruba Mobility Controllers (MCs). Aruba campus APs. and ArubaOS-CX switches. The company plans to use ClearPass Policy Manager (CPPM) to classify endpoints by type The ClearPass admins tell you that they want to run Network scans as part of the solution

What should you do to configure the infrastructure to support the scans?

Options:

A.

Create a TA profile on the ArubaOS-Switches with the root CA certificate for ClearPass's HTTPS certificate

B.

Create device fingerprinting profiles on the ArubaOS-Switches that include SNMP. and apply the profiles to edge ports

C.

Create remote mirrors on the ArubaOS-Swrtches that collect traffic on edge ports, and mirror it to CPPM's IP address.

D.

Create SNMPv3 users on ArubaOS-CX switches, and make sure that the credentials match those configured on CPPM

Question 11

Which is a correct description of a Public Key Infrastructure (PKI)?

Options:

A.

A device uses Intermediate Certification Authorities (CAs) to enable it to trust root CAs that are different from the root CA that signed its own certificate.

B.

A user must manually choose to trust intermediate and end-entity certificates, or those certificates must be installed on the device as trusted in advance.

C.

Root Certification Authorities (CAs) primarily sign certificates, and Intermediate Certification Authorities (CAs) primarily validate signatures.

D.

A user must manually choose to trust a root Certification Authority (CA) certificate, or the root CA certificate must be installed on the device as trusted.

Question 12

Refer to the exhibit, which shows the current network topology.

Question # 12

You are deploying a new wireless solution with an Aruba Mobility Master (MM). Aruba Mobility Controllers (MCs). and campus APs (CAPs). The solution will Include a WLAN that uses Tunnel for the forwarding mode and Implements WPA3-Enterprise security

What is a guideline for setting up the vlan for wireless devices connected to the WLAN?

Options:

A.

Assign the WLAN to a single new VLAN which is dedicated to wireless users

B.

Use wireless user roles to assign the devices to different VLANs in the 100-150 range

C.

Assign the WLAN to a named VLAN which specified 100-150 as the range of IDs.

D.

Use wireless user roles to assign the devices to a range of new vlan IDs.

Question 13

What is a correct guideline for the management protocols that you should use on ArubaOS-Switches?

Options:

A.

Disable Telnet and use TFTP instead.

B.

Disable SSH and use https instead.

C.

Disable Telnet and use SSH instead

D.

Disable HTTPS and use SSH instead

Question 14

From which solution can ClearPass Policy Manager (CPPM) receive detailed information about client device type OS and status?

Options:

A.

ClearPass Onboard

B.

ClearPass Access Tracker

C.

ClearPass OnGuard

D.

ClearPass Guest

Question 15

What distinguishes a Distributed Denial of Service (DDoS) attack from a traditional Denial or service attack (DoS)?

Options:

A.

A DDoS attack originates from external devices, while a DoS attack originates from internal devices

B.

A DDoS attack is launched from multiple devices, while a DoS attack is launched from a single device

C.

A DoS attack targets one server, a DDoS attack targets all the clients that use a server

D.

A DDoS attack targets multiple devices, while a DoS Is designed to Incapacitate only one device

Question 16

What is symmetric encryption?

Options:

A.

It simultaneously creates ciphertext and a same-size MAC.

B.

It any form of encryption mat ensures that thee ciphertext Is the same length as the plaintext.

C.

It uses the same key to encrypt plaintext as to decrypt ciphertext.

D.

It uses a Key that is double the size of the message which it encrypts.

Question 17

Your Aruba Mobility Master-based solution has detected a rogue AP Among other information the ArubaOS Detected Radios page lists this Information for the AP

SSID = PubllcWiFI

BSSID = a8M27 12 34:56

Match method = Exact match

Match type = Eth-GW-wired-Mac-Table

The security team asks you to explain why this AP is classified as a rogue. What should you explain?

Options:

A.

The AP Is connected to your LAN because It is transmitting wireless traffic with your network's default gateway's MAC address as a source MAC Because it does not belong to the company, it is a rogue

B.

The ap has a BSSID mat matches authorized client MAC addresses. This indicates that the AP is spoofing the MAC address to gam unauthorized access to your company's wireless services, so It is a rogue

C.

The AP has been detected as launching a DoS attack against your company's default gateway. This qualities it as a rogue which needs to be contained with wireless association frames immediately

D.

The AP is spoofing a routers MAC address as its BSSID. This indicates mat, even though WIP cannot determine whether the AP is connected to your LAN. it is a rogue.

Question 18

What does the NIST model for digital forensics define?

Options:

A.

how to define access control policies that will properly protect a company's most sensitive data and digital resources

B.

how to properly collect, examine, and analyze logs and other data, in order to use it as evidence in a security investigation

C.

which types of architecture and security policies are best equipped to help companies establish a Zero Trust Network (ZTN)

D.

which data encryption and authentication algorithms are suitable for enterprise networks in a world that is moving toward quantum computing

Question 19

What is a use case for Transport Layer Security (TLS)?

Options:

A.

to establish a framework for devices to determine when to trust other devices' certificates

B.

to enable a client and a server to establish secure communications for another protocol

C.

to enable two parties to asymmetrically encrypt and authenticate all data that passes be-tween them

D.

to provide a secure alternative to certificate authentication that is easier to implement

Question 20

You have an Aruba solution with multiple Mobility Controllers (MCs) and campus APs. You want to deploy a WPA3-Enterprise WLAN and authenticate users to Aruba ClearPass Policy Manager (CPPM) with EAP-TLS.

What is a guideline for ensuring a successful deployment?

Options:

A.

Avoid enabling CNSA mode on the WLAN, which requires the internal MC RADIUS server.

B.

Ensure that clients trust the root CA for the MCs’ Server Certificates.

C.

Educate users in selecting strong passwords with at least 8 characters.

D.

Deploy certificates to clients, signed by a CA that CPPM trusts.

Question 21

Which attack is an example or social engineering?

Options:

A.

An email Is used to impersonate a Dank and trick users into entering their bank login information on a fake website page.

B.

A hacker eavesdrops on insecure communications, such as Remote Desktop Program (RDP). and discovers login credentials.

C.

A user visits a website and downloads a file that contains a worm, which sell-replicates throughout the network.

D.

An attack exploits an operating system vulnerability and locks out users until they pay the ransom.

Question 22

You have deployed a new Aruba Mobility Controller (MC) and campus APs (CAPs). One of the WLANs enforces 802.IX authentication lo Aruba ClearPass Policy Manager {CPPM) When you test connecting the client to the WLAN. the test falls You check Aruba ClearPass Access Tracker and cannot find a record of the authentication attempt You ping from the MC to CPPM. and the ping is successful.

What is a good next step for troubleshooting?

Options:

A.

Renew CPPM's RADIUS/EAP certificate

B.

Reset the user credentials

C.

Check CPPM Event viewer.

D.

Check connectivity between CPPM and a backend directory server

Question 23

Two wireless clients, client 1 and client 2, are connected to an ArubaOS Mobility Controller. Subnet 10.1.10.10/24 is a network of servers on the other side of the ArubaOS firewall. The exhibit shows all three firewall rules that apply to these clients.

Question # 23

Which traffic is permitted?

Options:

A.

an HTTPS request from client 1 to 10.1.10.10 and an HTTPS response from 10.1.10.10 to client 1

B.

an HTTPS request from client 1 to 10.1.10.10 and an HTTPS request from 10.1.10.11 to client 1

C.

an HTTPS request from 10.1.10.10 to client 1 and an HTTPS re-sponse from client 1 to 10.1.10.10

D.

an HTTPS request from client 1 to client 2 and an HTTPS request from client 2 to client 1

Question 24

You are configuring ArubaOS-CX switches to tunnel client traffic to an Aruba Mobility Controller (MC). What should you do to enhance security for control channel communications between the switches and the MC?

Options:

A.

Create one UBT zone for control traffic and a second UBT zone for clients.

B.

Configure a long, random PAPI security key that matches on the switches and the MC.

C.

install certificates on the switches, and make sure that CPsec is enabled on the MC

D.

Make sure that the UBT client vlan is assigned to the interface on which the switches reach the MC and only that interface.

Question 25

Refer to the exhibit.

Question # 25

This company has ArubaOS-Switches. The exhibit shows one access layer switch, Swllcn-2. as an example, but the campus actually has more switches. The company wants to slop any internal users from exploiting ARP

What Is the proper way to configure the switches to meet these requirements?

Options:

A.

On Switch-1, enable ARP protection globally, and enable ARP protection on ail VLANs.

B.

On Switch-2, make ports connected to employee devices trusted ports for ARP protection

C.

On Swltch-2, enable DHCP snooping globally and on VLAN 201 before enabling ARP protection

D.

On Swltch-2, configure static PP-to-MAC bindings for all end-user devices on the network

Question 26

What is a benefit of deploying Aruba ClearPass Device insight?

Options:

A.

Highly accurate endpoint classification for environments with many devices types, including Internet of Things (loT)

B.

visibility into devices' 802.1X supplicant settings and automated certificate deployment

C.

Agent-based analysts of devices' security settings and health status, with the ability to implement quarantining

D.

Simpler troubleshooting of ClearPass solutions across an environment with multiple ClearPass Policy Managers

Question 27

An ArubaOS-CX switch enforces 802.1X on a port. No fan-through options or port-access roles are configured on the port The 802 1X supplicant on a connected client has not yet completed authentication

Which type of traffic does the authenticator accept from the client?

Options:

A.

EAP only

B.

DHCP, DNS and RADIUS only

C.

RADIUS only

D.

DHCP, DNS, and EAP only

Question 28

You have an Aruba Mobility Controller (MC). for which you are already using Aruba ClearPass Policy Manager (CPPM) to authenticate access to the Web Ul with usernames and passwords You now want to enable managers to use certificates to log in to the Web Ul CPPM will continue to act as the external server to check the names in managers' certificates and tell the MC the managers' correct rote

in addition to enabling certificate authentication. what is a step that you should complete on the MC?

Options:

A.

Verify that the MC has the correct certificates, and add RadSec to the RADIUS server configuration for CPPM

B.

install all of the managers' certificates on the MC as OCSP Responder certificates

C.

Verify that the MC trusts CPPM's HTTPS certificate by uploading a trusted CA certificate Also, configure a CPPM username and password on the MC

D.

Create a local admin account mat uses certificates in the account, specify the correct trusted CA certificate and external authentication

Question 29

How can ARP be used to launch attacks?

Options:

A.

Hackers can use ARP to change their NIC's MAC address so they can impersonate legiti-mate users.

B.

Hackers can exploit the fact that the port used for ARP must remain open and thereby gain remote access to another user's device.

C.

A hacker can use ARP to claim ownership of a CA-signed certificate that actually belongs to another device.

D.

A hacker can send gratuitous ARP messages with the default gateway IP to cause devices to redirect traffic to the hacker's MAC address.

Question 30

Refer to the exhibit.

Question # 30

How can you use the thumbprint?

Options:

A.

Install this thumbprint on management stations to use as two-factor authentication along with manager usernames and passwords, this will ensure managers connect from valid stations

B.

Copy the thumbprint to other Aruba switches to establish a consistent SSH Key for all switches this will enable managers to connect to the switches securely with less effort

C.

When you first connect to the switch with SSH from a management station, make sure that the thumbprint matches to ensure that a man-in-t he-mid die (MITM) attack is not occurring

D.

install this thumbprint on management stations the stations can then authenticate with the thumbprint instead of admins having to enter usernames and passwords.

Question 31

You have been authorized to use containment to respond to rogue APs detected by ArubaOS Wireless Intrusion Prevention (WIP). What is a consideration for using tarpit containment versus traditional wireless containment?

Options:

A.

Rather than function wirelessly, tarpit containment sends ARP frames over the wired network to poison rogue APs ARP tables and prevent them from transmitting on the wired network.

B.

Rather than target all clients connected to rogue APs, tarpit containment targets only authorized clients that are connected to a rogue AP, reducing the chance of negative effects on neighbors.

C.

Tarpit containment does not require an RF Protect license to function, while traditional wireless containment does.

D.

Tarpit containment forms associations with clients to enable more effective containment with fewer disassociation frames than traditional wireless containment.

Page: 1 / 11
Total 106 questions