HP hpe6-a78 practice test

Aruba Certified Network Security Associate Exam


Question 1

You are configuring ArubaOS-CX switches to tunnel client traffic to an Aruba Mobility Controller
(MC). What should you do to enhance security for control channel communications between the
switches and the MC?

  • A. Create one UBT zone for control traffic and a second UBT zone for clients.
  • B. Configure a long, random PAPI security key that matches on the switches and the MC.
  • C. install certificates on the switches, and make sure that CPsec is enabled on the MC
  • D. Make sure that the UBT client vlan is assigned to the interface on which the switches reach the MC and only that interface.
Answer:

C

Discussions
0 / 600

Question 2

You have been asked to rind logs related to port authentication on an ArubaOS-CX switch for events
logged in the past several hours But. you are having trouble searching through the logs What is one
approach that you can take to find the relevant logs?

  • A. Add the "-C and *-c port-access" options to the "show logging" command.
  • B. Configure a logging Tiller for the "port-access" category, and apply that filter globally.
  • C. Enable debugging for "portaccess" to move the relevant logs to a buffer.
  • D. Specify a logging facility that selects for "port-access" messages.
Answer:

A

Discussions
0 / 600

Question 3

What is a reason to set up a packet capture on an Aruba Mobility Controller (MC)?

  • A. The company wants to use ClearPass Policy Manager (CPPM) to profile devices and needs to receive HTTP User-Agent strings from the MC.
  • B. The security team believes that a wireless endpoint connected to the MC is launching an attack and wants to examine the traffic more closely.
  • C. You want the MC to analyze wireless clients' traffic at a lower level, so that the ArubaOS firewall can control the traffic I based on application.
  • D. You want the MC to analyze wireless clients' traffic at a lower level, so that the ArubaOS firewall can control Web traffic based on the destination URL.
Answer:

C

Discussions
0 / 600

Question 4

What is an example or phishing?

  • A. An attacker sends TCP messages to many different ports to discover which ports are open.
  • B. An attacker checks a user’s password by using trying millions of potential passwords.
  • C. An attacker lures clients to connect to a software-based AP that is using a legitimate SSID.
  • D. An attacker sends emails posing as a service team member to get users to disclose their passwords.
Answer:

D

Discussions
0 / 600

Question 5

Refer to the exhibit.

You are deploying a new ArubaOS Mobility Controller (MC), which is enforcing authentication to
Aruba ClearPass Policy Manager (CPPM). The authentication is not working correctly, and you find
the error shown In the exhibit in the CPPM Event Viewer.
What should you check?

  • A. that the MC has been added as a domain machine on the Active Directory domain with which CPPM is synchronized
  • B. that the snared secret configured for the CPPM authentication server matches the one defined for the device on CPPM
  • C. that the IP address that the MC is using to reach CPPM matches the one defined for the device on CPPM
  • D. that the MC has valid admin credentials configured on it for logging into the CPPM
Answer:

C

Discussions
0 / 600

Question 6

What is one way that Control Plane Security (CPsec) enhances security for me network?

  • A. It protects wireless clients' traffic tunneled between APs and Mobility Controllers, from eavesdropping
  • B. It prevents Denial of Service (DoS) attacks against Mobility Controllers' (MCs") control plane.
  • C. It prevents access from unauthorized IP addresses to critical services, such as SSH on Mobility Controllers (MCs).
  • D. It protects management traffic between APs and Mobility Controllers (MCs) from eavesdropping.
Answer:

A

Discussions
0 / 600

Question 7

You are managing an Aruba Mobility Controller (MC). What is a reason for adding a "Log Settings"
definition in the ArubaOS Diagnostics > System > Log Settings page?

  • A. Configuring the Syslog server settings for the server to which the MC forwards logs for a particular category and level
  • B. Configuring the MC to generate logs for a particular event category and level, but only for a specific user or AP.
  • C. Configuring a filter that you can apply to a defined Syslog server in order to filter events by subcategory
  • D. Configuring the log facility and log format that the MC will use for forwarding logs to all Syslog servers
Answer:

A

Discussions
0 / 600

Question 8

A company with 382 employees wants to deploy an open WLAN for guests. The company wants the
experience to be as follows:

The company also wants to provide encryption for the network for devices mat are capable, you
implement Tor the WLAN?
Which security options should

  • A. WPA3-Personal and MAC-Auth
  • B. Captive portal and WPA3-Personai
  • C. Captive portal and Opportunistic Wireless Encryption (OWE) in transition mode
  • D. Opportunistic Wireless Encryption (OWE) and WPA3-Personal
Answer:

C

Discussions
0 / 600

Question 9

Which is a correct description of a stage in the Lockheed Martin kill chain?

  • A. In the delivery stage, malware collects valuable data and delivers or exfilltrated it to the hacker.
  • B. In the reconnaissance stage, the hacker assesses the impact of the attack and how much information was exfilltrated.
  • C. In the weaponization stage, which occurs after malware has been delivered to a system, the malware executes Its function.
  • D. In the exploitation and installation phases, malware creates a backdoor into the infected system for the hacker.
Answer:

B

Discussions
0 / 600

Question 10

What is a Key feature of me ArubaOS firewall?

  • A. The firewall is stateful which means that n can track client sessions and automatically allow return traffic for permitted sessions
  • B. The firewall Includes application layer gateways (ALGs). which it uses to filter Web traffic based on the reputation of the destination web site.
  • C. The firewall examines all traffic at Layer 2 through Layer 4 and uses source IP addresses as the primary way to determine how to control traffic.
  • D. The firewall is designed to fitter traffic primarily based on wireless 802.11 headers, making it ideal for mobility environments
Answer:

B

Discussions
0 / 600
To page 2