New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

HPE7-A02 Questions Bank

Page: 9 / 10
Total 70 questions

Aruba Certified Network Security Professional Exam Questions and Answers

Question 33

Your company wants to implement Tunneled EAP (TEAP).

How can you set up HPE Aruba Networking ClearPass Policy Manager (CPPM) to enforce certificated-based authentication for clients using TEAP?

Options:

A.

For the service using TEAP, set the authentication source to an internal database.

B.

Select a service certificate when you specify TEAP as a service's authentication method.

C.

Create an authentication method named "TEAP" with the type set to EAP-TLS.

D.

Select an EAP-TLS-type authentication method for the TEAP method's inner method.

Question 34

A company has HPE Aruba Networking APs running AOS-10 that connect to AOS-CX switches. The APs will:

    Authenticate as 802.1X supplicants to HPE Aruba Networking ClearPass Policy Manager (CPPM)

    Be assigned to the "APs" role on the switches

    Have their traffic forwarded locally

What information do you need to help you determine the VLAN settings for the "APs" role?

Options:

A.

Whether the switches are using local user-roles (LURs) or downloadable user-roles (DURs).

B.

Whether the APs bridge or tunnel traffic on their SSIDs.

C.

Whether the switches have established tunnels with an HPE Aruba Networking gateway.

D.

Whether the APs have static or DHCP-assigned IP addresses.

Question 35

You are establishing a cluster of HPE Aruba Networking ClearPass servers. (Assume that they are running version 6.9.).

For which type of certificate it is recommended to install a CA-signed certificate on the Subscriber before it joins the cluster?

Options:

A.

Database

B.

HTTPS

C.

RADIUS/EAP

D.

RadSec

Question 36

You have created this rule in an HPE Aruba Networking ClearPass Policy Manager (CPPM) service's enforcement policy: IF Authorization [Endpoints Repository]

Conflict EQUALS true THEN apply "quarantine_profile"

What information can help you determine whether you need to configure cluster-wide profiler parameters to ignore some conflicts?

Options:

A.

Whether the company has rare Internet of Things (loT) devices

B.

Whether some devices are incapable of captive portal or 802.1X authentication

C.

Whether the company has devices that use PXE boot

D.

Whether some devices are running legacy operating systems

Page: 9 / 10
Total 70 questions