Easter Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

PDF HPE6-A78 Study Guide

Page: 12 / 13
Total 167 questions

Aruba Certified Network Security Associate Exam Questions and Answers

Question 45

You have detected a Rogue AP using the Security Dashboard Which two actions should you take in responding to this event? (Select two)

Options:

A.

There is no need to locale the AP If you manually contain It.

B.

This is a serious security event, so you should always contain the AP immediately regardless of your company's specific policies.

C.

You should receive permission before containing an AP. as this action could have legal Implications.

D.

For forensic purposes, you should copy out logs with relevant information, such as the time mat the AP was detected and the AP's MAC address.

E.

There is no need to locate the AP If the Aruba solution is properly configured to automatically contain it.

Question 46

Refer to the exhibit.

A diem is connected to an ArubaOS Mobility Controller. The exhibit snows all Tour firewall rules that apply to this diem

What correctly describes how the controller treats HTTPS packets to these two IP addresses, both of which are on the other side of the firewall

10.1 10.10

203.0.13.5

Options:

A.

It drops both of the packets

B.

It permits the packet to 10.1.10.10 and drops the packet to 203 0.13.5

C.

it permits both of the packets

D.

It drops the packet to 10.1.10.10 and permits the packet to 203.0.13.5.

Question 47

Refer to the exhibit:

port-access role role1 vlan access 11

port-access role role2 vlan access 12

port-access role role3 vlan access 13

port-access role role4 vlan access 14

aaa authentication port-access dot1x authenticator

enable

interface 1/1/1

no shutdown

no routing

vlan access 1

aaa authentication port-access critical-role role1

aaa authentication port-access preauth-role role2

aaa authentication port-access auth-role role3

interface 1/1/2

no shutdown

no routing

vlan access 1

aaa authentication port-access critical-role role1

aaa authentication port-access preauth-role role2

aaa authentication port-access auth-role role3

The exhibit shows the configuration on an AOS-CX switch.

    Client1 connects to port 1/1/1 and authenticates to HPE Aruba Networking ClearPass Policy Manager (CPPM). CPPM sends an Access-Accept with this VSA: Aruba-User-Role: role4.

    Client2 connects to port 1/1/2 and does not attempt to authenticate.To which roles are the users assigned?

Options:

A.

Client1 = role3; Client2 = role2

B.

Client1 = role4; Client2 = role1

C.

Client1 = role4; Client2 = role2

D.

Client1 = role3; Client2 = role1

Question 48

You are checking the Security Dashboard in the Web UI for your AOS solution and see that Wireless Intrusion Prevention (WIP) has discovered a rogue radio operating in ad hoc mode with open security. What correctly describes a threat that the radio could pose?

Options:

A.

It could be attempting to conceal itself from detection by changing its BSSID and SSID frequently.

B.

It could open a backdoor into the corporate LAN for unauthorized users.

C.

It is running in a non-standard 802.11 mode and could effectively jam the wireless signal.

D.

It is flooding the air with many wireless frames in a likely attempt at a DoS attack.

Page: 12 / 13
Total 167 questions