Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

HPE6-A78 Exam Dumps - Aruba Certified Network Security Associate Exam

Go to page:
Question # 25

You have been instructed to look in the ArubaOS Security Dashboard's client list Your goal is to find clients mat belong to the company and have connected to devices that might belong to hackers

Which client fits this description?

A.

MAC address d8:50:e6:f3;6d;a4; Client Classification Authorized; AP Classification, interfering

B.

MAC address d8:50:e6 f3;6e;c5; Client Classification Interfering. AP Classification Neighbor

C.

MAC address d8:50:e6:f3;6e;60; Client Classification Interfering. AP Classification Interfering

D.

MAC address d8:50:e6:f3;TO;ab; Client Classification Interfering. AP Classification Rogue

Full Access
Question # 26

What is an example or phishing?

A.

An attacker sends TCP messages to many different ports to discover which ports are open.

B.

An attacker checks a user’s password by using trying millions of potential passwords.

C.

An attacker lures clients to connect to a software-based AP that is using a legitimate SSID.

D.

An attacker sends emails posing as a service team member to get users to disclose their passwords.

Full Access
Question # 27

You are setting up an Aruba mobility solution which includes a Mobility Master (MM), Mobility Controllers (MCs), and campus APs (CAPs) for a university. The university plans to enforce WPA2-Enterprise for all users' connections. The university wants to apply one set of access control rules to faculty users' traffic and a different set of rules to students' traffic.

What is the best approach for applying the correct rules to each group?

A.

Create two VLANs, one for faculty and one for students. Create one set of firewall access control rules that specify faculty IP addresses for the source and a second set of rules that specify the student IP addresses for the source. Apply the rules to the WLAN.

B.

Create two roles, a "faculty" role and a "student" role. Apply firewall policies with the correct rules for each group to each role.

C.

Create two WLANs, one for faculty and one for students. Apply firewall policies with the correct rules for each group to each WLAN.

D.

Create two VLANs, one for faculty and one for students. Apply firewall policies with the correct rules for each group to each VLAN.

Full Access
Question # 28

The first exhibit shows roles on the MC, listed in alphabetic order. The second and third exhibits show the configuration for a WLAN to which a client connects. Which description of the role assigned to a user under various circumstances is correct?

A.

A user fails 802.1X authentication. The client remains connected, but is assigned the "guest" role.

B.

A user authenticates successfully with 802.1 X. and the RADIUS Access-Accept includes an Aruba-User-Role VSA set to "employeel.” The client’s role is "guest."

C.

A user authenticates successfully with 802.1X. and the RADIUS Access-Accept includes an Aruba-User-Role VSA set to "employee." The client’s role is "guest."

D.

A user authenticates successfully with 802.1X, and the RADIUS Access-Accept includes an Aruba-User-RoleVSA set to "employeel." The client's role is "employeel."

Full Access
Question # 29

You need to set up Aruba network infrastructure devices for management with SNMP. The SNMP server has this SNMPv3 user configured on it: username: airwave auth algorithm: sha auth key: fyluqp18@S!9a priv algorithm: aes priv key: 761oxaiaoeu19&

What correctly describes the setup on the infrastructure device?

A.

You must configure a user with the same name and keys, but can choose algorithms that meet the device's needs.

B.

You must configure the "airwave" server as an authorized user. Then, configure a separate user for this device with its own keys.

C.

You must configure a user with the same name and algorithms, but the keys should be unique to this device.

D.

You must configure a user with exactly the same name, algorithms, and keys.

Full Access
Question # 30

An admin has created a WLAN that uses the settings shown in the exhibits (and has not otherwise adjusted the settings in the AAA profile) A client connects to the WLAN Under which circumstances will a client receive the default role assignment?

A.

The client has attempted 802 1X authentication, but the MC could not contact the authentication server

B.

The client has attempted 802 1X authentication, but failed to maintain a reliable connection, leading to a timeout error

C.

The client has passed 802 1X authentication, and the value in the Aruba-User-Role VSA matches a role on the MC

D.

The client has passed 802 1X authentication and the authentication server did not send an Aruba-User-Role VSA

Full Access
Question # 31

Which is a use case for enabling Control Plane Policing on Aruba switches?

A.

to prevent unauthorized network devices from sending routing updates

B.

to prevent the switch from accepting routing updates from unauthorized users

C.

to encrypt traffic between tunneled node switches and Mobility Controllers (MCs)

D.

to mitigate Denial of Service (Dos) attacks on the switch

Full Access
Go to page: