Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

Aruba Certified Network Security Associate Exam Question and Answers

Aruba Certified Network Security Associate Exam

Last Update Apr 28, 2024
Total Questions : 60

We are offering FREE HPE6-A78 HP exam questions. All you do is to just go and sign up. Give your details, prepare HPE6-A78 free exam questions and then go for complete pool of Aruba Certified Network Security Associate Exam test questions that will help you more.

HPE6-A78 pdf

HPE6-A78 PDF

$35  $99.99
HPE6-A78 Engine

HPE6-A78 Testing Engine

$42  $119.99
HPE6-A78 PDF + Engine

HPE6-A78 PDF + Testing Engine

$56  $159.99
Questions 1

Which is a correct description of a stage in the Lockheed Martin kill chain?

Options:

A.  

In the delivery stage, malware collects valuable data and delivers or exfilltrated it to the hacker.

B.  

In the reconnaissance stage, the hacker assesses the impact of the attack and how much information was exfilltrated.

C.  

In the weaponization stage, which occurs after malware has been delivered to a system, the malware executes Its function.

D.  

In the exploitation and installation phases, malware creates a backdoor into the infected system for the hacker.

Discussion 0
Questions 2

Options:

Discussion 0
Questions 3

What is a correct guideline for the management protocols that you should use on ArubaOS-Switches?

Options:

A.  

Disable Telnet and use TFTP instead.

B.  

Disable SSH and use https instead.

C.  

Disable Telnet and use SSH instead

D.  

Disable HTTPS and use SSH instead

Discussion 0
Questions 4

What is one difference between EAP-Tunneled Layer security (EAP-TLS) and Protected EAP (PEAP)?

Options:

A.  

EAP-TLS creates a TLS tunnel for transmitting user credentials, while PEAP authenticates the server and supplicant during a TLS handshake.

B.  

EAP-TLS requires the supplicant to authenticate with a certificate, hut PEAP allows the supplicant to use a username and password.

C.  

EAP-TLS begins with the establishment of a TLS tunnel, but PEAP does not use a TLS tunnel as part of Its process

D.  

EAP-TLS creates a TLS tunnel for transmitting user credentials securely while PEAP protects user credentials with TKIP encryption.

Discussion 0
Questions 5

Refer to the exhibit.

You are deploying a new ArubaOS Mobility Controller (MC), which is enforcing authentication to Aruba ClearPass Policy Manager (CPPM). The authentication is not working correctly, and you find the error shown In the exhibit in the CPPM Event Viewer.

What should you check?

Options:

A.  

that the MC has been added as a domain machine on the Active Directory domain with which CPPM is synchronized

B.  

that the snared secret configured for the CPPM authentication server matches the one defined for the device on CPPM

C.  

that the IP address that the MC is using to reach CPPM matches the one defined for the device on CPPM

D.  

that the MC has valid admin credentials configured on it for logging into the CPPM

Discussion 0
Questions 6

What is a benefit or Protected Management Frames (PMF). sometimes called Management Frame Protection (MFP)?

Options:

A.  

PMF helps to protect APs and MCs from unauthorized management access by hackers.

B.  

PMF ensures trial traffic between APs and Mobility Controllers (MCs) is encrypted.

C.  

PMF prevents hackers from capturing the traffic between APs and Mobility Controllers.

D.  

PMF protects clients from DoS attacks based on forged de-authentication frames

Discussion 0
Questions 7

Your Aruba Mobility Master-based solution has detected a rogue AP Among other information the ArubaOS Detected Radios page lists this Information for the AP

SSID = PubllcWiFI

BSSID = a8M27 12 34:56

Match method = Exact match

Match type = Eth-GW-wired-Mac-Table

The security team asks you to explain why this AP is classified as a rogue. What should you explain?

Options:

A.  

The AP Is connected to your LAN because It is transmitting wireless traffic with your network's default gateway's MAC address as a source MAC Because it does not belong to the company, it is a rogue

B.  

The ap has a BSSID mat matches authorized client MAC addresses. This indicates that the AP is spoofing the MAC address to gam unauthorized access to your company's wireless services, so It is a rogue

C.  

The AP has been detected as launching a DoS attack against your company's default gateway. This qualities it as a rogue which needs to be contained with wireless association frames immediately

D.  

The AP is spoofing a routers MAC address as its BSSI

D.  

This indicates mat, even though WIP cannot determine whether the AP is connected to your LAN. it is a rogue.

Discussion 0
Questions 8

Which attack is an example or social engineering?

Options:

A.  

An email Is used to impersonate a Dank and trick users into entering their bank login information on a fake website page.

B.  

A hacker eavesdrops on insecure communications, such as Remote Desktop Program (RDP). and discovers login credentials.

C.  

A user visits a website and downloads a file that contains a worm, which sell-replicates throughout the network.

D.  

An attack exploits an operating system vulnerability and locks out users until they pay the ransom.

Discussion 0
Questions 9

What is an example or phishing?

Options:

A.  

An attacker sends TCP messages to many different ports to discover which ports are open.

B.  

An attacker checks a user’s password by using trying millions of potential passwords.

C.  

An attacker lures clients to connect to a software-based AP that is using a legitimate SSID.

D.  

An attacker sends emails posing as a service team member to get users to disclose their passwords.

Discussion 0