Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

Aruba Certified Network Security Associate Exam Question and Answers

Aruba Certified Network Security Associate Exam

Last Update Sep 22, 2025
Total Questions : 167

We are offering FREE HPE6-A78 HP exam questions. All you do is to just go and sign up. Give your details, prepare HPE6-A78 free exam questions and then go for complete pool of Aruba Certified Network Security Associate Exam test questions that will help you more.

HPE6-A78 pdf

HPE6-A78 PDF

$42  $104.99
HPE6-A78 Engine

HPE6-A78 Testing Engine

$50  $124.99
HPE6-A78 PDF + Engine

HPE6-A78 PDF + Testing Engine

$66  $164.99
Questions 1

An ArubaOS-CX switch enforces 802.1X on a port. No fan-through options or port-access roles are configured on the port The 802 1X supplicant on a connected client has not yet completed authentication

Which type of traffic does the authenticator accept from the client?

Options:

A.  

EAP only

B.  

DHCP, DNS and RADIUS only

C.  

RADIUS only

D.  

DHCP, DNS, and EAP only

Discussion 0
Questions 2

You have been asked to rind logs related to port authentication on an ArubaOS-CX switch for events logged in the past several hours But. you are having trouble searching through the logs What is one approach that you can take to find the relevant logs?

Options:

A.  

Add the "-C and *-c port-access" options to the "show logging" command.

B.  

Configure a logging Tiller for the "port-access" category, and apply that filter globally.

C.  

Enable debugging for "portaccess" to move the relevant logs to a buffer.

D.  

Specify a logging facility that selects for "port-access" messages.

Discussion 0
Questions 3

A company is deploying ArubaOS-CX switches to support 135 employees, which will tunnel client traffic to an Aruba Mobility Controller (MC) for the MC to apply firewall policies and deep packet inspection (DPI). This MC will be dedicated to receiving traffic from the ArubaOS-CX switches.

What are the licensing requirements for the MC?

Options:

A.  

one AP license per-switch

B.  

one PEF license per-switch

C.  

one PEF license per-switch. and one WCC license per-switch

D.  

one AP license per-switch. and one PEF license per-switch

Discussion 0
Questions 4

You need to deploy an Aruba instant AP where users can physically reach It. What are two recommended options for enhancing security for management access to the AP? (Select two )

Options:

A.  

Disable Its console ports

B.  

Place a Tamper Evident Label (TELS) over its console port

C.  

Disable the Web Ul.

D.  

Configure WPA3-Enterpnse security on the AP

E.  

install a CA-signed certificate

Discussion 0
Questions 5

What is social engineering?

Options:

A.  

Hackers use Artificial Intelligence (Al) to mimic a user’s online behavior so they can infiltrate a network and launch an attack.

B.  

Hackers use employees to circumvent network security and gather the information they need to launch an attack.

C.  

Hackers intercept traffic between two users, eavesdrop on their messages, and pretend to be one or both users.

D.  

Hackers spoof the source IP address in their communications so they appear to be a legitimate user.

Discussion 0
Questions 6

Which correctly describes one of HPE Aruba Networking ClearPass Policy Manager's (CPPM's) device profiling methods?

Options:

A.  

CPPM can use Wireshark to actively probe devices, analyze their traffic patterns, and construct an endpoint profile.

B.  

CPPM can use SNMP to configure Aruba switches and mobility devices to mirror client traffic to CPPM for analysis.

C.  

CPPM can analyze settings such as TTL and time window size in endpoints' TCP traffic in order to fingerprint the OS.

D.  

CPPM can analyze settings such as TCP/UDP ports used for HTTP, DHCP, and DNS in endpoints' traffic to fingerprint the OS.

Discussion 0
Questions 7

What is a consideration for using MAC authentication (MAC-Auth) to secure a wired or wireless connection?

Options:

A.  

As a Layer 2 authentication method, MAC-Auth cannot be used to authenticate devices to an external authentication server.

B.  

It is very easy for hackers to spoof their MAC addresses and get around MAC authentication.

C.  

MAC-Auth can add a degree of security to an open WLAN by enabling the generation of a PMK to encrypt traffic.

D.  

Headless devices, such as Internet of Things (loT) devices, must be configured in advance to support MAC-Auth.

Discussion 0
Questions 8

What is one practice that can help you to maintain a digital chain or custody In your network?

Options:

A.  

Enable packet capturing on Instant AP or Moodily Controller (MC) datepath on an ongoing basis

B.  

Enable packet capturing on Instant AP or Mobility Controller (MC) control path on an ongoing basis.

C.  

Ensure that all network infrastructure devices receive a valid clock using authenticated NTP

D.  

Ensure that all network Infrastructure devices use RADIUS rather than TACACS+ to authenticate managers

Discussion 0
Questions 9

Which attack is an example of social engineering?

Options:

A.  

An email is used to impersonate a bank and trick users into entering their bank login information on a fake website page.

B.  

An attack exploits an operating system vulnerability and locks out users until they pay the ransom.

C.  

A hacker eavesdrops on insecure communications, such as Remote Desktop Protocol (RDP), and discovers login credentials.

D.  

A user visits a website and downloads a file that contains a worm, which self-replicates throughout the network.

Discussion 0
Questions 10

What is another setting that you must configure on the switch to meet these requirements?

Options:

A.  

Set the aaa authentication login method for SSH to the "radius" server-group (with local as backup).

B.  

Configure a CPPM username and password that match a CPPM admin account.

C.  

Create port-access roles with the same names of the roles that CPPM will send in Aruba-Admin-Role VSAs.

D.  

Disable SSH on the default VRF and enable it on the mgmt VRF instead.

Discussion 0
Questions 11

Refer to the exhibit.

This Aruba Mobility Controller (MC) should authenticate managers who access the Web Ul to ClearPass Policy Manager (CPPM) ClearPass admins have asked you to use RADIUS and explained that the MC should accept managers' roles in Aruba-Admin-Role VSAs

Which setting should you change to follow Aruba best security practices?

Options:

A.  

Change the local user role to read-only

B.  

Clear the MSCHAP check box

C.  

Disable local authentication

D.  

Change the default role to "guest-provisioning"

Discussion 0
Questions 12

What is one way a honeypot can be used to launch a man-in-the-middle (MITM) attack to wireless clients?

Options:

A.  

It uses ARP poisoning to disconnect wireless clients from the legitimate wireless network and force clients to connect to the hacker’s wireless network instead.

B.  

It runs an NMap scan on the wireless client to find the client's MAC and IP address. The hacker then connects to another network and spoofs those addresses.

C.  

It uses a combination of software and hardware to jam the RF band and prevent the client from connecting to any wireless networks.

D.  

It examines wireless clients' probes and broadcasts the SSIDs in the probes, so that wireless clients will connect to it automatically.

Discussion 0
Questions 13

This company has AOS-CX switches. The exhibit shows one access layer switch, Switch-2, as an example, but the campus actually has more switches. Switch-1 is a core switch that acts as the default router for end-user devices.

What is a correct way to configure the switches to protect against exploits from untrusted end-user devices?

Options:

A.  

On Switch-1, enable ARP inspection on VLAN 100 and DHCP snooping on VLANs 15 and 25.

B.  

On Switch-2, enable DHCP snooping globally and on VLANs 15 and 25. Later, enable ARP inspection on the same VLANs.

C.  

On Switch-2, enable BPDU filtering on all edge ports in order to prevent eavesdropping attacks by untrusted devices.

D.  

On Switch-1, enable DHCP snooping on VLAN 100 and ARP inspection on VLANs 15 and 25.

Discussion 0
Questions 14

How does the ArubaOS firewall determine which rules to apply to a specific client's traffic?

Options:

A.  

The firewall applies every rule that includes the dent's IP address as the source.

B.  

The firewall applies the rules in policies associated with the client's wlan

C.  

The firewall applies thee rules in policies associated with the client's user role.

D.  

The firewall applies every rule that includes the client's IP address as the source or destination.

Discussion 0
Questions 15

The monitoring admin has asked you to set up an AOS-CX switch to meet these criteria:

    Send logs to a SIEM Syslog server at 10.4.13.15 at the standard TCP port (514)

    Send a log for all events at the "warning" level or above; do not send logs with a lower level than "warning"The switch did not have any "logging" configuration on it. You then entered this command:AOS-CX(config)# logging 10.4.13.15 tcp vrf defaultWhat should you do to finish configuring to the requirements?

Options:

A.  

Specify the "warning" severity level for the logging server.

B.  

Add logging categories at the global level.

C.  

Ask for the Syslog password and configure it on the switch.

D.  

Configure logging as a debug destination.

Discussion 0
Questions 16

What is a use case for implementing RadSec instead of RADIUS?

Options:

A.  

A university wants to protect communications between the students' devices and the network access server.

B.  

A corporation wants to implement EAP-TLS to authenticate wireless users at their main office.

C.  

A school district wants to protect messages sent between RADIUS clients and servers over an untrusted network.

D.  

A organization wants to strengthen the encryption used to protect RADIUS communications without increasing complexity.

Discussion 0
Questions 17

Refer to the exhibit.

You are deploying a new ArubaOS Mobility Controller (MC), which is enforcing authentication to Aruba ClearPass Policy Manager (CPPM). The authentication is not working correctly, and you find the error shown In the exhibit in the CPPM Event Viewer.

What should you check?

Options:

A.  

that the MC has been added as a domain machine on the Active Directory domain with which CPPM is synchronized

B.  

that the snared secret configured for the CPPM authentication server matches the one defined for the device on CPPM

C.  

that the IP address that the MC is using to reach CPPM matches the one defined for the device on CPPM

D.  

that the MC has valid admin credentials configured on it for logging into the CPPM

Discussion 0
Questions 18

What is a reason to set up a packet capture on an Aruba Mobility Controller (MC)?

Options:

A.  

The company wants to use ClearPass Policy Manager (CPPM) to profile devices and needs to receive HTTP User-Agent strings from the MC.

B.  

The security team believes that a wireless endpoint connected to the MC is launching an attack and wants to examine the traffic more closely.

C.  

You want the MC to analyze wireless clients' traffic at a lower level, so that the ArubaOS firewall can control the traffic I based on application.

D.  

You want the MC to analyze wireless clients' traffic at a lower level, so that the ArubaOS firewall can control Web traffic based on the destination URL.

Discussion 0
Questions 19

You have an Aruba Mobility Controller (MC) that is locked in a closet. What is another step that Aruba recommends to protect the MC from unauthorized access?

Options:

A.  

Use local authentication rather than external authentication to authenticate admins.

B.  

Change the password recovery password.

C.  

Set the local admin password to a long random value that is unknown or locked up securely.

D.  

Disable local authentication of administrators entirely.

Discussion 0
Questions 20

An organization has HPE Aruba Networking infrastructure, including AOS-CX switches and an AOS-8 mobility infrastructure with Mobility Controllers (MCs) and APs. Clients receive certificates from ClearPass Onboard. The infrastructure devices authenticate clients to ClearPass Policy Manager (CPPM). The company wants to start profiling clients to take their device type into account in their access rights.

What is a role that CPPM should play in this plan?

Options:

A.  

Assigning clients to their device categories

B.  

Helping to forward profiling information to the component responsible for profiling

C.  

Accepting and enforcing CoA messages

D.  

Enforcing access control decisions

Discussion 0
Questions 21

Refer to the exhibit, which shows the settings on the company's MCs.

You have deployed about 100 new HPE Aruba Networking 335 APs. What is required for the APs to become managed?

Options:

A.  

Installing CA-signed certificates on the APs

B.  

Approving the APs as authorized APs on the AP whitelist

C.  

Installing self-signed certificates on the APs

D.  

Configuring a PAPI key that matches on the APs and MCs

Discussion 0
Questions 22

A company with 439 employees wants to deploy an open WLAN for guests. The company wants the experience to be as follows:

*Guests select the WLAN and connect without having to enter a password.

*Guests are redirected to a welcome web page and log in.

The company also wants to provide encryption for the network for devices that are capable. Which security options should you implement for the WLAN?

Options:

A.  

Opportunistic Wireless Encryption (OWE) and WPA3-Personal

B.  

WPA3-Personal and MAC-Auth

C.  

Captive portal and Opportunistic Wireless Encryption (OWE) in transition mode

D.  

Captive portal and WPA3-Personal

Discussion 0
Questions 23

A customer has an AOS-10 network infrastructure. The customer is looking for a solution that can classify many different types of devices, including IoT devices. Which solution should you explain can provide these capabilities?

Options:

A.  

HPE Aruba Networking EdgeConnect SD-WAN

B.  

HPE Aruba Networking ClearPass OnGuard

C.  

HPE Aruba Networking Central

D.  

HPE Aruba Networking ClearPass Onboard

Discussion 0
Questions 24

You are troubleshooting an authentication issue for HPE Aruba Networking switches that enforce 802.1X to a cluster of HPE Aruba Networking ClearPass Policy Manager (CPPMs). You know that CPPM is receiving and processing the authentication requests because the Aruba switches are showing Access-Rejects in their statistics. However, you cannot find the record for the Access-Rejects in CPPM Access Tracker.

What is something you can do to look for the records?

Options:

A.  

Go to the CPPM Event Viewer, because this is where RADIUS Access Rejects are stored.

B.  

Verify that you are logged in to the CPPM UI with read-write, not read-only, access.

C.  

Make sure that CPPM cluster settings are configured to show Access-Rejects.

D.  

Click Edit in Access Viewer and make sure that the correct servers are selected.

Discussion 0
Questions 25

What is an example or phishing?

Options:

A.  

An attacker sends TCP messages to many different ports to discover which ports are open.

B.  

An attacker checks a user’s password by using trying millions of potential passwords.

C.  

An attacker lures clients to connect to a software-based AP that is using a legitimate SSID.

D.  

An attacker sends emails posing as a service team member to get users to disclose their passwords.

Discussion 0
Questions 26

Your Aruba Mobility Master-based solution has detected a rogue AP Among other information the ArubaOS Detected Radios page lists this Information for the AP

SSID = PubllcWiFI

BSSID = a8M27 12 34:56

Match method = Exact match

Match type = Eth-GW-wired-Mac-Table

The security team asks you to explain why this AP is classified as a rogue. What should you explain?

Options:

A.  

The AP Is connected to your LAN because It is transmitting wireless traffic with your network's default gateway's MAC address as a source MAC Because it does not belong to the company, it is a rogue

B.  

The ap has a BSSID mat matches authorized client MAC addresses. This indicates that the AP is spoofing the MAC address to gam unauthorized access to your company's wireless services, so It is a rogue

C.  

The AP has been detected as launching a DoS attack against your company's default gateway. This qualities it as a rogue which needs to be contained with wireless association frames immediately

D.  

The AP is spoofing a routers MAC address as its BSSI

D.  

This indicates mat, even though WIP cannot determine whether the AP is connected to your LAN. it is a rogue.

Discussion 0
Questions 27

A company has Aruba Mobility Controllers (MCs), Aruba campus APs, and ArubaOS-Switches. The company plans to use ClearPass Policy Manager (CPPM) to classify endpoints by type. This company is using only CPPM and no other ClearPass solutions.

The ClearPass admins tell you that they want to use HTTP User-Agent strings to help classify endpoints.

What should you do as a part of configuring the ArubaOS-Switches to support this requirement?

Options:

A.  

Create a device fingerprinting policy that includes HTTP, and apply the policy to edge ports.

B.  

Create remote mirrors that collect traffic on edge ports, and mirror it to CPPM's IP address.

C.  

Configure CPPM as the sFlow collector, and make sure that sFlow is enabled on edge ports.

D.  

Connect the switches to CPPM's span ports, and set up mirroring of HTTP traffic on the switches.

Discussion 0
Questions 28

You have been instructed to look in the ArubaOS Security Dashboard's client list. Your goal is to find clients that belong to the company and have connected to devices that might belong to hackers.

Which client fits this description?

Options:

A.  

MAC address: d8:50:e6:f3:70:ab; Client Classification: Interfering; AP Classification: Rogue

B.  

MAC address: d8:50:e6:f3:6e:c5; Client Classification: Interfering; AP Classification: Neighbor

C.  

MAC address: d8:50:e6:f3:6e:60; Client Classification: Interfering; AP Classification: Authorized

D.  

MAC address: d8:50:e6:f3:6d:a4; Client Classification: Authorized; AP Classification: Rogue

Discussion 0
Questions 29

A company has an ArubaOS solution. The company wants to prevent users assigned to the "user_group1" role from using gaming and peer-to-peer applications.

What is the recommended approach for these requirements?

Options:

A.  

Make sure DPI is enabled, and add application rules that deny gaming and peer-to-peer applications to the "user_groupr role.

B.  

Create ALGs for the gaming and peer-to-peer applications, and deny the "user_group1" role on the ALGs.

C.  

Add access control rules to the "user_group1" role, which deny HTTP/HTTPS traffic to IP addresses associated with gaming and peer-to-peer applications.

D.  

Create service aliases for the TCP ports associated with gaming and peer-to-per applications, and use those aliases in access control rules for the "user_group" rules.

Discussion 0
Questions 30

A user is having trouble connecting to an AP managed by a standalone Mobility Controller (MC). What can you do to get detailed logs and debugs for that user's client?

Options:

A.  

In the MC CLI, set up a control plane packet capture and filter for the client's IP address.

B.  

In the MC CLI, set up a data plane packet capture and filter for the client's MAC address.

C.  

In the MC UI’s Traffic Analytics dashboard, look for the client's IP address.

D.  

In the MC UI’s Diagnostics > Logs pages, add a "user-debug" log setting for the client's MAC address.

Discussion 0
Questions 31

Refer to the exhibit.

This company has ArubaOS-Switches. The exhibit shows one access layer switch, Swllcn-2. as an example, but the campus actually has more switches. The company wants to slop any internal users from exploiting ARP

What Is the proper way to configure the switches to meet these requirements?

Options:

A.  

On Switch-1, enable ARP protection globally, and enable ARP protection on ail VLANs.

B.  

On Switch-2, make ports connected to employee devices trusted ports for ARP protection

C.  

On Swltch-2, enable DHCP snooping globally and on VLAN 201 before enabling ARP protection

D.  

On Swltch-2, configure static PP-to-MAC bindings for all end-user devices on the network

Discussion 0
Questions 32

What is one practice that can help you to maintain a digital chain of custody in your network?

Options:

A.  

Enable packet capturing on Instant AP or Mobility Controller (MC) datapath on an ongoing basis.

B.  

Ensure that all network infrastructure devices use RADIUS rather than TACACS+ to authenticate managers.

C.  

Ensure that all network infrastructure devices receive a valid clock using authenticated NTP.

D.  

Enable packet capturing on Instant AP or Mobility Controller (MC) controlpath on an ongoing basis.

Discussion 0
Questions 33

What is a guideline for creating certificate signing requests (CSRs) and deploying server Certificates on ArubaOS Mobility Controllers (MCs)?

Options:

A.  

Create the CSR online using the MC Web Ul if your company requires you to archive the private key.

B.  

if you create the CSR and public/private Keypair offline, create a matching private key online on the MC.

C.  

Create the CSR and public/private keypair offline If you want to install the same certificate on multiple MCs.

D.  

Generate the private key online, but the public key and CSR offline, to install the same certificate on multiple MCs.

Discussion 0
Questions 34

Refer to the exhibit.

You need to ensure that only management stations in subnet 192.168.1.0/24 can access the ArubaOS-Switches' CLI. Web Ul. and REST interfaces The company also wants to let managers use these stations to access other parts of the network What should you do?

Options:

A.  

Establish a Control Plane Policing class that selects traffic from 192.168 1.0/24.

B.  

Specify 192.168.1.0.255.255.255.0 as authorized IP manager address

C.  

Configure the switch to listen for these protocols on OOBM only.

D.  

Specify vlan 100 as the management vlan for the switches.

Discussion 0
Questions 35

What is one way that Control Plane Security (CPSec) enhances security for the network?

Options:

A.  

It protects management traffic between APs and Mobility Controllers (MCs) from eavesdropping.

B.  

It prevents Denial of Service (DoS) attacks against Mobility Controllers' (MCs') control plane.

C.  

It protects wireless clients' traffic, tunneled between APs and Mobility Controllers, from eavesdropping.

D.  

It prevents access from unauthorized IP addresses to critical services, such as SSH, on Mobility Controllers (MCs).

Discussion 0
Questions 36

Which is a correct description of a stage in the Lockheed Martin kill chain?

Options:

A.  

In the weaponization stage, which occurs after malware has been delivered to a system, the malware executes its function.

B.  

In the exploitation and installation phases, malware creates a backdoor into the infected system for the hacker.

C.  

In the reconnaissance stage, the hacker assesses the impact of the attack and how much information was exfiltrated.

D.  

In the delivery stage, malware collects valuable data and delivers or exfiltrates it to the hacker.

Discussion 0
Questions 37

A company with 382 employees wants to deploy an open WLAN for guests. The company wants the experience to be as follows:

The company also wants to provide encryption for the network for devices mat are capable, you implement Tor the WLAN?

Which security options should

Options:

A.  

WPA3-Personal and MAC-Auth

B.  

Captive portal and WPA3-Personai

C.  

Captive portal and Opportunistic Wireless Encryption (OWE) in transition mode

D.  

Opportunistic Wireless Encryption (OWE) and WPA3-Personal

Discussion 0
Questions 38

Refer to the exhibit.

How can you use the thumbprint?

Options:

A.  

Install this thumbprint on management stations to use as two-factor authentication along with manager usernames and passwords, this will ensure managers connect from valid stations

B.  

Copy the thumbprint to other Aruba switches to establish a consistent SSH Key for all switches this will enable managers to connect to the switches securely with less effort

C.  

When you first connect to the switch with SSH from a management station, make sure that the thumbprint matches to ensure that a man-in-t he-mid die (MITM) attack is not occurring

D.  

install this thumbprint on management stations the stations can then authenticate with the thumbprint instead of admins having to enter usernames and passwords.

Discussion 0
Questions 39

What is a Key feature of me ArubaOS firewall?

Options:

A.  

The firewall is stateful which means that n can track client sessions and automatically allow return traffic for permitted sessions

B.  

The firewall Includes application layer gateways (ALGs). which it uses to filter Web traffic based on the reputation of the destination web site.

C.  

The firewall examines all traffic at Layer 2 through Layer 4 and uses source IP addresses as the primary way to determine how to control traffic.

D.  

The firewall is designed to fitter traffic primarily based on wireless 802.11 headers, making it ideal for mobility environments

Discussion 0
Questions 40

A company has HPE Aruba Networking Mobility Controllers (MCs), campus APs, and AOS-CX switches. The company plans to use HPE Aruba Networking ClearPass Policy Manager (CPPM) to classify endpoints by type. This company is using only CPPM and no other HPE Aruba Networking ClearPass solutions.

The HPE Aruba Networking ClearPass admins tell you that they want to use HTTP User-Agent strings to help profile the endpoints.

What should you do as a part of setting up Mobility Controllers (MCs) to support this requirement?

Options:

A.  

Create datapath mirrors that use the CPPM's IP address as the destination.

B.  

Create an IF-MAP profile, which specifies credentials for an API admin account on CPPM.

C.  

Create control path mirrors to mirror HTTP traffic from clients to CPPM.

D.  

Create a firewall whitelist rule that permits HTTP and CPPM's IP address.

Discussion 0
Questions 41

You are checking the Security Dashboard in the Web Ul for your ArubaOS solution and see that Wireless Intrusion Prevention (WIP) has discovered a rogue radio operating in ad hoc mode with open security. What correctly describes a threat that the radio could pose?

Options:

A.  

It could open a backdoor into the corporate LAN for unauthorized users.

B.  

It is running in a non-standard 802.11 mode and could effectively jam the wireless signal.

C.  

It is flooding the air with many wireless frames in a likely attempt at a DoS attack.

D.  

It could be attempting to conceal itself from detection by changing its BSSID and SSID frequently.

Discussion 0
Questions 42

What is one difference between EAP-Tunneled Layer security (EAP-TLS) and Protected EAP (PEAP)?

Options:

A.  

EAP-TLS creates a TLS tunnel for transmitting user credentials, while PEAP authenticates the server and supplicant during a TLS handshake.

B.  

EAP-TLS requires the supplicant to authenticate with a certificate, hut PEAP allows the supplicant to use a username and password.

C.  

EAP-TLS begins with the establishment of a TLS tunnel, but PEAP does not use a TLS tunnel as part of Its process

D.  

EAP-TLS creates a TLS tunnel for transmitting user credentials securely while PEAP protects user credentials with TKIP encryption.

Discussion 0
Questions 43

What is one way that WPA3-PerSonal enhances security when compared to WPA2-Personal?

Options:

A.  

WPA3-Perscn3i is more secure against password leaking Because all users nave their own username and password

B.  

WPA3-Personai prevents eavesdropping on other users' wireless traffic by a user who knows the passphrase for the WLAN.

C.  

WPA3-Personai is more resistant to passphrase cracking Because it requires passphrases to be at least 12 characters

D.  

WPA3-Personal is more complicated to deploy because it requires a backend authentication server

Discussion 0
Questions 44

Which is a correct description of a stage in the Lockheed Martin kill chain?

Options:

A.  

In the delivery stage, malware collects valuable data and delivers or exfilltrated it to the hacker.

B.  

In the reconnaissance stage, the hacker assesses the impact of the attack and how much information was exfilltrated.

C.  

In the weaponization stage, which occurs after malware has been delivered to a system, the malware executes Its function.

D.  

In the exploitation and installation phases, malware creates a backdoor into the infected system for the hacker.

Discussion 0
Questions 45

What is a consideration for implementing wireless containment in response to unauthorized devices discovered by ArubaOS Wireless Intrusion Detection (WIP)?

Options:

A.  

It is best practice to implement automatic containment of unauthorized devices to eliminate the need to locate and remove them.

B.  

Wireless containment only works against unauthorized wireless devices that connect to your corporate LAN, so it does not offer protection against Interfering APs.

C.  

Your company should consider legal implications before you enable automatic containment or implement manual containment.

D.  

Because wireless containment has a lower risk of targeting legitimate neighbors than wired containment, it is recommended in most use cases.

Discussion 0
Questions 46

You are deploying a new wireless solution with an Aruba Mobility Master (MM). Aruba Mobility Controllers (MCs), and campus APs (CAPs). The solution will include a WLAN that uses Tunnel for the forwarding mode and WPA3-Enterprise for the security option.

You have decided to assign the WLAN to VLAN 301, a new VLAN. A pair of core routing switches will act as the default router for wireless user traffic.

Which links need to carry VLAN 301?

Options:

A.  

only links in the campus LAN to ensure seamless roaming

B.  

only links between MC ports and the core routing switches

C.  

only links on the path between APs and the core routing switches

D.  

only links on the path between APs and the MC

Discussion 0
Questions 47

Refer to the exhibit, which shows the settings on the company’s MCs.

— Mobility Controller

Dashboard General Admin AirWave CPSec Certificates

Configuration

WLANsv Control Plane Security

Roles & PoliciesEnable CP Sec

Access PointsEnable auto cert provisioning:

You have deployed about 100 new Aruba 335-APs. What is required for the APs to become managed?

Options:

A.  

installing CA-signed certificates on the APs

B.  

installing self-signed certificates on the APs

C.  

approving the APs as authorized APs on the AP whitelist

D.  

configuring a PAPI key that matches on the APs and MCs

Discussion 0
Questions 48

You are checking the Security Dashboard in the Web UI for your AOS solution and see that Wireless Intrusion Prevention (WIP) has discovered a rogue radio operating in ad hoc mode with open security. What correctly describes a threat that the radio could pose?

Options:

A.  

It could be attempting to conceal itself from detection by changing its BSSID and SSID frequently.

B.  

It could open a backdoor into the corporate LAN for unauthorized users.

C.  

It is running in a non-standard 802.11 mode and could effectively jam the wireless signal.

D.  

It is flooding the air with many wireless frames in a likely attempt at a DoS attack.

Discussion 0
Questions 49

Device A is contacting https://arubapedia.arubanetworks.com. The web server sends a certificate chain. What does the browser do as part of validating the web server certificate?

Options:

A.  

It makes sure that the key in the certificate matches the key that DeviceA uses for HTTPS.

B.  

It makes sure the certificate has a DNS SAN that matches arubapedia.arubanetworks.com

C.  

It makes sure that the public key in the certificate matches DeviceA's private HTTPS key.

D.  

It makes sure that the public key in the certificate matches a private key stored on DeviceA.

Discussion 0
Questions 50

You configure an ArubaOS-Switch to enforce 802.1X authentication with ClearPass Policy Manager (CPPM) denned as the RADIUS server Clients cannot authenticate You check Aruba ClearPass Access Tracker and cannot find a record of the authentication attempt.

What are two possible problems that have this symptom? (Select two)

Options:

A.  

users are logging in with the wrong usernames and passwords or invalid certificates.

B.  

Clients are configured to use a mismatched EAP method from the one In the CPPM service.

C.  

The RADIUS shared secret does not match between the switch and CPPM.

D.  

CPPM does not have a network device defined for the switch's IP address.

E.  

Clients are not configured to trust the root CA certificate for CPPM's RADIUS/EAP certificate.

Discussion 0