Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the HP Aruba-ACNSA HPE6-A78 Questions and answers with ValidTests

Exam HPE6-A78 All Questions
Exam HPE6-A78 Premium Access

View all detail and faqs for the HPE6-A78 exam

Viewing page 2 out of 6 pages
Viewing questions 11-20 out of questions
Questions # 11:

Refer to the exhibit, which shows the current network topology.

Question # 11

You are deploying a new wireless solution with an Aruba Mobility Master (MM). Aruba Mobility Controllers (MCs). and campus APs (CAPs). The solution will Include a WLAN that uses Tunnel for the forwarding mode and Implements WPA3-Enterprise security

What is a guideline for setting up the vlan for wireless devices connected to the WLAN?

Options:

A.

Assign the WLAN to a single new VLAN which is dedicated to wireless users

B.

Use wireless user roles to assign the devices to different VLANs in the 100-150 range

C.

Assign the WLAN to a named VLAN which specified 100-150 as the range of IDs.

D.

Use wireless user roles to assign the devices to a range of new vlan IDs.

Expert Solution
Questions # 12:

What is one way that WPA3-PerSonal enhances security when compared to WPA2-Personal?

Options:

A.

WPA3-Perscn3i is more secure against password leaking Because all users nave their own username and password

B.

WPA3-Personai prevents eavesdropping on other users' wireless traffic by a user who knows the passphrase for the WLAN.

C.

WPA3-Personai is more resistant to passphrase cracking Because it requires passphrases to be at least 12 characters

D.

WPA3-Personal is more complicated to deploy because it requires a backend authentication server

Expert Solution
Questions # 13:

You have an Aruba solution with multiple Mobility Controllers (MCs) and campus APs. You want to deploy a WPA3-Enterprise WLAN and authenticate users to Aruba ClearPass Policy Manager (CPPM) with EAP-TLS.

What is a guideline for ensuring a successful deployment?

Options:

A.

Avoid enabling CNSA mode on the WLAN, which requires the internal MC RADIUS server.

B.

Ensure that clients trust the root CA for the MCs’ Server Certificates.

C.

Educate users in selecting strong passwords with at least 8 characters.

D.

Deploy certificates to clients, signed by a CA that CPPM trusts.

Expert Solution
Questions # 14:

What is one of the policies that a company should define for digital forensics?

Options:

A.

which data should be routinely logged, where logs should be forwarded, and which logs should be archived

B.

what are the first steps that a company can take to implement micro-segmentation in their environment

C.

to which resources should various users be allowed access, based on their identity and the identity of their clients

D.

which type of EAP method is most secure for authenticating wired and wireless users with 802.1

Expert Solution
Questions # 15:

What is a correct guideline for the management protocols that you should use on AOS-CX switches?

Options:

A.

Make sure that SSH is disabled and use HTTPS instead.

B.

Make sure that Telnet is disabled and use SSH instead.

C.

Make sure that Telnet is disabled and use TFTP instead.

D.

Make sure that HTTPS is disabled and use SSH instead.

Expert Solution
Questions # 16:

You are troubleshooting an authentication issue for HPE Aruba Networking switches that enforce 802.1X to a cluster of HPE Aruba Networking ClearPass Policy Manager (CPPMs). You know that CPPM is receiving and processing the authentication requests because the Aruba switches are showing Access-Rejects in their statistics. However, you cannot find the record for the Access-Rejects in CPPM Access Tracker.

What is something you can do to look for the records?

Options:

A.

Go to the CPPM Event Viewer, because this is where RADIUS Access Rejects are stored.

B.

Verify that you are logged in to the CPPM UI with read-write, not read-only, access.

C.

Make sure that CPPM cluster settings are configured to show Access-Rejects.

D.

Click Edit in Access Viewer and make sure that the correct servers are selected.

Expert Solution
Questions # 17:

What distinguishes a Distributed Denial of Service (DDoS) attack from a traditional Denial of Service (DoS) attack?

Options:

A.

A DDoS attack originates from external devices, while a DoS attack originates from internal devices.

B.

A DoS attack targets one server; a DDoS attack targets all the clients that use a server.

C.

A DDoS attack targets multiple devices, while a DoS is designed to incapacitate only one device.

D.

A DDoS attack is launched from multiple devices, while a DoS attack is launched from a single device.

Expert Solution
Questions # 18:

You have been asked to rind logs related to port authentication on an ArubaOS-CX switch for events logged in the past several hours But. you are having trouble searching through the logs What is one approach that you can take to find the relevant logs?

Options:

A.

Add the "-C and *-c port-access" options to the "show logging" command.

B.

Configure a logging Tiller for the "port-access" category, and apply that filter globally.

C.

Enable debugging for "portaccess" to move the relevant logs to a buffer.

D.

Specify a logging facility that selects for "port-access" messages.

Expert Solution
Questions # 19:

You have been asked to send RADIUS debug messages from an ArubaOS-CX switch to a central SIEM server at 10.5.15.6. The server is already defined on the switch with this command: logging 10.5.6.12

You enter this command: debug radius all

What is the correct debug destination?

Options:

A.

console

B.

file

C.

syslog

D.

buffer

Expert Solution
Questions # 20:

An MC has a WLAN that enforces WPA3-Enterprise with authentication to HPE Aruba Networking ClearPass Policy Manager (CPPM). The WLAN's default role is set to guest. A Mobility Controller (MC) has these roles configured on it:

    authenticated

    denyall

    guest

    general-access

    guest-logon

    logon

    stateful-dot1x

    switch-logon

    voiceA client authenticates. CPPM returns an Access-Accept with an Aruba-User-Role VSA set to general_access. What role does the client receive?

Options:

A.

guest

B.

logon

C.

general-access

D.

authenticated

Expert Solution
Viewing page 2 out of 6 pages
Viewing questions 11-20 out of questions