Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the HP Aruba-ACNSA HPE6-A78 Questions and answers with ValidTests

Exam HPE6-A78 All Questions
Exam HPE6-A78 Premium Access

View all detail and faqs for the HPE6-A78 exam

Viewing page 6 out of 6 pages
Viewing questions 51-60 out of questions
Questions # 51:

A company has HPE Aruba Networking Mobility Controllers (MCs), campus APs, and AOS-CX switches. The company plans to use HPE Aruba Networking ClearPass Policy Manager (CPPM) to classify endpoints by type. This company is using only CPPM and no other HPE Aruba Networking ClearPass solutions.

The HPE Aruba Networking ClearPass admins tell you that they want to use HTTP User-Agent strings to help profile the endpoints.

What should you do as a part of setting up Mobility Controllers (MCs) to support this requirement?

Options:

A.

Create datapath mirrors that use the CPPM's IP address as the destination.

B.

Create an IF-MAP profile, which specifies credentials for an API admin account on CPPM.

C.

Create control path mirrors to mirror HTTP traffic from clients to CPPM.

D.

Create a firewall whitelist rule that permits HTTP and CPPM's IP address.

Expert Solution
Questions # 52:

You need to implement a WPA3-Enterprise network that can also support WPA2-Enterprise clients. What is a valid configuration for the WPA3-Enterprise WLAN?

Options:

A.

CNSA mode disabled with 256-bit keys

B.

CNSA mode disabled with 128-bit keys

C.

CNSA mode enabled with 256-bit keys

D.

CNSA mode enabled with 128-bit keys

Expert Solution
Questions # 53:

What is the purpose of an Enrollment over Secure Transport (EST) server?

Options:

A.

It acts as an intermediate Certification Authority (CA) that signs end-entity certificates.

B.

It helps admins to avoid expired certificates with less management effort.

C.

It provides a secure central repository for private keys associated with devices' digital certif-icates.

D.

It provides a more secure alternative to private CAs at less cost than a public CA.

Expert Solution
Questions # 54:

What is a vulnerability of an unauthenticated Dime-Heliman exchange?

Options:

A.

A hacker can replace the public values exchanged by the legitimate peers and launch an MITM attack.

B.

A brute force attack can relatively quickly derive Diffie-Hellman private values if they are able to obtain public values

C.

Diffie-Hellman with elliptic curve values is no longer considered secure in modem networks, based on NIST recommendations.

D.

Participants must agree on a passphrase in advance, which can limit the usefulness of Diffie- Hell man in practical contexts.

Expert Solution
Questions # 55:

Your Aruba Mobility Master-based solution has detected a suspected rogue AP. Among other information, the ArubaOS Detected Radios page lists this information for the AP:

SSID = PublicWiFi

BSSID = a8:bd:27:12:34:56

Match method = Plus one

Match method = Eth-Wired-Mac-Table

The security team asks you to explain why this AP is classified as a rogue. What should you explain?

Options:

A.

The AP has a BSSID that is close to your authorized APs' BSSIDs. This indicates that the AP might be spoofing the corporate SSID and attempting to lure clients to it, making the AP a suspected rogue.

B.

The AP is probably connected to your LAN because it has a BSSID that is close to a MAC address that has been detected in your LAN. Because it does not belong to the company, it is a suspected rogue.

C.

The AP has been detected using multiple MAC addresses. This indicates that the AP is spoofing its MAC address, which qualifies it as a suspected rogue.

D.

The AP is an AP that belongs to your solution. However, the ArubaOS has detected that it is behaving suspiciously. It might have been compromised, so it is classified as a suspected rogue.

Expert Solution
Questions # 56:

What is a guideline for managing local certificates on AOS-CX switches?

Options:

A.

Understand that the switch must use the same certificate for all usages, such as its HTTPS server and RadSec client.

B.

Create a self-signed certificate online on the switch because AOS-CX switches do not support CA-signed certificates.

C.

Before installing the local certificate, create a trust anchor (TA) profile with the root CA certificate for the certificate that you will install.

D.

Install an Online Certificate Status Protocol (OCSP) certificate to simplify the process of enrolling and re-enrolling for certificates.

Expert Solution
Questions # 57:

Refer to the exhibit, which shows the settings on the company’s MCs.

— Mobility Controller

Dashboard General Admin AirWave CPSec Certificates

Configuration

WLANsv Control Plane Security

Roles & PoliciesEnable CP Sec

Access PointsEnable auto cert provisioning:

You have deployed about 100 new Aruba 335-APs. What is required for the APs to become managed?

Options:

A.

installing CA-signed certificates on the APs

B.

installing self-signed certificates on the APs

C.

approving the APs as authorized APs on the AP whitelist

D.

configuring a PAPI key that matches on the APs and MCs

Expert Solution
Questions # 58:

You are troubleshooting an authentication issue for Aruba switches that enforce 802 IX10 a cluster of Aruba ClearPass Policy Manager (CPPMs) You know that CPPM Is receiving and processing the authentication requests because the Aruba switches are showing Access-Rejects in their statistics However, you cannot find the record tor the Access-Rejects in CPPM Access Tracker

What is something you can do to look for the records?

Options:

A.

Make sure that CPPM cluster settings are configured to show Access-Rejects

B.

Verify that you are logged in to the CPPM Ul with read-write, not read-only, access

C.

Click Edit in Access viewer and make sure that the correct servers are selected.

D.

Go to the CPPM Event Viewer, because this is where RADIUS Access Rejects are stored.

Expert Solution
Questions # 59:

What is a difference between radius and TACACS+?

Options:

A.

RADIUS combines the authentication and authorization process while TACACS+ separates them.

B.

RADIUS uses TCP for Its connection protocol, while TACACS+ uses UDP tor its connection protocol.

C.

RADIUS encrypts the complete packet, white TACACS+ only offers partial encryption.

D.

RADIUS uses Attribute Value Pairs (AVPs) in its messages, while TACACS+ does not use them.

Expert Solution
Questions # 60:

What is one difference between EAP-Tunneled Layer Security (EAP-TLS) and Protected EAP (PEAP)?

Options:

A.

EAP-TLS begins with the establishment of a TLS tunnel, but PEAP does not use a TLS tunnel as part of its process.

B.

EAP-TLS requires the supplicant to authenticate with a certificate, but PEAP allows the supplicant to use a username and password.

C.

EAP-TLS creates a TLS tunnel for transmitting user credentials, while PEAP authenticates the server and supplicant during a TLS handshake.

D.

EAP-TLS creates a TLS tunnel for transmitting user credentials securely, while PEAP protects user credentials with TKIP encryption.

Expert Solution
Viewing page 6 out of 6 pages
Viewing questions 51-60 out of questions