HPE6-A78 Dumps HPE6-A78 Braindumps HPE6-A78 Real Questions HPE6-A78 Practice Test HPE6-A78 Actual Questions HP HPE6-A78 Aruba Certified Network Security Associate (HCNSA) https://killexams.com/pass4sure/exam-detail/HPE6-A78 Question: 148 What role does the Aruba ClearPass Device Insight Analyzer play in the Device Insight architecture? A. It resides in the cloud and manages licensing and configuration for Collectors B. It resides on-prem and provides the span port to which traffic is mirrored for deep analytics. C. It resides on-prem and is responsible for running active SNMP and Nmap scans D. It resides In the cloud and applies machine learning and supervised crowdsourcing to metadata sent by Collectors Answer: D Question: 149 Which correctly describes a way to deploy certificates to end-user devices? A. ClearPass Onboard can help to deploy certificates to end-user devices, whether or not they are members of a Windows domain B. ClearPass Device Insight can automatically discover end-user devices and deploy the proper certificates to them C. ClearPass OnGuard can help to deploy certificates to end-user devices, whether or not they are members of a Windows domain D. in a Windows domain, domain group policy objects (GPOs) can automatically install computer, but not user certificates Answer: A Question: 150 How should admins deal with vulnerabilities that they find in their systems? A. They should apply fixes, such as patches, to close the vulnerability before a hacker exploits it. B. They should add the vulnerability to their Common Vulnerabilities and Exposures (CVE). C. They should classify the vulnerability as malware. a DoS attack or a phishing attack. D. They should notify the security team as soon as possible that the network has already been breached. Answer: A Question: 151 Refer to the exhibit. You need to ensure that only management stations in subnet 192.168.1.0/24 can access the ArubaOS-Switches' CLI. Web Ul. and REST interfaces. The company also wants to let managers use these stations to access other parts of the network. What should you do? A. Establish a Control Plane Policing class that selects traffic from 192.168 1.0/24. B. Specify 192.168.1.0.255.255.255.0 as authorized IP manager address C. Configure the switch to listen for these protocols on OOBM only. D. Specify vlan 100 as the management vlan for the switches. Answer: A Question: 152 CORRECT TEXT What is a use case for tunneling traffic between an Aruba switch and an AruDa Mobility Controller (MC)? A. applying firewall policies and deep packet inspection to wired clients B. enhancing the security of communications from the access layer to the core with data encryption C. securing the network infrastructure control plane by creating a virtual out-of-band-management network D. simplifying network infrastructure management by using the MC to push configurations to the switches Answer: A Question: 153 Your Aruba Mobility Master-based solution has detected a rogue AP Among other information the ArubaOS Detected Radios page lists this Information for the AP SSID = PubllcWiFI BSSID = a8M27 12 34:56 Match method = Exact match Match type = Eth-GW-wired-Mac-Table The security team asks you to explain why this AP is classified as a rogue . What should you explain? A. The AP Is connected to your LAN because It is transmitting wireless traffic with your network's default gateway's MAC address as a source MAC Because it does not belong to the company, it is a rogue B. The ap has a BSSID mat matches authorized client MAC addresses. This indicates that the AP is spoofing the MAC address to gam unauthorized access to your company's wireless services, so It is a rogue C. The AP has been detected as launching a DoS attack against your company's default gateway. This qualities it as a rogue which needs to be contained with wireless association frames immediately D. The AP is spoofing a routers MAC address as its BSSI E. This indicates mat, even though WIP cannot determine whether the AP is connected to your LA F. it is a rogue. Answer: D Question: 154 What is a Key feature of me ArubaOS firewall? A. The firewall is stateful which means that n can track client sessions and automatically allow return traffic for permitted sessions B. The firewall Includes application layer gateways (ALGs). which it uses to filter Web traffic based on the reputation of the destination web site. C. The firewall examines all traffic at Layer 2 through Layer 4 and uses source IP addresses as the primary way to determine how to control traffic. D. The firewall is designed to fitter traffic primarily based on wireless 802.11 headers, making it ideal for mobility environments Answer: B Question: 155 What is a benefit or using network aliases in ArubaOS firewall policies? A. You can associate a reputation score with the network alias to create rules that filler traffic based on reputation rather than I B. You can use the aliases to translate client IP addresses to other IP addresses on the other side of the firewall C. You can adjust the IP addresses in the aliases, and the rules using those aliases automatically update D. You can use the aliases to conceal the true IP addresses of servers from potentially untrusted clients. Answer: A Question: 156 What is a guideline for creating certificate signing requests (CSRs) and deploying server Certificates on ArubaOS Mobility Controllers (MCs)? A. Create the CSR online using the MC Web Ul if your company requires you to archive the private key. B. if you create the CSR and public/private Keypair offline, create a matching private key online on the M C. Create the CSR and public/private keypair offline If you want to install the same certificate on multiple MCs. D. Generate the private key online, but the public key and CSR offline, to install the same certificate on multiple MCs. Answer: A Question: 157 You have an Aruba Mobility Controller (MC). for which you are already using Aruba ClearPass Policy Manager (CPPM) to authenticate access to the Web Ul with usernames and passwords You now want to enable managers to use certificates to log in to the Web Ul CPPM will continue to act as the external server to check the names in managers' certificates and tell the MC the managers' correct rote in addition to enabling certificate authentication. What is a step that you should complete on the MC? A. Verify that the MC has the correct certificates, and add RadSec to the RADIUS server configuration for CPPM B. install all of the managers' certificates on the MC as OCSP Responder certificates C. Verify that the MC trusts CPPM's HTTPS certificate by uploading a trusted CA certificate Also, configure a CPPM username and password on the MC D. Create a local admin account mat uses certificates in the account, specify the correct trusted CA certificate and external authentication Answer: A Question: 158 What is a guideline for managing local certificates on an ArubaOS-Switch? A. Before installing the local certificate, create a trust anchor (TA) profile with the root CA certificate for the certificate that you will install B. Install an Online Certificate Status Protocol (OCSP) certificate to simplify the process of enrolling and re-enrolling for certificate C. Generate the certificate signing request (CSR) with a program offline, then, install both the certificate and the private key on the switch in a single file. D. Create a self-signed certificate online on the switch because ArubaOS-Switches do not support CA-signed certificates. Answer: C Question: 159 You have deployed a new Aruba Mobility Controller (MC) and campus APs (CAPs). One of the WLANs enforces 802.IX authentication lo Aruba ClearPass Policy Manager {CPPM) When you test connecting the client to the WLAN. the test falls You check Aruba ClearPass Access Tracker and cannot find a record of the authentication attempt You ping from the MC to CPPM. and the ping is successful. What is a good next step for troubleshooting? A. Renew CPPM's RADIUS/EAP certificate B. Reset the user credentials C. Check CPPM Event viewer. D. Check connectivity between CPPM and a backend directory server Answer: C Question: 160 What is a benefit of Opportunistic Wireless Encryption (OWE)? A. It allows both WPA2-capabie and WPA3-capable clients to authenticate to the same WPA-Personal WLAN B. It offers more control over who can connect to the wireless network when compared with WPA2-Personal C. It allows anyone lo connect, but provides better protection against eavesdropping than a traditional open network D. It provides protection for wireless clients against both honeypot APs and man-in-the-middle (MUM) attacks Answer: C Question: 161 Refer to the exhibit. How can you use the thumbprint? A. Install this thumbprint on management stations to use as two-factor authentication along with manager usernames and passwords, this will ensure managers connect from valid stations B. Copy the thumbprint to other Aruba switches to establish a consistent SSH Key for all switches this will enable managers to connect to the switches securely with less effort C. When you first connect to the switch with SSH from a management station, make sure that the thumbprint matches to ensure that a man-in-t he-mid die (MITM) attack is not occurring D. install this thumbprint on management stations the stations can then authenticate with the thumbprint instead of admins having to enter usernames and passwords. Answer: C Question: 162 You need to deploy an Aruba instant AP where users can physically reach It . What are two recommended options for enhancing security for management access to the AP? (Select two) A. Disable Its console ports B. Place a Tamper Evident Label (TELS) over its console port C. Disable the Web Ul. D. Configure WPA3-Enterpnse security on the AP E. install a CA-signed certificate Answer: A,B,E Question: 163 Refer to the exhibit. You are deploying a new ArubaOS Mobility Controller (MC), which is enforcing authentication to Aruba ClearPass Policy Manager (CPPM). The authentication is not working correctly, and you find the error shown In the exhibit in the CPPM Event Viewer. What should you check? A. that the MC has been added as a domain machine on the Active Directory domain with which CPPM is synchronized B. that the snared secret configured for the CPPM authentication server matches the one defined for the device on CPPM C. that the IP address that the MC is using to reach CPPM matches the one defined for the device on CPPM D. that the MC has valid admin credentials configured on it for logging into the CPPM Answer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