Weekend Sale Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Download Full Version HPE6-A78 HP Exam

Page: 2 / 8
Total 106 questions

Aruba Certified Network Security Associate Exam Questions and Answers

Question 5

What is one difference between EAP-Tunneled Layer security (EAP-TLS) and Protected EAP (PEAP)?

Options:

A.

EAP-TLS creates a TLS tunnel for transmitting user credentials, while PEAP authenticates the server and supplicant during a TLS handshake.

B.

EAP-TLS requires the supplicant to authenticate with a certificate, hut PEAP allows the supplicant to use a username and password.

C.

EAP-TLS begins with the establishment of a TLS tunnel, but PEAP does not use a TLS tunnel as part of Its process

D.

EAP-TLS creates a TLS tunnel for transmitting user credentials securely while PEAP protects user credentials with TKIP encryption.

Question 6

Your ArubaoS solution has detected a rogue AP with Wireless intrusion Prevention (WIP). Which information about the detected radio can best help you to locate the rogue device?

Options:

A.

the match method

B.

the detecting devices

C.

the match type

D.

the confidence level

Question 7

What is social engineering?

Options:

A.

Hackers use Artificial Intelligence (Al) to mimic a user’s online behavior so they can infiltrate a network and launch an attack.

B.

Hackers use employees to circumvent network security and gather the information they need to launch an attack.

C.

Hackers intercept traffic between two users, eavesdrop on their messages, and pretend to be one or both users.

D.

Hackers spoof the source IP address in their communications so they appear to be a legitimate user.

Question 8

What is a correct use case for using the specified certificate file format?

Options:

A.

using a PKCS7 file to install a certificate plus and its private key on a device

B.

using a PKCS12 file to install a certificate plus its private key on a device

C.

using a PEM file to install a binary encoded certificate on a device

D.

using a PKCS7 file to install a binary encoded private key on a device

Page: 2 / 8
Total 106 questions