Weekend Sale Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

HP HPE6-A78 Actual Questions

Page: 5 / 8
Total 106 questions

Aruba Certified Network Security Associate Exam Questions and Answers

Question 17

Refer to the exhibit.

This Aruba Mobility Controller (MC) should authenticate managers who access the Web Ul to ClearPass Policy Manager (CPPM) ClearPass admins have asked you to use RADIUS and explained that the MC should accept managers' roles in Aruba-Admin-Role VSAs

Which setting should you change to follow Aruba best security practices?

Options:

A.

Change the local user role to read-only

B.

Clear the MSCHAP check box

C.

Disable local authentication

D.

Change the default role to "guest-provisioning"

Question 18

Your company policies require you to encrypt logs between network infrastructure devices and Syslog servers. What should you do to meet these requirements on an ArubaOS-CX switch?

Options:

A.

Specify the Syslog server with the TLS option and make sure the switch has a valid certificate.

B.

Specify the Syslog server with the UDP option and then add an CPsec tunnel that selects Syslog.

C.

Specify a priv key with the Syslog settings that matches a priv key on the Syslog server.

D.

Set up RadSec and then enable Syslog as a protocol carried by the RadSec tunnel.

Question 19

You have been authorized to use containment to respond to rogue APs detected by ArubaOS Wireless Intrusion Prevention (WIP). What is a consideration for using tarpit containment versus traditional wireless containment?

Options:

A.

Rather than function wirelessly, tarpit containment sends ARP frames over the wired network to poison rogue APs ARP tables and prevent them from transmitting on the wired network.

B.

Rather than target all clients connected to rogue APs, tarpit containment targets only authorized clients that are connected to a rogue AP, reducing the chance of negative effects on neighbors.

C.

Tarpit containment does not require an RF Protect license to function, while traditional wireless containment does.

D.

Tarpit containment forms associations with clients to enable more effective containment with fewer disassociation frames than traditional wireless containment.

Question 20

How can hackers implement a man-in-the-middle (MITM) attack against a wireless client?

Options:

A.

The hacker uses a combination of software and hardware to jam the RF band and prevent the client from connecting to any wireless networks.

B.

The hacker runs an NMap scan on the wireless client to find its MAC and IP address. The hacker then connects to another network and spoofs those addresses.

C.

The hacker connects a device to the same wireless network as the client and responds to the client’s ARP requests with the hacker device’s MAC address.

D.

The hacker uses spear-phishing to probe for the IP addresses that the client is attempting to reach. The hacker device then spoofs those IP addresses.

Page: 5 / 8
Total 106 questions