Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What is a guideline for managing local certificates on AOS-CX switches?

A.

Understand that the switch must use the same certificate for all usages, such as its HTTPS server and RadSec client.

B.

Create a self-signed certificate online on the switch because AOS-CX switches do not support CA-signed certificates.

C.

Before installing the local certificate, create a trust anchor (TA) profile with the root CA certificate for the certificate that you will install.

D.

Install an Online Certificate Status Protocol (OCSP) certificate to simplify the process of enrolling and re-enrolling for certificates.

What is a use case for implementing RadSec instead of RADIUS?

A.

A university wants to protect communications between the students' devices and the network access server.

B.

A corporation wants to implement EAP-TLS to authenticate wireless users at their main office.

C.

A school district wants to protect messages sent between RADIUS clients and servers over an untrusted network.

D.

A organization wants to strengthen the encryption used to protect RADIUS communications without increasing complexity.

You have a network with AOS-CX switches for which HPE Aruba Networking ClearPass Policy Manager (CPPM) acts as the TACACS+ server. When an admin authenticates, CPPM sends a response with:

    Aruba-Priv-Admin-User = 1

    TACACS+ privilege level = 15What happens to the user?

A.

The user receives auditors access.

B.

The user receives no access.

C.

The user receives administrators access.

D.

The user receives operators access.

Which is an accurate description of a type of malware?

A.

Worms are usually delivered in spear-phishing attacks and require users to open and run a file.

B.

Rootkits can help hackers gain elevated access to a system and often actively conceal themselves from detection.

C.

A Trojan is any type of malware that replicates itself and spreads to other systems automatically.

D.

Malvertising can only infect a system if the user encounters the malware on an untrustworthy site.

Refer to the exhibit, which shows the settings on the company's MCs.

You have deployed about 100 new HPE Aruba Networking 335 APs. What is required for the APs to become managed?

A.

Installing CA-signed certificates on the APs

B.

Approving the APs as authorized APs on the AP whitelist

C.

Installing self-signed certificates on the APs

D.

Configuring a PAPI key that matches on the APs and MCs

Refer to the exhibit.

You are deploying a new HPE Aruba Networking Mobility Controller (MC), which is enforcing authentication to HPE Aruba Networking ClearPass Policy Manager (CPPM). The authentication is not working correctly, and you find the error shown in the exhibit in the CPPM Event Viewer.

What should you check?

A.

That the IP address that the MC is using to reach CPPM matches the one defined for the device on CPPM

B.

That the MC has valid admin credentials configured on it for logging into the CPPM

C.

That the MC has been added as a domain machine on the Active Directory domain with which CPPM is synchronized

D.

That the shared secret configured for the CPPM authentication server matches the one defined for the device on CPPM

What is a correct use case for using the specified certificate file format?

A.

using a PKCS7 file to install a certificate plus and its private key on a device

B.

using a PKCS12 file to install a certificate plus its private key on a device

C.

using a PEM file to install a binary encoded certificate on a device

D.

using a PKCS7 file to install a binary encoded private key on a device

Refer to the exhibit.

This Aruba Mobility Controller (MC) should authenticate managers who access the Web Ul to ClearPass Policy Manager (CPPM) ClearPass admins have asked you to use RADIUS and explained that the MC should accept managers' roles in Aruba-Admin-Role VSAs

Which setting should you change to follow Aruba best security practices?

A.

Change the local user role to read-only

B.

Clear the MSCHAP check box

C.

Disable local authentication

D.

Change the default role to "guest-provisioning"

What does the NIST model for digital forensics define?

A.

how to define access control policies that will properly protect a company's most sensitive data and digital resources

B.

how to properly collect, examine, and analyze logs and other data, in order to use it as evidence in a security investigation

C.

which types of architecture and security policies are best equipped to help companies establish a Zero Trust Network (ZTN)

D.

which data encryption and authentication algorithms are suitable for enterprise networks in a world that is moving toward quantum computing

Which is a correct description of a stage in the Lockheed Martin kill chain?

A.

In the delivery stage, malware collects valuable data and delivers or exfilltrated it to the hacker.

B.

In the reconnaissance stage, the hacker assesses the impact of the attack and how much information was exfilltrated.

C.

In the weaponization stage, which occurs after malware has been delivered to a system, the malware executes Its function.

D.

In the exploitation and installation phases, malware creates a backdoor into the infected system for the hacker.