Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is a difference between passive and active endpoint classification?

A.

Passive classification refers exclusively to MAC OUI-based classification, while active classification refers to any other classification method.

B.

Passive classification classifies endpoints based on entries in dictionaries, while active classification uses admin-defined rules to classify endpoints.

C.

Passive classification is only suitable for profiling endpoints in small business environments, while enterprises should use active classification exclusively.

D.

Passive classification analyzes traffic that endpoints send as part of their normal functions; active classification involves sending requests to endpoints.

A company has a WLAN that uses Tunnel forwarding mode and WPA3-Enterprise security, supported by an Aruba Mobility Controller (MC) and campus APs (CAPs). You have been asked to capture packets from a wireless client connected to this WLAN and submit the packets to the security team.

What is a guideline for this capture?

A.

You should use an Air Monitor (AM) to capture the packets in the air.

B.

You should capture the traffic on the MC dataplane to obtain unencrypted traffic.

C.

You should mirror traffic from the switch port that connects to the AP out on a port connected to a packet analyzer.

D.

You should capture the traffic on the AP, so that the capture is as close to the source as possible.

You need to deploy an Aruba instant AP where users can physically reach It. What are two recommended options for enhancing security for management access to the AP? (Select two )

A.

Disable Its console ports

B.

Place a Tamper Evident Label (TELS) over its console port

C.

Disable the Web Ul.

D.

Configure WPA3-Enterpnse security on the AP

E.

install a CA-signed certificate

How can hackers implement a man-in-the-middle (MITM) attack against a wireless client?

A.

The hacker uses a combination of software and hardware to jam the RF band and prevent the client from connecting to any wireless networks.

B.

The hacker runs an NMap scan on the wireless client to find its MAC and IP address. The hacker then connects to another network and spoofs those addresses.

C.

The hacker uses spear-phishing to probe for the IP addresses that the client is attempting to reach. The hacker device then spoofs those IP addresses.

D.

The hacker connects a device to the same wireless network as the client and responds to the client's ARP requests with the hacker device's MAC address.

What distinguishes a Distributed Denial of Service (DDoS) attack from a traditional Denial or service attack (DoS)?

A.

A DDoS attack originates from external devices, while a DoS attack originates from internal devices

B.

A DDoS attack is launched from multiple devices, while a DoS attack is launched from a single device

C.

A DoS attack targets one server, a DDoS attack targets all the clients that use a server

D.

A DDoS attack targets multiple devices, while a DoS Is designed to Incapacitate only one device

A company has HPE Aruba Networking Mobility Controllers (MCs), campus APs, and AOS-CX switches. The company plans to use HPE Aruba Networking ClearPass Policy Manager (CPPM) to classify endpoints by type. This company is using only CPPM and no other HPE Aruba Networking ClearPass solutions.

The HPE Aruba Networking ClearPass admins tell you that they want to use HTTP User-Agent strings to help profile the endpoints.

What should you do as a part of setting up Mobility Controllers (MCs) to support this requirement?

A.

Create datapath mirrors that use the CPPM's IP address as the destination.

B.

Create an IF-MAP profile, which specifies credentials for an API admin account on CPPM.

C.

Create control path mirrors to mirror HTTP traffic from clients to CPPM.

D.

Create a firewall whitelist rule that permits HTTP and CPPM's IP address.

You need to implement a WPA3-Enterprise network that can also support WPA2-Enterprise clients. What is a valid configuration for the WPA3-Enterprise WLAN?

A.

CNSA mode disabled with 256-bit keys

B.

CNSA mode disabled with 128-bit keys

C.

CNSA mode enabled with 256-bit keys

D.

CNSA mode enabled with 128-bit keys

What is one of the policies that a company should define for digital forensics?

A.

which data should be routinely logged, where logs should be forwarded, and which logs should be archived

B.

what are the first steps that a company can take to implement micro-segmentation in their environment

C.

to which resources should various users be allowed access, based on their identity and the identity of their clients

D.

which type of EAP method is most secure for authenticating wired and wireless users with 802.1

Which attack is an example of social engineering?

A.

An email is used to impersonate a bank and trick users into entering their bank login information on a fake website page.

B.

An attack exploits an operating system vulnerability and locks out users until they pay the ransom.

C.

A hacker eavesdrops on insecure communications, such as Remote Desktop Protocol (RDP), and discovers login credentials.

D.

A user visits a website and downloads a file that contains a worm, which self-replicates throughout the network.

A company is deploying AOS-CX switches to support 114 employees, which will tunnel client traffic to an HPE Aruba Networking Mobility Controller (MC) for the MC to apply firewall policies and deep packet inspection (DPI). This MC will be dedicated to receiving traffic from the AOS-CX switches.

What are the licensing requirements for the MC?

A.

One PEF license per switch

B.

One PEF license per switch, and one WCC license per switch

C.

One AP license per switch

D.

One AP license per switch, and one PEF license per switch