Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

A company has HPE Aruba Networking APs running AOS-10 and managed by HPE Aruba Networking Central. The company also has AOS-CX switches. The

security team wants you to capture traffic from a particular wireless client. You should capture this client's traffic over a 15 minute time period and then send the

traffic to them in a PCAP file.

What should you do?

A.

Go to the client's AP in HPE Aruba Networking Central. Use the "Security" page to run a packet capture.

B.

Access the CLI for the client's AP. Set up a mirroring session between its radio and a management station running Wireshark.

C.

Access the CLI for the client's AP's switch. Set up a mirroring session between the AP's port and a management station running Wireshark.

D.

Go to that client in HPE Aruba Networking Central. Use the "Live Events" page to run a packet capture.

You are establishing a cluster of HPE Aruba Networking ClearPass servers. (Assume that they are running version 6.9.).

For which type of certificate it is recommended to install a CA-signed certificate on the Subscriber before it joins the cluster?

A.

Database

B.

HTTPS

C.

RADIUS/EAP

D.

RadSec

Refer to the exhibit:

The exhibit shows the TACACS+ enforcement profile that HPE Aruba Networking ClearPass Policy Manager (CPPM) assigns to a manager. When this manager logs into an AOS-CX switch, what does the switch do?

A.

Assigns the manager operator-level privileges

B.

Assigns the manager administrator-level privileges

C.

Rejects the manager with an error message

D.

Assigns the manager auditor-level privileges

You are setting up HPE Aruba Networking SSE. Which use case requires you to apply a non-default device posture in a rule?

A.

Applying threat inspection to users when they access certain websites

B.

Checking whether a client has antivirus software as a condition for receiving access to resources

C.

Redirecting compromised clients to a remediation server

D.

Integrating with HPE Aruba Networking ClearPass OnGuard

You are using OpenSSL to obtain a certificate signed by a Certification Authority (CA). You have entered this command:

openssl req -new -out file1.pem -newkey rsa:3072 -keyout file2.pem

Enter PEM pass phrase: **********

Verifying - Enter PEM pass phrase: **********

Country Name (2 letter code) [AU]:US

State or Province Name (full name) [Some-State]:California

Locality Name (eg, city) []:Sunnyvale

Organization Name (eg, company) [Internet Widgits Pty Ltd]:example.com

Organizational Unit Name (eg, section) []:Infrastructure

Common Name (e.g. server FQDN or YOUR name) []:radius.example.com

What is one guideline for continuing to obtain a certificate?

A.

You should use a third-party tool to encrypt file2.pem before sending it and file1.pem to the CA.

B.

You should concatenate file1.pem and file2.pem into a single file, and submit that to the desired CA to sign.

C.

You should submit file1.pem, but not file2.pem, to the desired CA to sign.

D.

You should submit file2.pem, but not file1.pem, to the desired CA to sign.

A company is using HPE Aruba Networking Central SD-WAN Orchestrator to establish a hub-spoke VPN between branch gateways (BGWs) at 1164 site and VPNCs at multiple data centers. What is part of the configuration that admins need to complete?

A.

In VPNCs’ groups, establish VPN pools to control which branches connect to which VPNCs.

B.

In BGWs’ and VPNCs’ groups, create default IKE policies for the SD-WAN Orchestrator to use.

C.

In BGWs’ groups, select the VPNCs to which to connect in a DC preference list.

D.

At the global level, create default IPsec policies for the SD-WAN Orchestrator to use.

A company is using HPE Aruba Networking ClearPass Device Insight (CPDI) (the standalone application). You have identified a device, which is currently

classified as one type, but you want to classify it as a custom type. You also want to classify all devices with similar attributes as this type, both already-discovered

devices and new devices discovered later.

What should you do?

A.

Create a user tag from the Generic Devices page, select the desired attributes for the tag, and save the tag.

B.

In the device details, select reclassify, create a user rule based on its attributes, and choose "Save & Reclassify."

C.

In the device details, select filter, create a user tag based on the device attributes, and save the tag.

D.

Create a user rule from the Generic Devices page, select the desired attributes for the rule, and choose "Save."

A company uses both HPE Aruba Networking ClearPass Policy Manager (CPPM) and HPE Aruba Networking ClearPass Device Insight (CPDI).

What is one way integrating the two solutions can help the company implement Zero Trust Security?

A.

CPPM can provide CPDI with custom device fingerprint definitions in order to enhance the company's total visibility.

B.

CPDI can provide CPPM with extra information about users' identity; CPPM can then use that information to apply the correct identity-based enforcement.

C.

CPPM can inform CPDI that it has assigned a particular Aruba-User-Role to a client; CPDI can then use that information to reclassify the client.

D.

CPDI can use tags to inform CPPM that clients are using prohibited applications; CPPM can then tell the network infrastructure to quarantine those clients.

A company has AOS-CX switches. The company wants to make it simpler and faster for admins to detect denial of service (DoS) attacks, such as ping or ARP

floods, launched against the switches.

What can you do to support this use case?

A.

Deploy an NAE agent on the switches to monitor control plane policing (CoPP).

B.

Implement ARP inspection on all VLANs that support end-user devices.

C.

Configure the switches to implement RADIUS accounting to HPE Aruba Networking ClearPass and enable HPE Aruba Networking ClearPass Insight.

D.

Enabling debugging of security functions on the switches.

A company needs to enforce 802.1X authentication for its Windows domain computers to HPE Aruba Networking ClearPass Policy Manager (CPPM). The

company needs the computers to authenticate as both machines and users in the same session.

Which authentication method should you set up on CPPM?

A.

TEAP

B.

PEAP MSCHAPv2

C.

EAP-TTLS

D.

EAP-TLS