Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

HPE Aruba Networking Central displays an alert about an Infrastructure Attack that was detected. You go to the Security > RAPIDS events and see that the attack

was "Detect adhoc using Valid SSID."

What is one possible next step?

A.

Use HPE Aruba Networking Central floorplans or the detecting AP identities to locate the general area for the threat.

B.

Look for the IP address associated with the offender and then check for that IP address among HPE Aruba Networking Central clients.

C.

Make sure that you have tuned the threshold for that check, as false positives are common for it.

D.

Make sure that clients have updated drivers, as faulty drivers are a common explanation for this attack type.

(Note that the HPE Aruba Networking Central interface shown here might look slightly different from what you see in your HPE Aruba Networking Central

interface as versions change; however, similar concepts continue to apply.)

An HPE Aruba Networking 9x00 gateway is part of an HPE Aruba Networking Central group that has the settings shown in the exhibit. What would cause the

gateway to drop traffic as part of its IDPS settings?

A.

Its site-to-site VPN connections failing

B.

Traffic matching a rule in the active ruleset

C.

Its IDPS engine failing

D.

Traffic showing anomalous behavior

A company issues user certificates to domain computers using its Windows CA and the default user certificate template. You have set up HPE Aruba Networking

ClearPass Policy Manager (CPPM) to authenticate 802.1X clients with those certificates. However, during tests, you receive an error that authorization has failed

because the usernames do not exist in the authentication source.

What is one way to fix this issue and enable clients to successfully authenticate with certificates?

A.

Configure rules to strip the domain name from the username.

B.

Change the authentication method list to include both PEAP MSCHAPv2 and EAP-TLS.

C.

Add the ClearPass Onboard local repository to the authentication source list.

D.

Remove EAP-TLS from the authentication method list and add TEAP there instead.

Refer to Exhibit:

All of the switches in the exhibit are AOS-CX switches.

What is the preferred configuration on Switch-2 for preventing rogue OSPF routers in this network?

A.

Configure OSPF authentication on VLANs 10-19 in password mode.

B.

Configure OSPF authentication on Lag 1 in MD5 mode.

C.

Disable OSPF entirely on VLANs 10-19.

D.

Configure passive-interface as the OSPF default and disable OSPF passive on Lag 1.

A company has Aruba APs that are controlled by Central and that implement WIDS. When you check WIDS events, you see a "detect valid SSID misuse" event. What can you interpret from this event, and what steps should you take?

A.

Clients are failing to authenticate to corporate SSIDs. You should first check for misconfigured authentication settings and then investigate a possible threat.

B.

Admins have likely misconfigured SSID security settings on some of the company's APs. You should have them check those settings.

C.

Hackers are likely trying to pose as authorized APs. You should use the detecting radio information and immediately track down the device that triggered the event.

D.

This event might be a threat but is almost always a false positive. You should wait to see the event over several days before following up on it.

A company has HPE Aruba Networking APs running AOS-10 that connect to AOS-CX switches. The APs will:

. Authenticate as 802.1X supplicants to HPE Aruba Networking ClearPass Policy Manager (CPPM)

. Be assigned to the "APs" role on the switches

. Have their traffic forwarded locally

What information do you need to help you determine the VLAN settings for the "APs" role?

A.

Whether the APs have static or DHCP-assigned IP addresses

B.

Whether the switches are using local user-roles (LURs) or downloadable user-roles (DURs)

C.

Whether the switches have established tunnels with an HPE Aruba Networking gateway

D.

Whether the APs bridge or tunnel traffic on their SSIDs

A company has AOS-CX switches at the access layer, managed by HPE Aruba Networking Central. You have identified suspicious activity on a wired client. You want to analyze the client's traffic with Wireshark, which you have on your management station.

What should you do?

A.

Access the client's switch's CLI from your management station. Access the switch shell and run a TCP dump on the client port.

B.

Go to the client's switch in HPE Aruba Networking Central. Use the "Security" page to run a packet capture.

C.

Set up a policy that implements a captive portal redirect to your management station. Apply that policy to the client's port.

D.

Set up a mirror session on the client's switch; set the client port as the source and your station IP address as the tunnel destination.

A company has HPE Aruba Networking APs and AOS-CX switches. The APs bridge wireless traffic. They receive DHCP IP addresses on VLAN 18. Wireless users are assigned to VLAN 12.

The company wants the APs to start using 802.1X authentication on their switch ports. You are configuring the port-access role to which the APs are assigned after authentication.

What is one recommended setting for that role?

A.

No trust for DSCP

B.

Trust for DSCP

C.

Auth-mode left at client-mode

D.

Access VLAN 18 with no support for VLAN 12

A company wants to implement Virtual Network based Tunneling (VNBT) on a particular group of users and assign those users to an overlay network with VNI

3000.

Assume that an AOS-CX switch is already set up to:

. Implement 802.1X to HPE Aruba Networking ClearPass Policy Manager (CPPM)

. Participate in an EVPN VXLAN solution that includes VNI 3000

Which setting should you configure in the users' AOS-CX role to apply VNBT to them when they connect?

A.

Gateway zone set to "3000" with no gateway role set

B.

Gateway zone set to "vni-3000" with no gateway role set

C.

Access VLAN set to the VLAN mapped to VNI 3000

D.

Access VLAN ID set to "3000"

You are using Wireshark to view packets captured from HPE Aruba Networking infrastructure, but you are not sure that the packets are displaying correctly.

In which circumstance does it make sense to ensure that Wireshark has GRE enabled as one of its analyzed protocols?

A.

When the traffic was captured on an HPE Aruba Networking gateway and sent to a remote IP

B.

When the traffic was captured on an HPE Aruba Networking gateway dataplane and saved to a file

C.

When the traffic was captured on an HPE Aruba Networking Mobility Controller (MC) control plane and saved to a file

D.

When the traffic was captured on an HPE Aruba Networking MC dataplane and saved to a file