Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Admins have recently turned on Wireless IDS/IPS infrastructure detection at the high level on HPE Aruba Networking APs. When you check WIDS events, you

see several RTS rate and CTS rate anomalies, which were triggered by neighboring APs.

What can you interpret from this event?

A.

These neighboring APs are likely to be wireless clients that are inappropriately bridging their wired and wireless NICs; you should track down and remove them.

B.

These neighboring APs might be hackers trying to launch a DoS, but are more likely operating normally; you should start by tuning the event thresholds.

C.

These neighboring APs are actually rogue APs, and you should enable wireless tarpit containment on them.

D.

These neighboring APs are actually rogue APs, and you should enable wireless de-authentication containment on them.

You manage AOS-10 APs with HPE Aruba Networking Central. A role is configured on these APs with the following rules:

    Allow UDP on port 67 to any destination

    Allow any to network 10.1.6.0/23

    Deny any to network 10.1.0.0/16 + log

    Deny any to network 10.0.0.0/8

    Allow any to any destination

You add this new rule immediately before rule 2:

Deny SSH to network 10.1.4.0/23 + denylist

What happens when a client assigned to this role sends SSH traffic to 10.1.11.42?

A.

The traffic is permitted.

B.

The traffic is dropped and logged.

C.

The traffic is dropped (without any logging or further action against the client).

D.

The traffic is dropped, and the client is denylisted.

A company uses HPE Aruba Networking ClearPass Policy Manager (CPPM) as a TACACS+ server to authenticate managers on its AOS-CX switches. The

company wants CPPM to control which commands managers are allowed to enter. You see there is no field to enter these commands in ClearPass.

How do you start configuring the command list on CPPM?

A.

Add the Shell service to the managers' TACACS+ enforcement profiles.

B.

Edit the TACACS+ settings in the AOS-CX switches' network device entries.

C.

Create an enforcement policy with the TACACS+ type.

D.

Edit the settings for CPPM's default TACACS+ admin roles.

A company uses both HPE Aruba Networking ClearPass Policy Manager (CPPM) and HPE Aruba Networking ClearPass Device Insight (CPDI). What is one way integrating the two solutions can help the company implement Zero Trust Security?

A.

CPPM can inform CPDI that it has assigned a particular Aruba-User-Role to a client; CPDI can then use that information to reclassify the client.

B.

CPDI can use tags to inform CPPM that clients are using prohibited applications. CPPM can then tell the network infrastructure to quarantine those clients.

C.

CPPM can provide CPDI with custom device fingerprint definitions in order to enhance the company's total visibility.

D.

CPDI can provide CPPM with extra information about users' identity. CPPM can then use that information to apply the correct identity-based enforcement.

HPE Aruba Networking switches are implementing MAC-Auth to HPE Aruba Networking ClearPass Policy Manager (CPPM) for a company's printers. The company wants to quarantine a client that spoofs a legitimate printer's MAC address. You plan to add a rule to the MAC-Auth service enforcement policy for this purpose. What condition should you include?

A.

Endpoint Compliance EQUALS false

B.

Endpoint Device Insight Tag EXISTS

C.

Authorization: [Endpoints Repository] Compromised EQUALS true

D.

Authorization: [Endpoints Repository] Conflict EQUALS true

A company has HPE Aruba Networking APs managed by HPE Aruba Networking Central. You have set up a WLAN to enforce WPA3 with 802.1X authentication.

What happens if the client fails authentication?

A.

The AP assigns the client to the WLAN's default role.

B.

The AP drops the client because authentication aborts.

C.

The AP assigns the client to the WLAN's critical role.

D.

The AP assigns the client to the WLAN's initial role.

(Note that the HPE Aruba Networking Central interface shown here might look slightly different from what you see in your HPE Aruba Networking Central

interface as versions change; however, similar concepts continue to apply.)

An HPE Aruba Networking 9x00 gateway is part of an HPE Aruba Networking Central group that has the settings shown in the exhibit. What would cause the

gateway to drop traffic as part of its IDPS settings?

A.

Its site-to-site VPN connections failing

B.

Traffic matching a rule in the active ruleset

C.

Its IDPS engine failing

D.

Traffic showing anomalous behavior

A company has Aruba APs that are controlled by Central and that implement WIDS. When you check WIDS events, you see a "detect valid SSID misuse" event. What can you interpret from this event, and what steps should you take?

A.

Clients are failing to authenticate to corporate SSIDs. You should first check for misconfigured authentication settings and then investigate a possible threat.

B.

Admins have likely misconfigured SSID security settings on some of the company's APs. You should have them check those settings.

C.

Hackers are likely trying to pose as authorized APs. You should use the detecting radio information and immediately track down the device that triggered the event.

D.

This event might be a threat but is almost always a false positive. You should wait to see the event over several days before following up on it.

A company wants to turn on Wireless IDS/IPS infrastructure and client detection at the high level on HPE Aruba Networking APs. The company does not want to

enable any prevention settings.

What should you explain about HPE Aruba Networking recommendations?

A.

HPE Aruba Networking recommends turning on both wired and wireless prevention whenever you enable detection at high.

B.

HPE Aruba Networking recommends using hybrid AP mode, as opposed to Air Monitors (AMs), when implementing detection without prevention.

C.

HPE Aruba Networking recommends disabling client detection when you configure infrastructure detection at high, as infrastructure detection includes all the client checks and more.

D.

HPE Aruba Networking recommends configuring infrastructure and client detection at a custom level and disabling or tuning some of the settings that are likely to produce false positives.