Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Aruba Certified Network Security Associate Exam

Last Update 10 hours ago Total Questions : 167

The Aruba Certified Network Security Associate Exam content is now fully updated, with all current exam questions added 10 hours ago. Deciding to include HPE6-A78 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our HPE6-A78 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these HPE6-A78 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Aruba Certified Network Security Associate Exam practice test comfortably within the allotted time.

Question # 21

Which endpoint classification capabilities do Aruba network infrastructure devices have on their own without ClearPass solutions?

A.

ArubaOS-CX switches can use a combination of active and passive methods to assign roles to clients.

B.

ArubaOS devices (controllers and lAPs) can use DHCP fingerprints to assign roles to clients.

C.

ArubaOS devices can use a combination of DHCP fingerprints, HTTP User-Agent strings, and Nmap to construct endpoint profiles.

D.

ArubaOS-Switches can use DHCP fingerprints to construct detailed endpoint profiles.

Question # 22

You are configuring ArubaOS-CX switches to tunnel client traffic to an Aruba Mobility Controller (MC). What should you do to enhance security for control channel communications between the switches and the MC?

A.

Create one UBT zone for control traffic and a second UBT zone for clients.

B.

Configure a long, random PAPI security key that matches on the switches and the MC.

C.

install certificates on the switches, and make sure that CPsec is enabled on the MC

D.

Make sure that the UBT client vlan is assigned to the interface on which the switches reach the MC and only that interface.

Question # 23

What is a benefit or using network aliases in ArubaOS firewall policies?

A.

You can associate a reputation score with the network alias to create rules that filler traffic based on reputation rather than IP.

B.

You can use the aliases to translate client IP addresses to other IP addresses on the other side of the firewall

C.

You can adjust the IP addresses in the aliases, and the rules using those aliases automatically update

D.

You can use the aliases to conceal the true IP addresses of servers from potentially untrusted clients.

Question # 24

What is social engineering?

A.

Hackers use Artificial Intelligence (Al) to mimic a user’s online behavior so they can infiltrate a network and launch an attack.

B.

Hackers use employees to circumvent network security and gather the information they need to launch an attack.

C.

Hackers intercept traffic between two users, eavesdrop on their messages, and pretend to be one or both users.

D.

Hackers spoof the source IP address in their communications so they appear to be a legitimate user.

Question # 25

A company has an ArubaOS controller-based solution with a WPA3-Enterprise WLAN. which authenticates wireless clients to Aruba ClearPass Policy Manager (CPPM). The company has decided to use digital certificates for authentication A user ' s Windows domain computer has had certificates installed on it However, the Networks and Connections window shows that authentication has tailed for the user. The Mobility Controllers (MC ' s) RADIUS events show that it is receiving Access-Rejects for the authentication attempt.

What is one place that you can you look for deeper insight into why this authentication attempt is failing?

A.

the reports generated by Aruba ClearPass Insight

B.

the RADIUS events within the CPPM Event Viewer

C.

the Alerts tab in the authentication record in CPPM Access Tracker

D.

the packets captured on the MC control plane destined to UDP 1812

Question # 26

You have deployed a new Aruba Mobility Controller (MC) and campus APs (CAPs). One of the WLANs enforces 802.IX authentication lo Aruba ClearPass Policy Manager {CPPM) When you test connecting the client to the WLAN. the test falls You check Aruba ClearPass Access Tracker and cannot find a record of the authentication attempt You ping from the MC to CPPM. and the ping is successful.

What is a good next step for troubleshooting?

A.

Renew CPPM ' s RADIUS/EAP certificate

B.

Reset the user credentials

C.

Check CPPM Event viewer.

D.

Check connectivity between CPPM and a backend directory server

Question # 27

What is a correct guideline for the management protocols that you should use on AOS-CX switches?

A.

Make sure that SSH is disabled and use HTTPS instead.

B.

Make sure that Telnet is disabled and use SSH instead.

C.

Make sure that Telnet is disabled and use TFTP instead.

D.

Make sure that HTTPS is disabled and use SSH instead.

Question # 28

You have been instructed to look in an AOS Security Dashboard’s client list. Your goal is to find clients that belong to the company and have connected to devices that might belong to hackers.

Which client fits this description?

A.

MAC address: d8:50:e6:f3:6d:a4; Client Classification: Authorized; AP Classification: Suspected Rogue

B.

MAC address: d8:50:e6:f3:6e:c5; Client Classification: Interfering; AP Classification: Neighbor

C.

MAC address: d8:50:e6:f3:6e:60; Client Classification: Interfering; AP Classification: Interfering

D.

MAC address: d8:50:e6:f3:70:ab; Client Classification: Interfering; AP Classification: Suspected Rogue

Question # 29

Device A is contacting https://arubapedia.arubanetworks.com. The web server sends a certificate chain. What does the browser do as part of validating the web server certificate?

A.

It makes sure that the key in the certificate matches the key that DeviceA uses for HTTPS.

B.

It makes sure the certificate has a DNS SAN that matches arubapedia.arubanetworks.com

C.

It makes sure that the public key in the certificate matches DeviceA ' s private HTTPS key.

D.

It makes sure that the public key in the certificate matches a private key stored on DeviceA.

Question # 30

You have been asked to rind logs related to port authentication on an ArubaOS-CX switch for events logged in the past several hours But. you are having trouble searching through the logs What is one approach that you can take to find the relevant logs?

A.

Add the " -C and *-c port-access " options to the " show logging " command.

B.

Configure a logging Tiller for the " port-access " category, and apply that filter globally.

C.

Enable debugging for " portaccess " to move the relevant logs to a buffer.

D.

Specify a logging facility that selects for " port-access " messages.

Go to page: