Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

HPE6-A78 Aruba Certified Network Security Associate Exam Questions and Answers

Questions 4

What is one of the roles of the network access server (NAS) in the AAA framewonx?

Options:

A.

It authenticates legitimate users and uses policies to determine which resources each user is allowed to access.

B.

It negotiates with each user ' s device to determine which EAP method is used for authentication

C.

It enforces access to network services and sends accounting information to the AAA server

D.

It determines which resources authenticated users are allowed to access and monitors each users session

Buy Now
Questions 5

You have been instructed to look in the ArubaOS Security Dashboard ' s client list. Your goal is to find clients that belong to the company and have connected to devices that might belong to hackers.

Which client fits this description?

Options:

A.

MAC address: d8:50:e6:f3:70:ab; Client Classification: Interfering; AP Classification: Rogue

B.

MAC address: d8:50:e6:f3:6e:c5; Client Classification: Interfering; AP Classification: Neighbor

C.

MAC address: d8:50:e6:f3:6e:60; Client Classification: Interfering; AP Classification: Authorized

D.

MAC address: d8:50:e6:f3:6d:a4; Client Classification: Authorized; AP Classification: Rogue

Buy Now
Questions 6

A company has Aruba Mobility Controllers (MCs), Aruba campus APs, and ArubaOS-Switches. The company plans to use ClearPass Policy Manager (CPPM) to classify endpoints by type. This company is using only CPPM and no other ClearPass solutions.

The ClearPass admins tell you that they want to use HTTP User-Agent strings to help classify endpoints.

What should you do as a part of configuring the ArubaOS-Switches to support this requirement?

Options:

A.

Create a device fingerprinting policy that includes HTTP, and apply the policy to edge ports.

B.

Create remote mirrors that collect traffic on edge ports, and mirror it to CPPM ' s IP address.

C.

Configure CPPM as the sFlow collector, and make sure that sFlow is enabled on edge ports.

D.

Connect the switches to CPPM ' s span ports, and set up mirroring of HTTP traffic on the switches.

Buy Now
Questions 7

Which is a correct description of a Public Key Infrastructure (PKI)?

Options:

A.

A device uses Intermediate Certification Authorities (CAs) to enable it to trust root CAs that are different from the root CA that signed its own certificate.

B.

A user must manually choose to trust intermediate and end-entity certificates, or those certificates must be installed on the device as trusted in advance.

C.

Root Certification Authorities (CAs) primarily sign certificates, and Intermediate Certification Authorities (CAs) primarily validate signatures.

D.

A user must manually choose to trust a root Certification Authority (CA) certificate, or the root CA certificate must be installed on the device as trusted.

Buy Now
Questions 8

What is one of the policies that a company should define for digital forensics?

Options:

A.

which data should be routinely logged, where logs should be forwarded, and which logs should be archived

B.

what are the first steps that a company can take to implement micro-segmentation in their environment

C.

to which resources should various users be allowed access, based on their identity and the identity of their clients

D.

which type of EAP method is most secure for authenticating wired and wireless users with 802.1

Buy Now
Questions 9

What is a benefit or using network aliases in ArubaOS firewall policies?

Options:

A.

You can associate a reputation score with the network alias to create rules that filler traffic based on reputation rather than IP.

B.

You can use the aliases to translate client IP addresses to other IP addresses on the other side of the firewall

C.

You can adjust the IP addresses in the aliases, and the rules using those aliases automatically update

D.

You can use the aliases to conceal the true IP addresses of servers from potentially untrusted clients.

Buy Now
Questions 10

What is one difference between EAP-Tunneled Layer security (EAP-TLS) and Protected EAP (PEAP)?

Options:

A.

EAP-TLS creates a TLS tunnel for transmitting user credentials, while PEAP authenticates the server and supplicant during a TLS handshake.

B.

EAP-TLS requires the supplicant to authenticate with a certificate, hut PEAP allows the supplicant to use a username and password.

C.

EAP-TLS begins with the establishment of a TLS tunnel, but PEAP does not use a TLS tunnel as part of Its process

D.

EAP-TLS creates a TLS tunnel for transmitting user credentials securely while PEAP protects user credentials with TKIP encryption.

Buy Now
Questions 11

What is a benefit of Protected Management Frames (PMF). sometimes called Management Frame Protection (MFP)?

Options:

A.

PMF helps to protect APs and MCs from unauthorized management access by hackers.

B.

PMF ensures trial traffic between APs and Mobility Controllers (MCs) is encrypted.

C.

PMF prevents hackers from capturing the traffic between APs and Mobility Controllers.

D.

PMF protects clients from DoS attacks based on forged de-authentication frames

Buy Now
Questions 12

What is a guideline for managing local certificates on AOS-CX switches?

Options:

A.

Understand that the switch must use the same certificate for all usages, such as its HTTPS server and RadSec client.

B.

Create a self-signed certificate online on the switch because AOS-CX switches do not support CA-signed certificates.

C.

Before installing the local certificate, create a trust anchor (TA) profile with the root CA certificate for the certificate that you will install.

D.

Install an Online Certificate Status Protocol (OCSP) certificate to simplify the process of enrolling and re-enrolling for certificates.

Buy Now
Questions 13

A company has an ArubaOS solution. The company wants to prevent users assigned to the " user_group1 " role from using gaming and peer-to-peer applications.

What is the recommended approach for these requirements?

Options:

A.

Make sure DPI is enabled, and add application rules that deny gaming and peer-to-peer applications to the " user_groupr role.

B.

Create ALGs for the gaming and peer-to-peer applications, and deny the " user_group1 " role on the ALGs.

C.

Add access control rules to the " user_group1 " role, which deny HTTP/HTTPS traffic to IP addresses associated with gaming and peer-to-peer applications.

D.

Create service aliases for the TCP ports associated with gaming and peer-to-per applications, and use those aliases in access control rules for the " user_group " rules.

Buy Now
Questions 14

A company has Aruba Mobility Controllers (MCs). Aruba campus APs. and ArubaOS-CX switches. The company plans to use ClearPass Policy Manager (CPPM) to classify endpoints by type The ClearPass admins tell you that they want to run Network scans as part of the solution

What should you do to configure the infrastructure to support the scans?

Options:

A.

Create a TA profile on the ArubaOS-Switches with the root CA certificate for ClearPass ' s HTTPS certificate

B.

Create device fingerprinting profiles on the ArubaOS-Switches that include SNMP. and apply the profiles to edge ports

C.

Create remote mirrors on the ArubaOS-Swrtches that collect traffic on edge ports, and mirror it to CPPM ' s IP address.

D.

Create SNMPv3 users on ArubaOS-CX switches, and make sure that the credentials match those configured on CPPM

Buy Now
Questions 15

Your ArubaoS solution has detected a rogue AP with Wireless intrusion Prevention (WIP). Which information about the detected radio can best help you to locate the rogue device?

Options:

A.

the match method

B.

the detecting devices

C.

the match type

D.

the confidence level

Buy Now
Questions 16

Your Aruba Mobility Master-based solution has detected a suspected rogue AP. Among other information, the ArubaOS Detected Radios page lists this information for the AP:

SSID = PublicWiFi

BSSID = a8:bd:27:12:34:56

Match method = Plus one

Match method = Eth-Wired-Mac-Table

The security team asks you to explain why this AP is classified as a rogue. What should you explain?

Options:

A.

The AP has a BSSID that is close to your authorized APs ' BSSIDs. This indicates that the AP might be spoofing the corporate SSID and attempting to lure clients to it, making the AP a suspected rogue.

B.

The AP is probably connected to your LAN because it has a BSSID that is close to a MAC address that has been detected in your LAN. Because it does not belong to the company, it is a suspected rogue.

C.

The AP has been detected using multiple MAC addresses. This indicates that the AP is spoofing its MAC address, which qualifies it as a suspected rogue.

D.

The AP is an AP that belongs to your solution. However, the ArubaOS has detected that it is behaving suspiciously. It might have been compromised, so it is classified as a suspected rogue.

Buy Now
Questions 17

What is one way that WPA3-Enterprise enhances security when compared to WPA2-Enterprise?

Options:

A.

WPA3-Enterprise implements the more secure simultaneous authentication of equals (SAE), while WPA2-Enterprise uses 802.1X.

B.

WPA3-Enterprise provides built-in mechanisms that can deploy user certificates to authorized end-user devices.

C.

WPA3-Enterprise uses Diffie-Hellman in order to authenticate clients, while WPA2-Enterprise uses 802.1X authentication.

D.

WPA3-Enterprise can operate in CNSA mode, which mandates that the 802.11 association uses secure algorithms.

Buy Now
Questions 18

Which correctly describes one of HPE Aruba Networking ClearPass Policy Manager ' s (CPPM ' s) device profiling methods?

Options:

A.

CPPM can use Wireshark to actively probe devices, analyze their traffic patterns, and construct an endpoint profile.

B.

CPPM can use SNMP to configure Aruba switches and mobility devices to mirror client traffic to CPPM for analysis.

C.

CPPM can analyze settings such as TTL and time window size in endpoints ' TCP traffic in order to fingerprint the OS.

D.

CPPM can analyze settings such as TCP/UDP ports used for HTTP, DHCP, and DNS in endpoints ' traffic to fingerprint the OS.

Buy Now
Questions 19

What is a vulnerability of an unauthenticated Dime-Heliman exchange?

Options:

A.

A hacker can replace the public values exchanged by the legitimate peers and launch an MITM attack.

B.

A brute force attack can relatively quickly derive Diffie-Hellman private values if they are able to obtain public values

C.

Diffie-Hellman with elliptic curve values is no longer considered secure in modem networks, based on NIST recommendations.

D.

Participants must agree on a passphrase in advance, which can limit the usefulness of Diffie- Hell man in practical contexts.

Buy Now
Questions 20

An AOS-CX switch currently has no device fingerprinting settings configured on it. You want the switch to start collecting DHCP and LLDP information. You enter these commands:

Switch(config)# client device-fingerprint profile myprofile

Switch(myprofile)# dhcp

Switch(myprofile)# lldp

What else must you do to allow the switch to collect information from clients?

Options:

A.

Configure the switch as a DHCP relay

B.

Add at least one LLDP option to the policy

C.

Apply the policy to edge ports

D.

Add at least one DHCP option to the policy

Buy Now
Questions 21

A company has added a new user group. Users in the group try to connect to the WLAN and receive errors that the connection has no Internet access. The users cannot reach any resources. The first exhibit shows the record for one of the users who cannot connect. The second exhibit shows the role to which the ArubaOS device assigned the user ' s client.

What is a likely problem?

Options:

A.

The ArubaOS device has a server derivation rule configured on it that has overridden the role sent by CPPM.

B.

The ArubaOS device does not have the correct RADIUS dictionaries installed on it to under-stand the Aruba-User-Role VSA.

C.

The role name that CPPM is sending does not match the role name configured on the Aru-baOS device.

D.

The clients rejected the server authentication on their side because they do not have the root CA for CPPM ' s RADIUS/EAP certificate.

Buy Now
Questions 22

What is an example of passive endpoint classification?

Options:

A.

TCP fingerprinting

B.

SSH scans

C.

WMI scans

D.

SNMP scans

Buy Now
Questions 23

From which solution can ClearPass Policy Manager (CPPM) receive detailed information about client device type OS and status?

Options:

A.

ClearPass Onboard

B.

ClearPass Access Tracker

C.

ClearPass OnGuard

D.

ClearPass Guest

Buy Now
Questions 24

How should admins deal with vulnerabilities that they find in their systems?

Options:

A.

They should apply fixes, such as patches, to close the vulnerability before a hacker exploits it.

B.

They should add the vulnerability to their Common Vulnerabilities and Exposures (CVE).

C.

They should classify the vulnerability as malware. a DoS attack or a phishing attack.

D.

They should notify the security team as soon as possible that the network has already been breached.

Buy Now
Questions 25

What is a difference between passive and active endpoint classification?

Options:

A.

Passive classification refers exclusively to MAC OUI-based classification, while active classification refers to any other classification method.

B.

Passive classification classifies endpoints based on entries in dictionaries, while active classification uses admin-defined rules to classify endpoints.

C.

Passive classification is only suitable for profiling endpoints in small business environments, while enterprises should use active classification exclusively.

D.

Passive classification analyzes traffic that endpoints send as part of their normal functions; active classification involves sending requests to endpoints.

Buy Now
Questions 26

You have been authorized to use containment to respond to rogue APs detected by ArubaOS Wireless Intrusion Prevention (WIP). What is a consideration for using tarpit containment versus traditional wireless containment?

Options:

A.

Rather than function wirelessly, tarpit containment sends ARP frames over the wired network to poison rogue APs ARP tables and prevent them from transmitting on the wired network.

B.

Rather than target all clients connected to rogue APs, tarpit containment targets only authorized clients that are connected to a rogue AP, reducing the chance of negative effects on neighbors.

C.

Tarpit containment does not require an RF Protect license to function, while traditional wireless containment does.

D.

Tarpit containment forms associations with clients to enable more effective containment with fewer disassociation frames than traditional wireless containment.

Buy Now
Questions 27

Your AOS solution has detected a rogue AP with Wireless Intrusion Prevention (WIP). Which information about the detected radio can best help you to locate the rogue device?

Options:

A.

The detecting devices

B.

The match method

C.

The confidence level

D.

The match type

Buy Now
Questions 28

Two wireless clients, client 1 and client 2, are connected to an ArubaOS Mobility Controller. Subnet 10.1.10.10/24 is a network of servers on the other side of the ArubaOS firewall. The exhibit shows all three firewall rules that apply to these clients.

Which traffic is permitted?

Options:

A.

an HTTPS request from client 1 to 10.1.10.10 and an HTTPS response from 10.1.10.10 to client 1

B.

an HTTPS request from client 1 to 10.1.10.10 and an HTTPS request from 10.1.10.11 to client 1

C.

an HTTPS request from 10.1.10.10 to client 1 and an HTTPS re-sponse from client 1 to 10.1.10.10

D.

an HTTPS request from client 1 to client 2 and an HTTPS request from client 2 to client 1

Buy Now
Questions 29

A company has an AOS controller-based solution with a WPA3-Enterprise WLAN, which authenticates wireless clients to HPE Aruba Networking ClearPass Policy Manager (CPPM). The company has decided to use digital certificates for authentication. A user ' s Windows domain computer has had certificates installed on it. However, the Networks and Connections window shows that authentication has failed for the user. The Mobility Controller’s (MC ' s) RADIUS events show that it is receiving Access-Rejects for the authentication attempt.

What is one place that you can look for deeper insight into why this authentication attempt is failing?

Options:

A.

The reports generated by HPE Aruba Networking ClearPass Insight

B.

The RADIUS events within the CPPM Event Viewer

C.

The Alerts tab in the authentication record in CPPM Access Tracker

D.

The packets captured on the MC control plane destined to UDP 1812

Buy Now
Questions 30

You have been asked to send RADIUS debug messages from an ArubaOS-CX switch to a central SIEM server at 10.5.15.6. The server is already defined on the switch with this command: logging 10.5.6.12

You enter this command: debug radius all

What is the correct debug destination?

Options:

A.

console

B.

file

C.

syslog

D.

buffer

Buy Now
Questions 31

What is a reason to set up a packet capture on an HPE Aruba Networking Mobility Controller (MC)?

Options:

A.

The security team believes that a wireless endpoint connected to the MC is launching an attack and wants to examine the traffic more closely.

B.

The company wants to use HPE Aruba Networking ClearPass Policy Manager (CPPM) to profile devices and needs to receive HTTP User-Agent strings from the MC.

C.

You want the MC to analyze wireless clients ' traffic at a lower level, so that the AOS firewall can control Web traffic based on the destination URL.

D.

You want the MC to analyze wireless clients ' traffic at a lower level, so that the AOS firewall can control the traffic based on application.

Buy Now
Questions 32

Which is a correct description of a stage in the Lockheed Martin kill chain?

Options:

A.

In the weaponization stage, which occurs after malware has been delivered to a system, the malware executes its function.

B.

In the exploitation and installation phases, malware creates a backdoor into the infected system for the hacker.

C.

In the reconnaissance stage, the hacker assesses the impact of the attack and how much information was exfiltrated.

D.

In the delivery stage, malware collects valuable data and delivers or exfiltrates it to the hacker.

Buy Now
Questions 33

What are some functions of an AruDaOS user role?

Options:

A.

The role determines which authentication methods the user must pass to gain network access

B.

The role determines which firewall policies and bandwidth contract apply to the clients traffic

C.

The role determines which wireless networks (SSiDs) a user is permitted to access

D.

The role determines which control plane ACL rules apply to the client ' s traffic

Buy Now
Questions 34

What is one way that Control Plane Security (CPsec) enhances security for me network?

Options:

A.

It protects wireless clients ' traffic tunneled between APs and Mobility Controllers, from eavesdropping

B.

It prevents Denial of Service (DoS) attacks against Mobility Controllers ' (MCs " ) control plane.

C.

It prevents access from unauthorized IP addresses to critical services, such as SSH on Mobility Controllers (MCs).

D.

It protects management traffic between APs and Mobility Controllers (MCs) from eavesdropping.

Buy Now
Questions 35

How can hackers implement a man-in-the-middle (MITM) attack against a wireless client?

Options:

A.

The hacker uses a combination of software and hardware to jam the RF band and prevent the client from connecting to any wireless networks.

B.

The hacker runs an NMap scan on the wireless client to find its MAC and IP address. The hacker then connects to another network and spoofs those addresses.

C.

The hacker uses spear-phishing to probe for the IP addresses that the client is attempting to reach. The hacker device then spoofs those IP addresses.

D.

The hacker connects a device to the same wireless network as the client and responds to the client ' s ARP requests with the hacker device ' s MAC address.

Buy Now
Questions 36

Refer to the exhibit.

HPE6-A78 Question 36

This company has ArubaOS-Switches. The exhibit shows one access layer switch, Swllcn-2. as an example, but the campus actually has more switches. The company wants to slop any internal users from exploiting ARP

What Is the proper way to configure the switches to meet these requirements?

Options:

A.

On Switch-1, enable ARP protection globally, and enable ARP protection on ail VLANs.

B.

On Switch-2, make ports connected to employee devices trusted ports for ARP protection

C.

On Swltch-2, enable DHCP snooping globally and on VLAN 201 before enabling ARP protection

D.

On Swltch-2, configure static PP-to-MAC bindings for all end-user devices on the network

Buy Now
Questions 37

What is a benefit of deploying HPE Aruba Networking ClearPass Device Insight?

Options:

A.

Highly accurate endpoint classification for environments with many device types, including Internet of Things (IoT)

B.

Simpler troubleshooting of ClearPass solutions across an environment with multiple ClearPass Policy Managers

C.

Visibility into devices’ 802.1X supplicant settings and automated certificate deployment

D.

Agent-based analysis of devices’ security settings and health status, with the ability to implement quarantining

Buy Now
Questions 38

You have a network with ArubaOS-Switches for which Aruba ClearPass Policy Manager (CPPM) is acting as a TACACS+ server to authenticate managers. CPPM assigns the admins a TACACS+ privilege level, either manager or operator. You are now adding ArubaOS-CX switches to the network. ClearPass admins want to use the same CPPM service and policies to authenticate managers on the new switches.

What should you explain?

Options:

A.

This approach cannot work because the ArubaOS-CX switches do not accept standard TACACS+ privilege levels.

B.

This approach cannot work because the ArubaOS-CX switches do not support TACACS+.

C.

This approach will work, but will need to be adjusted later if you want to assign managers to the default auditors group.

D.

This approach will work to assign admins to the default " administrators " group, but not to the default " operators " group.

Buy Now
Questions 39

You need to implement a WPA3-Enterprise network that can also support WPA2-Enterprise clients. What is a valid configuration for the WPA3-Enterprise WLAN?

Options:

A.

CNSA mode disabled with 256-bit keys

B.

CNSA mode disabled with 128-bit keys

C.

CNSA mode enabled with 256-bit keys

D.

CNSA mode enabled with 128-bit keys

Buy Now
Questions 40

What correctly describes the Pairwise Master Key (PMK) in thee specified wireless security protocol?

Options:

A.

In WPA3-Enterprise, the PMK is unique per session and derived using Simultaneous Authentication of Equals.

B.

In WPA3-Personal, the PMK is unique per session and derived using Simultaneous Authentication of Equals.

C.

In WPA3-Personal, the PMK is derived directly from the passphrase and is the same tor every session.

D.

In WPA3-Personal, the PMK is the same for each session and is communicated to clients that authenticate

Buy Now
Questions 41

Refer to the exhibit.

HPE6-A78 Question 41

A diem is connected to an ArubaOS Mobility Controller. The exhibit snows all Tour firewall rules that apply to this diem

What correctly describes how the controller treats HTTPS packets to these two IP addresses, both of which are on the other side of the firewall

10.1 10.10

203.0.13.5

Options:

A.

It drops both of the packets

B.

It permits the packet to 10.1.10.10 and drops the packet to 203 0.13.5

C.

it permits both of the packets

D.

It drops the packet to 10.1.10.10 and permits the packet to 203.0.13.5.

Buy Now
Questions 42

You are configuring ArubaOS-CX switches to tunnel client traffic to an Aruba Mobility Controller (MC). What should you do to enhance security for control channel communications between the switches and the MC?

Options:

A.

Create one UBT zone for control traffic and a second UBT zone for clients.

B.

Configure a long, random PAPI security key that matches on the switches and the MC.

C.

install certificates on the switches, and make sure that CPsec is enabled on the MC

D.

Make sure that the UBT client vlan is assigned to the interface on which the switches reach the MC and only that interface.

Buy Now
Questions 43

What is an Authorized client, as defined by AOS Wireless Intrusion Prevention System (WIP)?

Options:

A.

A client that is on the WIP whitelist

B.

A client that has a certificate issued by a trusted Certification Authority (CA)

C.

A client that is NOT on the WIP blacklist

D.

A client that has successfully authenticated to an authorized AP and passed encrypted traffic

Buy Now
Questions 44

You need to set up Aruba network infrastructure devices for management with SNMP. The SNMP server has this SNMPv3 user configured on it: username: airwave auth algorithm: sha auth key: fyluqp18@S!9a priv algorithm: aes priv key: 761oxaiaoeu19 &

What correctly describes the setup on the infrastructure device?

Options:

A.

You must configure a user with the same name and keys, but can choose algorithms that meet the device ' s needs.

B.

You must configure the " airwave " server as an authorized user. Then, configure a separate user for this device with its own keys.

C.

You must configure a user with the same name and algorithms, but the keys should be unique to this device.

D.

You must configure a user with exactly the same name, algorithms, and keys.

Buy Now
Questions 45

Refer to the exhibit.

HPE6-A78 Question 45

You have set up a RADIUS server on an ArubaOS Mobility Controller (MC) when you created a WLAN named " MyEmployees .You now want to enable the MC to accept change of authorization (CoA) messages from this server for wireless sessions on this WLAN.

What Is a part of the setup on the MC?

Options:

A.

Create a dynamic authorization, or RFC 3576, server with the 10.5.5.5 address and correct shared secret.

B.

Install the root CA associated with the 10 5.5.5 server ' s certificate as a Trusted CA certificate.

C.

Configure a ClearPass username and password in the MyEmployees AAA profile.

D.

Enable the dynamic authorization setting in the " clearpass " authentication server settings.

Buy Now
Questions 46

You have an Aruba solution with multiple Mobility Controllers (MCs) and campus APs. You want to deploy a WPA3-Enterprise WLAN and authenticate users to Aruba ClearPass Policy Manager (CPPM) with EAP-TLS.

What is a guideline for ensuring a successful deployment?

Options:

A.

Avoid enabling CNSA mode on the WLAN, which requires the internal MC RADIUS server.

B.

Ensure that clients trust the root CA for the MCs’ Server Certificates.

C.

Educate users in selecting strong passwords with at least 8 characters.

D.

Deploy certificates to clients, signed by a CA that CPPM trusts.

Buy Now
Questions 47

You have configured a WLAN to use Enterprise security with the WPA3 version.

How does the WLAN handle encryption?

Options:

A.

Traffic is encrypted with TKIP and keys derived from a PMK shared by all clients on the WLAN.

B.

Traffic is encrypted with TKIP and keys derived from a unique PMK per client.

C.

Traffic is encrypted with AES and keys derived from a PMK shared by all clients on the WLAN.

D.

Traffic is encrypted with AES and keys derived from a unique PMK per client.

Buy Now
Questions 48

You are checking the Security Dashboard in the Web Ul for your ArubaOS solution and see that Wireless Intrusion Prevention (WIP) has discovered a rogue radio operating in ad hoc mode with open security. What correctly describes a threat that the radio could pose?

Options:

A.

It could open a backdoor into the corporate LAN for unauthorized users.

B.

It is running in a non-standard 802.11 mode and could effectively jam the wireless signal.

C.

It is flooding the air with many wireless frames in a likely attempt at a DoS attack.

D.

It could be attempting to conceal itself from detection by changing its BSSID and SSID frequently.

Buy Now
Questions 49

Refer to the exhibit:

port-access role role1 vlan access 11

port-access role role2 vlan access 12

port-access role role3 vlan access 13

port-access role role4 vlan access 14

aaa authentication port-access dot1x authenticator

enable

interface 1/1/1

no shutdown

no routing

vlan access 1

aaa authentication port-access critical-role role1

aaa authentication port-access preauth-role role2

aaa authentication port-access auth-role role3

interface 1/1/2

no shutdown

no routing

vlan access 1

aaa authentication port-access critical-role role1

aaa authentication port-access preauth-role role2

aaa authentication port-access auth-role role3

The exhibit shows the configuration on an AOS-CX switch.

    Client1 connects to port 1/1/1 and authenticates to HPE Aruba Networking ClearPass Policy Manager (CPPM). CPPM sends an Access-Accept with this VSA: Aruba-User-Role: role4.

    Client2 connects to port 1/1/2 and does not attempt to authenticate. To which roles are the users assigned?

Options:

A.

Client1 = role3; Client2 = role2

B.

Client1 = role4; Client2 = role1

C.

Client1 = role4; Client2 = role2

D.

Client1 = role3; Client2 = role1

Buy Now
Questions 50

An ArubaOS-CX switch enforces 802.1X on a port. No fan-through options or port-access roles are configured on the port The 802 1X supplicant on a connected client has not yet completed authentication

Which type of traffic does the authenticator accept from the client?

Options:

A.

EAP only

B.

DHCP, DNS and RADIUS only

C.

RADIUS only

D.

DHCP, DNS, and EAP only

Buy Now
Exam Code: HPE6-A78
Exam Name: Aruba Certified Network Security Associate Exam
Last Update: May 16, 2026
Questions: 167

PDF + Testing Engine

$64.99  $185.69

Testing Engine

$49.99  $142.83
buy now HPE6-A78 testing engine

PDF (Q&A)

$54.99  $157.11
buy now HPE6-A78 pdf