Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free HP HPE6-A78 Practice Exam with Questions & Answers | Set: 4

Questions 31

Refer to the exhibits.

HPE6-A78 Question 31

An admin has created a WLAN that uses the settings shown in the exhibits (and has not otherwise adjusted the settings in the AAA profile). A client connects to the WLAN. Under which circumstances will a client receive the default role assignment?

Options:
A.

The client has attempted 802.1X authentication, but the MC could not contact the authentication server.

B.

The client has passed 802.1X authentication, and the authentication server did not send an Aruba-User-Role VSA.

C.

The client has attempted 802.1X authentication, but failed to maintain a reliable connection, leading to a timeout error.

D.

The client has passed 802.1X authentication, and the value in the Aruba-User-Role VSA matches a role on the MC.

HP HPE6-A78 Premium Access
Questions 32

Refer to the exhibit.

HPE6-A78 Question 32

You are deploying a new ArubaOS Mobility Controller (MC), which is enforcing authentication to Aruba ClearPass Policy Manager (CPPM). The authentication is not working correctly, and you find the error shown In the exhibit in the CPPM Event Viewer.

What should you check?

Options:
A.

that the MC has been added as a domain machine on the Active Directory domain with which CPPM is synchronized

B.

that the snared secret configured for the CPPM authentication server matches the one defined for the device on CPPM

C.

that the IP address that the MC is using to reach CPPM matches the one defined for the device on CPPM

D.

that the MC has valid admin credentials configured on it for logging into the CPPM

Questions 33

You have been instructed to look in an AOS Security Dashboard’s client list. Your goal is to find clients that belong to the company and have connected to devices that might belong to hackers.

Which client fits this description?

Options:
A.

MAC address: d8:50:e6:f3:6d:a4; Client Classification: Authorized; AP Classification: Suspected Rogue

B.

MAC address: d8:50:e6:f3:6e:c5; Client Classification: Interfering; AP Classification: Neighbor

C.

MAC address: d8:50:e6:f3:6e:60; Client Classification: Interfering; AP Classification: Interfering

D.

MAC address: d8:50:e6:f3:70:ab; Client Classification: Interfering; AP Classification: Suspected Rogue

Questions 34

The monitoring admin has asked you to set up an AOS-CX switch to meet these criteria:

    Send logs to a SIEM Syslog server at 10.4.13.15 at the standard TCP port (514)

    Send a log for all events at the "warning" level or above; do not send logs with a lower level than "warning"The switch did not have any "logging" configuration on it. You then entered this command:AOS-CX(config)# logging 10.4.13.15 tcp vrf defaultWhat should you do to finish configuring to the requirements?

Options:
A.

Specify the "warning" severity level for the logging server.

B.

Add logging categories at the global level.

C.

Ask for the Syslog password and configure it on the switch.

D.

Configure logging as a debug destination.

Questions 35

What is one practice that can help you to maintain a digital chain or custody In your network?

Options:
A.

Enable packet capturing on Instant AP or Moodily Controller (MC) datepath on an ongoing basis

B.

Enable packet capturing on Instant AP or Mobility Controller (MC) control path on an ongoing basis.

C.

Ensure that all network infrastructure devices receive a valid clock using authenticated NTP

D.

Ensure that all network Infrastructure devices use RADIUS rather than TACACS+ to authenticate managers

Questions 36

What is a difference between passive and active endpoint classification?

Options:
A.

Passive classification refers exclusively to MAC OUI-based classification, while active classification refers to any other classification method.

B.

Passive classification classifies endpoints based on entries in dictionaries, while active classification uses admin-defined rules to classify endpoints.

C.

Passive classification is only suitable for profiling endpoints in small business environments, while enterprises should use active classification exclusively.

D.

Passive classification analyzes traffic that endpoints send as part of their normal functions; active classification involves sending requests to endpoints.

Questions 37

You are deploying an Aruba Mobility Controller (MC). What is a best practice for setting up secure management access to the ArubaOS Web UP

Options:
A.

Avoid using external manager authentication tor the Web UI.

B.

Change the default 4343 port tor the web UI to TCP 443.

C.

Install a CA-signed certificate to use for the Web UI server certificate.

D.

Make sure to enable HTTPS for the Web UI and select the self-signed certificate Installed in the factory.

Questions 38

What is a benefit of Opportunistic Wireless Encryption (OWE)?

Options:
A.

It allows both WPA2-capable and WPA3-capable clients to authenticate to the same WPA-Personal WLAN.

B.

It offers more control over who can connect to the wireless network when compared with WPA2-Personal.

C.

It allows anyone to connect, but provides better protection against eavesdropping than a traditional open network.

D.

It provides protection for wireless clients against both honeypot APs and man-in-the-middle (MITM) attacks.

Questions 39

Which attack is an example of social engineering?

Options:
A.

An email is used to impersonate a bank and trick users into entering their bank login information on a fake website page.

B.

An attack exploits an operating system vulnerability and locks out users until they pay the ransom.

C.

A hacker eavesdrops on insecure communications, such as Remote Desktop Protocol (RDP), and discovers login credentials.

D.

A user visits a website and downloads a file that contains a worm, which self-replicates throughout the network.

Questions 40

Refer to the exhibit:

port-access role role1 vlan access 11

port-access role role2 vlan access 12

port-access role role3 vlan access 13

port-access role role4 vlan access 14

aaa authentication port-access dot1x authenticator

enable

interface 1/1/1

no shutdown

no routing

vlan access 1

aaa authentication port-access critical-role role1

aaa authentication port-access preauth-role role2

aaa authentication port-access auth-role role3

interface 1/1/2

no shutdown

no routing

vlan access 1

aaa authentication port-access critical-role role1

aaa authentication port-access preauth-role role2

aaa authentication port-access auth-role role3

The exhibit shows the configuration on an AOS-CX switch.

    Client1 connects to port 1/1/1 and authenticates to HPE Aruba Networking ClearPass Policy Manager (CPPM). CPPM sends an Access-Accept with this VSA: Aruba-User-Role: role4.

    Client2 connects to port 1/1/2 and does not attempt to authenticate.To which roles are the users assigned?

Options:
A.

Client1 = role3; Client2 = role2

B.

Client1 = role4; Client2 = role1

C.

Client1 = role4; Client2 = role2

D.

Client1 = role3; Client2 = role1