Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free HP HPE6-A78 Practice Exam with Questions & Answers | Set: 5

Questions 41

You have configured a WLAN to use Enterprise security with the WPA3 version.

How does the WLAN handle encryption?

Options:
A.

Traffic is encrypted with TKIP and keys derived from a PMK shared by all clients on the WLAN.

B.

Traffic is encrypted with TKIP and keys derived from a unique PMK per client.

C.

Traffic is encrypted with AES and keys derived from a PMK shared by all clients on the WLAN.

D.

Traffic is encrypted with AES and keys derived from a unique PMK per client.

HP HPE6-A78 Premium Access
Questions 42

HPE6-A78 Question 42

What is another setting that you must configure on the switch to meet these requirements?

Options:
A.

Set the aaa authentication login method for SSH to the "radius" server-group (with local as backup).

B.

Configure a CPPM username and password that match a CPPM admin account.

C.

Create port-access roles with the same names of the roles that CPPM will send in Aruba-Admin-Role VSAs.

D.

Disable SSH on the default VRF and enable it on the mgmt VRF instead.

Questions 43

What is a benefit of Protected Management Frames (PMF). sometimes called Management Frame Protection (MFP)?

Options:
A.

PMF helps to protect APs and MCs from unauthorized management access by hackers.

B.

PMF ensures trial traffic between APs and Mobility Controllers (MCs) is encrypted.

C.

PMF prevents hackers from capturing the traffic between APs and Mobility Controllers.

D.

PMF protects clients from DoS attacks based on forged de-authentication frames

Questions 44

What is a guideline for managing local certificates on AOS-CX switches?

Options:
A.

Understand that the switch must use the same certificate for all usages, such as its HTTPS server and RadSec client.

B.

Create a self-signed certificate online on the switch because AOS-CX switches do not support CA-signed certificates.

C.

Before installing the local certificate, create a trust anchor (TA) profile with the root CA certificate for the certificate that you will install.

D.

Install an Online Certificate Status Protocol (OCSP) certificate to simplify the process of enrolling and re-enrolling for certificates.

Questions 45

What is a correct use case for using the specified certificate file format?

Options:
A.

using a PKCS7 file to install a certificate plus and its private key on a device

B.

using a PKCS12 file to install a certificate plus its private key on a device

C.

using a PEM file to install a binary encoded certificate on a device

D.

using a PKCS7 file to install a binary encoded private key on a device

Questions 46

A company has Aruba Mobility Controllers (MCs), Aruba campus APs, and ArubaOS-Switches. The company plans to use ClearPass Policy Manager (CPPM) to classify endpoints by type. This company is using only CPPM and no other ClearPass solutions.

The ClearPass admins tell you that they want to use HTTP User-Agent strings to help classify endpoints.

What should you do as a part of configuring the ArubaOS-Switches to support this requirement?

Options:
A.

Create a device fingerprinting policy that includes HTTP, and apply the policy to edge ports.

B.

Create remote mirrors that collect traffic on edge ports, and mirror it to CPPM's IP address.

C.

Configure CPPM as the sFlow collector, and make sure that sFlow is enabled on edge ports.

D.

Connect the switches to CPPM's span ports, and set up mirroring of HTTP traffic on the switches.

Questions 47

What is a correct description of a stage in the Lockheed Martin kill chain?

Options:
A.

In the delivery stage, the hacker delivers malware to targeted users, often with spear phishing methods.

B.

In the installation phase, hackers seek to install vulnerabilities in operating systems across the network.

C.

In the weaponization stage, malware installed in the targeted network seeks to attack intrusion prevention systems (IPS).

D.

In the exploitation phase, hackers conduct social engineering attacks to exploit weak algorithms and crack user accounts.

Questions 48

You have an AOS-8 architecture, consisting of a Mobility Conductor (MC) and Mobility Controllers (MCs). You want to monitor wireless clients’ application usage in the Traffic Analysis dashboard. What is a requirement?

Options:
A.

Configuring packet capturing on the MCs’ data plane

B.

Enabling logging on the users category on the MCs

C.

Discovering the mobility devices in HPE Aruba Networking Central

D.

Enabling firewall visibility and deep packet inspection (DPI) on the MCs

Questions 49

A user is having trouble connecting to an AP managed by a standalone Mobility Controller (MC). What can you do to get detailed logs and debugs for that user's client?

Options:
A.

In the MC CLI, set up a control plane packet capture and filter for the client's IP address.

B.

In the MC CLI, set up a data plane packet capture and filter for the client's MAC address.

C.

In the MC UI’s Traffic Analytics dashboard, look for the client's IP address.

D.

In the MC UI’s Diagnostics > Logs pages, add a "user-debug" log setting for the client's MAC address.

Questions 50

What is a correct guideline for the management protocols that you should use on AOS-CX switches?

Options:
A.

Make sure that SSH is disabled and use HTTPS instead.

B.

Make sure that Telnet is disabled and use SSH instead.

C.

Make sure that Telnet is disabled and use TFTP instead.

D.

Make sure that HTTPS is disabled and use SSH instead.