Pre-Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free HP HPE7-A02 Practice Exam with Questions & Answers | Set: 2

Questions 11

A company is using HPE Aruba Networking Central SD-WAN Orchestrator to establish a hub-spoke VPN between branch gateways (BGWs) at 1164 site and VPNCs at multiple data centers. What is part of the configuration that admins need to complete?

Options:
A.

In VPNCs’ groups, establish VPN pools to control which branches connect to which VPNCs.

B.

In BGWs’ and VPNCs’ groups, create default IKE policies for the SD-WAN Orchestrator to use.

C.

In BGWs’ groups, select the VPNCs to which to connect in a DC preference list.

D.

At the global level, create default IPsec policies for the SD-WAN Orchestrator to use.

HP HPE7-A02 Premium Access
Questions 12

A company has AOS-CX switches at the access layer, managed by HPE Aruba Networking Central. You have identified suspicious activity on a wired client. You want to analyze the client ' s traffic with Wireshark, which you have on your management station.

What should you do?

Options:
A.

Access the client ' s switch ' s CLI from your management station. Access the switch shell and run a TCP dump on the client port.

B.

Go to the client ' s switch in HPE Aruba Networking Central. Use the " Security " page to run a packet capture.

C.

Set up a policy that implements a captive portal redirect to your management station. Apply that policy to the client ' s port.

D.

Set up a mirror session on the client ' s switch; set the client port as the source and your station IP address as the tunnel destination.

Questions 13

You manage AOS-10 APs with HPE Aruba Networking Central. A role is configured on these APs with these rules (in order):

Allow UDP on port 67 to any destination

Allow any to network 10.1.4.0/23

Deny any to network 10.1.0.0/18 + log

Deny any to network 10.0.0.0/8

Allow any to any destination

You add this new rule immediately before rule 4:

Deny SSH to network 10.1.0.0/21 + denylist

After this change, what happens when a client assigned to this role sends SSH traffic to 10.1.7.12?

Options:
A.

The traffic is permitted

B.

The traffic is dropped and logged

C.

The traffic is dropped, and the client is denylisted

D.

The traffic is dropped (without any logging or further action against the client)

Questions 14

Which statement describes Zero Trust Security?

Options:
A.

Companies must apply the same access controls to all users, regardless of identity.

B.

Companies that support remote workers cannot achieve zero trust security and must determine if the benefits outweigh the cost.

C.

Companies should focus on protecting their resources rather than on protecting the boundaries of their internal network.

D.

Companies can achieve zero trust security by strengthening their perimeter security to detect a wider range of threats.

Questions 15

You are establishing a cluster of HPE Aruba Networking ClearPass servers. (Assume that they are running version 6.9.).

For which type of certificate it is recommended to install a CA-signed certificate on the Subscriber before it joins the cluster?

Options:
A.

Database

B.

HTTPS

C.

RADIUS/EAP

D.

RadSec

Questions 16

You have created this rule in an HPE Aruba Networking ClearPass Policy Manager (CPPM) service ' s enforcement policy: IF Authorization [Endpoints Repository]

Conflict EQUALS true THEN apply " quarantine_profile "

What information can help you determine whether you need to configure cluster-wide profiler parameters to ignore some conflicts?

Options:
A.

Whether the company has rare Internet of Things (loT) devices

B.

Whether some devices are incapable of captive portal or 802.1X authentication

C.

Whether the company has devices that use PXE boot

D.

Whether some devices are running legacy operating systems

Questions 17

A company is using HPE Aruba Networking ClearPass Device Insight (CPDI). In the CPDI security settings, Security Analysis is on, the Data Source is ClearPass Device Insight, and Enable Posture Assessment is on. You check multiple Windows 10 devices’ Security tab in their device profiles. No vulnerabilities are detected, and the posture for all devices is unknown.

What is one setting that you should check?

Options:
A.

A WMI augmentation method is attached to these devices’ subnet segments.

B.

CPDI has been integrated with CPPM and is receiving information from it.

C.

Traffic is mirrored from core routing switches’ uplinks to Data Collectors’ SPAN ports.

D.

All Data Collectors have both their Management and Data ports connected.

Questions 18

A company is using HPE Aruba Networking ClearPass Device Insight (CPDI) (the standalone application). In the CPDI security settings, Security Analysis is On,

the Data Source is ClearPass Devices Insight, and Enable Posture Assessment is On. You see that device has a Risk Score of 90.

What can you know from this information?

Options:
A.

The posture is unhealthy, and CPDI has also detected at least one vulnerability on the device.

B.

The posture is unhealthy, but CPDI has not detected any vulnerabilities on the device.

C.

The posture is healthy, but CPDI has detected multiple vulnerabilities on the device.

D.

The posture is unknown, and CPDI has detected exactly four vulnerabilities on the device.

Questions 19

An admin has configured an AOS-CX switch with these settings:

port-access role employees

vlan access name employees

This switch is also configured with CPPM as its RADIUS server.

Which enforcement profile should you configure on CPPM to work with this configuration?

Options:
A.

RADIUS Enforcement type with HPE-User-Role VSA set to " employees "

B.

HPE Aruba Networking Downloadable Role Enforcement type with role name set to " employees "

C.

HPE Aruba Networking Downloadable Role Enforcement type with gateway role name set to " employees "

D.

RADIUS Enforcement type with Aruba-User-Role VSA set to " employees "

Questions 20

You are configuring an HPE Aruba Networking VIA solution for a customer. The customer wants this behavior for remote clients that connect to the VPN:

    They forward internet traffic locally.

    They forward traffic destined to the data center over the VPN.

How can you configure this behavior?

Options:
A.

Use the firewall role to which users are assigned after VIA Web authentication to configure the forwarding rules.

B.

Use the firewall role to which users are assigned after IKE authentication to configure the forwarding rules.

C.

Enable split tunneling in the VIA Connection Profile and add the data center networks to the tunneled networks list.

D.

Specify the data center networks in a VPN pool; associate that pool to the role to which users are assigned after IKE authentication.