A company has HPE Aruba Networking APs, which authenticate users to HPE Aruba Networking ClearPass Policy Manager (CPPM).
What does HPE Aruba Networking recommend as the preferred method for assigning clients to a role on the AOS firewall?
A company has HPE Aruba Networking gateways that implement gateway IDS/IPS. Admins sometimes check the Security Dashboard, but they want a faster way
to discover if a gateway starts detecting threats in traffic.
What should they do?
Which use case is fulfilled by applying a time range to a firewall rule on an AOS device?
A company has AOS-CX switches and HPE Aruba Networking APs, which run AOS-10 and bridge their SSIDs. Company security policies require 802.1X on all edge ports, some of which connect to APs. How should you configure the auth-mode on AOS-CX switches?
What is a benefit of Online Certificate Status Protocol (OCSP)?
A company needs to enforce 802.1X authentication for its Windows domain computers to HPE Aruba Networking ClearPass Policy Manager (CPPM). The
company needs the computers to authenticate as both machines and users in the same session.
Which authentication method should you set up on CPPM?
A company has HPE Aruba Networking APs running AOS-10 and managed by HPE Aruba Networking Central. The company also has AOS-CX switches. The
security team wants you to capture traffic from a particular wireless client. You should capture this client's traffic over a 15 minute time period and then send the
traffic to them in a PCAP file.
What should you do?
A company lacks visibility into the many different types of user and loT devices deployed in its internal network, making it hard for the security team to address
those devices.
Which HPE Aruba Networking solution should you recommend to resolve this issue?
Refer to the exhibit:
The exhibit shows the TACACS+ enforcement profile that HPE Aruba Networking ClearPass Policy Manager (CPPM) assigns to a manager. When this manager logs into an AOS-CX switch, what does the switch do?
You manage AOS-10 APs with HPE Aruba Networking Central. A role is configured on these APs with the following rules:
Allow UDP on port 67 to any destination
Allow any to network 10.1.6.0/23
Deny any to network 10.1.0.0/16 + log
Deny any to network 10.0.0.0/8
Allow any to any destination
You add this new rule immediately before rule 2:
Deny SSH to network 10.1.4.0/23 + denylist
What happens when a client assigned to this role sends SSH traffic to 10.1.11.42?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
HP Free Exams |
---|
![]() |