Pre-Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free HP HPE7-A02 Practice Exam with Questions & Answers | Set: 3

Questions 21

A company wants HPE Aruba Networking ClearPass Policy Manager (CPPM) to periodically poll Microsoft Endpoint Manager (formerly Intune) for attributes about its managed clients.

What should you do on ClearPass to permit this integration?

Options:
A.

Install the Intune extension from ClearPass Guest

B.

Import the Intune dictionary into the ClearPass dictionaries

C.

Create an Intune authentication source on CPPM

D.

Configure Endpoint Manager (Intune) as an event source on CPPM

HP HPE7-A02 Premium Access
Questions 22

HPE7-A02 Question 22

(Note that the HPE Aruba Networking Central interface shown here might look slightly different from what you see in your HPE Aruba Networking Central

interface as versions change; however, similar concepts continue to apply.)

An HPE Aruba Networking 9x00 gateway is part of an HPE Aruba Networking Central group that has the settings shown in the exhibit. What would cause the

gateway to drop traffic as part of its IDPS settings?

Options:
A.

Its site-to-site VPN connections failing

B.

Traffic matching a rule in the active ruleset

C.

Its IDPS engine failing

D.

Traffic showing anomalous behavior

Questions 23

HPE Aruba Networking Central displays an alert about an Infrastructure Attack that was detected. You go to the Security > RAPIDS events and see that the attack

was " Detect adhoc using Valid SSID. "

What is one possible next step?

Options:
A.

Use HPE Aruba Networking Central floorplans or the detecting AP identities to locate the general area for the threat.

B.

Look for the IP address associated with the offender and then check for that IP address among HPE Aruba Networking Central clients.

C.

Make sure that you have tuned the threshold for that check, as false positives are common for it.

D.

Make sure that clients have updated drivers, as faulty drivers are a common explanation for this attack type.

Questions 24

Refer to the exhibit.

HPE7-A02 Question 24

You are reviewing packets in Wireshark. The capture shows traffic from source IP address 10.1.14.10 to several destinations in the 10.1.15.0/24 network. The packets use TCP flags FIN, PSH, and URG together.

What can you interpret from the packets that you see here?

Options:
A.

10.1.14.10 might be running a TCP port scan, but it may simply be trying to open TCP sessions with several destinations.

B.

10.1.14.10 is almost certainly running a TCP port scan because this type of packet does not legitimately exist.

C.

10.1.14.10 is launching a denial-of-service attack against Windows machines in 10.1.15.0/24.

D.

10.1.14.10 is showing some signs of launching a DoS attack, but might simply be misconfigured.

Questions 25

What is one use case that companies can fulfill using HPE Aruba Networking ClearPass Policy Manager ' s (CPPM ' s) Device Profiler?

Options:
A.

OIdentifying device security vulnerabilities by CVE ID and receiving remediation recommendations

B.

Leveraging artificial intelligence to more accurately identify Internet of Things (loT) devices

C.

Quarantining devices that do not have the required antivirus software installed on them

D.

Assigning different AOS firewall roles to users on computers and the same users on smartphones

Questions 26

A company has AOS-CX switches. The company wants to make it simpler and faster for admins to detect denial of service (DoS) attacks, such as ping or ARP floods, launched against the switches.

What can you do to support this use case?

Options:
A.

Deploy an NAE agent on the switches to monitor control plane policing (CoPP).

B.

Configure the switches to implement RADIUS accounting to HPE Aruba Networking ClearPass and enable HPE Aruba Networking ClearPass Insight.

C.

Implement ARP inspection on all VLANs that support end-user devices.

D.

Enabling debugging of security functions on the switches.

Questions 27

A company is using HPE Aruba Networking ClearPass Device Insight (CPDI) (the standalone application). In the CPDI security settings, Security Analysis is On, the Data Source is ClearPass Device Insight, and Enable Posture Assessment is On. You see that a device has a Risk Score of 90.

What can you know from this information?

Options:
A.

The posture is unknown, and CPDI has detected exactly four vulnerabilities on the device.

B.

The posture is healthy, but CPDI has detected multiple vulnerabilities on the device.

C.

The posture is unhealthy, and CPDI has also detected at least one vulnerability on the device.

D.

The posture is unhealthy, but CPDI has not detected any vulnerabilities on the device.

Questions 28

A company has a variety of HPE Aruba Networking solutions, including an HPE Aruba Networking infrastructure and HPE Aruba Networking ClearPass Policy Manager (CPPM). The company passes traffic from the corporate LAN destined to the data center through a third-party SRX firewall. The company would like to further protect itself from internal threats. What is one solution that you can recommend?

Options:
A.

Have the third-party firewall send Syslogs to CPPM, which can work with network devices to lock internal attackers out of the network.

B.

Add ClearPass Device Insight (CPDI) to the solution, integrate it with the third-party firewall to develop more complete device profiles.

C.

Configure CPPM to poll the third-party firewall for a broad array of information about internal clients, such as profile and posture.

D.

Use tunnel mode SSIDs and user-based tunneling (UBT) on AOS-CX switches to pass all internal traffic directly through the third-party firewall.

Questions 29

You are setting up user-based tunneling (UBT) between access layer AOS-CX switches and AOS-10 gateways. You have selected reserved (local) VLAN mode.

Tunneled devices include IoT devices, which should be assigned to:

Roles: iot on the switches and iot-wired on the gateways

VLAN: 64, for which the gateways route traffic.

IoT devices connect to the access layer switches ' edge ports, and the access layer switches reach the gateways on their uplinks.

Where must you configure VLAN 64?

Options:
A.

In the iot-wired role and on no physical interfaces

B.

In the iot role and the iot-wired role and on no physical interfaces

C.

In the iot-wired role and the access switch uplinks

D.

In the iot role and the access switch uplinks

Questions 30

A company has Aruba APs that are controlled by Central and that implement WIDS. When you check WIDS events, you see a " detect valid SSID misuse " event. What can you interpret from this event, and what steps should you take?

Options:
A.

Clients are failing to authenticate to corporate SSIDs. You should first check for misconfigured authentication settings and then investigate a possible threat.

B.

Admins have likely misconfigured SSID security settings on some of the company ' s APs. You should have them check those settings.

C.

Hackers are likely trying to pose as authorized APs. You should use the detecting radio information and immediately track down the device that triggered the event.

D.

This event might be a threat but is almost always a false positive. You should wait to see the event over several days before following up on it.