Q: 1
What is a use case for Transport Layer Security (TLS)?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
Which correctly describes one of HPE Aruba Networking ClearPass Policy Manager's (CPPM's) device
profiling methods?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
A company has Aruba Mobility Controllers (MCs), Aruba campus APs, and ArubaOS-CX switches. The
company plans to use ClearPass Policy Manager (CPPM) to classify endpoints by type. The company
is contemplating the use of ClearPass’s TCP fingerprinting capabilities.
What is a consideration for using those capabilities?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
A client has accessed an HTTPS server at myhost1.example.com using Chrome. The server sends a
certificate that includes these properties:
Subject name: myhost.example.com
SAN: DNS: myhost.example.com; DNS: myhost1.example.com
Extended Key Usage (EKU): Server authentication
Issuer: MyCA_Signing
The server also sends an intermediate CA certificate for MyCA_Signing, which is signed by MyC
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
How can hackers implement a man-in-the-middle (MITM) attack against a wireless client?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
A company has an ArubaOS solution. The company wants to prevent users assigned to the
"user_group1" role from using gaming and peer-to-peer applications.
What is the recommended approach for these requirements?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
You have been instructed to look in the ArubaOS Security Dashboard's client list. Your goal is to find
clients that belong to the company and have connected to devices that might belong to hackers.
Which client fits this description?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
Refer to the exhibit:
port-access role role1 vlan access 11
port-access role role2 vlan access 12
port-access role role3 vlan access 13
port-access role role4 vlan access 14
aaa authentication port-access dot1x authenticator
enable
interface 1/1/1
no shutdown
no routing
vlan access 1
aaa authentication port-access critical-role role1
aaa authentication port-access preauth-role role2
aaa authentication port-access auth-role role3
interface 1/1/2
no shutdown
no routing
vlan access 1
aaa authentication port-access critical-role role1
aaa authentication port-access preauth-role role2
aaa authentication port-access auth-role role3
The exhibit shows the configuration on an AOS-CX switch.
Client1 connects to port 1/1/1 and authenticates to HPE Aruba Networking ClearPass Policy Manager
(CPPM). CPPM sends an Access-Accept with this VSA: Aruba-User-Role: role4.
Client2 connects to port 1/1/2 and does not attempt to authenticate.
To which roles are the users assigned?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
A company has HPE Aruba Networking Mobility Controllers (MCs), campus APs, and AOS-CX
switches. The company plans to use HPE Aruba Networking ClearPass Policy Manager (CPPM) to
classify endpoints by type. This company is using only CPPM and no other HPE Aruba Networking
ClearPass solutions.
The HPE Aruba Networking ClearPass admins tell you that they want to use HTTP User-Agent strings
to help profile the endpoints.
What should you do as a part of setting up Mobility Controllers (MCs) to support this requirement?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2