Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > HP > Aruba-ACNSA > HPE6-A78

HPE6-A78 Aruba Certified Network Security Associate Exam Question and Answers

Question # 4

What is an Authorized client as defined by ArubaOS Wireless Intrusion Prevention System (WIP)?

A.

a client that has a certificate issued by a trusted Certification Authority (CA)

B.

a client that is not on the WIP blacklist

C.

a client that has successfully authenticated to an authorized AP and passed encrypted traffic

D.

a client that is on the WIP whitelist.

Full Access
Question # 5

What is a guideline for managing local certificates on an ArubaOS-Switch?

A.

Before installing the local certificate, create a trust anchor (TA) profile with the root CA certificate for the certificate that you will install

B.

Install an Online Certificate Status Protocol (OCSP) certificate to simplify the process of enrolling and re-enrolling for certificate

C.

Generate the certificate signing request (CSR) with a program offline, then, install both the certificate and the private key on the switch in a single file.

D.

Create a self-signed certificate online on the switch because ArubaOS-Switches do not support CA-signed certificates.

Full Access
Question # 6

What are some functions of an AruDaOS user role?

A.

The role determines which authentication methods the user must pass to gain network access

B.

The role determines which firewall policies and bandwidth contract apply to the clients traffic

C.

The role determines which wireless networks (SSiDs) a user is permitted to access

D.

The role determines which control plane ACL rules apply to the client's traffic

Full Access
Question # 7

What is a vulnerability of an unauthenticated Dime-Heliman exchange?

A.

A hacker can replace the public values exchanged by the legitimate peers and launch an MITM attack.

B.

A brute force attack can relatively quickly derive Diffie-Hellman private values if they are able to obtain public values

C.

Diffie-Hellman with elliptic curve values is no longer considered secure in modem networks, based on NIST recommendations.

D.

Participants must agree on a passphrase in advance, which can limit the usefulness of Diffie- Hell man in practical contexts.

Full Access
Question # 8

Refer to the exhibit, which shows the current network topology.

You are deploying a new wireless solution with an Aruba Mobility Master (MM). Aruba Mobility Controllers (MCs). and campus APs (CAPs). The solution will Include a WLAN that uses Tunnel for the forwarding mode and Implements WPA3-Enterprise security

What is a guideline for setting up the vlan for wireless devices connected to the WLAN?

A.

Assign the WLAN to a single new VLAN which is dedicated to wireless users

B.

Use wireless user roles to assign the devices to different VLANs in the 100-150 range

C.

Assign the WLAN to a named VLAN which specified 100-150 as the range of IDs.

D.

Use wireless user roles to assign the devices to a range of new vlan IDs.

Full Access
Question # 9

What is a correct guideline for the management protocols that you should use on ArubaOS-Switches?

A.

Disable Telnet and use TFTP instead.

B.

Disable SSH and use https instead.

C.

Disable Telnet and use SSH instead

D.

Disable HTTPS and use SSH instead

Full Access