Special Summer Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

HPE7-A02 Sample Questions Answers

Questions 4

A company has HPE Aruba Networking APs, which authenticate users to HPE Aruba Networking ClearPass Policy Manager (CPPM).

What does HPE Aruba Networking recommend as the preferred method for assigning clients to a role on the AOS firewall?

Options:

A.

Configure CPPM to assign the role using a RADIUS enforcement profile with a RADIUS:IETF Username attribute.

B.

Configure CPPM to assign the role using a RADIUS enforcement profile with an Aruba-User-Role VSA.

C.

OCreate server rules on the APs to assign clients to roles based on RADIUS IETF attributes returned by CPPM.

D.

Create user rules on the APs to assign clients to roles based on a variety of criteria.

Buy Now
Questions 5

You have enabled "rogue AP containment" in the Wireless IPS settings for a company’s HPE Aruba Networking APs. What form of containment does HPE Aruba Networking recommend?

Options:

A.

Wireless deauthentication only

B.

Wireless tarpit and wired containment

C.

Wireless tarpit only

D.

Wired containment

Buy Now
Questions 6

You want to examine the applications that a device is using and look for any changes in application usage over several different ranges. In which HPE Aruba Networking solution can you view this information in an easy-to-view format?

Options:

A.

HPE Aruba Networking ClearPass OnGuard agent installed on the device

B.

HPE Aruba Networking Central within a device's Live Monitoring page

C.

HPE Aruba Networking ClearPass Insight using an Active Endpoint Security report

D.

HPE Aruba Networking ClearPass Device Insight (CPDI) in the device's network activity

Buy Now
Questions 7

What is a use case for the HPE Aruba Networking ClearPass OnGuard dissolvable agent?

Options:

A.

Continuously monitoring Windows domain clients for compliance

B.

Implementing a one-time compliance scan

C.

Auto-remediating posture issues on clients

D.

Periodically scanning Linux clients for security issues

Buy Now
Questions 8

A company has AOS-CX switches. The company wants to make it simpler and faster for admins to detect denial of service (DoS) attacks, such as ping or ARP floods, launched against the switches.

What can you do to support this use case?

Options:

A.

Deploy an NAE agent on the switches to monitor control plane policing (CoPP).

B.

Configure the switches to implement RADIUS accounting to HPE Aruba Networking ClearPass and enable HPE Aruba Networking ClearPass Insight.

C.

Implement ARP inspection on all VLANs that support end-user devices.

D.

Enabling debugging of security functions on the switches.

Buy Now
Questions 9

What is one benefit of integrating HPE Aruba Networking ClearPass Policy Manager (CPPM) with third-party solutions such as Mobility Device Management (MDM) and firewalls?

Options:

A.

CPPM can exchange contextual information about clients with third-party solutions, which helps make better decisions.

B.

CPPM can make the third-party solutions more secure by adding signature-based threat detection capabilities.

C.

CPPM can offload policy decisions to the third-party solutions, enabling CPPM to respond to authentication requests more quickly.

D.

CPPM can take over filtering internal traffic so that the third-party solutions have more processing power to devote to filtering external traffic.

Buy Now
Questions 10

HPE Aruba Networking Central displays an alert about an Infrastructure Attack that was detected. You go to the Security > RAPIDS events and see that the attack was "Detect adhoc using Valid SSID." What is one possible next step?

Options:

A.

Make sure that you have tuned the threshold for that check as false positives are common for it.

B.

Make sure that clients have updated drivers, as faulty drivers are a common explanation for this attack type.

C.

Use HPE Aruba Networking Central floorplans or the detecting AP identities to locate the general area for the threat.

D.

Look for the IP address associated with the offender and then check for that IP address among HPE Aruba Networking Central clients.

Buy Now
Questions 11

A company assigns a different block of VLAN IDs to each of its access layer AOS-CX switches. The switches run version 10.07. The IDs are used for standard

purposes, such as for employees, VolP phones, and cameras. The company wants to apply 802.1X authentication to HPE Aruba Networking ClearPass Policy

Manager (CPPM) and then steer clients to the correct VLANs for local forwarding.

What can you do to simplify setting up this solution?

Options:

A.

Assign consistent names to VLANs of the same type across the AOS-CX switches and have user-roles reference names.

B.

Use the trunk allowed VLAN setting to assign multiple VLAN IDs to the same role.

C.

Change the VLAN IDs across the AOS-CX switches so that they are consistent.

D.

Avoid configuring the VLAN in the role; use trunk VLANs to assign multiple VLANs to the port instead.

Buy Now
Questions 12

A company wants HPE Aruba Networking ClearPass Policy Manager (CPPM) to respond to Syslog messages from its Check Point firewall. You have added the

firewall as an event source and set up an event service. However, test Syslog messages are not triggering the expected actions.

What is one CPPM setting that you should check?

Options:

A.

ClearPass Device Insight integration is disabled.

B.

The Check Point Extension is installed through ClearPass Guest.

C.

The CoA delay value is set to 0 on the server.

D.

Ingress Event Dictionaries for Check Point messages are enabled.

Buy Now
Questions 13

What is one use case for implementing user-based tunneling (UBT) on AOS-CX switches?

Options:

A.

Centralizing the distribution of wired traffic without requiring HPE Aruba Networking gateways

B.

Tunneling traffic directly to a third-party firewall in a client data center

C.

Adding 802.1X while continuing to use the existing VLAN and ACL structure in the Ethernet network

D.

Applying enhanced security features such as deep packet inspection (DPI) to wired traffic

Buy Now
Questions 14

Refer to Exhibit:

An HPE Aruba Networking 9x00 gateway is part of an HPE Aruba Networking Central group that has the settings shown in the exhibit. What would cause the gateway to drop traffic as part of its IDPS settings?

Options:

A.

Its site-to-site VPN connections failing

B.

Traffic matching a rule in the active ruleset

C.

Its IDPS engine failing

D.

Traffic showing anomalous behavior

Buy Now
Questions 15

You are configuring the HPE Aruba Networking ClearPass Device Insight Integration settings on ClearPass Policy Manager (CPPM). For which use case should you set the 'Tag Updates Action" to "apply for all tag updates"?

Options:

A.

When the Device Insight integration poll interval is set to a relatively long interval but you still want CPPM to be informed quickly about devices' new tags.

B.

When Device Insight tags are only used to identify dangerous devices, and you want to disconnect those devices without having to set up new rules in enforcement policies.

C.

When CPPM is gathering posture information for CPDI, and you want CPDI to always have access to the most up-to-date information.

D.

When you plan to have CPPM issue CoAs for clients with new tags, but do not want to have to list those specific tags in the Device Integration settings in advance.

Buy Now
Questions 16

A company has HPE Aruba Networking APs running AOS-10 and managed by HPE Aruba Networking Central. The company also has AOS-CX switches. The security team wants you to capture traffic from a particular wireless client. You should capture this client’s traffic over a 15-minute time period and then send the traffic to them in a PCAP file. What should you do?

Options:

A.

Access the CLI for the client’s AP. Set up a mirroring session between its radio and a management station running Wireshark.

B.

Go to the client’s AP in HPE Aruba Networking Central. Use the "Security" page to run a packet capture.

C.

Go to that client in HPE Aruba Networking Central. Use the "Live Events" page to run a packet capture.

D.

Access the CLI for the client’s AP's switch. Set up a mirroring session between the AP’s port and a management station running Wireshark.

Buy Now
Questions 17

A company needs you to integrate HPE Aruba Networking ClearPass Policy Manager (CPPM) with HPE Aruba Networking ClearPass Device Insight (CPDI).

What is one task you should do to prepare?

Options:

A.

Install the root CA for CPPM's HTTPS certificate as trusted in the CPDI application.

B.

Configure WMI, SSH, and SNMP external accounts for device scanning on CPPM.

C.

Enable Insight in the CPPM server configuration settings.

D.

Collect a Data Collector token from HPE Aruba Networking Central.

Buy Now
Questions 18

A company has an HPE Aruba Networking ClearPass cluster with several servers. ClearPass Policy Manager (CPPM) is set up to:

. Update client attributes based on Syslog messages from third-party appliances

. Have the clients reauthenticate and apply new profiles to the clients based on the updates

To ensure that the correct profiles apply, what is one step you should take?

Options:

A.

Configure a CoA action for all tag updates in the ClearPass Device Insight integration settings.

B.

Tune the CoA delay on the ClearPass servers to a value of 5 seconds or greater.

C.

Set the cluster's Endpoint Context Servers polling interval to a value of 5 seconds or less.

D.

Configure the cluster to periodically clean up (delete) unknown endpoints.

Buy Now
Questions 19

A company has AOS-CX switches at the access layer, managed by HPE Aruba Networking Central. You have identified suspicious activity on a wired client. You want to analyze the client's traffic with Wireshark, which you have on your management station.

What should you do?

Options:

A.

Access the client's switch's CLI from your management station. Access the switch shell and run a TCP dump on the client port.

B.

Go to the client's switch in HPE Aruba Networking Central. Use the "Security" page to run a packet capture.

C.

Set up a policy that implements a captive portal redirect to your management station. Apply that policy to the client's port.

D.

Set up a mirror session on the client's switch; set the client port as the source and your station IP address as the tunnel destination.

Buy Now
Questions 20

The security team needs you to show them information about MAC spoofing attempts detected by HPE Aruba Networking ClearPass Policy Manager (CPPM).

What should you do?

Options:

A.

Export the Access Tracker records on CPPM as an XML file.

B.

Use ClearPass Insight to run an Active Endpoint Security report.

C.

Integrate CPPM with ClearPass Device Insight (CPDI) and run a security report on CPDI.

D.

Show the security team the CPPM Endpoint Profiler dashboard.

Buy Now
Questions 21

A company is using HPE Aruba Networking ClearPass Device Insight (CPDI) (the standalone application). You have identified a device, which is currently

classified as one type, but you want to classify it as a custom type. You also want to classify all devices with similar attributes as this type, both already-discovered

devices and new devices discovered later.

What should you do?

Options:

A.

Create a user tag from the Generic Devices page, select the desired attributes for the tag, and save the tag.

B.

In the device details, select reclassify, create a user rule based on its attributes, and choose "Save & Reclassify."

C.

In the device details, select filter, create a user tag based on the device attributes, and save the tag.

D.

Create a user rule from the Generic Devices page, select the desired attributes for the rule, and choose "Save."

Buy Now
Questions 22

A ClearPass Policy Manager (CPPM) service includes these settings:

    Role Mapping Policy:

      Evaluate: Select first

      Rule 1 conditions:

        Authorization:AD:Groups EQUALS Managers

        Authentication:TEAP-Method-1-Status EQUALS Success

        Rule 1 role: manager

Rule 2 conditions:

    Authentication:TEAP-Method-1-Status EQUALS Success

    Rule 2 role: domain-comp

Default role: [Other]

Enforcement Policy:

    Evaluate: Select first

    Rule 1 conditions:

      Tips Role EQUALS manager AND Tips Role EQUALS domain-comp

      Rule 1 profile list: domain-manager

Rule 2 conditions:

    Tips Role EQUALS manager

    Rule 2 profile list: manager-only

Rule 3 conditions:

    Tips Role EQUALS domain-comp

    Rule 3 profile list: domain-only

Default profile: [Deny access]

A client is authenticated by the service. CPPM collects attributes indicating that the user is in the Contractors group, and the client passed both TEAP methods.

Which enforcement policy will be applied?

Options:

A.

[Deny Access Profile]

B.

manager-only

C.

domain-manager

D.

domain-only

Buy Now
Questions 23

What is a typical use case for using HPE Aruba Networking ClearPass Onboard to provision devices?

Options:

A.

Enabling unmanaged devices to succeed at certificate-based 802.1X

B.

Enabling managed Windows domain computers to succeed at certificate-based 802.1X

C.

Enhancing security for loT devices that need to authenticate with MAC-Auth

D.

Enforcing posture-based assessment on managed Windows domain computers

Buy Now
Questions 24

A company uses both HPE Aruba Networking ClearPass Policy Manager (CPPM) and HPE Aruba Networking ClearPass Device Insight (CPDI). What is one way integrating the two solutions can help the company implement Zero Trust Security?

Options:

A.

CPPM can inform CPDI that it has assigned a particular Aruba-User-Role to a client; CPDI can then use that information to reclassify the client.

B.

CPDI can use tags to inform CPPM that clients are using prohibited applications. CPPM can then tell the network infrastructure to quarantine those clients.

C.

CPPM can provide CPDI with custom device fingerprint definitions in order to enhance the company's total visibility.

D.

CPDI can provide CPPM with extra information about users' identity. CPPM can then use that information to apply the correct identity-based enforcement.

Buy Now
Questions 25

Your company wants to implement Tunneled EAP (TEAP).

How can you set up HPE Aruba Networking ClearPass Policy Manager (CPPM) to enforce certificated-based authentication for clients using TEAP?

Options:

A.

For the service using TEAP, set the authentication source to an internal database.

B.

Select a service certificate when you specify TEAP as a service's authentication method.

C.

Create an authentication method named "TEAP" with the type set to EAP-TLS.

D.

Select an EAP-TLS-type authentication method for the TEAP method's inner method.

Buy Now
Questions 26

You have created a Web-based Health Check Service that references a posture policy. You want the service to trigger a RADIUS change of authorization (CoA) when a client receives a Healthy or Quarantine posture. Where do you configure those rules?

Options:

A.

In a RADIUS enforcement policy

B.

In the Agents and Software Updates > OnGuard Settings

C.

In the posture policy

D.

In a WEBAUTH enforcement policy

Buy Now
Questions 27

A company has HPE Aruba Networking APs running AOS-10 and managed by HPE Aruba Networking Central. The company also has AOS-CX switches. The

security team wants you to capture traffic from a particular wireless client. You should capture this client's traffic over a 15 minute time period and then send the

traffic to them in a PCAP file.

What should you do?

Options:

A.

Go to the client's AP in HPE Aruba Networking Central. Use the "Security" page to run a packet capture.

B.

Access the CLI for the client's AP. Set up a mirroring session between its radio and a management station running Wireshark.

C.

Access the CLI for the client's AP's switch. Set up a mirroring session between the AP's port and a management station running Wireshark.

D.

Go to that client in HPE Aruba Networking Central. Use the "Live Events" page to run a packet capture.

Buy Now
Questions 28

What is a benefit of Online Certificate Status Protocol (OCSP)?

Options:

A.

It lets a device query whether a single certificate is revoked or not.

B.

It lets a device dynamically renew its certificate before the certificate expires.

C.

It lets a device download all the serial numbers for certificates revoked by a CA at once.

D.

It lets a device determine whether to trust a certificate without needing any root certificates installed.

Buy Now
Questions 29

Refer to Exhibit:

All of the switches in the exhibit are AOS-CX switches.

What is the preferred configuration on Switch-2 for preventing rogue OSPF routers in this network?

Options:

A.

Configure OSPF authentication on VLANs 10-19 in password mode.

B.

Configure OSPF authentication on Lag 1 in MD5 mode.

C.

Disable OSPF entirely on VLANs 10-19.

D.

Configure passive-interface as the OSPF default and disable OSPF passive on Lag 1.

Buy Now
Questions 30

Which statement describes Zero Trust Security?

Options:

A.

Companies should focus on protecting their resources rather than on protecting the boundaries of their internal network.

B.

Companies must apply the same access controls to all users, regardless of identity.

C.

Companies that support remote workers cannot achieve zero trust security and must determine if the benefits outweigh the cost.

D.

Companies can achieve zero trust security by strengthening their perimeter security to detect a wider range of threats.

Buy Now
Questions 31

A company has AOS-CX switches and HPE Aruba Networking APs, which run AOS-10 and bridge their SSIDs. Company security policies require 802.1X on all edge ports, some of which connect to APs. How should you configure the auth-mode on AOS-CX switches?

Options:

A.

Leave all edge ports in client auth-mode and configure device auth-mode in the AP role.

B.

Configure all edge ports in client auth-mode.

C.

Configure all edge ports in device auth-mode.

D.

Leave all edge ports in device auth-mode and configure client auth-mode in the AP role.

Buy Now
Questions 32

Which use case is fulfilled by applying a time range to a firewall rule on an AOS device?

Options:

A.

Enforcing the rule only during the specified time range

B.

Tuning the session timeout for sessions established with this rule

C.

Locking clients that violate the rule for the specified time range

D.

Setting the time range over which hit counts for the rule are aggregated

Buy Now
Questions 33

A company has been running Gateway IDS/IPS on its gateways in IDS mode for several weeks. The company wants to transition to IPS mode.

What is one step you should recommend?

Options:

A.

Disable traffic inspection and reboot before re-enabling traffic inspection with the new mode.

B.

Change the mode on one gateway at a time to establish a smoother transition period.

C.

Consider applying a stricter IPS policy to minimize issues during the transition period.

D.

Check for legitimate traffic that has been flagged as a threat and allow list the associated rules.

Buy Now
Questions 34

A company has a variety of HPE Aruba Networking solutions, including an HPE Aruba Networking infrastructure and HPE Aruba Networking ClearPass Policy Manager (CPPM). The company passes traffic from the corporate LAN destined to the data center through a third-party SRX firewall. The company would like to further protect itself from internal threats. What is one solution that you can recommend?

Options:

A.

Have the third-party firewall send Syslogs to CPPM, which can work with network devices to lock internal attackers out of the network.

B.

Add ClearPass Device Insight (CPDI) to the solution, integrate it with the third-party firewall to develop more complete device profiles.

C.

Configure CPPM to poll the third-party firewall for a broad array of information about internal clients, such as profile and posture.

D.

Use tunnel mode SSIDs and user-based tunneling (UBT) on AOS-CX switches to pass all internal traffic directly through the third-party firewall.

Buy Now
Questions 35

HPE Aruba Networking switches are implementing MAC-Auth to HPE Aruba Networking ClearPass Policy Manager (CPPM) for a company's printers. The company wants to quarantine a client that spoofs a legitimate printer's MAC address. You plan to add a rule to the MAC-Auth service enforcement policy for this purpose. What condition should you include?

Options:

A.

Endpoint Compliance EQUALS false

B.

Endpoint Device Insight Tag EXISTS

C.

Authorization: [Endpoints Repository] Compromised EQUALS true

D.

Authorization: [Endpoints Repository] Conflict EQUALS true

Buy Now
Questions 36

You are setting up policy rules in HPE Aruba Networking SSE. You want to create a single rule that permits users in a particular user group to access multiple applications. What is an easy way to meet this need?

Options:

A.

Associate the applications directly with the IdP used to authenticate the users; choose any for the destination in the policy rule.

B.

Apply the same tag to the applications; select the tag as a destination in the policy rule.

C.

Place all the applications in the same connector zone; select that zone as a destination in the policy rule.

D.

Select the applications within a non-default web profile; select that profile in the policy rule.

Buy Now
Questions 37

You manage AOS-10 APs with HPE Aruba Networking Central. A role is configured on these APs with the following rules:

    Allow UDP on port 67 to any destination

    Allow any to network 10.1.6.0/23

    Deny any to network 10.1.0.0/16 + log

    Deny any to network 10.0.0.0/8

    Allow any to any destination

You add this new rule immediately before rule 2:

Deny SSH to network 10.1.4.0/23 + denylist

What happens when a client assigned to this role sends SSH traffic to 10.1.11.42?

Options:

A.

The traffic is permitted.

B.

The traffic is dropped and logged.

C.

The traffic is dropped (without any logging or further action against the client).

D.

The traffic is dropped, and the client is denylisted.

Buy Now
Questions 38

A company has HPE Aruba Networking gateways that implement gateway IDS/IPS. Admins sometimes check the Security Dashboard, but they want a faster way

to discover if a gateway starts detecting threats in traffic.

What should they do?

Options:

A.

Use Syslog to integrate the gateways with HPE Aruba Networking ClearPass Policy Manager (CPPM) event processing.

B.

Integrate HPE Aruba Networking ClearPass Device Insight (CPDI) with Central and schedule hourly reports.

C.

Set up email notifications using HPE Aruba Networking Central's global alert settings.

D.

Set up Webhooks that are attached to the HPE Aruba Networking Central Threat Dashboard.

Buy Now
Questions 39

A company is using HPE Aruba Networking Central SD-WAN Orchestrator to establish a hub-spoke VPN between branch gateways (BGWs) at 1444 site and

VPNCs at multiple data centers.

What is part of the configuration that admins need to complete?

Options:

A.

At the global level, create default IPsec policies for the SD-WAN Orchestrator to use.

B.

In BGWs' groups, select the VPNCs to which to connect in a DC preference list.

C.

In VPNCs' groups, establish VPN pools to control which branches connect to which VPNCs.

D.

In BGWs' and VPNCs' groups, create default IKE policies for the SD-WAN Orchestrator to use.

Buy Now
Exam Code: HPE7-A02
Exam Name: Aruba Certified Network Security Professional Exam
Last Update: Mar 31, 2025
Questions: 130
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now HPE7-A02