HPE7-A02 Aruba Certified Network Security Professional Exam Practice Test

Page: 1 / 14
Total 130 questions
Question 1

A company wants to apply a standard configuration to all AOS-CX switch ports and have the ports dynamically adjust their configuration based on the identity of

the user or device that connects. They want to centralize configuration of the identity-based settings as much as possible.

What should you recommend?



Answer : D

For a company that wants to apply a standard configuration to all AOS-CX switch ports and dynamically adjust their configuration based on the identity of the user or device that connects, the best approach is to have the switches download user-roles from HPE Aruba Networking ClearPass Policy Manager (CPPM). This method centralizes the configuration of identity-based settings in CPPM, allowing it to dynamically assign roles and policies to switch ports based on authentication and authorization results. This ensures consistent and secure network access control tailored to each user or device.


Question 2

A company has HPE Aruba Networking APs running AOS-10 that connect to AOS-CX switches. The APs will:

. Authenticate as 802.1X supplicants to HPE Aruba Networking ClearPass Policy Manager (CPPM)

. Be assigned to the "APs" role on the switches

. Have their traffic forwarded locally

What information do you need to help you determine the VLAN settings for the "APs" role?



Answer : D

To determine the VLAN settings for the 'APs' role on AOS-CX switches, it is crucial to know whether the APs bridge or tunnel traffic on their SSIDs. If the APs are bridging traffic, the VLAN settings on the switch need to align with the VLANs used by the SSIDs. If the APs are tunneling traffic to a controller or gateway, the VLAN settings might differ as the traffic is encapsulated and forwarded through the tunnel. Understanding this aspect ensures that the VLAN configuration on the switches correctly supports the traffic forwarding method employed by the APs.


Question 3

A company has HPE Aruba Networking APs, which authenticate users to HPE Aruba Networking ClearPass Policy Manager (CPPM).

What does HPE Aruba Networking recommend as the preferred method for assigning clients to a role on the AOS firewall?



Answer : B

The preferred method for assigning clients to a role on the AOS firewall is to configure HPE Aruba Networking ClearPass Policy Manager (CPPM) to assign the role using a RADIUS enforcement profile with an Aruba-User-Role VSA (Vendor-Specific Attribute). This method allows ClearPass to dynamically assign the appropriate user roles to clients during the authentication process, ensuring that role-based access policies are consistently enforced across the network.


Question 4

You are setting up user-based tunneling (UBT) between access layer AOS-CX switches and AOS-10 gateways. You have selected reserved (local) VLAN mode.

Tunneled devices include IoT devices, which should be assigned to:

Roles: iot on the switches and iot-wired on the gateways

VLAN: 64, for which the gateways route traffic.

IoT devices connect to the access layer switches' edge ports, and the access layer switches reach the gateways on their uplinks.

Where must you configure VLAN 64?



Answer : A

Comprehensive Detailed Explanation

In a user-based tunneling (UBT) setup with reserved VLAN mode, VLAN 64 is used for routing traffic at the gateways. Since the IoT traffic is tunneled to the AOS-10 gateway:

On the gateways:

VLAN 64 must be configured in the iot-wired role for routing purposes.

On the switches:

VLAN 64 does not need to be configured on the access switch physical uplinks because the IoT traffic is tunneled directly to the gateway and does not rely on VLAN configurations at the access layer switches.

Reserved VLAN mode:

Ensures that traffic is encapsulated within the UBT tunnel, and VLANs like 64 are only relevant at the gateway for routing and enforcement.

Therefore, the correct configuration is to define VLAN 64 in the iot-wired role on the AOS-10 gateways and not on any physical interfaces.

Reference

Aruba AOS-CX UBT configuration guide.

Aruba AOS-10 Gateway Role and VLAN Management documentation.


Question 5

You are setting up HPE Aruba Networking SSE to prohibit users from uploading and downloading files from Dropbox. What is part of the process?



Answer : A

Comprehensive Detailed Explanation

To prohibit users from uploading and downloading files from Dropbox using HPE Aruba Networking SSE (Secure Service Edge), you need to configure web access policies. This typically involves:

Adding a web category to the SSE configuration that includes Dropbox.

The SSE solution uses category-based filtering to block access to specific applications or services, such as Dropbox, based on their classification.

Other Options:

B . Installing the SSE root certificate is required for enabling SSL inspection, but this does not directly control access to Dropbox.

C and D. Deploying a connector is not necessary for this purpose as the enforcement is done via SSE policies, not by directly interfacing with Dropbox or remote users.

Reference

Aruba Networking SSE documentation on web filtering policies.

HPE Aruba SSE Application Control Best Practices Guide.


Question 6

(Note that the HPE Aruba Networking Central interface shown here might look slightly different from what you see in your HPE Aruba Networking Central

interface as versions change; however, similar concepts continue to apply.)

An HPE Aruba Networking 9x00 gateway is part of an HPE Aruba Networking Central group that has the settings shown in the exhibit. What would cause the

gateway to drop traffic as part of its IDPS settings?



Answer : B

In the exhibit, the HPE Aruba Networking Central settings for the 9x00 gateway show that traffic inspection is enabled, and the gateway is set to operate in IDS (Intrusion Detection System) mode with the fail strategy set to 'Block'. This configuration means that the gateway will drop traffic if it matches a rule in the active ruleset.

1. Active Ruleset: The ruleset version 9861 is active, and the gateway is configured to automatically update the ruleset daily.

2. Traffic Matching Rules: When traffic matches a rule in the active ruleset, it is flagged as suspicious or malicious.

3. Block Mode: Since the fail strategy is set to 'Block', any traffic that matches a rule in the active ruleset will be dropped to prevent potential threats.


Question 7

A company has AOS-CX switches at the access layer, managed by HPE Aruba Networking Central. You have identified suspicious activity on a wired client. You want to analyze the client's traffic with Wireshark, which you have on your management station.

What should you do?



Answer : D

Why a Mirror Session Is the Correct Choice

To analyze a wired client's traffic with Wireshark, you need the traffic mirrored to your management station where Wireshark is installed. The most effective way to achieve this is by configuring a mirror session on the AOS-CX switch, specifying the client port as the source and your management station as the destination.

Analysis of Each Option

A . Access the client's switch's CLI from your management station. Access the switch shell and run a TCP dump on the client port:

Incorrect:

AOS-CX switches do not natively support packet capture (e.g., tcpdump) directly on the switch CLI.

This approach is not feasible for capturing and analyzing live client traffic.

B . Go to the client's switch in HPE Aruba Networking Central. Use the 'Security' page to run a packet capture:

Incorrect:

HPE Aruba Networking Central provides security insights but does not directly support initiating packet captures for detailed analysis.

Traffic analysis with tools like Wireshark requires local packet capture at the management station.

C . Set up a policy that implements a captive portal redirect to your management station. Apply that policy to the client's port:

Incorrect:

Captive portals are designed for user authentication and redirection, not traffic analysis.

This would disrupt the client's network activity without enabling traffic analysis in Wireshark.

D . Set up a mirror session on the client's switch; set the client port as the source and your station IP address as the tunnel destination:

Correct:

Mirroring the client port to your management station is the standard method for analyzing live network traffic with Wireshark.

Steps include:

Configure a mirror session on the client's AOS-CX switch.

Set the client's port as the source.

Set your management station as the destination using its IP address (via GRE tunnel or physical interface).

Start capturing traffic with Wireshark on the management station.

Final Recommendation

To analyze the client's traffic, configure a mirror session on the switch, set the client port as the source, and direct the traffic to your management station where Wireshark is running.

Reference

AOS-CX Switch Port Mirroring Configuration Guide.

HPE Aruba Networking Central Monitoring and Troubleshooting Best Practices.

Wireshark Traffic Analysis and Capture Techniques.


Page:    1 / 14   
Total 130 questions