HPE7-A02 Aruba Certified Network Security Professional Exam Practice Test

Page: 1 / 14
Total 130 questions
Question 1

HPE Aruba Networking switches are implementing MAC-Auth to HPE Aruba Networking ClearPass Policy Manager (CPPM) for a company's printers. The company wants to quarantine a client that spoofs a legitimate printer's MAC address. You plan to add a rule to the MAC-Auth service enforcement policy for this purpose. What condition should you include?



Answer : D

MAC Spoofing Detection with Endpoint Conflict:

When two devices attempt to use the same MAC address, ClearPass identifies a Conflict state in the Endpoints Repository.

This condition can be used to detect and quarantine clients that spoof legitimate devices.

Option D: Correct. The Conflict EQUALS true condition identifies devices with duplicate MAC addresses.

Option A: Incorrect. Endpoint compliance checks posture, not MAC spoofing.

Option B: Incorrect. Device Insight Tags are used for profiling but do not identify conflicts.

Option C: Incorrect. Compromised devices relate to security incidents, not MAC address conflicts.


Question 2

A company wants to use HPE Aruba Networking ClearPass Policy Manager (CPPM) to profile Linux devices. You have decided to schedule a subnet scan of the devices' subnets. Which additional step should you complete before scheduling the scan?



Answer : C

Subnet Scan Requirements for Profiling:

For ClearPass to scan and profile devices in a subnet, the Data Port must be enabled on the ClearPass server and connected to the network.

This ensures that ClearPass can send and receive the required packets for device discovery and profiling.

Option Analysis:

Option A: Incorrect. SSH accounts are not required for subnet scanning.

Option B: Incorrect. WMI probing is for Windows systems, not Linux devices.

Option C: Correct. The Data Port is essential for subnet scans and must be properly configured and connected.

Option D: Incorrect. SNMP is used for network device monitoring, not Linux device profiling.


Question 3

You want to examine the applications that a device is using and look for any changes in application usage over several different ranges. In which HPE Aruba Networking solution can you view this information in an easy-to-view format?



Answer : B

HPE Aruba Central Live Monitoring:

Aruba Central provides real-time Live Monitoring of network devices, including:

Application usage statistics.

Trends and changes over time for specific devices.

This information is presented in a clear and easy-to-read format, making it ideal for examining changes in application usage over different time ranges.

Option Analysis:

Option A: Incorrect. ClearPass OnGuard monitors endpoint compliance (e.g., antivirus, OS version) but does not analyze application usage.

Option B: Correct. Aruba Central's Live Monitoring page is specifically designed for this type of analysis.

Option C: Incorrect. ClearPass Insight generates endpoint security reports but does not track application usage.

Option D: Incorrect. ClearPass Device Insight (CPDI) focuses on device profiling and identification, not continuous application monitoring.


Question 4

You are helping an organization deploy HPE Aruba Networking SSE. What is one reason to recommend that the company install agents on remote users' devices?



Answer : A

Installing Agents for SSE (Secure Service Edge):

Agents installed on remote users' devices allow posture checks (e.g., antivirus status, OS version) to ensure compliance.

Based on the results of the posture checks, different permissions and security policies can be applied dynamically.

This improves the security posture of remote users before granting access to resources.

Option A: Correct. Agents enable posture checks and enforce conditional access based on compliance.

Option B: Incorrect. Admins manage SSE policies centrally, not via agents.

Option C: Incorrect. Access to private servers via SSH does not require agents; it relies on policies and tunnels.

Option D: Incorrect. Local sandboxing is generally a function of endpoint protection solutions, not SSE agents.


Question 5

You are configuring the HPE Aruba Networking ClearPass Device Insight Integration settings on ClearPass Policy Manager (CPPM). For which use case should you set the 'Tag Updates Action" to "apply for all tag updates"?



Answer : D

Tag Updates Action - 'Apply for All Tag Updates':

This setting ensures that all updated tags from Device Insight (CPDI) are applied dynamically.

It is particularly useful when you want to trigger Change of Authorization (CoA) without explicitly predefining the tag values.

Option D: Correct. This setting allows CPPM to issue CoAs automatically for updated tags without requiring prior configuration of specific tags.

Option A: Incorrect. The setting is not directly related to reducing the poll interval latency.

Option B: Incorrect. Disconnecting devices based on dangerous tags would require predefined enforcement rules.

Option C: Incorrect. Posture information updates do not directly rely on this setting.


Question 6

A port-access role for AOS-CX switches has this policy applied to it:

plaintext

Copy code

port-access policy mypolicy

10 class ip zoneC action drop

20 class ip zoneA action drop

100 class ip zoneB

The classes have this configuration:

plaintext

Copy code

class ip zoneC

10 match tcp 10.2.0.0/16 eq https

class ip zoneA

10 match ip any 10.1.0.0/16

class ip zoneB

10 match ip any 10.0.0.0/8

The company wants to permit clients in this role to access 10.2.12.0/24 with HTTPS. What should you do?



Answer : A

Comprehensive Detailed Explanation

The requirement is to permit HTTPS traffic from clients to the 10.2.12.0/24 subnet.

ZoneC is configured to drop all HTTPS traffic to the 10.2.0.0/16 subnet. Therefore, the first match in the zoneC class (priority 10) will drop the desired traffic.

To override this behavior, you must add a higher-priority rule (lower rule number) to zoneC that explicitly matches 10.2.12.0/24 and permits the traffic.

Thus, adding the rule 5 match any 10.2.12.0/24 eq https to zoneC ensures the desired traffic is permitted while maintaining the drop behavior for the rest of 10.2.0.0/16.

Reference

AOS-CX Role-Based Access Control documentation.

Understanding class priority and policy rule ordering in AOS-CX.


Question 7

An AOS-CX switch has this admin user account configured on it:

netadmin in the operators group.

You have configured these commands on an AOS-CX switch:

tacacs-server host cp.example.com key plaintext &12xl,powmay7855

aaa authentication login ssh group tacacs local

aaa authentication allow-fail-through

A user accesses the switch with SSH and logs in as netadmin with the correct password. When the switch sends a TACACS+ request to the ClearPass server at cp.example.com, the server does not send a response. Authentication times out.

What happens?



Answer : A

Comprehensive Detailed Explanation

The configuration includes the command aaa authentication allow-fail-through, which specifies that if the TACACS+ server fails to respond (e.g., times out), the switch will proceed to the next authentication method in the sequence, which is local. In this scenario:

The switch first attempts to authenticate the user against the TACACS+ server.

When the TACACS+ server fails to respond, the switch falls back to local authentication.

The user netadmin is a local account configured on the switch and belongs to the operators group.

As a result, the user is successfully authenticated locally and is granted operator level access.

Reference

Aruba AOS-CX User Guide: Authentication fallback mechanisms.

TACACS+ fallback behavior for HPE Aruba switches.


Page:    1 / 14   
Total 130 questions