HP
HPE6-A78
Q1:
What is an example or phishing?
○
A
An attacker sends TCP messages to many different ports to discover which ports are open.○
B
An attacker checks a user's password by using trying millions of potential passwords.○
C
An attacker lures clients to connect to a software-based AP that is using a legitimate SSID.○
D
An attacker sends emails posing as a service team member to get users to disclose their passwords.
HP
HPE6-A78
Q2:
Answer: What is a use case for tunneling traffic between an Aruba switch and an AruDa Mobility Controller (MC)?
○
A
applying firewall policies and deep packet inspection to wired clients○
B
enhancing the security of communications from the access layer to the core with data encryption○
C
securing the network infrastructure control plane by creating a virtual out-of-band-management network○
D
simplifying network infrastructure management by using the MC to push configurations to the switches
HP
HPE6-A78
Q3:
What is one of the roles of the network access server (NAS) in the AAA framewonx?
○
A
It authenticates legitimate users and uses policies to determine which resources each user is allowed to access.○
B
It negotiates with each user's device to determine which EAP method is used for authentication○
C
It enforces access to network services and sends accounting information to the AAA server○
D
It determines which resources authenticated users are allowed to access and monitors each users session
HP
HPE6-A78
Q4:
What is one practice that can help you to maintain a digital chain or custody In your network?
○
A
Enable packet capturing on Instant AP or Moodily Controller (MC) datepath on an ongoing basis○
B
Enable packet capturing on Instant AP or Mobility Controller (MC) control path on an ongoing basis.○
C
Ensure that all network infrastructure devices receive a valid clock using authenticated NTP○
D
Ensure that all network Infrastructure devices use RADIUS rather than TACACS+ to authenticate managers
HP
HPE6-A78
Q5:
Answer: How does the ArubaOS firewall determine which rules to apply to a specific client's traffic?
○
A
The firewall applies every rule that includes the dent's IP address as the source.○
B
The firewall applies the rules in policies associated with the client's wlan○
C
The firewall applies thee rules in policies associated with the client's user role.○
D
The firewall applies every rule that includes the client's IP address as the source or destination.