Free HP HPE7-A02 Exam Questions (page: 4)

A company is using HPE Aruba Networking ClearPass Device Insight (CPDI) (the standalone application). In the CPDI security settings, Security Analysis is On,

the Data Source is ClearPass Devices Insight, and Enable Posture Assessment is On. You see that device has a Risk Score of 90.

What can you know from this information?

  1. The posture is unhealthy, and CPDI has also detected at least one vulnerability on the device.
  2. The posture is unhealthy, but CPDI has not detected any vulnerabilities on the device.
  3. The posture is healthy, but CPDI has detected multiple vulnerabilities on the device.
  4. The posture is unknown, and CPDI has detected exactly four vulnerabilities on the device.

Answer(s): A

Explanation:

In HPE Aruba Networking ClearPass Device Insight (CPDI), a device with a Risk Score of 90 indicates that the posture is unhealthy, and CPDI has detected at least one vulnerability on the device. The risk score is a reflection of the device's security posture and detected vulnerabilities. A high risk score, such as 90, typically signifies significant security concerns, including the presence of vulnerabilities that could be exploited, thereby categorizing the device as a high-risk asset within the network.


Reference:

ClearPass Device Insight documentation and security settings guides explain how risk scores are calculated and interpreted, including the impact of posture assessment and vulnerability detection on overall device risk ratings.



You have set up a mirroring session between an AOS-CX switch and a management station, running Wireshark. You want to capture just the traffic sent in the mirroring session, not the management station's other traffic.

What should you do?

  1. Apply this capture filter: ip proto 47
  2. Edit protocol preferences and enable ARUBA_ERM.
  3. Edit protocol preferences and enable HPE_ERM.
  4. Apply this capture filter: udp port 5555

Answer(s): D

Explanation:

To capture only the traffic sent in the mirroring session between an AOS-CX switch and a management station running Wireshark, you should apply a capture filter that isolates the specific traffic of interest. In this case, using the filter udp port 5555 will capture the traffic associated with the mirroring session. This is because AOS-CX switches typically use UDP port 5555 for mirrored traffic, ensuring that only the relevant mirrored packets are captured and excluding other traffic generated by the management station.


Reference:

Aruba's AOS-CX documentation and network management guides detail the configuration and monitoring of traffic mirroring sessions, including the use of specific ports for mirrored traffic.



A company uses HPE Aruba Networking ClearPass Policy Manager (CPPM) as a TACACS+ server to authenticate managers on its AOS-CX switches. The company wants CPPM to control which commands managers are allowed to enter. You see there is no field to enter these commands in ClearPass.

How do you start configuring the command list on CPPM?

  1. Add the Shell service to the managers' TACACS+ enforcement profiles.
  2. Edit the TACACS+ settings in the AOS-CX switches' network device entries.
  3. Create an enforcement policy with the TACACS+ type.
  4. Edit the settings for CPPM's default TACACS+ admin roles.

Answer(s): A

Explanation:

To control which commands managers are allowed to enter on AOS-CX switches using HPE Aruba Networking ClearPass Policy Manager (CPPM) as a TACACS+ server, you need to add the Shell service to the TACACS+ enforcement profiles for the managers. This service allows you to define and enforce specific command sets and access privileges for users authenticated via TACACS+. By configuring the Shell service in the enforcement profile, you can specify the commands that are permitted or denied for the managers, ensuring controlled and secure access to the switch's command-line interface.


Reference:

Aruba's ClearPass Policy Manager documentation provides detailed instructions on setting up TACACS+ services, including configuring Shell profiles for command authorization and enforcement policies.



HPE Aruba Networking ClearPass Policy Manager (CPPM) uses a service to authenticate clients. You are now adding the Endpoints Repository as an authorization source for the service, and you want to add rules to the service's policies that apply different access levels based, in part, on a client's device category. You need to ensure that CPPM can apply the new correct access level after discovering new clients' categories.

What should you enable on the service?

  1. The Posture Compliance option in the Service tab
  2. The Profile Endpoints option in the Service tab
  3. The Use cached Roles and Posture attributes from previous sessions option in the Enforcement tab
  4. The Audit End-host option in the Service tab

Answer(s): B

Explanation:

To ensure that HPE Aruba Networking ClearPass Policy Manager (CPPM) can apply the correct access levels based on a client's device category after discovering new clients, you need to enable the "Profile Endpoints" option in the Service tab. This option allows CPPM to profile and categorize endpoints dynamically, ensuring that the appropriate access levels are applied based on the device's characteristics. Enabling this feature ensures that new devices are accurately profiled and that access policies can be enforced based on the updated device information.


Reference:

Aruba ClearPass documentation and profiling guides detail the configuration and use of endpoint profiling to enhance access control and policy enforcement based on device categories.



A company has HPE Aruba Networking Central-managed APs. The company wants to block all clients connected through the APs from using YouTube.

Which steps should you take?

  1. Deploy gateways and have the APs tunnel traffic to the gateways. Then, enable the gateway IDS/IPS engine.
  2. Enable Client IPS at the "custom" level, and then specify the check for YouTube.
  3. Enable WebCC on all client firewall roles. Then, create WebCC category rules that deny suspicious URLs.
  4. Enable DPI. Then, create application rules to deny YouTube on the firewall roles.

Answer(s): D

Explanation:

To block all clients connected through HPE Aruba Networking Central-managed APs from accessing YouTube, you should enable DPI (Deep Packet Inspection) and then create application rules to deny YouTube on the firewall roles. DPI allows the network to inspect and classify traffic based on application signatures, making it possible to enforce application-specific policies. By creating rules that specifically block YouTube traffic, you can effectively prevent clients from accessing the service.


Reference:

Aruba Central's documentation on firewall and application control provides detailed instructions on enabling DPI and creating application rules to manage and restrict access to specific applications such as YouTube.



Viewing page 4 of 28
Viewing questions 16 - 20 out of 135 questions



Post your Comments and Discuss HP HPE7-A02 exam prep with other Community members:

HPE7-A02 Exam Discussions & Posts