Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the HP ACNSP HPE7-A02 Questions and answers with Dumpstech

Exam HPE7-A02 Premium Access

View all detail and faqs for the HPE7-A02 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions
Questions # 11:

A security team needs to track a device's communication patterns and identify patterns such as how many destinations the device is accessing.

Which Aruba solution can show this information at a glance?

Options:

A.

HPE Aruba Networking ClearPass Insight Endpoints and Network Dashboards

B.

HPE Aruba Networking ClearPass Policy Manager (CPPM) live monitoring Access Tracker

C.

HPE Aruba Networking ClearPass Device Insight (CPDI) under a device's network activity

D.

AOS-CX Analytics Dashboard using the system-installed NAE agent

Questions # 12:

You are setting up HPE Aruba Networking SSE. Which use case requires you to apply a non-default device posture in a rule?

Options:

A.

Applying threat inspection to users when they access certain websites

B.

Checking whether a client has antivirus software as a condition for receiving access to resources

C.

Redirecting compromised clients to a remediation server

D.

Integrating with HPE Aruba Networking ClearPass OnGuard

Questions # 13:

You are setting up HPE Aruba Networking SSE to prohibit users from uploading and downloading files from Dropbox. What is part of the process?

Options:

A.

Adding a web category that includes Dropbox

B.

Installing the HPE Aruba Networking SSE root certificate on clients

C.

Deploying a connector that can reach the remote users

D.

Deploying a connector that can reach Dropbox

Questions # 14:

You are setting up user-based tunneling (UBT) between access layer AOS-CX switches and AOS-10 gateways. You have selected reserved (local) VLAN mode.

Tunneled devices include IoT devices, which should be assigned to:

    Roles: iot on the switches and iot-wired on the gateways

    VLAN: 64, for which the gateways route traffic.

IoT devices connect to the access layer switches' edge ports, and the access layer switches reach the gateways on their uplinks.

Where must you configure VLAN 64?

Options:

A.

In the iot-wired role and on no physical interfaces

B.

In the iot role and the iot-wired role and on no physical interfaces

C.

In the iot-wired role and the access switch uplinks

D.

In the iot role and the access switch uplinks

Questions # 15:

You are setting up policy rules in HPE Aruba Networking SSE. You want to create a single rule that permits users in a particular user group to access multiple applications. What is an easy way to meet this need?

Options:

A.

Associate the applications directly with the IdP used to authenticate the users; choose any for the destination in the policy rule.

B.

Apply the same tag to the applications; select the tag as a destination in the policy rule.

C.

Place all the applications in the same connector zone; select that zone as a destination in the policy rule.

D.

Select the applications within a non-default web profile; select that profile in the policy rule.

Questions # 16:

You are helping an organization deploy HPE Aruba Networking SSE. What is one reason to recommend that the company install agents on remote users' devices?

Options:

A.

To run posture checks and apply different permissions based on those checks.

B.

To permit admins to manage the HPE Aruba Networking SSE policy rules.

C.

To permit users to access private servers using SSH.

D.

To run threat inspection on clients in a local sandbox rather than in the cloud.

Questions # 17:

You have set up a mirroring session between an AOS-CX switch and a management station, running Wireshark. You want to capture just the traffic sent in the

mirroring session, not the management station's other traffic.

What should you do?

Options:

A.

Apply this capture filter: ip proto 47

B.

Edit protocol preferences and enable ARUBA_ERM.

C.

Edit protocol preferences and enable HPE_ERM.

D.

Apply this capture filter: udp port 5555

Questions # 18:

You manage AOS-10 APs with HPE Aruba Networking Central. A role is configured on these APs with the following rules:

    Allow UDP on port 67 to any destination

    Allow any to network 10.1.6.0/23

    Deny any to network 10.1.0.0/16 + log

    Deny any to network 10.0.0.0/8

    Allow any to any destination

You add this new rule immediately before rule 2:

Deny SSH to network 10.1.4.0/23 + denylist

What happens when a client assigned to this role sends SSH traffic to 10.1.11.42?

Options:

A.

The traffic is permitted.

B.

The traffic is dropped and logged.

C.

The traffic is dropped (without any logging or further action against the client).

D.

The traffic is dropped, and the client is denylisted.

Questions # 19:

A port-access role for AOS-CX switches has this policy applied to it:

plaintext

Copy code

port-access policy mypolicy

10 class ip zoneC action drop

20 class ip zoneA action drop

100 class ip zoneB

The classes have this configuration:

plaintext

Copy code

class ip zoneC

10 match tcp 10.2.0.0/16 eq https

class ip zoneA

10 match ip any 10.1.0.0/16

class ip zoneB

10 match ip any 10.0.0.0/8

The company wants to permit clients in this role to access 10.2.12.0/24 with HTTPS. What should you do?

Options:

A.

Add this rule to zoneC: 5 match any 10.2.12.0/24 eq https

B.

Add this rule to zoneA: 5 ignore tcp any 10.2.12.0/24 eq https

C.

Add this rule to zoneB: 5 match tcp any 10.2.12.0/24 eq https

D.

Add this rule to zoneC: 5 ignore tcp any 10.2.12.0/24 eq https

Questions # 20:

Your company wants to implement Tunneled EAP (TEAP).

How can you set up HPE Aruba Networking ClearPass Policy Manager (CPPM) to enforce certificated-based authentication for clients using TEAP?

Options:

A.

For the service using TEAP, set the authentication source to an internal database.

B.

Select a service certificate when you specify TEAP as a service's authentication method.

C.

Create an authentication method named "TEAP" with the type set to EAP-TLS.

D.

Select an EAP-TLS-type authentication method for the TEAP method's inner method.

Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions