Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the HP ACNSP HPE7-A02 Questions and answers with Dumpstech

Exam HPE7-A02 Premium Access

View all detail and faqs for the HPE7-A02 exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions
Questions # 31:

An AOS-CX switch has this admin user account configured on it:

netadmin in the operators group.

You have configured these commands on an AOS-CX switch:

tacacs-server host cp.example.com key plaintext &12xl,powmay7855

aaa authentication login ssh group tacacs local

aaa authentication allow-fail-through

A user accesses the switch with SSH and logs in as netadmin with the correct password. When the switch sends a TACACS+ request to the ClearPass server at cp.example.com, the server does not send a response. Authentication times out.

What happens?

Options:

A.

The user is logged in and granted operator access.

B.

The user is logged in and allowed to enter auditor commands only.

C.

The user is logged in and granted administrators access.

D.

The user is not allowed to log in.

Questions # 32:

Refer to the exhibit.

Question # 32

The exhibit shows a saved packet capture, which you have opened in Wireshark. You want to focus on the complete conversation between 10.1.70.90 and 10.1.79.11 that uses source port 5448.

What is a simple way to do this in Wireshark?

Options:

A.

Apply a capture filter that selects for both the 10.1.70.90 and 10.1.79.11 IP addresses.

B.

Click the Source column and then the Destination column to sort the packets into the desired order.

C.

Apply a capture filter that selects for TCP port 5448.

D.

Right-click one of the packets between those addresses and choose to follow the stream.

Questions # 33:

A company has AOS-CX switches and HPE Aruba Networking APs, which run AOS-10 and bridge their SSIDs. Company security policies require 802.1X on all edge ports, some of which connect to APs. How should you configure the auth-mode on AOS-CX switches?

Options:

A.

Leave all edge ports in client auth-mode and configure device auth-mode in the AP role.

B.

Configure all edge ports in client auth-mode.

C.

Configure all edge ports in device auth-mode.

D.

Leave all edge ports in device auth-mode and configure client auth-mode in the AP role.

Questions # 34:

You are deploying a virtual Data Collector for use with HPE Aruba Networking ClearPass Device Insight (CPDI). You have identified VLAN 101 in the data center

as the VLAN to which the Data Collector should connect to receive its IP address and connect to HPE Aruba Networking Central.

Which Data Collector virtual ports should you tell the virtual admins to connect to VLAN 101?

Options:

A.

The one with the lowest MAC address

B.

The one with the highest port ID

C.

The one with the highest MAC address

D.

The one with the lowest port ID

Questions # 35:

You are using Wireshark to view packets captured from HPE Aruba Networking infrastructure, but you are not sure that the packets are displaying correctly.

In which circumstance does it make sense to ensure that Wireshark has GRE enabled as one of its analyzed protocols?

Options:

A.

When the traffic was captured on an HPE Aruba Networking gateway and sent to a remote IP

B.

When the traffic was captured on an HPE Aruba Networking gateway dataplane and saved to a file

C.

When the traffic was captured on an HPE Aruba Networking Mobility Controller (MC) control plane and saved to a file

D.

When the traffic was captured on an HPE Aruba Networking MC dataplane and saved to a file

Questions # 36:

A company has HPE Aruba Networking infrastructure devices. The devices authenticate clients to HPE Aruba Networking ClearPass Policy Manager (CPPM). You want CPPM to track information about clients, such as their IP addresses and their network bandwidth utilization. What should you set up on the network infrastructure devices to help that happen?

Options:

A.

Logging with CPPM configured as a Syslog server.

B.

Dynamic authorization enabled in the RADIUS settings for CPPM.

C.

RADIUS accounting to CPPM, including interim updates.

D.

An IF-MAP interface with CPPM as the destination.

Questions # 37:

A company lacks visibility into the many different types of user and loT devices deployed in its internal network, making it hard for the security team to address

those devices.

Which HPE Aruba Networking solution should you recommend to resolve this issue?

Options:

A.

HPE Aruba Networking ClearPass Device Insight (CPDI)

B.

HPE Aruba Networking Network Analytics Engine (NAE)

C.

HPE Aruba Networking Mobility Conductor

D.

HPE Aruba Networking ClearPass OnBoard

Questions # 38:

A company has HPE Aruba Networking APs running AOS-10 and managed by HPE Aruba Networking Central. The company also has AOS-CX switches. The security team wants you to capture traffic from a particular wireless client. You should capture this client’s traffic over a 15-minute time period and then send the traffic to them in a PCAP file. What should you do?

Options:

A.

Access the CLI for the client’s AP. Set up a mirroring session between its radio and a management station running Wireshark.

B.

Go to the client’s AP in HPE Aruba Networking Central. Use the "Security" page to run a packet capture.

C.

Go to that client in HPE Aruba Networking Central. Use the "Live Events" page to run a packet capture.

D.

Access the CLI for the client’s AP's switch. Set up a mirroring session between the AP’s port and a management station running Wireshark.

Questions # 39:

A company has AOS-CX switches at the access layer, managed by HPE Aruba Networking Central. You have identified suspicious activity on a wired client. You want to analyze the client's traffic with Wireshark, which you have on your management station.

What should you do?

Options:

A.

Access the client's switch's CLI from your management station. Access the switch shell and run a TCP dump on the client port.

B.

Go to the client's switch in HPE Aruba Networking Central. Use the "Security" page to run a packet capture.

C.

Set up a policy that implements a captive portal redirect to your management station. Apply that policy to the client's port.

D.

Set up a mirror session on the client's switch; set the client port as the source and your station IP address as the tunnel destination.

Questions # 40:

What is a benefit of Online Certificate Status Protocol (OCSP)?

Options:

A.

It lets a device query whether a single certificate is revoked or not.

B.

It lets a device dynamically renew its certificate before the certificate expires.

C.

It lets a device download all the serial numbers for certificates revoked by a CA at once.

D.

It lets a device determine whether to trust a certificate without needing any root certificates installed.

Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions