Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

HPE7-A02 Sample Questions Answers

Questions 4

You are using OpenSSL to obtain a certificate signed by a Certification Authority (CA). You have entered this command:

openssl req -new -out file1.pem -newkey rsa:3072 -keyout file2.pem

Enter PEM pass phrase: **********

Verifying - Enter PEM pass phrase: **********

Country Name (2 letter code) [AU]:US

State or Province Name (full name) [Some-State]:California

Locality Name (eg, city) []:Sunnyvale

Organization Name (eg, company) [Internet Widgits Pty Ltd]:example.com

Organizational Unit Name (eg, section) []:Infrastructure

Common Name (e.g. server FQDN or YOUR name) []:radius.example.com

What is one guideline for continuing to obtain a certificate?

Options:

A.

You should use a third-party tool to encrypt file2.pem before sending it and file1.pem to the CA.

B.

You should concatenate file1.pem and file2.pem into a single file, and submit that to the desired CA to sign.

C.

You should submit file1.pem, but not file2.pem, to the desired CA to sign.

D.

You should submit file2.pem, but not file1.pem, to the desired CA to sign.

Buy Now
Questions 5

A company has an HPE Aruba Networking ClearPass cluster with several servers. ClearPass Policy Manager (CPPM) is set up to:

. Update client attributes based on Syslog messages from third-party appliances

. Have the clients reauthenticate and apply new profiles to the clients based on the updates

To ensure that the correct profiles apply, what is one step you should take?

Options:

A.

Configure a CoA action for all tag updates in the ClearPass Device Insight integration settings.

B.

Tune the CoA delay on the ClearPass servers to a value of 5 seconds or greater.

C.

Set the cluster's Endpoint Context Servers polling interval to a value of 5 seconds or less.

D.

Configure the cluster to periodically clean up (delete) unknown endpoints.

Buy Now
Questions 6

A company has AOS-CX switches and HPE Aruba Networking ClearPass Policy Manager (CPPM). The company wants switches to implement 802.1X

authentication to CPPM and download user roles.

What is one task that you must complete on the switches to support this use case?

Options:

A.

Specify CPPM as the RADIUS server with the exact CN in CPPM's HTTPS certificate.

B.

Install the root CA certificate for CPPM's RADIUS certificate in a TA profile on the switches.

C.

Configure empty user-roles with names that match enforcement profile names on CPPM.

D.

Specify a ClearPass username and password that match the name and RADIUS secret in a CPPM network device entry.

Buy Now
Questions 7

You have configured an AOS-CX switch to implement 802.1X on edge ports. Assume ports operate in the default auth-mode. VoIP phones are assigned to the "voice" role and need to send traffic that is tagged for VLAN 12. Where should you configure VLAN 12?

Options:

A.

As the trunk native VLAN on edge ports and the trunk native VLAN on the "voice" role.

B.

As the allowed trunk VLAN in the "voice" role (and not in the edge port settings).

C.

As a trunk allowed VLAN on edge ports and the trunk native VLAN in the "voice" role.

D.

As the trunk native VLAN in the "voice" role (and not in the edge port settings).

Buy Now
Questions 8

HPE Aruba Networking ClearPass Device Insight (CPDI) could not classify some endpoints using system and user rules. Using machine learning, it did assign those endpoints to a cluster and discover a recommendation. In which of these circumstances does CPDI automatically classify the endpoints based on that recommendation?

Options:

A.

The recommendation has 96% confidence, and it is based on 13 classified devices.

B.

The recommendation has 98% confidence, and it is based on 5 classified devices.

C.

The recommendation has 93% confidence, and it is based on 36 classified devices.

D.

The recommendation has 100% confidence, and it is based on 4 classified devices.

Buy Now
Questions 9

A company wants to apply role-based access control lists (ACLs) on AOS-CX switches, which are implementing authentication to HPE Aruba Networking ClearPass Policy Manager (CPPM). The company wants to centralize configuration as much as possible. Which correctly describes your options?

Options:

A.

You can configure the role on CPPM; however, the CPPM role must reference a policy name that is configured on the switch.

B.

You can configure the role name on CPPM; however, the role settings, including policy and classes, must be configured locally on the switch.

C.

You can configure the role, its policy, and the classes referenced in the policy all on CPPM.

D.

You can configure the role and its policy on CPPM; however, the classes referenced in the policy must be configured locally on the switch.

Buy Now
Questions 10

You want to examine the applications that a device is using and look for any changes in application usage over several different ranges. In which HPE Aruba Networking solution can you view this information in an easy-to-view format?

Options:

A.

HPE Aruba Networking ClearPass OnGuard agent installed on the device

B.

HPE Aruba Networking Central within a device's Live Monitoring page

C.

HPE Aruba Networking ClearPass Insight using an Active Endpoint Security report

D.

HPE Aruba Networking ClearPass Device Insight (CPDI) in the device's network activity

Buy Now
Questions 11

You have created a Web-based Health Check Service that references a posture policy. You want the service to trigger a RADIUS change of authorization (CoA) when a client receives a Healthy or Quarantine posture. Where do you configure those rules?

Options:

A.

In a RADIUS enforcement policy

B.

In the Agents and Software Updates > OnGuard Settings

C.

In the posture policy

D.

In a WEBAUTH enforcement policy

Buy Now
Questions 12

A company has HPE Aruba Networking APs managed by HPE Aruba Networking Central. You have set up a WLAN to enforce WPA3 with 802.1X authentication.

What happens if the client fails authentication?

Options:

A.

The AP assigns the client to the WLAN's default role.

B.

The AP drops the client because authentication aborts.

C.

The AP assigns the client to the WLAN's critical role.

D.

The AP assigns the client to the WLAN's initial role.

Buy Now
Questions 13

Refer to Exhibit.

A company is using HPE Aruba Networking ClearPass Device Insight (CPDI) (the standalone application). In the CPDI interface, you go to the Generic Devices

page and see the view shown in the exhibit.

What correctly describes what you see?

Options:

A.

Each cluster is a group of unclassified devices that CPDI's machine learning has discovered to have similar attributes.

B.

Each cluster is a group of devices that match one of the tags configured by admins.

C.

Each cluster is all the devices that have been assigned to the same category by one of CPDI's built-in system rules.

D.

Each cluster is a group of devices that have been classified with user rules, but for which CPDI offers different recommendations.

Buy Now
Questions 14

You need to create a rule in an HPE Aruba Networking ClearPass Policy Manager (CPPM) role mapping policy that references a ClearPass Device Insight Tag.

Which Type (namespace) should you specify for the rule?

Options:

A.

Application

B.

Tips

C.

Device

D.

Endpoint

Buy Now
Questions 15

A company uses HPE Aruba Networking ClearPass Policy Manager (CPPM) as a TACACS+ server to authenticate managers on its AOS-CX switches. The company wants CPPM to control which commands managers are allowed to enter.

Which service must you add to the managers' TACACS+ enforcement profile?

Options:

A.

Cpass:HTTP

B.

Shell

C.

ARAP

D.

Aruba:Common

Buy Now
Questions 16

A company needs you to integrate HPE Aruba Networking ClearPass Policy Manager (CPPM) with HPE Aruba Networking ClearPass Device Insight (CPDI).

What is one task you should do to prepare?

Options:

A.

Install the root CA for CPPM's HTTPS certificate as trusted in the CPDI application.

B.

Configure WMI, SSH, and SNMP external accounts for device scanning on CPPM.

C.

Enable Insight in the CPPM server configuration settings.

D.

Collect a Data Collector token from HPE Aruba Networking Central.

Buy Now
Questions 17

You need to use "Tips:Posture" conditions within an 802.1X service's enforcement policy.

Which guideline should you follow?

Options:

A.

Enable caching roles and posture attributes from previous sessions in the service's enforcement settings.

B.

Create rules that assign postures in the service's role mapping policy.

C.

Enable profiling in the service's general settings.

D.

Select the Posture Policy type for the service's enforcement policy.

Buy Now
Questions 18

A company has several use cases for using its AOS-CX switches' HPE Aruba Networking Network Analytics Engine (NAE).

What is one guideline to keep in mind as you plan?

Options:

A.

Each switch model has a maximum number of supported monitors, and one agent might have multiple monitors.

B.

You can install multiple scripts on a switch, but you can deploy only one agent per script.

C.

The switch will permit you to deploy as many NAE agents as you want, but they might degrade the switch functionality.

D.

When you use custom scripts, you can create as many agents from each script as you want.

Buy Now
Questions 19

You are setting up user-based tunneling (UBT) between access layer AOS-CX switches and AOS-10 gateways. You have selected reserved (local) VLAN mode.

Tunneled devices include IoT devices, which should be assigned to:

    Roles: iot on the switches and iot-wired on the gateways

    VLAN: 64, for which the gateways route traffic.

IoT devices connect to the access layer switches' edge ports, and the access layer switches reach the gateways on their uplinks.

Where must you configure VLAN 64?

Options:

A.

In the iot-wired role and on no physical interfaces

B.

In the iot role and the iot-wired role and on no physical interfaces

C.

In the iot-wired role and the access switch uplinks

D.

In the iot role and the access switch uplinks

Buy Now
Questions 20

A company issues user certificates to domain computers using its Windows CA and the default user certificate template. You have set up HPE Aruba Networking

ClearPass Policy Manager (CPPM) to authenticate 802.1X clients with those certificates. However, during tests, you receive an error that authorization has failed

because the usernames do not exist in the authentication source.

What is one way to fix this issue and enable clients to successfully authenticate with certificates?

Options:

A.

Configure rules to strip the domain name from the username.

B.

Change the authentication method list to include both PEAP MSCHAPv2 and EAP-TLS.

C.

Add the ClearPass Onboard local repository to the authentication source list.

D.

Remove EAP-TLS from the authentication method list and add TEAP there instead.

Buy Now
Questions 21

You have enabled "rogue AP containment" in the Wireless IPS settings for a company’s HPE Aruba Networking APs. What form of containment does HPE Aruba Networking recommend?

Options:

A.

Wireless deauthentication only

B.

Wireless tarpit and wired containment

C.

Wireless tarpit only

D.

Wired containment

Buy Now
Questions 22

Refer to Exhibit:

An HPE Aruba Networking 9x00 gateway is part of an HPE Aruba Networking Central group that has the settings shown in the exhibit. What would cause the gateway to drop traffic as part of its IDPS settings?

Options:

A.

Its site-to-site VPN connections failing

B.

Traffic matching a rule in the active ruleset

C.

Its IDPS engine failing

D.

Traffic showing anomalous behavior

Buy Now
Questions 23

A company wants you to create a custom device fingerprint on CPPM with rules for profiling a group of specialized devices. What is one requirement?

Options:

A.

Connecting a known device of this type and getting it discovered in CPPM's Endpoints Repository.

B.

Enabling HPE Aruba Networking ClearPass Device Insight integration with the correct Data Collector token.

C.

Pre-defining the desired attributes and rules in an XML format file.

D.

Disabling the "Automatically download Endpoint Profiler Fingerprints" feature in cluster-wide parameters.

Buy Now
Questions 24

HPE Aruba Networking switches are implementing MAC-Auth to HPE Aruba Networking ClearPass Policy Manager (CPPM) for a company's printers. The company wants to quarantine a client that spoofs a legitimate printer's MAC address. You plan to add a rule to the MAC-Auth service enforcement policy for this purpose. What condition should you include?

Options:

A.

Endpoint Compliance EQUALS false

B.

Endpoint Device Insight Tag EXISTS

C.

Authorization: [Endpoints Repository] Compromised EQUALS true

D.

Authorization: [Endpoints Repository] Conflict EQUALS true

Buy Now
Questions 25

You are configuring the HPE Aruba Networking ClearPass Device Insight Integration settings on ClearPass Policy Manager (CPPM). For which use case should you set the 'Tag Updates Action" to "apply for all tag updates"?

Options:

A.

When the Device Insight integration poll interval is set to a relatively long interval but you still want CPPM to be informed quickly about devices' new tags.

B.

When Device Insight tags are only used to identify dangerous devices, and you want to disconnect those devices without having to set up new rules in enforcement policies.

C.

When CPPM is gathering posture information for CPDI, and you want CPDI to always have access to the most up-to-date information.

D.

When you plan to have CPPM issue CoAs for clients with new tags, but do not want to have to list those specific tags in the Device Integration settings in advance.

Buy Now
Questions 26

HPE Aruba Networking Central displays an alert about an Infrastructure Attack that was detected. You go to the Security > RAPIDS events and see that the attack

was "Detect adhoc using Valid SSID."

What is one possible next step?

Options:

A.

Use HPE Aruba Networking Central floorplans or the detecting AP identities to locate the general area for the threat.

B.

Look for the IP address associated with the offender and then check for that IP address among HPE Aruba Networking Central clients.

C.

Make sure that you have tuned the threshold for that check, as false positives are common for it.

D.

Make sure that clients have updated drivers, as faulty drivers are a common explanation for this attack type.

Buy Now
Questions 27

A company uses both HPE Aruba Networking ClearPass Policy Manager (CPPM) and HPE Aruba Networking ClearPass Device Insight (CPDI).

What is one way integrating the two solutions can help the company implement Zero Trust Security?

Options:

A.

CPPM can provide CPDI with custom device fingerprint definitions in order to enhance the company's total visibility.

B.

CPDI can provide CPPM with extra information about users' identity; CPPM can then use that information to apply the correct identity-based enforcement.

C.

CPPM can inform CPDI that it has assigned a particular Aruba-User-Role to a client; CPDI can then use that information to reclassify the client.

D.

CPDI can use tags to inform CPPM that clients are using prohibited applications; CPPM can then tell the network infrastructure to quarantine those clients.

Buy Now
Questions 28

A company has a variety of HPE Aruba Networking solutions, including an HPE Aruba Networking infrastructure and HPE Aruba Networking ClearPass Policy

Manager (CPPM). The company passes traffic from the corporate LAN destined to the data center through a third-party SRX firewall. The company would like to

further protect itself from internal threats.

What is one solution that you can recommend?

Options:

A.

Have the third-party firewall send Syslogs to CPPM, which can work with network devices to lock internal attackers out of the network.

B.

Use tunnel mode SSIDs and user-based tunneling (UBT) on AOS-CX switches to pass all internal traffic directly through the third-party firewall.

C.

Add ClearPass Device Insight (CPDI) to the solution; integrate it with the third-party firewall to develop more complete device profiles.

D.

Configure CPPM to poll the third-party firewall for a broad array of information about internal clients, such as profile and posture.

Buy Now
Questions 29

You have created this rule in an HPE Aruba Networking ClearPass Policy Manager (CPPM) service's enforcement policy: IF Authorization [Endpoints Repository]

Conflict EQUALS true THEN apply "quarantine_profile"

What information can help you determine whether you need to configure cluster-wide profiler parameters to ignore some conflicts?

Options:

A.

Whether the company has rare Internet of Things (loT) devices

B.

Whether some devices are incapable of captive portal or 802.1X authentication

C.

Whether the company has devices that use PXE boot

D.

Whether some devices are running legacy operating systems

Buy Now
Questions 30

An admin has configured an AOS-CX switch with these settings:

port-access role employees

vlan access name employees

This switch is also configured with CPPM as its RADIUS server.

Which enforcement profile should you configure on CPPM to work with this configuration?

Options:

A.

RADIUS Enforcement type with HPE-User-Role VSA set to "employees"

B.

HPE Aruba Networking Downloadable Role Enforcement type with role name set to "employees"

C.

HPE Aruba Networking Downloadable Role Enforcement type with gateway role name set to "employees"

D.

RADIUS Enforcement type with Aruba-User-Role VSA set to "employees"

Buy Now
Questions 31

You have set up a mirroring session between an AOS-CX switch and a management station, running Wireshark. You want to capture just the traffic sent in the

mirroring session, not the management station's other traffic.

What should you do?

Options:

A.

Apply this capture filter: ip proto 47

B.

Edit protocol preferences and enable ARUBA_ERM.

C.

Edit protocol preferences and enable HPE_ERM.

D.

Apply this capture filter: udp port 5555

Buy Now
Questions 32

You are setting up HPE Aruba Networking SSE to prohibit users from uploading and downloading files from Dropbox. What is part of the process?

Options:

A.

Adding a web category that includes Dropbox

B.

Installing the HPE Aruba Networking SSE root certificate on clients

C.

Deploying a connector that can reach the remote users

D.

Deploying a connector that can reach Dropbox

Buy Now
Questions 33

You are setting up an HPE Aruba Networking VIA solution for a company. You have already created a VPN pool with IP addresses for the remote clients. During

tests, however, the clients do not receive IP addresses from that pool.

What is one setting to check?

Options:

A.

That the pool uses valid, public IP addresses that are assigned to the company

B.

That the pool is associated with the role to which the VIA clients are being assigned

C.

That the pool uses an IP subnet that is different from any subnet configured on the VPNC

D.

That the pool is referenced in the clients' VIA Connection Profile

Buy Now
Questions 34

A company is implementing a client-to-site VPN based on tunnel-mode IPsec.

Which devices are responsible for the IPsec encapsulation?

Options:

A.

Gateways at the remote clients' locations and devices accessed by the clients at the main site

B.

The remote clients and devices accessed by the clients at the main site

C.

The remote clients and a gateway at the main site

D.

Gateways at the remote clients' locations and a gateway at the main site

Buy Now
Questions 35

A company wants to use the HPE Aruba Networking ClearPass OnGuard agent to assign posture to clients.

How do you define the conditions by which a client receives a particular posture?

Options:

A.

Create rules within a posture policy

B.

Create rules within a WebAuth enforcement policy

C.

Create the rules directly in a service’s Enforcement tab

D.

Create rules directly in a service’s Posture tab

Buy Now
Questions 36

HPE Aruba Networking Central displays an alert about an Infrastructure Attack that was detected. You go to the Security > RAPIDS events and see that the attack was "Detect adhoc using Valid SSID." What is one possible next step?

Options:

A.

Make sure that you have tuned the threshold for that check as false positives are common for it.

B.

Make sure that clients have updated drivers, as faulty drivers are a common explanation for this attack type.

C.

Use HPE Aruba Networking Central floorplans or the detecting AP identities to locate the general area for the threat.

D.

Look for the IP address associated with the offender and then check for that IP address among HPE Aruba Networking Central clients.

Buy Now
Questions 37

You have created this rule in an HPE Aruba Networking ClearPass Policy Manager (CPPM) service’s enforcement policy:

IF Authorization [Endpoints Repository] Conflict EQUALS true

THEN apply "quarantine_profile"

What information can help you determine whether you need to configure cluster-wide profiler parameters to ignore some conflicts?

Options:

A.

Whether some devices are running legacy operating systems

B.

Whether the company has rare Internet of Things (IoT) devices

C.

Whether some devices are incapable of captive portal or 802.1X authentication

D.

Whether the company has devices that use PXE boot

Buy Now
Questions 38

The following firewall role is configured on HPE Aruba Networking Central-managed APs:

wlan access-rule employees

index 3

rule any any match 17 67 67 permit

rule any any match any 53 53 permit

rule 10 5 5.0 255.255 255.0 match any any any deny

rule 10.5 0.0 255.255 0.0 match 6 80 80 permit

rule 10.5 0.0 255.255.0.0 match 6 443 443 permit

rule 10.5.0.0 255.255.0.0 match any any any deny

rule any any match any any any permit

A client has authenticated and been assigned to the employees role. The client has IP address 10.2.2.2. Which correctly describes behavior in this policy?

Options:

A.

HTTPS traffic from 10.2.2.2 to 10.5.5.5 is denied.

B.

HTTPS traffic from 10.2.2.2 to 203.0.113.12 is denied.

C.

Traffic from 10.5.3.3 in an active HTTPS session between 10.2.2.2 and 10.5.3.3 is permitted.

D.

Traffic from 198.51.100.12 in an active HTTP session between 10.2.2.2 and 198.51.100.12 is denied.

Buy Now
Questions 39

A company wants HPE Aruba Networking ClearPass Policy Manager (CPPM) to periodically poll Microsoft Endpoint Manager (formerly Intune) for attributes about its managed clients.

What should you do on ClearPass to permit this integration?

Options:

A.

Install the Intune extension from ClearPass Guest

B.

Import the Intune dictionary into the ClearPass dictionaries

C.

Create an Intune authentication source on CPPM

D.

Configure Endpoint Manager (Intune) as an event source on CPPM

Buy Now
Questions 40

A company is using HPE Aruba Networking ClearPass Device Insight (CPDI) (the standalone application). In the CPDI security settings, Security Analysis is On,

the Data Source is ClearPass Devices Insight, and Enable Posture Assessment is On. You see that device has a Risk Score of 90.

What can you know from this information?

Options:

A.

The posture is unhealthy, and CPDI has also detected at least one vulnerability on the device.

B.

The posture is unhealthy, but CPDI has not detected any vulnerabilities on the device.

C.

The posture is healthy, but CPDI has detected multiple vulnerabilities on the device.

D.

The posture is unknown, and CPDI has detected exactly four vulnerabilities on the device.

Buy Now
Exam Code: HPE7-A02
Exam Name: Aruba Certified Network Security Professional Exam
Last Update: Feb 2, 2026
Questions: 135
$66  $164.99
$50  $124.99
$42  $104.99
buy now HPE7-A02