New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

Aruba-ACNSA HPE6-A78 Dumps PDF

Page: 2 / 7
Question 8

What are the roles of 802.1X authenticators and authentication servers?

Options:

A.

The authenticator stores the user account database, while the server stores access policies.

B.

The authenticator supports only EAP, while the authentication server supports only RADIUS.

C.

The authenticator is a RADIUS client and the authentication server is a RADIUS server.

D.

The authenticator makes access decisions and the server communicates them to the supplicant.

Question 9

What is another setting that you must configure on the switch to meet these requirements?

Options:

A.

Set the aaa authentication login method for SSH to the "radius" server-group (with local as backup).

B.

Configure a CPPM username and password that match a CPPM admin account.

C.

Create port-access roles with the same names of the roles that CPPM will send in Aruba-Admin-Role VSAs.

D.

Disable SSH on the default VRF and enable it on the mgmt VRF instead.

Question 10

What is one difference between EAP-Tunneled Layer security (EAP-TLS) and Protected EAP (PEAP)?

Options:

A.

EAP-TLS creates a TLS tunnel for transmitting user credentials, while PEAP authenticates the server and supplicant during a TLS handshake.

B.

EAP-TLS requires the supplicant to authenticate with a certificate, hut PEAP allows the supplicant to use a username and password.

C.

EAP-TLS begins with the establishment of a TLS tunnel, but PEAP does not use a TLS tunnel as part of Its process

D.

EAP-TLS creates a TLS tunnel for transmitting user credentials securely while PEAP protects user credentials with TKIP encryption.

Question 11

How can hackers implement a man-in-the-middle (MITM) attack against a wireless client?

Options:

A.

The hacker uses a combination of software and hardware to jam the RF band and prevent the client from connecting to any wireless networks.

B.

The hacker runs an NMap scan on the wireless client to find its MAC and IP address. The hacker then connects to another network and spoofs those addresses.

C.

The hacker connects a device to the same wireless network as the client and responds to the client’s ARP requests with the hacker device’s MAC address.

D.

The hacker uses spear-phishing to probe for the IP addresses that the client is attempting to reach. The hacker device then spoofs those IP addresses.

Page: 2 / 7
Exam Code: HPE6-A78
Exam Name: Aruba Certified Network Security Associate Exam
Last Update: Dec 22, 2024
Questions: 106
HPE6-A78 pdf

HPE6-A78 PDF

$25.5  $84.99
HPE6-A78 Engine

HPE6-A78 Testing Engine

$28.5  $94.99
HPE6-A78 PDF + Engine

HPE6-A78 PDF + Testing Engine

$40.5  $134.99