Which is a correct description of a Public Key Infrastructure (PKI)?
A. A device uses Intermediate Certification Authorities (CAs) to enable it to trust root CAs that are different from the root CA that signed its own certificate.
B. A user must manually choose to trust intermediate and end-entity certificates, or those certificates must be installed on the device as trusted in advance.
C. Root Certification Authorities (CAs) primarily sign certificates, and Intermediate Certification Authorities (CAs) primarily validate signatures.
D. A user must manually choose to trust a root Certification Authority (CA) certificate, or the root CA certificate must be installed on the device as trusted.
Explanation:
Public Key Infrastructure (PKI) relies on a trusted root Certification Authority (CA) to issue certificates. Devices and users must trust the root CA for the PKI to be effective. If a root CA certificate is not pre-installed or manually chosen to be trusted on a device, any certificates issued by that CA will not be inherently trusted by the device.
Reference:
[Reference: The concept and structure of PKI are detailed in various security literature, such as NIST Special Publication 800-32 - Introduction to Public Key Technology and the Federal PKI Infrastructure., ]
What are some functions of an AruDaOS user role?
A. The role determines which authentication methods the user must pass to gain network access
B. The role determines which firewall policies and bandwidth contract apply to the clients traffic
C. The role determines which wireless networks (SSiDs) a user is permitted to access
D. The role determines which control plane ACL rules apply to the client's traffic
Explanation:
An ArubaOS user role determines the firewall policies and bandwidth contracts that apply to the client’s traffic. When a user is authenticated, they are assigned a role, and this role has associated policies that govern network access rights, Quality of Service (QoS), Layer 2 forwarding, Layer 3 routing behaviors, and bandwidth contracts for users or devices.
References:
• Aruba Networks official documentation on user roles in ArubaOS.
• Technical guides that detail user role definitions and their impact on network policies.
How should admins deal with vulnerabilities that they find in their systems?
A. They should apply fixes, such as patches, to close the vulnerability before a hacker exploits it.
B. They should add the vulnerability to their Common Vulnerabilities and Exposures (CVE).
C. They should classify the vulnerability as malware. a DoS attack or a phishing attack.
D. They should notify the security team as soon as possible that the network has already been breached.
Explanation:
When vulnerabilities are identified in systems, it is crucial for administrators to act immediately to mitigate the risk of exploitation by attackers. The appropriate response involves applying fixes, such as software patches or configuration changes, to close the vulnerability. This proactive approach is necessary to protect the integrity, confidentiality, and availability of the system resources and data. It's important to prioritize these actions based on the severity and exploitability of the vulnerability to ensure that the most critical issues are addressed first.References:
• Best practices in system security management.
What is a use case for tunneling traffic between an Aruba switch and an AruDa Mobility Controller (MC)?
A. applying firewall policies and deep packet inspection to wired clients
B. enhancing the security of communications from the access layer to the core with data encryption
C. securing the network infrastructure control plane by creating a virtual out-of-band-management network
D. simplifying network infrastructure management by using the MC to push configurations to the switches
Explanation:
Tunneling traffic between an Aruba switch and an Aruba Mobility Controller (MC) allows for the centralized application of firewall policies and deep packet inspection to wired clients. By directing traffic through the MC, network administrators can implement a consistent set of security policies across both wired and wireless segments of the network, enhancing overall network security posture.
Reference:
[Reference: Aruba Networks documentation details the use cases for tunneling traffic to an MC, including the application of security and access controls on network traffic., ]
How can ARP be used to launch attacks?
A. Hackers can use ARP to change their NIC's MAC address so they can impersonate legiti-mate users.
B. Hackers can exploit the fact that the port used for ARP must remain open and thereby gain remote access to another user's device.
C. A hacker can use ARP to claim ownership of a CA-signed certificate that actually belongs to another device.
D. A hacker can send gratuitous ARP messages with the default gateway IP to cause devices to redirect traffic to the hacker's MAC address.
Explanation:
ARP (Address Resolution Protocol) can indeed be exploited to conduct various types of attacks, most notably ARP spoofing/poisoning. Gratuitous ARP is a special kind of ARP message which is used by an IP node to announce or update its IP to MAC mapping to the entire network. A hacker can abuse this by sending out gratuitous ARP messages pretending to associate the IP address of the router (default gateway) with their own MAC address. This results in traffic that was supposed to go to the router being sent to the attacker instead, thus potentially enabling the attacker to intercept, modify, or block traffic.
Page 1 out of 6 Pages |