A company has an Aruba solution with a Mobility Master (MM) Mobility Controllers (MCs) and campus Aps. What is one benefit of adding Aruba Airwave from the perspective of forensics?
A. Airwave can provide more advanced authentication and access control services for the AmbaOS solution
B. Airwave retains information about the network for much longer periods than ArubaOS solution
C. Airwave is required to activate Wireless Intrusion Prevention (WIP) services on the ArubaOS solution
D. AirWave enables low level debugging on the devices across the ArubaOS solution
A company with 439 employees wants to deploy an open WLAN for guests. The company wants the experience to be as follows:
*Guests select the WLAN and connect without having to enter a password.
*Guests are redirected to a welcome web page and log in.
The company also wants to provide encryption for the network for devices that are capable. Which security options should you implement for the WLAN?
A. Opportunistic Wireless Encryption (OWE) and WPA3-Personal
B. WPA3-Personal and MAC-Auth
C. Captive portal and Opportunistic Wireless Encryption (OWE) in transition mode
D. Captive portal and WPA3-Personal
You configure an ArubaOS-Switch to enforce 802.1X authentication with ClearPass Policy Manager (CPPM) denned as the RADIUS server Clients cannot authenticate You check Aruba ClearPass Access Tracker and cannot find a record of the authentication attempt.
What are two possible problems that have this symptom? (Select two)
A. users are logging in with the wrong usernames and passwords or invalid certificates.
B. Clients are configured to use a mismatched EAP method from the one In the CPPM service.
C. The RADIUS shared secret does not match between the switch and CPPM.
D. CPPM does not have a network device defined for the switch's IP address.
E. Clients are not configured to trust the root CA certificate for CPPM's RADIUS/EAP certificate.
What is one practice that can help you to maintain a digital chain or custody In your network?
A. Enable packet capturing on Instant AP or Moodily Controller (MC) datepath on an ongoing basis
B. Enable packet capturing on Instant AP or Mobility Controller (MC) control path on an ongoing basis.
C. Ensure that all network infrastructure devices receive a valid clock using authenticated NTP
D. Ensure that all network Infrastructure devices use RADIUS rather than TACACS+ to authenticate managers
What is a vulnerability of an unauthenticated Dime-Heliman exchange?
A. A hacker can replace the public values exchanged by the legitimate peers and launch an MITM attack.
B. A brute force attack can relatively quickly derive Diffie-Hellman private values if they are able to obtain public values
C. Diffie-Hellman with elliptic curve values is no longer considered secure in modem networks, based on NIST recommendations.
D. Participants must agree on a passphrase in advance, which can limit the usefulness of Diffie- Hell man in practical contexts.
Page 3 out of 22 Pages |
Previous |