You are configuring ArubaOS-CX switches to tunnel client traffic to an Aruba Mobility Controller (MC). What should you do to enhance security for control channel communications between the switches and the MC?
A. Create one UBT zone for control traffic and a second UBT zone for clients.
B. Configure a long, random PAPI security key that matches on the switches and the MC.
C. install certificates on the switches, and make sure that CPsec is enabled on the MC
D. Make sure that the UBT client vlan is assigned to the interface on which the switches reach the MC and only that interface.
Which attack is an example or social engineering?
A. An email Is used to impersonate a Dank and trick users into entering their bank login information on a fake website page.
B. A hacker eavesdrops on insecure communications, such as Remote Desktop Program (RDP). and discovers login credentials.
C. A user visits a website and downloads a file that contains a worm, which sell-replicates throughout the network.
D. An attack exploits an operating system vulnerability and locks out users until they pay the ransom.
How does the ArubaOS firewall determine which rules to apply to a specific client's traffic?
A. The firewall applies every rule that includes the dent's IP address as the source.
B. The firewall applies the rules in policies associated with the client's wlan
C. The firewall applies thee rules in policies associated with the client's user role.
D. The firewall applies every rule that includes the client's IP address as the source or destination.
From which solution can ClearPass Policy Manager (CPPM) receive detailed information about client device type OS and status?
A. ClearPass Onboard
B. ClearPass Access Tracker
C. ClearPass OnGuard
D. ClearPass Guest
You have been authorized to use containment to respond to rogue APs detected by ArubaOS Wireless Intrusion Prevention (WIP). What is a consideration for using tarpit containment versus traditional wireless containment?
A. Rather than function wirelessly, tarpit containment sends ARP frames over the wired network to poison rogue APs ARP tables and prevent them from transmitting on the wired network.
B. Rather than target all clients connected to rogue APs, tarpit containment targets only authorized clients that are connected to a rogue AP, reducing the chance of negative effects on neighbors.
C. Tarpit containment does not require an RF Protect license to function, while traditional wireless containment does.
D. Tarpit containment forms associations with clients to enable more effective containment with fewer disassociation frames than traditional wireless containment.
Page 4 out of 22 Pages |
Previous |