Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

HPE7-A02 Aruba Certified Network Security Professional Exam Questions and Answers

Questions 4

You are setting up an HPE Aruba Networking VIA solution for a company. You have already created a VPN pool with IP addresses for the remote clients. During

tests, however, the clients do not receive IP addresses from that pool.

What is one setting to check?

Options:

A.

That the pool uses valid, public IP addresses that are assigned to the company

B.

That the pool is associated with the role to which the VIA clients are being assigned

C.

That the pool uses an IP subnet that is different from any subnet configured on the VPNC

D.

That the pool is referenced in the clients' VIA Connection Profile

Buy Now
Questions 5

HPE Aruba Networking Central displays a Gateway Threat Count alert in the alert list. How can you gather more information about what caused the alert to trigger?

Options:

A.

Use HPE Aruba Networking Central tools to run a Network Check on the gateway with which the alert is associated.

B.

Use Live Monitoring on the gateway to download a packet capture of recent traffic flowing through the gateway.

C.

Check the threat list for the gateway associated with the alert. Access threat details and download packet info.

D.

Check the gateway's Audit Trail in HPE Aruba Networking Central for more details about the threats that triggered the alert.

Buy Now
Questions 6

You are setting up user-based tunneling (UBT) between access layer AOS-CX switches and AOS-10 gateways. You have selected reserved (local) VLAN mode.

Tunneled devices include IoT devices, which should be assigned to:

    Roles: iot on the switches and iot-wired on the gateways

    VLAN: 64, for which the gateways route traffic.

IoT devices connect to the access layer switches' edge ports, and the access layer switches reach the gateways on their uplinks.

Where must you configure VLAN 64?

Options:

A.

In the iot-wired role and on no physical interfaces

B.

In the iot role and the iot-wired role and on no physical interfaces

C.

In the iot-wired role and the access switch uplinks

D.

In the iot role and the access switch uplinks

Buy Now
Questions 7

A company wants to use the HPE Aruba Networking ClearPass OnGuard agent to assign posture to clients.

How do you define the conditions by which a client receives a particular posture?

Options:

A.

Create rules within a posture policy

B.

Create rules within a WebAuth enforcement policy

C.

Create the rules directly in a service’s Enforcement tab

D.

Create rules directly in a service’s Posture tab

Buy Now
Questions 8

A company uses HPE Aruba Networking ClearPass Policy Manager (CPPM) as a TACACS+ server to authenticate managers on its AOS-CX switches. You want

to assign managers to groups on the AOS-CX switch by name.

How do you configure this setting in a CPPM TACACS+ enforcement profile?

Options:

A.

Add the Shell service and set autocmd to the group name.

B.

Add the Shell service and set priv-Ivl to the group name.

C.

Add the Aruba:Common service and set Aruba-Admin-Role to the group name.

D.

Add the Aruba:Common service and set Aruba-Priv-Admin-User to the group name.

Buy Now
Questions 9

HPE Aruba Networking Central displays an alert about an Infrastructure Attack that was detected. You go to the Security > RAPIDS events and see that the attack was "Detect adhoc using Valid SSID." What is one possible next step?

Options:

A.

Make sure that you have tuned the threshold for that check as false positives are common for it.

B.

Make sure that clients have updated drivers, as faulty drivers are a common explanation for this attack type.

C.

Use HPE Aruba Networking Central floorplans or the detecting AP identities to locate the general area for the threat.

D.

Look for the IP address associated with the offender and then check for that IP address among HPE Aruba Networking Central clients.

Buy Now
Questions 10

A company has HPE Aruba Networking gateways that implement gateway IDS/IPS. Admins sometimes check the Security Dashboard, but they want a faster way to discover if a gateway starts detecting threats in traffic.

What should they do?

Options:

A.

Set up Webhooks that are attached to the HPE Aruba Networking Central Threat Dashboard.

B.

Use Syslog to integrate the gateways with HPE Aruba Networking ClearPass Policy Manager (CPPM) event processing.

C.

Set up email notifications using HPE Aruba Networking Central's global alert settings.

D.

Integrate HPE Aruba Networking ClearPass Device Insight (CPDI) with Central and schedule hourly reports.

Buy Now
Questions 11

HPE Aruba Networking Central displays an alert about an Infrastructure Attack that was detected. You go to the Security > RAPIDS events and see that the attack

was "Detect adhoc using Valid SSID."

What is one possible next step?

Options:

A.

Use HPE Aruba Networking Central floorplans or the detecting AP identities to locate the general area for the threat.

B.

Look for the IP address associated with the offender and then check for that IP address among HPE Aruba Networking Central clients.

C.

Make sure that you have tuned the threshold for that check, as false positives are common for it.

D.

Make sure that clients have updated drivers, as faulty drivers are a common explanation for this attack type.

Buy Now
Questions 12

A company has AOS-CX switches and HPE Aruba Networking APs, which run AOS-10 and bridge their SSIDs. Company security policies require 802.1X on all edge ports, some of which connect to APs. How should you configure the auth-mode on AOS-CX switches?

Options:

A.

Leave all edge ports in client auth-mode and configure device auth-mode in the AP role.

B.

Configure all edge ports in client auth-mode.

C.

Configure all edge ports in device auth-mode.

D.

Leave all edge ports in device auth-mode and configure client auth-mode in the AP role.

Buy Now
Questions 13

What correctly describes an HPE Aruba Networking AP's Device (TPM) certificate?

Options:

A.

It is signed by an HPE Aruba Networking CA and is trusted by many HPE Aruba Networking solutions.

B.

It works well as a captive portal certificate for guest SSIDs.

C.

It is a self-signed certificate that should not be used in production.

D.

It is installed on APs after they connect to and are provisioned by HPE Aruba Networking Central.

Buy Now
Questions 14

You have configured an AOS-CX switch to implement 802.1X on edge ports. Assume ports operate in the default auth-mode. VolP phones are assigned to the

"voice" role and need to send traffic that is tagged for VLAN 12.

Where should you configure VLAN 12?

Options:

A.

As the trunk native VLAN on edge ports and the trunk native VLAN on the "voice" role

B.

As a trunk allowed VLAN on edge ports and the trunk native VLAN in the "voice" role

C.

As the trunk native VLAN in the "voice" role (and not in the edge port settings)

D.

As the allowed trunk VLAN in the "voice" role (and not in the edge port settings)

Buy Now
Questions 15

A company is using HPE Aruba Networking Central SD-WAN Orchestrator to establish a hub-spoke VPN between branch gateways (BGWs) at 1444 site and

VPNCs at multiple data centers.

What is part of the configuration that admins need to complete?

Options:

A.

At the global level, create default IPsec policies for the SD-WAN Orchestrator to use.

B.

In BGWs' groups, select the VPNCs to which to connect in a DC preference list.

C.

In VPNCs' groups, establish VPN pools to control which branches connect to which VPNCs.

D.

In BGWs' and VPNCs' groups, create default IKE policies for the SD-WAN Orchestrator to use.

Buy Now
Questions 16

Refer to Exhibit.

A company is using HPE Aruba Networking ClearPass Device Insight (CPDI) (the standalone application). In the CPDI interface, you go to the Generic Devices

page and see the view shown in the exhibit.

What correctly describes what you see?

Options:

A.

Each cluster is a group of unclassified devices that CPDI's machine learning has discovered to have similar attributes.

B.

Each cluster is a group of devices that match one of the tags configured by admins.

C.

Each cluster is all the devices that have been assigned to the same category by one of CPDI's built-in system rules.

D.

Each cluster is a group of devices that have been classified with user rules, but for which CPDI offers different recommendations.

Buy Now
Questions 17

What role can Internet Key Exchange (IKE)/IKEv2 play in an HPE Aruba Networking client-to-site VPN?

Options:

A.

It provides an alternative to IPsec that is suitable for legacy clients.

B.

It provides a more modern and secure alternative to IPsec.

C.

It helps to negotiate the IPsec SA automatically and securely.

D.

It helps remote clients download IPsec profiles for later use.

Buy Now
Questions 18

You manage AOS-10 APs with HPE Aruba Networking Central. A role is configured on these APs with these rules (in order):

    Allow UDP on port 67 to any destination

    Allow any to network 10.1.4.0/23

    Deny any to network 10.1.0.0/18 + log

    Deny any to network 10.0.0.0/8

    Allow any to any destination

You add this new rule immediately before rule 4:

    Deny SSH to network 10.1.0.0/21 + denylist

After this change, what happens when a client assigned to this role sends SSH traffic to 10.1.7.12?

Options:

A.

The traffic is permitted

B.

The traffic is dropped and logged

C.

The traffic is dropped, and the client is denylisted

D.

The traffic is dropped (without any logging or further action against the client)

Buy Now
Questions 19

A company uses HPE Aruba Networking ClearPass Policy Manager (CPPM) as a TACACS+ server to authenticate managers on its AOS-CX switches. The company wants CPPM to control which commands managers are allowed to enter.

Which service must you add to the managers' TACACS+ enforcement profile?

Options:

A.

Cpass:HTTP

B.

Shell

C.

ARAP

D.

Aruba:Common

Buy Now
Questions 20

A company uses HPE Aruba Networking ClearPass Policy Manager (CPPM) and HPE Aruba Networking ClearPass Device Insight (CPDI) and has integrated the

two. CPDI admins have created a tag. CPPM admins have created rules that use that tag in the wired 802.1X and wireless 802.1X services' enforcement policies.

The company requires CPPM to apply the tag-based rules to a client directly after it learns that the client has that tag.

What is one of the settings that you should verify on CPPM?

Options:

A.

The "Device Sync" setting is set to 1 in the ClearPass Device Insight Integration settings.

B.

Both 802.1X services have the "Profile Endpoints" option enabled and an appropriate CoA profile selected in the Profiler tab.

C.

Both 802.1X services have the "Use cached Role and Posture attributes from the previous sessions" setting.

D.

The "Polling Interval" is set to 1 in the ClearPass Device Insight Integration settings.

Buy Now
Questions 21

You are establishing a cluster of HPE Aruba Networking ClearPass servers. (Assume that they are running version 6.9.).

For which type of certificate is it recommended to install a CA-signed certificate on the Subscriber before it joins the cluster?

Options:

A.

HTTPS

B.

Database

C.

RADIUS/EAP

D.

RadSec

Buy Now
Questions 22

A company wants you to integrate HPE Aruba Networking ClearPass Policy Manager (CPPM) with HPE Aruba Networking ClearPass Device Insight (CPDI).

What is one aspect of the integration that you should explain?

Options:

A.

CPPM no longer supports any Device Profiler features and relies on CPDI for this profile information.

B.

CPDI must be configured as an audit server on CPPM for the integration to be successful.

C.

CPDI must have security analysis disabled on it for the integration to be successful.

D.

CPPM can submit profile information to CPDI, but if CPDI derives a different classification, CPDI takes precedence.

Buy Now
Questions 23

A company assigns a different block of VLAN IDs to each of its access layer AOS-CX switches. The switches run version 10.07. The IDs are used for standard

purposes, such as for employees, VolP phones, and cameras. The company wants to apply 802.1X authentication to HPE Aruba Networking ClearPass Policy

Manager (CPPM) and then steer clients to the correct VLANs for local forwarding.

What can you do to simplify setting up this solution?

Options:

A.

Assign consistent names to VLANs of the same type across the AOS-CX switches and have user-roles reference names.

B.

Use the trunk allowed VLAN setting to assign multiple VLAN IDs to the same role.

C.

Change the VLAN IDs across the AOS-CX switches so that they are consistent.

D.

Avoid configuring the VLAN in the role; use trunk VLANs to assign multiple VLANs to the port instead.

Buy Now
Questions 24

What is a benefit of Online Certificate Status Protocol (OCSP)?

Options:

A.

It lets a device query whether a single certificate is revoked or not.

B.

It lets a device dynamically renew its certificate before the certificate expires.

C.

It lets a device download all the serial numbers for certificates revoked by a CA at once.

D.

It lets a device determine whether to trust a certificate without needing any root certificates installed.

Buy Now
Questions 25

You have set up a mirroring session between an AOS-CX switch and a management station, running Wireshark. You want to capture just the traffic sent in the

mirroring session, not the management station's other traffic.

What should you do?

Options:

A.

Apply this capture filter: ip proto 47

B.

Edit protocol preferences and enable ARUBA_ERM.

C.

Edit protocol preferences and enable HPE_ERM.

D.

Apply this capture filter: udp port 5555

Buy Now
Questions 26

Refer to Exhibit:

All of the switches in the exhibit are AOS-CX switches.

What is the preferred configuration on Switch-2 for preventing rogue OSPF routers in this network?

Options:

A.

Configure OSPF authentication on VLANs 10-19 in password mode.

B.

Configure OSPF authentication on Lag 1 in MD5 mode.

C.

Disable OSPF entirely on VLANs 10-19.

D.

Configure passive-interface as the OSPF default and disable OSPF passive on Lag 1.

Buy Now
Questions 27

HPE Aruba Networking ClearPass Device Insight (CPDI) could not classify some endpoints using system and user rules. Using machine learning, it did assign those endpoints to a cluster and discover a recommendation. In which of these circumstances does CPDI automatically classify the endpoints based on that recommendation?

Options:

A.

The recommendation has 96% confidence, and it is based on 13 classified devices.

B.

The recommendation has 98% confidence, and it is based on 5 classified devices.

C.

The recommendation has 93% confidence, and it is based on 36 classified devices.

D.

The recommendation has 100% confidence, and it is based on 4 classified devices.

Buy Now
Questions 28

What is one use case that companies can fulfill using HPE Aruba Networking ClearPass Policy Manager's (CPPM's) Device Profiler?

Options:

A.

OIdentifying device security vulnerabilities by CVE ID and receiving remediation recommendations

B.

Leveraging artificial intelligence to more accurately identify Internet of Things (loT) devices

C.

Quarantining devices that do not have the required antivirus software installed on them

D.

Assigning different AOS firewall roles to users on computers and the same users on smartphones

Buy Now
Questions 29

A company wants to use HPE Aruba Networking ClearPass Policy Manager (CPPM) to profile Linux devices. You have decided to schedule a subnet scan of the devices' subnets. Which additional step should you complete before scheduling the scan?

Options:

A.

Set up SSH accounts on CPPM and map them to the Linux devices' subnets.

B.

Enable WMI probing in the cluster-wide parameters.

C.

Enable the Data Port in the ClearPass server settings and connect that port to the network.

D.

Configure SNMP in the network device settings for the switches that support the Linux devices.

Buy Now
Questions 30

A company has HPE Aruba Networking APs and AOS-CX switches. The APs bridge wireless traffic. They receive DHCP IP addresses on VLAN 18. Wireless users are assigned to VLAN 12.

The company wants the APs to start using 802.1X authentication on their switch ports. You are configuring the port-access role to which the APs are assigned after authentication.

What is one recommended setting for that role?

Options:

A.

No trust for DSCP

B.

Trust for DSCP

C.

Auth-mode left at client-mode

D.

Access VLAN 18 with no support for VLAN 12

Buy Now
Questions 31

Assume that an AOS-CX switch is already implementing DHCP snooping and ARP inspection successfully on several VLANs.

What should you do to help minimize disruption time if the switch reboots?

Options:

A.

Configure the switch to act as an ARP proxy.

B.

Create static IP-to-MAC bindings for the DHCP and DNS servers.

C.

Save the IP-to-MAC bindings to external storage.

D.

Configure the IP helper address on this switch, rather than a core routing switch.

Buy Now
Questions 32

A ClearPass Policy Manager (CPPM) service includes these settings:

    Role Mapping Policy:

      Evaluate: Select first

      Rule 1 conditions:

        Authorization:AD:Groups EQUALS Managers

        Authentication:TEAP-Method-1-Status EQUALS Success

        Rule 1 role: manager

Rule 2 conditions:

    Authentication:TEAP-Method-1-Status EQUALS Success

    Rule 2 role: domain-comp

Default role: [Other]

Enforcement Policy:

    Evaluate: Select first

    Rule 1 conditions:

      Tips Role EQUALS manager AND Tips Role EQUALS domain-comp

      Rule 1 profile list: domain-manager

Rule 2 conditions:

    Tips Role EQUALS manager

    Rule 2 profile list: manager-only

Rule 3 conditions:

    Tips Role EQUALS domain-comp

    Rule 3 profile list: domain-only

Default profile: [Deny access]

A client is authenticated by the service. CPPM collects attributes indicating that the user is in the Contractors group, and the client passed both TEAP methods.

Which enforcement policy will be applied?

Options:

A.

[Deny Access Profile]

B.

manager-only

C.

domain-manager

D.

domain-only

Buy Now
Questions 33

A company has HPE Aruba Networking APs running AOS-10 that connect to AOS-CX switches. The APs will:

. Authenticate as 802.1X supplicants to HPE Aruba Networking ClearPass Policy Manager (CPPM)

. Be assigned to the "APs" role on the switches

. Have their traffic forwarded locally

What information do you need to help you determine the VLAN settings for the "APs" role?

Options:

A.

Whether the APs have static or DHCP-assigned IP addresses

B.

Whether the switches are using local user-roles (LURs) or downloadable user-roles (DURs)

C.

Whether the switches have established tunnels with an HPE Aruba Networking gateway

D.

Whether the APs bridge or tunnel traffic on their SSIDs

Buy Now
Questions 34

A company has AOS-CX switches and HPE Aruba Networking ClearPass Policy Manager (CPPM). The company wants switches to implement 802.1X authentication to CPPM and download user roles. What is one task that you must complete on CPPM to support this use case?

Options:

A.

Export roles on CPPM to a file that uses XML format.

B.

Create an admin account for the switch on CPPM with the HPE Aruba Networking User Role Download privilege level.

C.

Configure RADIUS enforcement profiles that specify the HPE-User-Role VSA.

D.

Upload the switch TPM certificate as a trusted CA certificate with the Others usage.

Buy Now
Questions 35

A company wants to apply a standard configuration to all AOS-CX switch ports and have the ports dynamically adjust their configuration based on the identity of

the user or device that connects. They want to centralize configuration of the identity-based settings as much as possible.

What should you recommend?

Options:

A.

Having HPE Aruba Networking ClearPass Policy Manager (CPPM) send standard RADIUS AVPs to customize port settings

B.

Having switches pull port configurations dynamically from HPE Aruba Networking Activate

C.

Having switches download user-roles from HPE Aruba Networking gateways

D.

Having switches download user-roles from HPE Aruba Networking ClearPass Policy Manager (CPPM)

Buy Now
Questions 36

A company has HPE Aruba Networking APs (AOS-10), which authenticate clients to HPE Aruba Networking ClearPass Policy Manager (CPPM). CPPM is set up

to receive a variety of information about clients' profile and posture. New information can mean that CPPM should change a client's enforcement profile.

What should you set up on the APs to help the solution function correctly?

Options:

A.

In the security settings, configure dynamic denylisting.

B.

In the RADIUS server settings for CPPM, enable Dynamic Authorization.

C.

In the WLAN profiles, enable interim RADIUS accounting.

D.

In the RADIUS server settings for CPPM, enable querying the authentication status.

Buy Now
Questions 37

An admin has configured an AOS-CX switch with these settings:

port-access role employees

vlan access name employees

This switch is also configured with CPPM as its RADIUS server.

Which enforcement profile should you configure on CPPM to work with this configuration?

Options:

A.

RADIUS Enforcement type with HPE-User-Role VSA set to "employees"

B.

HPE Aruba Networking Downloadable Role Enforcement type with role name set to "employees"

C.

HPE Aruba Networking Downloadable Role Enforcement type with gateway role name set to "employees"

D.

RADIUS Enforcement type with Aruba-User-Role VSA set to "employees"

Buy Now
Questions 38

What is one use case for implementing user-based tunneling (UBT) on AOS-CX switches?

Options:

A.

Centralizing the distribution of wired traffic without requiring HPE Aruba Networking gateways

B.

Tunneling traffic directly to a third-party firewall in a client data center

C.

Adding 802.1X while continuing to use the existing VLAN and ACL structure in the Ethernet network

D.

Applying enhanced security features such as deep packet inspection (DPI) to wired traffic

Buy Now
Questions 39

A company uses both HPE Aruba Networking ClearPass Policy Manager (CPPM) and HPE Aruba Networking ClearPass Device Insight (CPDI). What is one way integrating the two solutions can help the company implement Zero Trust Security?

Options:

A.

CPPM can inform CPDI that it has assigned a particular Aruba-User-Role to a client; CPDI can then use that information to reclassify the client.

B.

CPDI can use tags to inform CPPM that clients are using prohibited applications. CPPM can then tell the network infrastructure to quarantine those clients.

C.

CPPM can provide CPDI with custom device fingerprint definitions in order to enhance the company's total visibility.

D.

CPDI can provide CPPM with extra information about users' identity. CPPM can then use that information to apply the correct identity-based enforcement.

Buy Now
Questions 40

Refer to the Exhibit:

These packets have been captured from VLAN 10. which supports clients that receive their IP addresses with DHCP.

What can you interpret from the packets that you see here?

These packets have been captured from VLAN 10, which supports clients that receive their IP addresses with DHCP. What can you interpret from the packets that you see here?

Options:

A.

Someone is possibly implementing a MAC spoofing attack to gain unauthorized access.

B.

The mirroring session that captured the packets was likely misconfigured and captured duplicate traffic.

C.

An admin has likely misconfigured two clients to use the same DHCP settings.

D.

Someone is possibly implementing an ARP poisoning and MITM attack.

Buy Now

ACNSP |

Exam Code: HPE7-A02
Exam Name: Aruba Certified Network Security Professional Exam
Last Update: Nov 18, 2025
Questions: 135
HPE7-A02 pdf

HPE7-A02 PDF

$29.75  $84.99
HPE7-A02 Engine

HPE7-A02 Testing Engine

$35  $99.99
HPE7-A02 PDF + Engine

HPE7-A02 PDF + Testing Engine

$47.25  $134.99