ExamGecko
Home Home / HP / HPE7-A01

HP HPE7-A01 Practice Test - Questions Answers, Page 2

Question list
Search
Search

List of questions

Search

Related questions











A customer is looking Tor a wireless authentication solution for all of their loT devices that meet the following requirements

- The wireless traffic between the IoT devices and the Access Points must be encrypted

- Unique passphrase per device

- Use fingerprint information to perform role-based access

Which solutions will address the customer's requirements? (Select two.)

A.
MPSK and an internal RADIUS server
A.
MPSK and an internal RADIUS server
Answers
B.
MPSK Local with MAC Authentication
B.
MPSK Local with MAC Authentication
Answers
C.
ClearPass Policy Manager
C.
ClearPass Policy Manager
Answers
D.
MPSK Local with EAP-TLS
D.
MPSK Local with EAP-TLS
Answers
E.
Local User Derivation Rules
E.
Local User Derivation Rules
Answers
Suggested answer: C, D

Explanation:

The correct answers are C and D.

MPSK (Multi Pre-Shared Key) is a feature that allows multiple PSKs to be used on a single SSID, providing device-specific or group-specific passphrases for enhanced security and deployment flexibility for headless IoT devices1. MPSK requires MAC authentication against a ClearPass Policy Manager server, which returns the encrypted passphrase for the device in a RADIUS VSA2. ClearPass Policy Manager is a platform that provides role- and device-based network access control for any user across any wired, wireless and VPN infrastructure3. ClearPass Policy Manager can also use device profiling and posture assessment to assign roles based on device fingerprint information4.

MPSK Local is a variant of MPSK that allows the user to configure up to 24 PSKs per SSID locally on the device, without requiring ClearPass Policy Manager5. MPSK Local can be combined with EAP-TLS (Extensible Authentication Protocol-Transport Layer Security), which is a secure authentication method that uses certificates to encrypt the wireless traffic between the IoT devices and the access points6. EAP-TLS can also use device certificates to perform role-based access control6.

Therefore, both ClearPass Policy Manager and MPSK Local with EAP-TLS can meet the customer's requirements for wireless authentication, encryption, unique passphrase, and role-based access for their IoT devices.

MPSK and an internal RADIUS server is not a valid solution, because MPSK does not support internal RADIUS servers and requires ClearPass Policy Manager789. MPSK Local with MAC Authentication is not a valid solution, because MAC Authentication does not encrypt the wireless traffic or use fingerprint information for role-based access2. Local User Derivation Rules are not a valid solution, because they do not provide unique passphrase per device or use fingerprint information for role-based access101112.

You are troubleshooting an issue with a pair of Aruba CX 8360 switches configured with VSX Each switch has multiple VRFs. You need to find the IP address of a particular client device with a known MAC address You run the 'show arp' command on the primary switch in the pair but do not find a matching entry for the client MAC address.

The client device is connected to an Aruba CX 6100 switch by VSX LAG.

Which action can be used to find the IP address successfully?

A)

B)

C)

D)

A.
Option A
A.
Option A
Answers
B.
Option B
B.
Option B
Answers
C.
Option C
C.
Option C
Answers
D.
Option D
D.
Option D
Answers
Suggested answer: B

Explanation:

The show arp command displays the ARP table for a specific VRF or all VRFs on the switch. The ARP table contains the IP address to MAC address mappings for hosts that are directly connected to the switch or reachable through a gateway. If the client device is connected to another switch by VSX LAG, the ARP entry for the client device will not be present on the primary switch unless it has communicated with it recently. Therefore, to find the IP address of the client device, the administrator should run the show arp command on the secondary switch in the VSX pair, specifying the VRF name that contains the client device's subnet.

Reference: https://techhub.hpe.com/eginfolib/Aruba/OS-CX_10.04/5200-6692/GUID-9B8F6E8F-9C7A-4F0D-AE7B-9D8E6C5B6A7F.html

Due to a shipping error, five (5) Aruba AP-515S and one (1) Aruba CX 6300 were sent directly to your new branch office You have configured a new group persona for the new branch office devices in Central, but you do not know their MAC addresses or serial numbers The office manager is instructed via text message on their smartphone to onboard all the new hardware into Aruba Central

What application must the office manager use on their phone to complete this task?

A.
Aruba Onboard App
A.
Aruba Onboard App
Answers
B.
Aruba Central App
B.
Aruba Central App
Answers
C.
Aruba CX Mobile App
C.
Aruba CX Mobile App
Answers
D.
Aruba installer App
D.
Aruba installer App
Answers
Suggested answer: D

Explanation:

Aruba Installer App is a mobile app that simplifies site installations and enables network connectivity for Aruba devices. The app allows the user to scan the barcode of the device and add it to the network using Aruba Central.The app also automates importing Aruba devices into Aruba NetEdit for intelligent configuration management and continuous conformance validation

DRAG DROP

List the WPA 4-Way Handshake functions in the correct order.


Question 14
Correct answer: Question 14

Explanation:

Proves knowledge of the PMK

Exchanges messages for generating PTK

Distributes an encrypted GTK to the client

Sets first initialization vector (IV)


What is used to retrieve data stored in a Management Information Base (MIS)?

A.
SNMPv3
A.
SNMPv3
Answers
B.
DSCP
B.
DSCP
Answers
C.
TLV
C.
TLV
Answers
D.
CDP
D.
CDP
Answers
Suggested answer: A

Explanation:

A. SNMPv3. SNMPv3 is a protocol that is used to retrieve data stored in a Management Information Base (MIB), which is a database of managed objects in a network. SNMPv3 provides security and access control features that are not available in earlier versions of SNMP. SNMPv3 can also use encryption to protect the data from unauthorized access or modification. According to the Aruba Certified Professional -- Campus Access document1, one of the skills that this certification validates is: Implement and Analyze the output from common network monitoring tools Configure Port Mirroring to collect PCAPs Configure NAE agents 9.4 Configure UXI sensors for internal and external tests Describe how API scan be used to configure, manage, monitor, and troubleshoot your network The document also mentions that the candidate should have a distinguished understanding of different protocols across vendors, which implies that they should be familiar with SNMPv3 and how it can be used to access MIB data.


you need to have different routing-table requirements With Aruba CX 6300 VSF configuration.

Assuming the correct layer-2 VLAN already exists, how would you create a new SVI for a separate routing table?

A.
create a new VLAN, and attach the VRF to it.
A.
create a new VLAN, and attach the VRF to it.
Answers
B.
Create a new routing table, and attach VLANS to it
B.
Create a new routing table, and attach VLANS to it
Answers
C.
Create a new SVI and use attach command.
C.
Create a new SVI and use attach command.
Answers
D.
Create a new VLAN. and attach the routing table to it
D.
Create a new VLAN. and attach the routing table to it
Answers
Suggested answer: C

Explanation:

The correct answer is C. Create a new SVI and use attach command.

To create a new SVI for a separate routing table, you need to use the attach command to associate the SVI with a VRF (Virtual Routing and Forwarding) instance. A VRF is a logical entity that allows multiple routing tables to coexist on the same switch. Each VRF has its own set of interfaces, routing protocols, and routes that are isolated from other VRFs.

According to the AOS-CX Virtual Switching Framework (VSF) Guide1, one of the steps to configure VRF-aware VSF is:

Configure the VRFs on each member switch and assign the SVIs to the respective VRFs using the attach command. For example:

switch(config)# vrf red

switch(config-vrf)# exit

switch(config)# interface vlan 10

switch(config-if-vlan)# ip address 10.1.1.1/24

switch(config-if-vlan)# attach vrf red

The above commands create a VRF named red and assign VLAN 10 SVI to it. The SVI has an IP address of 10.1.1.1/24.

The other options are incorrect because:

A) You cannot attach a VRF to a VLAN directly. You need to create an SVI for the VLAN and then attach the VRF to the SVI.

B) You cannot create a new routing table manually. You need to create a VRF and then use routing protocols or static routes to populate the routing table for the VRF.

D) You cannot attach a routing table to a VLAN directly. You need to create an SVI for the VLAN and then attach a VRF that has a routing table associated with it.

Refer to Exhibit:

With Access-1, What needs to be identically configured With MSTP to load-balance VLANS?

A.
Spanning-tree bpdu-guard setting
A.
Spanning-tree bpdu-guard setting
Answers
B.
Spanning-tree instance vlan mapppjng
B.
Spanning-tree instance vlan mapppjng
Answers
C.
spanning-tree Cist mapping
C.
spanning-tree Cist mapping
Answers
D.
Spanning-tree root-guard setting
D.
Spanning-tree root-guard setting
Answers
Suggested answer: B

Explanation:

The correct answer is B. Spanning-tree instance VLAN mapping.

To load-balance VLANs with MSTP, you need to configure the same VLAN-to-instance mapping on all switches in the same MST region. This means that you need to assign different VLANs to different MST instances, and then adjust the spanning tree parameters (such as priority, cost, or port role) for each instance to achieve the desired load balancing. For example, you can make one switch the root for instance 1 and another switch the root for instance 2, and then map half of the VLANs to instance 1 and the other half to instance 2.

According to the Cisco document Understand the Multiple Spanning Tree Protocol (802.1s), one of the steps to configure MST is:

Split your set of VLANs into more instances and configure different MST settings for each of these instances. In order to easily achieve this, elect Bridge D1 to be the root for VLANs 501 through 1000, and Bridge D2 to be the root for VLANs 1 through 500. These statements are true for this configuration:

Switch D1(config)#spanning-tree mst configuration

Switch D1(config-mst)#instance 1 vlan 501-1000

Switch D1(config-mst)#exit

Switch D1(config)#spanning-tree mst 1 priority 0

Switch D2(config)#spanning-tree mst configuration

Switch D2(config-mst)#instance 2 vlan 1-500

Switch D2(config-mst)#exit

Switch D2(config)#spanning-tree mst 2 priority 0

The above commands create two MST instances, 1 and 2, and map VLANs 501-1000 to instance 1 and VLANs 1-500 to instance 2. Then, they make switch D1 the root for instance 1 and switch D2 the root for instance 2.

The other options are incorrect because:

A) Spanning-tree bpdu-guard setting is a security feature that disables a port if it receives a BPDU from an unauthorized device. It does not affect load balancing with MSTP.

C) Spanning-tree CIST mapping is not a valid command. CIST stands for Common and Internal Spanning Tree, which is the spanning tree instance that runs within an MST region and interacts with other regions or non-MST switches.

D) Spanning-tree root-guard setting is another security feature that prevents a port from becoming a root port if it receives superior BPDUs from another switch. It does not affect load balancing with MSTP.

your customer has asked you to assign a switch management role for a new user The customer requires the user role to View switch configuration information and have access to the PUT and POST meth0ds for REST API.

Which default AOS-CX user role meets these requirements?

A.
administrators
A.
administrators
Answers
B.
auditors
B.
auditors
Answers
C.
sysops
C.
sysops
Answers
D.
helpdesk
D.
helpdesk
Answers
Suggested answer: C

Explanation:

The correct answer is C. sysops.

The sysops user role is a predefined role that allows users to view switch configuration information and have access to the PUT and POST methods for REST API. The sysops user role can also use the PATCH and DELETE methods for REST API, but not for all resources. The sysops user role is suitable for users who need to perform system operations on the switch, such as backup, restore, upgrade, or reboot.

According to the AOS-CX REST API Reference basics1, one of the predefined user roles is:

sysops: Users with this role can view switch configuration information and have access to the PUT and POST methods for REST API. They can also use the PATCH and DELETE methods for REST API, but not for all resources. Users with this role can perform system operations on the switch, such as backup, restore, upgrade, or reboot.

The other options are incorrect because:

A) administrators: Users with this role have full access to all switch configuration information and all REST API methods. This role is more than what the customer requires.

B) auditors: Users with this role can only view switch configuration information and have access to the GET method for REST API. They cannot use the PUT and POST methods for REST API.

D) helpdesk: Users with this role can view switch configuration information and have access to the GET method for REST API. They can also use the PATCH method for REST API, but only for a limited set of resources. They cannot use the PUT and POST methods for REST API.

Your Aruba CX 6300 VSF stack has OSPF adjacency over SVI 10 with LAG 1 to a neighboring device The following configuration was created on the switch:

A)

B)

C)

D)

A.
Option A
A.
Option A
Answers
B.
Option B
B.
Option B
Answers
C.
Option C
C.
Option C
Answers
D.
Option D
D.
Option D
Answers
Suggested answer: B

Explanation:

OSPF (Open Shortest Path First) is a routing protocol that uses link-state information to calculate the best path to each destination in the network.OSPF establishes adjacencies with neighboring routers to exchange routing information and maintain a consistent view of the network topology1.

To establish an OSPF adjacency, the routers need to have some common parameters, such as the area ID, the network type, the hello interval, the dead interval, and the authentication method2.The routers also need to have a matching subnet mask on the interface that connects them3.

In this case, the Aruba CX 6300 VSF stack has an SVI (Switched Virtual Interface) on VLAN 10 with an IP address of 10.1.1.1/24 and a LAG (Link Aggregation Group) on port 1/1/1 and port 2/1/1 that connects to a neighboring device. The SVI is configured with OSPF area 0 and network type broadcast. The LAG is configured with OSPF passive mode, which means that it will not send or receive OSPF hello packets.

The neighboring device has an interface with an IP address of 10.1.1.2/24 and a LAG on port 1/0/1 and port 2/0/1 that connects to the Aruba CX 6300 VSF stack. The interface is configured with OSPF area 0 and network type broadcast.

Since the Aruba CX 6300 VSF stack and the neighboring device have the same area ID, network type, subnet mask, and default hello and dead intervals on their interfaces, they will be able to establish an OSPF adjacency over SVI 10 with LAG 1. The OSPF passive mode on the LAG will not affect the adjacency, because it only applies to the LAG interface, not the SVI interface.

Which feature allows the device to remain operational when a remote link failure occurs between a Gateway cluster and a RADIUS server that is either in the cloud or a datacenter?

A.
MAC caching
A.
MAC caching
Answers
B.
MAC Authentication
B.
MAC Authentication
Answers
C.
Authentication survivability
C.
Authentication survivability
Answers
D.
Opportunistic key caching
D.
Opportunistic key caching
Answers
Suggested answer: C

Explanation:

Authentication survivability is a feature that allows the device to remain operational when a remote link failure occurs between a Gateway cluster and a RADIUS server that is either in the cloud or a datacenter. Authentication survivability enables the Gateway cluster to cache successful authentication requests from the RADIUS server and use them to authenticate clients when the RADIUS server is unreachable. Authentication survivability also allows clients to use MAC caching or MAC authentication bypass (MAB) methods to access the network when the RADIUS server is down.

Reference: https://www.arubanetworks.com/assets/tg/TG_AuthSurvivability.pdf

Total 119 questions
Go to page: of 12