HP
HPE7-A02
105 Minutes
135
Aruba Certified Network Security Professional Exam
A: Set up Webhooks that are attached to the HPE Aruba Networking Central Threat Dashboard.
B: Use Syslog to integrate the gateways with HPE Aruba Networking ClearPass Policy Manager (CPPM) event processing.
C: Set up email notifications using HPE Aruba Networking Central's global alert settings.
D: Integrate HPE Aruba Networking ClearPass Device Insight (CPDI) with Central and schedule hourly reports.
A: Clients are failing to authenticate to corporate SSIDs. You should first check for misconfigured authentication settings and then investigate a possible threat.
B: Admins have likely misconfigured SSID security settings on some of the company's APs. You should have them check those settings.
C: Hackers are likely trying to pose as authorized APs. You should use the detecting radio information and immediately track down the device that triggered the event.
D: This event might be a threat but is almost always a false positive. You should wait to see the event over several days before following up on it.
A: The posture is unknown, and CPDI has detected exactly four vulnerabilities on the device.
B: The posture is healthy, but CPDI has detected multiple vulnerabilities on the device.
C: The posture is unhealthy, and CPDI has also detected at least one vulnerability on the device.
D: The posture is unhealthy, but CPDI has not detected any vulnerabilities on the device.
A: Companies must apply the same access controls to all users, regardless of identity.
B: Companies that support remote workers cannot achieve zero trust security and must determine if the benefits outweigh the cost.
C: Companies should focus on protecting their resources rather than on protecting the boundaries of their internal network.
D: Companies can achieve zero trust security by strengthening their perimeter security to detect a wider range of threats.