HP 

This exam validates candidates’ knowledge, skills, and ability to describe common security threats and vulnerabilities. It tests a candidate’s knowledge of device hardening, implementation of security at the edge with AAA, basic roles and firewall policies, dynamic segmentation, and endpoint classification. It covers basic threat detection technologies, collecting logs and alarms.

You need an HPE Learner ID and a Pearson VUE login and password.

Register for this Exam
No reference material is allowed at the testing site. This exam may contain beta test items for experimental purposes.
During the exam, you can make comments about the exam items. We welcome these comments as part of our continuous improvement process.

Exam ID HPE6-A78
Exam type Proctored
Exam duration 1 hour 30 minutes
Exam length 60 questions
Passing score 63%
Delivery languages Japanese, English, Latin American Spanish
Supporting resources

Aruba Network Security Fundamentals, Rev. 20.41

Additional study materials
Aruba Certified Network Security Associate (HPE6-A78) Study Guide

Ideal candidate
The candidate should be a network engineer or help desk engineer working in either a customer or partner environment. The candidate should have worked six months to a year in networking in both wired and wireless knowledge.

Examkingdom HPE HPE6-A78 Exam pdf,

MCTS Training, MCITP Trainnig

Best HPE HPE6-A78 Free downloads , HPE HPE6-A78 Dumps at Certkingdom.com

Exam contents
This exam has 60 questions.
Here are types of questions to expect:
Multiple choice (multiple responses)Multiple choice (single response)
Advice to help you take this exam

Complete the training and review all course materials and documents before you take the exam.
Exam items are based on expected knowledge acquired from job experience, an expected level of industry standard knowledge, or other prerequisites (events, supplemental materials, etc.).
Successful completion of the course alone does not ensure you will pass the exam.
Read this HPE Exam Preparation Guide and follow its recommendations.
Visit HPE Press for additional reference materials, study guides, practice tests, and HPE books.

Exam policies

70% Protect and Defend
Describe common security threats (MiM, DDOS, spoofing, zero day, etc.) and identify the difference between a threat and a vulnerability
Explain common security protocols and their use cases
Describe PKI components
Describe firewall (PEF), dynamic segmentation, RBAC, AppRF
Describe user roles and policy enforcement
Explain the purpose and methods of a packet capture
Explain social engineering and defense
Disable insecure protocols and follow best practices for implement secure management protocols such as SSH, HTTPS, authenticated NTP, and CPsec
Describe best practices to protect network infrastructure devices with passwords, physical security, and out-of-band management
Use external authentication for network managers
Compare and contrast wireless LAN methodologies
Deploy basic WLAN security Deploy basic WLAN security
Describe and deploy basic user roles for wireless users
Compare and contrast wired LAN methodologies
Define and deploy basic user roles for wired users
Compare endpoint classifications methods

24% Analyze
View and acknowledge WIPS and WIDS, alarms
Explain attack stages and kill chain
Collect logs
Troubleshoot with access tracker
Collect and monitor historical network pattern data
Identify and evaluate discovered endpoints

6% Investigate
Collect logs
Identify chain of custody
Initiate an investigation

Question: 1
What is a vulnerability of an unauthenticated Dime-Heliman exchange?

A. A hacker can replace the public values exchanged by the legitimate peers and launch an MITM attack.
B. A brute force attack can relatively quickly derive Diffie-Hellman private values if they are able to obtain public values
C. Diffie-Hellman with elliptic curve values is no longer considered secure in modem networks, based on NIST recommendations.
D. Participants must agree on a passphrase in advance, which can limit the usefulness of Diffie- Hell man in practical contexts.

Answer: A

Question: 2
What is a difference between radius and TACACS+?

A. RADIUS combines the authentication and authorization process while TACACS+ separates them.
B. RADIUS uses TCP for Its connection protocol, while TACACS+ uses UDP tor its connection protocol.
C. RADIUS encrypts the complete packet, white TACACS+ only offers partial encryption.
D. RADIUS uses Attribute Value Pairs (AVPs) in its messages, while TACACS+ does not use them.

Answer: A

Question: 3
A company has an Aruba solution with a Mobility Master (MM) Mobility Controllers (MCs) and
campus Aps. What is one benefit of adding Aruba Airwave from the perspective of forensics?

A. Airwave can provide more advanced authentication and access control services for the AmbaOS solution
B. Airwave retains information about the network for much longer periods than ArubaOS solution
C. Airwave is required to activate Wireless Intrusion Prevention (WIP) services on the ArubaOS solution
D. AirWave enables low level debugging on the devices across the ArubaOS solution

Answer: C

Question: 4
What role does the Aruba ClearPass Device Insight Analyzer play in the Device Insight architecture?

A. It resides in the cloud and manages licensing and configuration for Collectors
B. It resides on-prem and provides the span port to which traffic is mirrored for deep analytics.
C. It resides on-prem and is responsible for running active SNMP and Nmap scans
D. It resides In the cloud and applies machine learning and supervised crowdsourcing to metadata sent by Collectors

Answer: D

Question: 5
What is a correct guideline for the management protocols that you should use on ArubaOS-Switches?

A. Disable Telnet and use TFTP instead.
B. Disable SSH and use https instead.
C. Disable Telnet and use SSH instead
D. Disable HTTPS and use SSH instead

Answer: B

Click to rate this post!
[Total: 0 Average: 0]
News Reporter