Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

HP Exam HPE6-A84 Topic 1 Question 32 Discussion

Actual exam question for HP's HPE6-A84 exam
Question #: 32
Topic #: 1
[All HPE6-A84 Questions]

A customer wants CPPM to authenticate non-802.1X-capable devices. An admin has created the service shown in the exhibits below:

What is one recommendation to improve security?

Show Suggested Answer Hide Answer
Suggested Answer: C

MAC Authentication Bypass (MAB) is a technique that allows non-802.1X-capable devices to bypass the 802.1X authentication process and gain network access based on their MAC addresses. However, MAB has some security drawbacks, such as the possibility of MAC address spoofing or unauthorized devices being added to the network. Therefore, it is recommended to use a custom MAC-Auth authentication method that adds an additional layer of security to MAB.

A custom MAC-Auth authentication method is a method that uses a combination of the MAC address and another attribute, such as a username, password, or certificate, to authenticate the device. This way, the device needs to provide both the MAC address and the additional attribute to gain access, making it harder for an attacker to spoof or impersonate the device. A custom MAC-Auth authentication method can be created and configured in ClearPass Policy Manager (CPPM) by following the steps in the Customizing MAC Authentication - Aruba page.


Contribute your Thoughts:

Stefan
2 months ago
Securing non-802.1X devices, huh? Sounds like a job for MacGyver and a paperclip. I bet he could come up with a solution that would make James Bond jealous.
upvoted 0 times
...
Werner
2 months ago
Hmm, I wonder if we could also throw in a few unicorns and rainbows to really spice up the security. That would definitely keep the hackers on their toes!
upvoted 0 times
Lettie
7 days ago
D: D) Enabling caching of posture and roles
upvoted 0 times
...
Alise
9 days ago
C: A) Adding an enforcement policy rule that denies access to endpoints with the Conflict flag
upvoted 0 times
...
Aliza
21 days ago
B: C) Creating and using a custom MAC-Auth authentication method
upvoted 0 times
...
Dick
1 months ago
A: A) Adding an enforcement policy rule that denies access to endpoints with the Conflict flag
upvoted 0 times
...
...
Tambra
2 months ago
Enabling caching of posture and roles sounds like a practical solution. It could improve performance and responsiveness for our non-802.1X-capable devices.
upvoted 0 times
...
Glen
2 months ago
Creating and using a custom MAC-Auth authentication method could be an interesting option. It would give us more control over the authentication process and potentially enhance security.
upvoted 0 times
...
Maryanne
2 months ago
Using Active Directory as the authentication source seems like a more robust approach. That way, we can leverage the existing user management infrastructure and strengthen our authentication process.
upvoted 0 times
Nu
1 months ago
C: We should definitely consider leveraging our existing user management infrastructure.
upvoted 0 times
...
Yvonne
1 months ago
B: Yeah, it would definitely make our authentication process more secure.
upvoted 0 times
...
Johnetta
1 months ago
A: I think using Active Directory is a good idea for authentication.
upvoted 0 times
...
...
Carey
2 months ago
I think adding an enforcement policy rule that denies access to endpoints with the Conflict flag is a good recommendation to improve security. This way, we can prevent unauthorized devices from accessing the network.
upvoted 0 times
Emmett
1 months ago
User 3: Creating and using a custom MAC-Auth authentication method might be a good idea to add an extra layer of security for non-802.1X-capable devices.
upvoted 0 times
...
Iesha
1 months ago
Using Active Directory as the authentication source could also enhance security by ensuring only authorized users can access the network.
upvoted 0 times
...
Devorah
2 months ago
I agree, denying access to endpoints with the Conflict flag can help prevent unauthorized devices from connecting.
upvoted 0 times
...
...
Willow
2 months ago
But wouldn't using a custom MAC-Auth method provide more security for non-802.1X-capable devices?
upvoted 0 times
...
Ahmed
2 months ago
I disagree, I believe the answer is A) Adding an enforcement policy rule that denies access to endpoints with the Conflict flag.
upvoted 0 times
...
Willow
3 months ago
I think the answer is C) Creating and using a custom MAC-Auth authentication method.
upvoted 0 times
...

Save Cancel