Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

HP Exam HPE6-A84 Topic 2 Question 15 Discussion

Actual exam question for HP's HPE6-A84 exam
Question #: 15
Topic #: 2
[All HPE6-A84 Questions]

Refer to the scenario.

A hospital has an AOS10 architecture that is managed by Aruba Central. The customer has deployed a pair of Aruba 9000 Series gateways with Security licenses at each clinic. The gateways implement IDS/IPS in IDS mode.

The Security Dashboard shows these several recent events with the same signature, as shown below:

Which step could give you valuable context about the incident?

Show Suggested Answer Hide Answer

Contribute your Thoughts:

Kip
21 days ago
I'd go with option C. Checking the RAPIDS Security Dashboard just seems like the most straightforward way to get the information we need. Plus, it's probably more fun than trying to decipher a bunch of 802.11 gibberish.
upvoted 0 times
...
Mendy
1 months ago
The 802.11 settings of the threat sources? Sounds like a real hoot! I bet they were using the 'Hack-My-Neighbor' wireless protocol.
upvoted 0 times
Brynn
9 days ago
D) Find the Central client profile for the threat sources and note their category and family.
upvoted 0 times
...
Jerry
10 days ago
C) View the RAPIDS Security Dashboard and see if the threat sources are listed as rogues.
upvoted 0 times
...
...
Latrice
1 months ago
Finding the Central client profile for the threat sources and looking at their category and family might give some insights, but it's not clear how that would provide valuable context about the incident.
upvoted 0 times
Erasmo
10 days ago
C: Let's check if the threat sources are listed as rogues on the RAPIDS Security Dashboard.
upvoted 0 times
...
Cory
16 days ago
B: Yeah, that could help us understand the incident better.
upvoted 0 times
...
Dominga
23 days ago
A: I think we should view the Central client profile for the threat sources.
upvoted 0 times
...
...
Kara
1 months ago
Checking the firewall sessions and the threat sources' type and OS seems like a logical step. That information could help identify the nature of the threat.
upvoted 0 times
Myrtie
16 days ago
A) View firewall sessions on the APs and record the threat sources' type and OS.
upvoted 0 times
...
...
Torie
1 months ago
The RAPIDS Security Dashboard sounds like a good place to start. If the threat sources are listed as rogues, that could provide valuable context about the incident.
upvoted 0 times
...
Garry
2 months ago
I'm not sure, but D) Find the Central client profile for the threat sources and note their category and family could also be helpful.
upvoted 0 times
...
Angella
2 months ago
I agree with Celeste, checking the RAPIDS Security Dashboard can provide valuable context about the incident.
upvoted 0 times
...
Celeste
2 months ago
I think the answer is C) View the RAPIDS Security Dashboard and see if the threat sources are listed as rogues.
upvoted 0 times
...

Save Cancel