image


2B0-020 Dumps

2B0-020 Braindumps 2B0-020 Real Questions 2B0-020 Practice Test

2B0-020 Actual Questions


Enterasys


2B0-020


ES NetSight Atlas


https://killexams.com/pass4sure/exam-detail/2B0-020


QUESTION: 62

Which of the following statements describes the benefit to the network administrator of archiving device configurations?


  1. To reconfigure a device from a BOOTP state

  2. To reconfigure device access properties after a device reset

  3. To isolate the source of network problems due to changes in configuration files

  4. All of the above

  5. A and C


Answer: E


QUESTION: 63

Which of the following actions can Atlas Console initiate when certain alarms, events or

traps occur on the network?


  1. Send an e-mail notification and then shut down Atlas Console

  2. Send an e-mail notification or run a program

  3. Write the event log to an HTML file for web-based viewing

  4. Run a program or shut down Atlas Console

  5. A and C only


Answer: B


QUESTION: 64

Which of the following network components is represented by a network object?


  1. Range of IP addresses

  2. Subnets

  3. Dynamic objects

  4. Hosts

  5. All of the above

  6. A, B and D


Answer: E


QUESTION: 65

Console displays VLAN device and model settings in a side-by-side manner for which

of the following VLAN tab views??


  1. Basic Port View

  2. Advanced Port View

  3. Device View

  4. All of the above

  5. B and C only


Answer: E


QUESTION: 66

How is it possible to protect a map from accidental editing?


  1. It is not possible to protect a map from accidental editing.

  2. Edit the map properties to remove write privileges.

  3. Click the Edit button to hide the Placement Panel.

  4. None of the above


Answer: C


QUESTION: 67

What is the purpose of the Packet Evaluation Tool?


  1. To verify that the packet will hit selected ACLs based on other router configurations

  2. To test whether a defined packet will be denied or allowed based on selected ACL

  3. To evaluate packet syntax

  4. All of the above


Answer: B


QUESTION: 68

With SNMPv3, message integrity is checked


  1. to prevent disclosure of sensitive information while en route

  2. to make sure the user has permission to access the device

  3. to verify the message was not modified en route

  4. to read or to modify subsets of the target data

  5. Both A and B


Answer: C


QUESTION: 69

The Packet Evaluation Tool can be used as a troubleshooting aid to exclude an ACL as the source of routing issues.


  1. True

  2. False


Answer: A


QUESTION: 70

Which version uses IP address-based access lists and community strings for authentication?


  1. SNMPv1

  2. SNMPv2

  3. SNMPv3

  4. A and B

  5. All of the above


Answer: D


image

6$03/( 48(67,216


7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV


.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP


$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP


([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP


3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV


*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV


8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV


7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\


'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU

.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG