image


2B0-101 Dumps

2B0-101 Braindumps 2B0-101 Real Questions 2B0-101 Practice Test

2B0-101 Actual Questions


Enterasys


2B0-101


ESSE Recertification


https://killexams.com/pass4sure/exam-detail/2B0-101

  1. All placed in the same guest VLAN or several guest VLANs

  2. Isolated from communicating to one another

  3. Placed on the production VLAN and each controlled with policy


Answer: B


QUESTION: 90

As defined in NetSight Policy Managers demo.pmd file, the Guest Access policy role is associated to:


  1. No services

  2. The Deny Spoofing & Other Administrative Protocols service only

  3. The Deny Unsupported Protocol Access service only

  4. All services grouped under the Secure Guest Access service group


Answer: D


QUESTION: 91

In the deployment of static policy on the network, NetSight Policy Manager:


  1. Classifiesingressed traffic locally on the device where NetSight Policy Manager is installed

  2. Defines and pushes a policy configuration out to devices on the network

  3. Is used to update the policy configuration of a switch after it is rebooted

  4. Maintains periodic contact with policy-capable switches on the network so the switch can pull down the policy configuration on demand


Answer: B


QUESTION: 92

The advantages to using protocol-based containment via policy for guest networking over VLANbased containment is:


  1. Policy drops unwanted traffic sourced from guests before this traffic enters the network

  2. Policy can be configured to control how guests communicate to other guests on the network, even within the same VLAN

  3. Guest users can reside on the production VLAN while network security is maintained. Therefore, guest VLANs do not need to be deployed on the network

  4. All of the above


Answer: D


QUESTION: 93

Which of the following services, as defined by demo.pmd in NetSight Policy Manager, reduces networkcongestion by removing legacy protocols from the network such as IPX?


  1. Deny Unsupported Protocol Access service

  2. Deny Spoofing & other Administrative Protocols service

  3. Threat Management service

  4. Limit Exposure toDoS Attacks service


Answer: A


QUESTION: 94

As defined in NetSight Policy Managers demo.pmd file, the Secure Guest Access Service Group:


  1. Allows PPTP and HTTP traffic only, and discards all other traffic

  2. Allows HTTP, DNS, and DHCP traffic only, anddiscards all other traffic

  3. Allows PPTP, HTTP, DNS, and DHCP traffic, anddenies access to all other TCP/UDP ports and unsupported protocols on the network

  4. Discards all traffic


Answer: C


QUESTION: 95

As defined in NetSight Policy Managers demo.pmd file, the Enterprise Access policy role is associated to:


  1. No services

  2. The Deny Spoofing & Other Administrative Protocols service only

  3. The Deny Unsupported Protocol Access service only

  4. All services grouped under the Acceptable Use Policy service group


Answer: D


QUESTION: 96

Which of the following is not a traffic attribute for which a classification rule may be configured?


  1. MAC address

  2. PHY and PMD sub-layers

  3. TCP/UDP port number

  4. IP address


Answer: B


QUESTION: 97

Which of the following services, as defined by demo.pmd in NetSight Policy Manager, protects the network from well-known layer 4 ports utilized in various attacks and exploits on the network?


  1. Deny Unsupported Protocol Access service

  2. Deny Layer 4 Attack Ports service

  3. Threat Management service

  4. Application Provisioning - AUP service


Answer: C


QUESTION: 98

As defined in NetSight Policy Managers demo.pmd file, the Application Provisioning - Supplemental service is associated to the:


  1. Enterprise User role only

  2. Enterprise User role and Enterprise Access role

  3. Enterprise Access role only

  4. Enterprise Access and Guest Access role


Answer: A


QUESTION: 99

The RADIUS Filter-ID parameter is used to:


  1. Authenticate users

  2. Authenticate a RADIUS client

  3. Pass policy information to a switch to authorize an authenticated user with a level of network access

  4. Discard traffic destined for a RADIUS server


Answer: C


QUESTION: 100

Port Groups can be used in NetSight Policy Manager to:


  1. Group ports based on location

  2. Group ports based on speed

  3. Group ports based on whetheruntrusted users have physical access to these ports

  4. All of the above


Answer: D


image

6$03/( 48(67,216


7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV


.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP


$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP


([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP


3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV


*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV


8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV


7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\


'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU

.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG