Latest 2B0-103 Practice Tests with Actual Questions

Get Complete pool of questions with Premium PDF and Test Engine

Exam Code : 2B0-103
Exam Name : Enterasys Security Systems Engineer-NAC
Vendor Name : "Enterasys"







2B0-103 Dumps

2B0-103 Braindumps 2B0-103 Real Questions 2B0-103 Practice Test

2B0-103 Actual Questions


killexams.com Enterasys 2B0-103


Enterasys Security Systems Engineer-NAC


https://killexams.com/pass4sure/exam-detail/2B0-103




Answer: C



Question: 21

Modifying the configuration of which of the following requires enforcement in order for the changes to take effect?


  1. MAC/User Overrides

  2. Add/remove Assessments server to a Security Domain

  3. Add/remove Lock MAC

  4. All of the above




Answer: D



Question: 22

What is the Synchronize With Console option located in the tools menu of the Enterasys Sentinel Trusted Access Manager (TAM) used for?


  1. Adding switches to TAM that were discovered using NetSight Console

  2. Adding Enterasys Sentinel Trusted Access Gateways to TAM that were discovered using

    NetSight Console

  3. Adding Assessment Servers to TAM that were discovered using NetSight Console

  4. All of the above




Answer: B



Question: 23

When Enterasys Sentinel Trusted Access Gateway receives an authentication request, what

precedence order will it use to determine which configuration template to use for that end- system?


  1. User Override > MAC Override, Security Domain Default Template

  2. MAC Override > User Override > Security Domain Default Template

  3. Security Domain Default Template > User Override > MAC Override

  4. Security Domain Default Template > MAC Override > User Override




Answer: A



Question: 24

When Enterasys Sentinel Trusted Access Gateway receives a RADIUS reject from a

RADIUS server, what will it do with that reject?


  1. Forward the RADIUS reject to the switch

  2. Forward Accept Policy back to switch

  3. Forward FailSafe policy back to switch

  4. Forward Quarantine policy back to switch




Answer: A



Question: 25

User overrides work with the following authentication methods?


A. Mac Authentication B. 802.1X

  1. PWA

  2. Both B and C




Answer: D