image


2B0-104 Dumps

2B0-104 Braindumps 2B0-104 Real Questions 2B0-104 Practice Test

2B0-104 Actual Questions


Enterasys


2B0-104


Enterasys Certified Internetworking Engineer(ECIE)


https://killexams.com/pass4sure/exam-detail/2B0-104

QUESTION: 62

As defined in NetSight Policy Managers demo.pmd file, the Application Provisioning

- Supplemental service is designed to:


  1. Discard malicious traffic

  2. Prioritize mission critical traffic by provisioning on-demand QoS

  3. Discard unsupported protocols

  4. Rate limit traffic associated to DoS attacks


Answer: B


QUESTION: 63

When deploying static policy to the network,:


  1. The NetSight Policy configuration must be enforced to the policy-capable devices before policy roles are assigned to ports

  2. The Phased Implementation Approach should be used to minimize inadvertent negative impact to business-critical applications on the network

  3. Updating the policy configuration across the entire network requires enforcing the altered policy configuration in NetSight Policy Manager and then reassigning the altered policy roles to device ports

  4. A and B


Answer: D


QUESTION: 64

In the deployment of static policy on the network, a policy-capable device, such as the Matrix N-series,:


  1. Classifies ingressed traffic on the network

  2. Centrally defines and pushes out the policy configuration for the network

  3. Periodically updates the policy configuration in NetSight Policy Manager

  4. Maintains periodic contact with other policy-capable switches on the network


Answer: A


QUESTION: 65

Port Groups can be used in NetSight Policy Manager to:


  1. Group ports based on location

  2. Group ports based on speed

  3. Group ports based on whether untrusted users have physical access to these ports

  4. All of the above


Answer: D


QUESTION: 66

When configuring a highly restrictive policy role in NetSight Policy Manager with the highest level of security, such as the Quarantine policy, the default access control setting for the policy role should be set to:


  1. Deny

  2. Allow

  3. Redirect to a remediation server

  4. CoS Priority 0


Answer: A


QUESTION: 67

Which of the following services, as defined by demo.pmd in NetSight Policy

Manager, protects the network from Denial of Service attacks on the network?


  1. Deny Unsupported Protocol Access service

  2. Deny DoS Attacks service

  3. Limit Exposure to DoS Attacks service

  4. Application Provisioning - AUP service


Answer: C


QUESTION: 68

Which of the following services, as defined by demo.pmd in NetSight Policy

Manager, reduces network congestion by removing legacy protocols from the

network such as IPX?


  1. Deny Unsupported Protocol Access service

  2. Deny Spoofing & other Administrative Protocols service

  3. Threat Management service

  4. Limit Exposure to DoS Attacks service


Answer: A


QUESTION: 69

As defined in NetSight Policy Managers demo.pmd file, the Guest Access policy role is associated to:


  1. No services

  2. The Deny Spoofing & Other Administrative Protocols service only

  3. The Deny Unsupported Protocol Access service only

  4. All services grouped under the Secure Guest Access service group


Answer: D


QUESTION: 70

A new virus has been identified on the Internet causing an infected system to listen to TCP port X for allowing remote connections to the infected device. Since port X is used for a business-critical application on the network, the network administrator can most effectively protect his/her network without severely impacting business continuity by configuring and enforcing policy to the Active Edge that:


  1. Discards traffic destined to TCP port X

  2. Discards traffic sourced from TCP port X

  3. Prioritizes traffic destined or sourced to TCP port X to a lower priority with rate limiting

  4. Discards traffic sourced or destined to TCP port X


Answer: C


QUESTION: 71

In a multi-vendor environment, where is the placement of a policy capable device most effective in discarding malicious traffic and protecting the entire network:


  1. At the access layer edge

  2. At the distribution layer

  3. In the DMZ

  4. In the core


Answer: A


QUESTION: 72

A network administrator has identified that a new operating system installed on a large number of end devices on the network natively supports IPv6 as well as IPv4, and these end systems attempt to communicate over IPv4 and IPv6 by default. To improve the network utilization efficiency and avoid reconfiguring each individual

end system, to which service would the network administrator most likely add a drop IPv6 traffic classification rule?


  1. Deny Unsupported Protocol Access service

  2. Deny Spoofing & other Administrative Protocols service

  3. Threat Management service

  4. Limit Exposure to DoS Attacks service


Answer: A


QUESTION: 73

A Policy Profile:


  1. Defines a collection of classification rules and default packet handling logic

  2. Maps to an organizational role within the enterprise for the allocation of network resources

  3. May be assigned to multiple ports on a device

  4. All of the above


Answer: D


QUESTION: 74

As defined in NetSight Policy Managers demo.pmd file, the Guest Access policy role should be assigned to ports where:


  1. Only IT operations may access the network

  2. Only trusted users may access the network

  3. Trusted users may access the network as well as untrusted users

  4. The Guest Access policy role should only be dynamically assigned to ports as a result of successful authentication


Answer: C


QUESTION: 75

As defined in NetSight Policy Managers demo.pmd file, the Enterprise Access policy

role is associated to:


  1. No services

  2. The Deny Spoofing & Other Administrative Protocols service only

  3. The Deny Unsupported Protocol Access service only

  4. All services grouped under the Acceptable Use Policy service group


Answer: D


image


image

6$03/( 48(67,216


7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV


.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP


$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP


([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP


3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV


*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV


8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV


7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\


'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU

.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG