Latest 2B0-104 Practice Tests with Actual Questions

Get Complete pool of questions with Premium PDF and Test Engine

Exam Code : 2B0-104
Exam Name : Enterasys Certified Internetworking Engineer(ECIE)
Vendor Name : "Enterasys"







2B0-104 Dumps

2B0-104 Braindumps 2B0-104 Real Questions 2B0-104 Practice Test

2B0-104 Actual Questions


killexams.com Enterasys 2B0-104


Enterasys Certified Internetworking Engineer(ECIE)


https://killexams.com/pass4sure/exam-detail/2B0-104


Question: 62

As defined in NetSight Policy Managers demo.pmd file, the Application Provisioning

- Supplemental service is designed to:


  1. Discard malicious traffic

  2. Prioritize mission critical traffic by provisioning on-demand QoS

  3. Discard unsupported protocols

  4. Rate limit traffic associated to DoS attacks




Answer: B



Question: 63

When deploying static policy to the network,:


  1. The NetSight Policy configuration must be enforced to the policy-capable devices before policy roles are assigned to ports

  2. The Phased Implementation Approach should be used to minimize inadvertent negative impact to business-critical applications on the network

  3. Updating the policy configuration across the entire network requires enforcing the altered policy configuration in NetSight Policy Manager and then reassigning the altered policy roles to device ports

  4. A and B




Answer: D



Question: 64

In the deployment of static policy on the network, a policy-capable device, such as the Matrix N-series,:


  1. Classifies ingressed traffic on the network

  2. Centrally defines and pushes out the policy configuration for the network

  3. Periodically updates the policy configuration in NetSight Policy Manager

  4. Maintains periodic contact with other policy-capable switches on the network




Answer: A



Question: 65

Port Groups can be used in NetSight Policy Manager to:


  1. Group ports based on location

  2. Group ports based on speed

  3. Group ports based on whether untrusted users have physical access to these ports

  4. All of the above




Answer: D



Question: 66

When configuring a highly restrictive policy role in NetSight Policy Manager with the highest level of security, such as the Quarantine policy, the default access control setting for the policy role should be set to:


  1. Deny

  2. Allow

  3. Redirect to a remediation server

  4. CoS Priority 0




Answer: A



Question: 67

Which of the following services, as defined by demo.pmd in NetSight Policy

Manager, protects the network from Denial of Service attacks on the network?


  1. Deny Unsupported Protocol Access service

  2. Deny DoS Attacks service

  3. Limit Exposure to DoS Attacks service

  4. Application Provisioning - AUP service




Answer: C



Question: 68

Which of the following services, as defined by demo.pmd in NetSight Policy

Manager, reduces network congestion by removing legacy protocols from the

network such as IPX?


  1. Deny Unsupported Protocol Access service

  2. Deny Spoofing & other Administrative Protocols service

  3. Threat Management service

  4. Limit Exposure to DoS Attacks service




Answer: A



Question: 69

As defined in NetSight Policy Managers demo.pmd file, the Guest Access policy role is associated to:


  1. No services

  2. The Deny Spoofing & Other Administrative Protocols service only

  3. The Deny Unsupported Protocol Access service only

  4. All services grouped under the Secure Guest Access service group




Answer: D



Question: 70

A new virus has been identified on the Internet causing an infected system to listen to TCP port X for allowing remote connections to the infected device. Since port X is used for a business-critical application on the network, the network administrator can most effectively protect his/her network without severely impacting business continuity by configuring and enforcing policy to the Active Edge that:


  1. Discards traffic destined to TCP port X

  2. Discards traffic sourced from TCP port X

  3. Prioritizes traffic destined or sourced to TCP port X to a lower priority with rate limiting

  4. Discards traffic sourced or destined to TCP port X




Answer: C



Question: 71

In a multi-vendor environment, where is the placement of a policy capable device most effective in discarding malicious traffic and protecting the entire network:


  1. At the access layer edge

  2. At the distribution layer

  3. In the DMZ

  4. In the core




Answer: A



Question: 72

A network administrator has identified that a new operating system installed on a large number of end devices on the network natively supports IPv6 as well as IPv4, and these end systems attempt to communicate over IPv4 and IPv6 by default. To improve the network utilization efficiency and avoid reconfiguring each individual

end system, to which service would the network administrator most likely add a drop IPv6 traffic classification rule?


  1. Deny Unsupported Protocol Access service

  2. Deny Spoofing & other Administrative Protocols service

  3. Threat Management service

  4. Limit Exposure to DoS Attacks service




Answer: A



Question: 73

A Policy Profile:


  1. Defines a collection of classification rules and default packet handling logic

  2. Maps to an organizational role within the enterprise for the allocation of network resources

  3. May be assigned to multiple ports on a device

  4. All of the above




Answer: D



Question: 74

As defined in NetSight Policy Managers demo.pmd file, the Guest Access policy role should be assigned to ports where:


  1. Only IT operations may access the network

  2. Only trusted users may access the network

  3. Trusted users may access the network as well as untrusted users

  4. The Guest Access policy role should only be dynamically assigned to ports as a result of successful authentication




Answer: C



Question: 75

As defined in NetSight Policy Managers demo.pmd file, the Enterprise Access policy

role is associated to:


  1. No services

  2. The Deny Spoofing & Other Administrative Protocols service only

  3. The Deny Unsupported Protocol Access service only

  4. All services grouped under the Acceptable Use Policy service group




Answer: D