2B0-202 Dumps

2B0-202 Braindumps 2B0-202 Real Questions 2B0-202 Practice Test

2B0-202 Actual Questions


killexams.com Enterasys 2B0-202


ES Net Sight Atlas


https://killexams.com/pass4sure/exam-detail/2B0-202

QUESTION: 58

In which Inventory Manager Option do you configure TFTP server parameters?


  1. File Transfer Method

  2. Database

  3. Services

  4. Updates


Answer: A


QUESTION: 59

Which Compass search type is used to locate authenticated users in a User Personalized

Network?


  1. IP Address

  2. IP Subnet

  3. MAC Address

  4. User Name


Answer: D


QUESTION: 60

What step should be taken after editing or deleting a redundant rule?


  1. Click the Re-evaluate Reference Index button to seek additional redundancies to the Reference rule

  2. Click the Advance Reference Index button to start a new search

  3. Click the Close button to exit the Find Redundant Rules window

  4. No action is necessary


Answer: A


QUESTION: 61

How are ACLs added to the Router Services Manager database?


  1. Using the Import ACLs from Device option

  2. Using the Verify option to retrieve ACLs from devices

  3. Using File > Import > ACLs From File option

  4. All of the above

  5. A and C only


Answer: D


QUESTION: 62

What is the name of the file that defines the absolute path to your NetSight Plug-In

applications?


  1. PlugIn.details

  2. common

  3. NetSight.properties

  4. Atlas.config


Answer: C


QUESTION: 63

What service must be running to allow a successful firmware download operation?


  1. TFTP

  2. SNMP trapd

  3. BOOTP

  4. All of the above


Answer: A


QUESTION: 64

A FlexView table can be exported to which of the following formats?


  1. Bar graph

  2. Pie chart

  3. gif

  4. HTML


Answer: D


QUESTION: 65

Which of the following network components is represented by a network object?


  1. Range of IP addresses

  2. Subnets

  3. Dynamic objects

  4. Hosts

  5. All of the above

  6. A, B and D


Answer: E


QUESTION: 66

What are the three tabs in the left panel of Inventory Manager?


  1. Devices, Traps, Archives

  2. Network Elements, Firmware Management, Configuration Management

  3. Details View, Archives, Chassis

  4. Properties, VLAN, Compass


Answer: B


QUESTION: 67

With SNMPv3, the source is authorized


  1. to prevent disclosure of sensitive information while en route

  2. to make sure the user has permission to access the device

  3. to verify the message was not modified en route

  4. to read or to modify subsets of the target data

  5. Both B and D


Answer: D


QUESTION: 68

Compass can be used to search devices, device groups and port groups.


  1. True

  2. False


Answer: B


QUESTION: 69

How is it possible to protect a map from accidental editing?


  1. It is not possible to protect a map from accidental editing.

  2. Edit the map properties to remove write privileges.

  3. Click the Edit button to hide the Placement Panel.

  4. None of the above


Answer: C


QUESTION: 70

Compass search results list everywhere a particular user has been heard on the network in

just the last 60 minutes.


  1. True

  2. False


Answer: B