2B0-104 Demo and Sample
Note: Answers are below each question.
Samples are taken from full version.
Latest 2B0-104 Exam Questions and Practice Tests 2024 - Killexams.com
2B0-104 Dumps
2B0-104 Braindumps 2B0-104 Real Questions 2B0-104 Practice Test
2B0-104 Actual Questions
Enterasys
2B0-104
Enterasys Certified Internetworking Engineer(ECIE)
https://killexams.com/pass4sure/exam-detail/2B0-104
QUESTION: 62
As defined in NetSight Policy Managers demo.pmd file, the Application Provisioning
- Supplemental service is designed to:
Discard malicious traffic
Prioritize mission critical traffic by provisioning on-demand QoS
Discard unsupported protocols
Rate limit traffic associated to DoS attacks
Answer: B
QUESTION: 63
When deploying static policy to the network,:
The NetSight Policy configuration must be enforced to the policy-capable devices before policy roles are assigned to ports
The Phased Implementation Approach should be used to minimize inadvertent negative impact to business-critical applications on the network
Updating the policy configuration across the entire network requires enforcing the altered policy configuration in NetSight Policy Manager and then reassigning the altered policy roles to device ports
A and B
Answer: D
QUESTION: 64
In the deployment of static policy on the network, a policy-capable device, such as the Matrix N-series,:
Classifies ingressed traffic on the network
Centrally defines and pushes out the policy configuration for the network
Periodically updates the policy configuration in NetSight Policy Manager
Maintains periodic contact with other policy-capable switches on the network
Answer: A
QUESTION: 65
Port Groups can be used in NetSight Policy Manager to:
Group ports based on location
Group ports based on speed
Group ports based on whether untrusted users have physical access to these ports
All of the above
Answer: D
QUESTION: 66
When configuring a highly restrictive policy role in NetSight Policy Manager with the highest level of security, such as the Quarantine policy, the default access control setting for the policy role should be set to:
Deny
Allow
Redirect to a remediation server
CoS Priority 0
Answer: A
QUESTION: 67
Which of the following services, as defined by demo.pmd in NetSight Policy
Manager, protects the network from Denial of Service attacks on the network?
Deny Unsupported Protocol Access service
Deny DoS Attacks service
Limit Exposure to DoS Attacks service
Application Provisioning - AUP service
Answer: C
QUESTION: 68
Which of the following services, as defined by demo.pmd in NetSight Policy
Manager, reduces network congestion by removing legacy protocols from the
network such as IPX?
Deny Unsupported Protocol Access service
Deny Spoofing & other Administrative Protocols service
Threat Management service
Limit Exposure to DoS Attacks service
Answer: A
QUESTION: 69
As defined in NetSight Policy Managers demo.pmd file, the Guest Access policy role is associated to:
No services
The Deny Spoofing & Other Administrative Protocols service only
The Deny Unsupported Protocol Access service only
All services grouped under the Secure Guest Access service group
Answer: D
QUESTION: 70
A new virus has been identified on the Internet causing an infected system to listen to TCP port X for allowing remote connections to the infected device. Since port X is used for a business-critical application on the network, the network administrator can most effectively protect his/her network without severely impacting business continuity by configuring and enforcing policy to the Active Edge that:
Discards traffic destined to TCP port X
Discards traffic sourced from TCP port X
Prioritizes traffic destined or sourced to TCP port X to a lower priority with rate limiting
Discards traffic sourced or destined to TCP port X
Answer: C
QUESTION: 71
In a multi-vendor environment, where is the placement of a policy capable device most effective in discarding malicious traffic and protecting the entire network:
At the access layer edge
At the distribution layer
In the DMZ
In the core
Answer: A
QUESTION: 72
A network administrator has identified that a new operating system installed on a large number of end devices on the network natively supports IPv6 as well as IPv4, and these end systems attempt to communicate over IPv4 and IPv6 by default. To improve the network utilization efficiency and avoid reconfiguring each individual
end system, to which service would the network administrator most likely add a drop IPv6 traffic classification rule?
Deny Unsupported Protocol Access service
Deny Spoofing & other Administrative Protocols service
Threat Management service
Limit Exposure to DoS Attacks service
Answer: A
QUESTION: 73
A Policy Profile:
Defines a collection of classification rules and default packet handling logic
Maps to an organizational role within the enterprise for the allocation of network resources
May be assigned to multiple ports on a device
All of the above
Answer: D
QUESTION: 74
As defined in NetSight Policy Managers demo.pmd file, the Guest Access policy role should be assigned to ports where:
Only IT operations may access the network
Only trusted users may access the network
Trusted users may access the network as well as untrusted users
The Guest Access policy role should only be dynamically assigned to ports as a result of successful authentication
Answer: C
QUESTION: 75
As defined in NetSight Policy Managers demo.pmd file, the Enterprise Access policy
role is associated to:
No services
The Deny Spoofing & Other Administrative Protocols service only
The Deny Unsupported Protocol Access service only
All services grouped under the Acceptable Use Policy service group
Answer: D
6$03/( 48(67,216
7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV
.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP
$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP
([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP
3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV
*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV
8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV
7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\
'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU
.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG
View Practice Questions »