|
tryy this out pls visit ITCertkeys it is good site for all users thanks
|
Question 1. Authentication is used in Secure Application Provisioning to: A. Quarantine malicious traffic B. Persistently apply policy C. Allow configuration of a switch's host data port D. provide additional network access Answer: D Question 2. Saving a NetSight Atlas Policy Manager configuration to a .pmd file: A. Writes the configuration to NVRAM on the switches B. Allows for multiple configurations to be stored on the NMS C. Notifies the RADIUS server that new policies have been created D. Temporarily disables communication between all RADIUS clients until the save is complete Answer: B Question 3. Certificate services must be installed when using: A. EAP-TLS B. EAP-MD5 C. PWA D. MAC authentication Answer: A Question 4. Persistent policy assignment: A. Can be effective in an incremental deployment of acceptable use policy B. Is dependent upon a RADIUS back-end configuration C. Is deployed based on user authentication D. Cannot be used on uplink ports Answer: A Question 5. A distinguishing characteristic of PEAP is: A. It adds security by running over a VPN tunnel B. It uses salt encryption C. It requires that only the supplicant present a certificate D. It creates keying material using the Pseudo-Random Function Answer: D Question 6. In the Enterasys policy-enabled network model, on-demand policy assignment: A. Is the result of a manual configuration B. Makes use of the Filter-ID parameter C. Is overridden by a ports default role D. Requires the use of 802.1X authentication mechanisms Answer: B Question 7. All of the following are services which make up the pre-configured Acceptable Use Policy service group EXCEPT: A. Deny Spoofing B. Permit Legacy Protocols C. Limit Exposure to DoS attacks D. Protocol Priority Access Control Answer: B Question 8. After configuration changes have been made in NetSight Atlas Policy Manager, what must be done before the changes take effect on the devices? A. The NMS must be rebooted B. The changes must be enforced C. The changes must be verified D. Nothing the changes take effect immediately Answer: B Question 9. In the three-level policy model, Enterasys maps: A. The business/network level to classification rules B. The service-provisioning level to roles C. The device level to classification rules D. All of the above Answer: C Question 10. The Active Edge consists of: A. Policy-enabled switches B. Core routers C. SAP servers D. User resources Answer: A
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.