Free 2B0-104 Exam Braindumps (page: 2)

Page 2 of 19

An Acceptable Use Policy for the network should define:

  1. Which types of traffic trusted users only are allowed to generate on the network
  2. Which types of traffic untrusted users only are allowed to generate on the network
  3. Which types of traffic trusted and untrusted users are allowed to generate on the network
  4. Which types of traffic guest users only are allowed to generate on the network

Answer(s): C



A new virus has been identified on the Internet causing an infected system to listen to TCP port X for allowing remote connections to the infected device. If a network administrator desires to prevent infected devices from being further exploited within the enterprise network, the network administrator should configure and enforce policy for infected devices to the Active Edge of the network that:

  1. Discards traffic destined to TCP port X
  2. Discards traffic sourced from TCP port X
  3. Prioritizes traffic destined or sourced to TCP port X to a low priority
  4. Rate limit traffic destined or sourced to TCP port X

Answer(s): B



Which of the following services, as defined by demo.pmd in NetSight Policy Manager, reduces network congestion by removing legacy protocols from the network such as IPX?

  1. Deny Unsupported Protocol Access service
  2. Deny Spoofing & other Administrative Protocols service
  3. Threat Management service
  4. Limit Exposure to DoS Attacks service

Answer(s): A



In a multi-vendor environment where 3 rd party devices are located at the edge of the network and are not policy-capable, installing a policy-capable device in the distribution layer:

  1. Protects the network core from internally sourced attacks
  2. Protects the server farm from internally sourced attacks
  3. Secures other access layer segments connected through the policy-capable distribution layer device
  4. All of the above

Answer(s): D






Post your Comments and Discuss Enterasys 2B0-104 exam prep with other Community members: