Documente Academic
Documente Profesional
Documente Cultură
QUESTION NO: 1
Role-based administration:
Answer: C
QUESTION NO: 2
Persistent policy assignment:
Answer: B
QUESTION NO: 3
What is the function of the Filter-ID when configuring a RADIUS server for use within
a policy-enabled network?
Answer: D
QUESTION NO: 4
What is the difference between a Controlled port and an Uncontrolled port in
802.1X?
A. A controlled port passes all PDUs (protocol data units) while an uncontrolled port
must be in an Active state
B. The controlled port only allows for the exchange of PDUs if its current state is
authorized, while the uncontrolled port will pass PDUs regardless of its authorization
state
C. The controlled port must always be in an active state while an uncontrolled port
must not
D. A controlled port is a physical port while an uncontrolled port is virtual
Answer: B
QUESTION NO: 5
In Secure Application Provisioning, the Enterprise Access role:
Answer: D
QUESTION NO: 6
The traditional approach to Secure Guest Access has been:
Answer: C
QUESTION NO: 7
All of the following are services which make up the pre-configured Acceptable Use
Policy service group EXCEPT:
Answer: D
QUESTION NO: 8
Network security policy should:
Answer: C
QUESTION NO: 9
Selecting Active/Default Role in the Port Configuration Wizard:
A. Causes the user to inherit the ports default role if authentication fails
B. Assigns the ports default role to the user upon authentication success
C. Is an unsupported configuration option
D. Discards traffic from an unauthenticated user
Answer: A
QUESTION NO: 10
The classification type having the highest precedence value is:
A. IP protocol type
B. Source MAC address
C. Source IP address exact match
D. Destination MAC address
Answer: B
QUESTION NO: 11
Enterasys Secure Guest Access solution:
Answer: B
QUESTION NO: 12
EAP-TLS:
Answer: D
QUESTION NO: 13
Classification precedence rules:
Answer: D
QUESTION NO: 14
The Port Web Authentication URL in NetSight Atlas Policy Manager:
Answer: A
QUESTION NO: 15
Regarding roles in NetSight Atlas Policy Manager, which of the following is true?
Answer: C
QUESTION NO: 16
The pre-configured Demo.pmd database file in NetSight Atlas Policy Manager
includes:
Answer: D
QUESTION NO: 17
Classification rules may be written based on all of the following EXCEPT:
A. Logical address
B. PHY and PMD sub-layers
C. Hardware address
D. TCP/UDP port number
Answer: B
QUESTION NO: 18
Enterasys policy-enabled network solution:
Answer: A
QUESTION NO: 19
When configuring RADIUS parameters in NetSight Atlas Policy Manager, a 16-byte
(hex) shared secret is used to enable:
Answer: C
QUESTION NO: 20
The Application Shared Secret value in NetSight Atlas Policy Manager:
A. Must be the same as the shared secret configured on the RADIUS server and
client
B. Permits the application to communicate with the RADIUS server
C. Is an alpha-numeric string of any length
D. Is not necessary when using SNMPv3
Answer: D
QUESTION NO: 21
The RoamAbout R2 WAP supports policy-enabled networking:
Answer: B
QUESTION NO: 22
When services are added to an existing .pmd file:
Answer: D
QUESTION NO: 23
In the Enterasys policy-enabled network model, on-demand policy assignment:
Answer: C
QUESTION NO: 24
In the three-level policy model, Enterasys maps:
Answer: B
QUESTION NO: 25
Populating NetSight Atlas Policy Managers device list:
Answer: A
QUESTION NO: 26
When potentially damaging traffic is introduced at the network edge:
B. Policy Manager must contact an IDS in order to determine the source IP address
of the malicious traffic
C. A new .pmd file must be opened and enforced to each device in the active edge
D. Classification rules which discard the unwanted traffic can be pushed to the edge
switches quickly
Answer: D
QUESTION NO: 27
The Active Edge consists of:
A. Core routers
B. SAP servers
C. User resources
D. Policy-enabled switches
Answer: D
QUESTION NO: 28
Selecting Active/Discard in the Port Configuration Wizard:
Answer: A
QUESTION NO: 29
Directory-enabled Networks (DEN):
Answer: A
QUESTION NO: 30
Enterasys Port Web Authentication:
Answer: C
QUESTION NO: 31
In an 802.1X environment, if an end-station does not support authentication, then:
Answer: A
QUESTION NO: 32
Certificate services must be installed when using:
A. PWA
B. EAP-TLS
C. EAP-MD5
D. MAC authentication
Answer: B
QUESTION NO: 33
Enterasys products support all the following authentication methods EXCEPT:
A. Kerberos
B. MAC
C. Hybrid
D. PEAP
Answer: A
QUESTION NO: 34
A distinguishing characteristic of PEAP is:
Answer: A
QUESTION NO: 35
All of the following are true regarding a RADIUS server EXCEPT:
Answer: C
QUESTION NO: 36
Within the Demo.pmd file, the Administrator role:
Answer: C
QUESTION NO: 37
EAPoL (Extensible Authentication Protocol Over LANs) frames:
A. Are VLAN-tagged
B. Cannot be encrypted
C. Are used by a NAS to communicate with a RADIUS server
D. Are not VLAN-tagged
Answer: D
QUESTION NO: 38
Importing .pmd files:
Answer: B
QUESTION NO: 39
Acceptable Use Policy:
Answer: B
QUESTION NO: 40
Authentication is used in Secure Application Provisioning to:
Answer: B
QUESTION NO: 41
Key elements of a common policy architecture include:
Answer: A
QUESTION NO: 42
Spoofing is a technique in which an:
Answer: A
QUESTION NO: 43
After configuration changes have been made in NetSight Atlas Policy Manager, what
must be done before the changes take effect on the devices?
Answer: C
QUESTION NO: 44
Classification rules can deter attacks by:
Answer: C
QUESTION NO: 45
NetSight Atlas Policy Manager can assure consistent QoS across a routed network
environment by:
Answer: B
QUESTION NO: 46
Components of the Enterasys policy-enabled network do NOT include:
A. Role-Based Administration
B. Active Edge
C. Authentication
D. Core-Based Dynamic VLAN Registration
Answer: D
QUESTION NO: 47
A phased approach to policy implementation:
Answer: C
QUESTION NO: 48
The Enterasys approach to Policy-Enabled Networking:
Answer: B
QUESTION NO: 49
Saving a NetSight Atlas Policy Manager configuration to a .pmd file:
Answer: A
QUESTION NO: 50
In the policy-enabled network environment, decisions on what resources a user is
allowed to access are:
Answer: C
QUESTION NO: 51
The Enforce function in NetSight Atlas Policy Manager:
Answer: B
QUESTION NO: 52
A. Layer 2 information
B. Layer 1 information
C. Layer 3 information
D. Layer 4 information
Answer: D
QUESTION NO: 53
Secure Application Provisioning:
A. Limits scalability
B. Assigns guest users to a common VLAN
C. Does not address the issue of QoS
D. Provides levels of service based on business policy
Answer: D