2b0-202 1-0

28
2B0-202 ES NetSight Atlas Version 1.0

Upload: kamran-musa

Post on 18-Dec-2015

222 views

Category:

Documents


2 download

DESCRIPTION

22

TRANSCRIPT

2B0-202ES NetSight AtlasVersion 1.0

QUESTION NO: 1Which of the following configuration files can you view while comparing archives inInventory Manager?A. All archived configuration filesB. Only files in which a difference in configurations is foundC. All archived database filesD. A and CAnswer: BQUESTION NO: 2What benefits are gained with SNMPv3?A. Better error codesB. Encrypted messagesC. Fast table retrievalD. All of the aboveAnswer: DQUESTION NO: 3Which RMON groups are accessible from the Device Manager?A. Alarm and EventB. Host and MatrixC. Statistics and HistoryD. Filter and CaptureAnswer: CQUESTION NO: 4Which of the following actions can Atlas Console initiate when certain alarms, events ortraps occur on the network?A. Send an e-mail notification and then shut down Atlas ConsoleB. Send an e-mail notification or run a programC. Write the event log to an HTML file for web-based viewingD. Run a program or shut down Atlas ConsoleE. A and C onlyAnswer: BQUESTION NO: 5The Firmware Upgrade Wizard allows you to enter a reset delay time for devices thatsupport timed reset. How can you reset devices that do not support timed reset?A. You cannot reset devices that do not support timed reset.B. After selecting the devices in the table, click Start to initiate manual resets.C. It is necessary to walk to the device to initiate a reset.D. After closing the Firmware Upgrade Wizard, you open the Manual Device ResetWizard.Answer: BQUESTION NO: 6Device Manager provides all of the following, EXCEPTA. Graphic representation of a deviceB. Configuration file upload/downloadC. System level configurationD. Broadcast Suppression configurationAnswer: CQUESTION NO: 7With SNMPv3, the message is encryptedA. to prevent disclosure of sensitive information while en routeB. to make sure the user has permission to access the deviceC. to verify the message was not modified en routeD. to read or to modify subsets of the target dataE. Both A and CAnswer: AQUESTION NO: 8In the context of Policy Manager, a Role is aA. Feature set that is assigned after authentication exchange and the port is availableB. Feature used to assign access control and/or class of service to network traffic basedon its OSI layerC. Feature used to enforce the default role on a portD. Feature used to combine classification rules to implement permission and denial tonetwork resourcesAnswer: AQUESTION NO: 9The Goto symbol is used as a navigational tool to jump to another map.A. TrueB. FalseAnswer: AQUESTION NO: 10What service must be running to save a configuration?A. TFTPB. BOOTPC. SNMP trapdD. All of the aboveAnswer: AQUESTION NO: 11Which version uses IP address-based access lists and community strings forauthentication?A. SNMPv1B. SNMPv2C. SNMPv3D. A and BE. All of the aboveAnswer: DQUESTION NO: 12VLAN configurations can be deployed in Atlas Lite via the Device Manager, providingthe device supports it.A. TrueB. FalseAnswer: AQUESTION NO: 13Inventory Manager Firmware Upgrade Wizard executes download operations in parallelon the number of devices specified in the "Groups of" field. What value do you enter tohave the download operations performed serially?A. serialB. 0C. 1D. 6Answer: CQUESTION NO: 14What is the purpose of the SNMP trapd Server?A. To create the trap log fileB. To send traps to devicesC. To use the trap log file as a trap repositoryD. To provide device recovery services to remote devicesE. Both A and CAnswer: EQUESTION NO: 15Which of the following statements describes the benefit to the network administrator ofarchiving device configurations?A. To reconfigure a device from a BOOTP stateB. To reconfigure device access properties after a device resetC. To isolate the source of network problems due to changes in configuration filesD. All of the aboveE. A and CAnswer: EQUESTION NO: 16ACL rules are considered redundant ifA. They are the same rule TypeB. They are defined by parameters that would match the same packet trafficC. They have the same descriptionD. All of the aboveE. A and BAnswer: EQUESTION NO: 17What is the purpose of the Packet Evaluation Tool?A. To verify that the packet will hit selected ACLs based on other router configurationsB. To test whether a defined packet will be denied or allowed based on selected ACLC. To evaluate packet syntaxD. All of the aboveAnswer: B

QUESTION NO: 18The Atlas Console process that writes the definitions in the VLAN model to selecteddevices or ports is calledA. PushingB. EnforcingC. RequestingD. VerifyingAnswer: BQUESTION NO: 19The benefit to defining groups is to enable focused management of network elements.A. TrueB. FalseAnswer: AQUESTION NO: 20FlexViews can be viewed as aA. TableB. Bar graphC. Pie chartD. All of the aboveE. A and C onlyAnswer: DQUESTION NO: 21How are devices added to the Router Services Manager database?A. Using the Create Device windowB. Using File > Import Devices From FileC. Using the Discover ToolD. All of the aboveE. A and B onlyAnswer: EQUESTION NO: 22Which task can be performed using Device Manager?A. View Trap Table information

B. Change the IP address of a nodeC. Firmware Image DownloadD. Change the community name of a nodeAnswer: CQUESTION NO: 23What item is NOT available to enable/disable in the Bridge Extension Configurationwindow?A. Traffic classesB. GMRPC. Dynamic egressD. GVRPAnswer: CQUESTION NO: 24Console can poll and display up to 100 FlexViews at a time.A. TrueB. FalseAnswer: BQUESTION NO: 25How many default Alarm & Events tables are available with the initial installation ofAtlas Console?A. OneB. TwoC. ThreeD. FourAnswer: BQUESTION NO: 26Router Services Manager provides functionality to copy an ACL from and X-Peditionrouter and paste and translate it to the proper format to be used on an E1 Workgroupswitch routing interface.A. TrueB. FalseAnswer: A

QUESTION NO: 27Which of the following device communication methods is used by MIB Tools?A. SNMPv1B. SNMPv3 CredentialC. SNMPv3 ProfileD. Max Access/Super UserE. All of the aboveF. A and C onlyAnswer: EQUESTION NO: 28Which of the following symbols indicates that VLAN settings will be written to thedevice when enforced?A. A red exclamation pointB. A green exclamation pointC. A red not-equal signD. A green right-pointing arrowAnswer: BQUESTION NO: 29Which service must be stopped to modify the bootptab file?A. TFTPB. SNMP trapdC. BOOTPD. All of the aboveAnswer: CQUESTION NO: 30What were the two new PDUs implemented in SNMPv2?A. GetNext and GetBulkB. InformRequest and ResponseRequestC. GetBulk and SetNextD. GetBulk and InformRequestAnswer: DQUESTION NO: 31Which of the following statements best describes why you would want to enable theRemote Data Services option?A. To provide remote workstations with access to the Console database on the localworkstation.B. To import the local device list into an Atlas plug-in application like Policy Manager,or Inventory Manager.C. To store the local Console database on a remote workstation.D. Both A and BE. All of the aboveAnswer: DQUESTION NO: 32A MIB not supported on all devices should be assigned to which SNMP Request Group,when defining a FlexView?A. Group 1B. Group 2C. Group 3D. Group 4E. All of the aboveF. B or C onlyAnswer: FQUESTION NO: 33With SNMPv3, the source is authenticatedA. to prevent disclosure of sensitive information while en routeB. to make sure the user has permission to access the deviceC. to verify the message was not modified en routeD. to read or to modify subsets of the target dataE. Both A and CAnswer: BQUESTION NO: 34Which of the following tools is used to write new MIB object values?A. FlexView Table EditorB. FlexView PropertiesC. FlexView Event NotificationD. FlexView Request Group.Answer: A

QUESTION NO: 35With SNMPv3, message integrity is checkedA. to prevent disclosure of sensitive information while en routeB. to make sure the user has permission to access the deviceC. to verify the message was not modified en routeD. to read or to modify subsets of the target dataE. Both A and BAnswer: CQUESTION NO: 36In what directory must the bootptab file be saved?A. C:Program Files\Enterasys NetworksB. \NetSight Atlas Shared\binC. \NetSight Atlas Console\bootpD. There is no particular directory where the bootptab file must be savedAnswer: BQUESTION NO: 37Which version provides user-level authentication and message encryption via a securitysubsystem?A. SNMPv1B. SNMPv2C. SNMPv3D. A and BE. All of the aboveAnswer: CQUESTION NO: 38Which version provides user role-based authorization through an access controlsubsystem?A. SNMPv1B. SNMPv2C. SNMPv3D. A and BE. All of the aboveAnswer: C

QUESTION NO: 39The Packet Evaluation Tool can be used as a troubleshooting aid to exclude an ACL asthe source of routing issues.A. TrueB. FalseAnswer: AQUESTION NO: 40Console displays VLAN device and model settings in a side-by-side manner for which ofthe following VLAN tab views??A. Basic Port ViewB. Advanced Port ViewC. Device ViewD. All of the aboveE. B and C onlyAnswer: EQUESTION NO: 41The relationship among remote devices in each map is automatically generated byConsole when you click the Retrieve button.A. TrueB. FalseAnswer: BQUESTION NO: 42To add a BOOTP tab to the Alarms and Events panel you must first configure BOOTP tocreate a log file.A. TrueB. FalseAnswer: AQUESTION NO: 43How can network masks be displayed in CIDR notation in Router Services Manager?A. By selecting CIDR in the Network Mask option of Tools > OptionsB. By selecting CIDR in the device properties windowC. By selecting Dot Delimited in the Display option of Tools > OptionsD. It is not possible to have network masks displayed in CIDR notationAnswer: AQUESTION NO: 44Creating a hierarchy of user-defined location groups to manage devices based on theirphysical location is an example of how groups might be used.A. TrueB. FalseAnswer: AQUESTION NO: 45What directory contains the NetSight Atlas background services on Unix?A. /usr/binB. /etc/rc2.dC. /usr/local/Enterasys Networks/NetSight Atlas Console/binD. /usr/sbinAnswer: BQUESTION NO: 46Which of the following statements about Compass is NOT true?A. Compass is available with Atlas Console and Atlas Lite.B. Compass performs a search on the devices or device groups selected in the left panel.C. Compass is a tool used to find out information about users and where they areconnected.D. Compass results can be exported.Answer: AQUESTION NO: 47What level of access is required to create new users in Router Services Manager, whenAuthorization is enabled?A. Read OnlyB. Read WriteC. AdministratorD. Any user can create new usersAnswer: CQUESTION NO: 48Which of the following statements are true about FlexViews?A. You can use the FlexView editor to define as many FlexViews as you want.B. You can create custom tabs to display desired MIB information.C. The FlexView Wizard is not available with Atlas Lite.D. All of the aboveE. A and C onlyAnswer: DQUESTION NO: 49What are the three predefined groups in Inventory Manager Network Elements?A. Chassis, Device Type and IPB. Chassis, Matrix and X-PeditionC. Matrix, SmartSwitch and X-PeditionD. Matrix, X-Pedition and IPAnswer: AQUESTION NO: 50Which of the following definition(s) best describes the difference between managers andagents in SNMPv1 and SNMPv3?A. In SNMPv1, the manager and agent were distinctly different but performedoverlapping functions. Managers resided onworkstations; agents on remote devices.B. In SNMPv3, a distributed interacting collection of SNMP entities can reside on bothmanagement workstations and remotedevices. Because each entity implements a portion of SNMP capability, an entity can actas an agent, a manager, or a combination of the two.C. In SNMPv1, the manager and agent were distinctly different and performed discretefunctions; the manager ran applications; the agent provided functionality. Managers residedon workstations; agents on remote devices.D. A and BE. B and CF. All of the aboveAnswer: EQUESTION NO: 51Within the context of NetSight Atlas Policy Manager, which of the following statementsdescribe a Role?A. A VLAN membershipB. A defined function within the business organizationC. A traffic description and associated actionD. A classification ruleAnswer: BQUESTION NO: 52In the context of Policy Manager, a Service is aA. Feature set that is assigned after authentication exchange and the port is availableB. Feature used to assign access control and/or class of service to network traffic basedon its OSI layerC. Feature used to enforce the default role on a portD. Feature used to combine classification rules to implement permission and denial tonetwork resourcesAnswer: DQUESTION NO: 53Which of the following best describes a firewall policy?A. Controls ICMP trafficB. Controls UDP trafficC. Controls TCP trafficD. All of the aboveE. B and CAnswer: EQUESTION NO: 54How can you import third-party MIB data into the MIB Tools Utility?A. Use the MIB EditorB. Use the Details tabC. Add the MIB file to /Resources/mibsD. You cannot import third-party MIB data into the MIB Tools UtilityAnswer: CQUESTION NO: 55On Cabletron and Enterasys devices, each interface has two default RMON historytables, as follows:A. One table contains snapshots taken every minute, and the other contains snapshotstaken every second.B. One table contains snapshots taken every 30 minutes, and the other contains snapshotstaken every 30 seconds.C. One table contains snapshots taken every day, and the other contains snapshots taken every 30 days.D. One table contains snapshots taken every second, and the other contains snapshotstaken every 30 seconds.Answer: BQUESTION NO: 56The information displayed in the Device Manager is obtained from theA. Atlas Console databaseB. Atlas Inventory Manager databaseC. MIB database of the deviceD. Atlas Router Services Manager databaseE. Atlas Policy Manager databaseAnswer: CQUESTION NO: 57The MIB Tools Utility allows you to do all of the following, EXCEPTA. View object definitionsB. Set object valuesC. Change IP addresses on devicesD. Search for objectsE. Browse the MIB databaseAnswer: CQUESTION NO: 58In which Inventory Manager Option do you configure TFTP server parameters?A. File Transfer MethodB. DatabaseC. ServicesD. UpdatesAnswer: AQUESTION NO: 59Which Compass search type is used to locate authenticated users in a User PersonalizedNetwork?A. IP AddressB. IP SubnetC. MAC AddressD. User NameAnswer: DQUESTION NO: 60What step should be taken after editing or deleting a redundant rule?A. Click the Re-evaluate Reference Index button to seek additional redundancies to theReference ruleB. Click the Advance Reference Index button to start a new searchC. Click the Close button to exit the Find Redundant Rules windowD. No action is necessaryAnswer: AQUESTION NO: 61How are ACLs added to the Router Services Manager database?A. Using the Import ACLs from Device optionB. Using the Verify option to retrieve ACLs from devicesC. Using File > Import > ACLs From File optionD. All of the aboveE. A and C onlyAnswer: DQUESTION NO: 62What is the name of the file that defines the absolute path to your NetSight Plug-Inapplications?A. PlugIn.detailsB. commonC. NetSight.propertiesD. Atlas.configAnswer: CQUESTION NO: 63What service must be running to allow a successful firmware download operation?A. TFTPB. SNMP trapdC. BOOTPD. All of the aboveAnswer: A

QUESTION NO: 64A FlexView table can be exported to which of the following formats?A. Bar graphB. Pie chartC. gifD. HTMLAnswer: DQUESTION NO: 65Which of the following network components is represented by a network object?A. Range of IP addressesB. SubnetsC. Dynamic objectsD. HostsE. All of the aboveF. A, B and DAnswer: EQUESTION NO: 66What are the three tabs in the left panel of Inventory Manager?A. Devices, Traps, ArchivesB. Network Elements, Firmware Management, Configuration ManagementC. Details View, Archives, ChassisD. Properties, VLAN, CompassAnswer: BQUESTION NO: 67With SNMPv3, the source is authorizedA. to prevent disclosure of sensitive information while en routeB. to make sure the user has permission to access the deviceC. to verify the message was not modified en routeD. to read or to modify subsets of the target dataE. Both B and DAnswer: DQUESTION NO: 68Compass can be used to search devices, device groups and port groups.A. TrueB. FalseAnswer: BQUESTION NO: 69How is it possible to protect a map from accidental editing?A. It is not possible to protect a map from accidental editing.B. Edit the map properties to remove write privileges.C. Click the Edit button to hide the Placement Panel.D. None of the aboveAnswer: CQUESTION NO: 70Compass search results list everywhere a particular user has been heard on the network injust the last 60 minutes.A. TrueB. FalseAnswer: B