Enterasys-Security-Systems-Engineer-Defense-(2B0-102).pdf - Enterasys 2B0-102 Enterasys Security Systems Engineer-Defense

Enterasys-Security-Systems-Engineer-Defense-(2B0-102).pdf -...

This preview shows page 1 - 5 out of 5 pages.

2B0-102 Enterasys Enterasys Security Systems Engineer-Defense
Image of page 1
C. Network Sensor D. Alarm Tool Answer: D QUESTION: 38 The Enable follow on signature check box A. Enables dynamic packet collection B. Enables combination signatures C. Enables macro signatures D. Applies signature to dynamically collected traffic Answer: D QUESTION: 39 Before the host Sensor can be deployed AIt must be associated with a virtual sensor A. It must be associated with a host policy B. Its key must be added to the /usr/dragon/bin directory C. Its address must be added to /etc/hosts Answer: A QUESTION: 40 MD5 checksums are A. Stored in a protected directory on the host B. Appended to the protected file C. Passed up the event channel to the MD5 Agent D. Stored in the /usr/dragon/bin directory on the Enterprise Management Server (EMS) Answer: C QUESTION: 41 Thresholds can be set to A. Reduce false positives 11
Image of page 2
B. Turn alarming on and off
Image of page 3
Image of page 4
Image of page 5

You've reached the end of your free preview.

Want to read all 5 pages?

  • Fall '16
  • Mohammad Alizadeh
  • IP address, Domain Name System, Hostname

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture