D The primary authentication method for manager level access through the

D the primary authentication method for manager level

This preview shows page 4 - 6 out of 7 pages.

D. The primary authentication method for manager-level access through the console port is the RADIUS server; if no RADIUS server is found, only operator-level access is granted. Answer: C QUESTION: 125 MAC Lockdown has been configured to lock down a device on port A1 in VLAN 10. During a maintenance task, the device is accidentally connected to port B5 in VLAN 8. Which statement correctly describes the state of port B5? A. The port is operational because it is not the port configured for MAC Lockdown. B. The port is listed as enabled and up, but the device is prevented from transmitting into the network. C. The port is listed as disabled and down and the device is prevented from transmitting into the network. D. Because the MAC Lockdown feature is not configured on the second module, the device can successfully connect to the port. E. The port is listed as throttled and will automatically be re-examined after a delay period. If the device is still connected it will be blocked. Answer: B QUESTION: 126 What are the main components of the ProCurve ProActive Defense network security solution? (Select three.) A. stateful firewall B. access control C. network immunity D. secure infrastructure E. intrusion prevention system F. antivirus andantispam integration Answer: B, C, D QUESTION: 127 44
Image of page 4
What are the minimum configuration steps required to implement the ProCurve DHCP Snooping feature on a switch? (Select three.) A. Enable it globally. B. Define trusted ports. C. Specify option 82 parameters. D. Activate it on one or more VI_ANs. E. Identify the DHCP server's IP address. F. Specify the server where the lease database is stored. G. Specify the maximum number of IP addresses per subnet allowed to be assigned by a DHCP server. Answer: A, B, D QUESTION: 128 When configuring SSH on a ProCurve switch, which user authentication methods can be specified? (Select four.) A. 802.1X B. RADIUS C. Kerberos D. public key E. TACACS+ F. Web browser G. local user name and password
Image of page 5
Image of page 6

You've reached the end of your free preview.

Want to read all 7 pages?

  • Fall '20
  • IP address, Dynamic Host Configuration Protocol

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture