1.When defining location switching criteria, which two can be used? (Select two.)
A. MAC address
B. Wins Server address
C. host name
D. NIC description
E. OS type
Answer: B, D
2.When identifying risks, an administrator should prioritize them according to what? (Select two.)
A. likelihood of occurrence
B. order of occurrence
C. level of inconvenience to the customer
D. impact to the project
E. visibility to senior management
Answer: A, D
3.An administrator has deployed LAN enforcer within the network and enabled 802.lx on all switch ports.
How can the administrator ensure that printers directly connected to the switch are still accessible, and
also prevent computers bypassing LAN enforcement should they be connected to the printer ¯ s net wor k
outlet?
A. install Symantec Endpoint Protection on the printers
B. add the MAC addresses of the printers to the Trusted Hosts list in the advanced settings of the
Enforcer Group properties
C. log on to the command line of the enforcer, at the command line enter mab enable
D. log on to the command line of the enforcer, at the command line enter mac and the list of printer MAC
addresses
Answer: C
4.With an 802.lx enabled switch, the SNAC client communicates with the switch at which layer of the OSI
reference model for EAP authentication?
A. Layer 1 (Physical Layer)
B. Layer 2 (Data Link Layer)
C. Layer 3 (Network Layer)
D. Layer 4 (Transport Layer)
Answer: B
5.At an administrator ¯ sfi r st meeti ng wit h a cust o mer t heyr eali zet hat t hei r cust o mer i s expecti ngt he
product to do a certain function that the administrator is sure it cannot accomplish. What should the
administrator ¯ sr esponse be?
A. call the account team
B. escalate to the administrator ¯ s manager
C. provide alternative solutions
D. call the product manager
Answer: C
No comments:
Post a Comment