Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

HP HP0-Y24 Exam -

Free HP0-Y24 Sample Questions:

1. What is the intended purpose of the default traffic sampling action?
A. to help PCM+/NIM periodically begin to monitor new ports
B. to prevent ProCurve NIM from triggering false positives
C. to send traffic for increased analysis to an Intrusion Detection System (IDS)
D. to allow ProCurve NIM to take immediate action against the most probable threats
Answer: A

2. Click the Exhibit button.
(The exhibit is not available in this demo)
Which alert shown in the exhibit is the least sensitive?
A. A
B. B
C. C
D. D
Answer: C

3. Click the Exhibit button.
(The exhibit is not available in this demo)
Which image in the exhibit shows an invalid NIM + IDS deployment?
A. A
B. B
C. C
D. D
Answer: B

4. Which statement is correct about the ProCurve ProActive Defense strategy?
A. It operates at a safe distance from the points of attack and the network resources being attacked.
B. It achieves better-performing, more scalable networks by using high capacity c ore resources.
C. It enforces access and policy decisions where users and applications connect to the network.
D. It creates a cost-effective management framework by using core infrastructure protection measures.
Answer: C

5. Which infrastructure defense capabilities are provided by the ProCurve ProActive Defense network security solution? (Select two.)
A. vulnerability assessment database
B. connection rate filtering
C. spoofing protection of DHCP traffic
D. managed security services
E. phishing protection
Answer: BC

6. Which statement is correct about the threat mitigation capabilities of ProCurve NIM?
A. NIM can apply a threat mitigation action to supported infrastructure devices.
B. NIM can mitigate threats detected by NBAD, but must only log other thr eats.
C. NIM can detect threats but relies on an Intrusion Prevention System (IPS) to mitigate them.
D. NIM can mitigate threats from wired offenders, but not wireless offenders.
Answer: A

7. Network security can be described in terms of multiple layers o f security. Which security layer does an unauthorized VLAN correspond to?
A. network access control
B. network immunity protection
C. control protocol detection
D. device-to-device authentication
Answer: A

8. Network security can be described in terms of multiple layers of security. The DHCP Spoofing and Dynamic ARP Protection features correspond to which layer?
A. infrastructure protection
B. network immunity protection
C. device-to-device authentication
D. network access control
Answer: A

9. What is the default state of a Port Access Entity configured for IEEE 802.1X port-access authentication?
A. disabled
B. authorized
C. restricted
D. idle
E. unauthorized
Answer: E

10. Which role does the authenticator play in the 802.1X authentication process?
A. It encapsulates an EAP-access-request inside of a RADIUS response-identity packet and forwards it for validation.
B. It creates and sends an access-challenge message to the supplicant to request client credentials.
C. It provides two-way translation between EAP messages and RADIUS messages.
D. It validates the EAP-identity-request and responds with either an accept or reject message.
Answer: C

© 2014, All Rights Reserved