Limited Time Discount Offer
30% Off - Ends in 02:00:00

X

HP HP0-Y16 Dumps

HP
ProCurve Network Immunity Solutions
HP
ProCurve Network Immunity Solutions

Questions & Answers for HP HP0-Y16

Showing 1-15 of 110 Questions

Question #1 - Topic 0

Which statement is true about the role that events play in ProCurve NIM?

A. When a particular event occurs, ProCurve NIM executes the corresponding alert.

B. When a particular event occurs, ProCurve NIM executes the corresponding policy.

C. When a particular number of events occur within a set time window, ProCurve NIM triggers the corresponding alert.

D. When a particular number of events occur within a set time window, ProCurve NIM triggers the corresponding policy.

Question #2 - Topic 0

You want to display and print a list of all events related to the Policy Manager. What should
you do?

A. From the Reports menu, select the Policy Events report.

B. In Interconnect Devices, click the Events tab; filter for Policy Manager; click the Print button.

C. From the Reports menu, select the Events report; filter for Policy Manager in the Report Wizard.

D. In Network Management Home, click the Events tab; filter for Policy Manager; click the Print button.

Question #3 - Topic 0

How does a ProCurve Network Immunity Solution protect a network?

A. It deals with threats from authorized users.

B. It stops unauthorized users from connecting.

C. It customizes users' rights based on their identity.

D. It filters Web content and email while searching for viruses.

Question #4 - Topic 0

Click the Exhibit buttons.
What is the problem with the policy configuration shown in the exhibits?
(Note: There are four exhibits.)

A. You should never include a source group in a security policy.

B. The time has not been configured, so the policy can never execute.

C. A detected threat will cut off network access for all endpoints in the network.

D. A policy is allowed only one threat mitigation action; the second action should be a notify action.

Question #5 - Topic 0

What is the standard name for a device that includes a firewall, Web content filtering, and
antivirus capabilities?

A. Network Immunity Solution (NIS)

B. Intrusion Detection System (IDS)

C. Intrusion Prevention System (IPS)

D. Unified Threat Management (UTM)

Question #6 - Topic 0

Your company's regulatory compliance group has asked you for a record of changes to the
Policy Manager policies. Which report should you generate?

A. Security Audit

B. Actions by Policy

C. Executed Policies

D. Automation (Policy) History

Question #7 - Topic 0

Click the Exhibit button.
Given the information shown in the exhibit, what do you know about alerts on the 10.1.1.1
device over the last five hours? (Note: The orange color corresponds with Major severity.)

A. The device has received only Major alerts.

B. The majority of alerts on the device are Major alerts.

C. The highest severity for an alert on this device is Major.

D. The most recent alert received on the device was a Major alert.

Question #8 - Topic 0

Which threat mitigation action is supported on ProCurve wireless devices?

A. Port Disable

B. MAC Lockout

C. Port Rate Limit

D. Quarantine VLAN

Question #9 - Topic 0

What must you do to configure a Port Rate Limit action?

A. Set the rate limit as a percentage.

B. Set the rate limit as a QoS priority value.

C. Set the rate limit as an absolute value in Kbps.

D. Enable the limit, leaving the rate to be determined by the switch configuration.

Question #10 - Topic 0

ProCurve NIM was registering few TCP/UDP Fanout events. You have raised the
sensitivity, and many false positive TCP/UDP Fanout events are now triggered throughout
the network. What should you do next? (Select two.)

A. Lower the sensitivity to the previous level.

B. Remove the TCP/UDP alert from all policies.

C. Plan and create a Policy Manager policy to deal with false positive events.

D. Exclude the devices triggering the false positive events from the TCP/UDP fanout.

Question #11 - Topic 0

Which report provides a general idea of where the most and the fewest threats are
originating?

A. Event Activity

B. Actions by Policy

C. Alert Distribution by Device

D. Network Activity by Offender IP Range

Question #12 - Topic 0

What is a valid configuration input for a ProCurve NIM security policy?

A. time

B. user group

C. IDM location

D. offender MAC address

Question #13 - Topic 0

You want to compare the number of alerts being triggered on all your edge switches.
Where do you find this information?

A. Policy Manager --> Events tab

B. Network Activity by Device report

C. Security Activity --> Alert tab for interconnect devices

D. Security Activity --> History tab for interconnect devices

Question #14 - Topic 0

Click the Exhibit button.
What are reasons to configure the policy settings shown in the exhibit? (Select two.)

A. You want the policy to respond to threats from offenders within this group.

B. You want ProCurve NIM to apply the policy for threats detected in this group.

C. You have set the policy to a source group, so you must set the target group to match.

D. You want to enable dynamic local port mirroring on set ports, which compose this group.

E. The policy action is MAC Lockout, and you want to lock the offender out of the entire group.

Question #15 - Topic 0

A. An alert is triggered for an attack that originates in Location A.

B. An alert is triggered for an attack that is targeted to Location A.

C. An alert is triggered for an attack that is detected in Location A.

D. An alert is triggered for an attack that originates and is detected in Location A.

×