Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "50-664" Exam

question required!!

 Please upload the some questions from 50-664.


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for PK0-002 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "PK0-002" Exam

It Project+

 Question 1.
During the planning and implementation phases, there is often a need to conduct trade-offs between several approaches to the project execution.
The trade-offs are made between_______ .

A. Scope, issues, and risks.
B. Risk, schedule, and quality.
C. Cost, schedule, and quality.
D. Overhead, direct cost, and expenses.
E. Design, engineering, and implementation.

Answer: C

Question 2.
What is the core function of a project manager?

A. Project integration
B. Client interface
C. Systems design
D. Quality assurance
E. Facilitating meetings

Answer: A

Question 3.
Which two methods are valid for developing project task duration estimates? (Choose two)

A. Historical data
B. Expert judgement
C. Value engineering
D. Stochastic estimating
E. Bottoms-up estimating

Answer: A, B

Question 4.
Which component is used to estimate resource requirements, activity durations, and costs?

A. Project plan
B. Implementation plan
C. Business requirements
D. Work breakdown structure (WBS)

Answer: D

Question 5.
DRAG DROP
Exhibit:
 

Task A is dependent on the completion of Task B. Task C is dependent on the starting of
Task B.
Place the tasks in the order in which they will start.

Answer:
 

Question 6.
The firm you are working with, ITCertKeys.com, has a number of stakeholders with a wide variety of backgrounds. The stakeholders do not agree on the objectives for the project. 

What is the first thing you should do in order to resolve the differences the stakeholders have with respect to the project objectives?

A. Conduct a series of meetings with all stakeholders.
B. Conduct a brainstorming session with all stakeholders.
C. Prepare and deliver a presentation on objective development to all stakeholders.
D. Conduct interviews with each stakeholder to understand which objectives they feel are critical.

Answer: D

Question 7.
The project is well under way and you notice that the enthusiastic support of an executive stakeholder has diminished. You believe the executive now has doubt about the project.

Which three abilities would best help a project manager resolve this situation? (Choose one)

A. The ability to manage team resources.
B. The ability to identify the areas of doubts.
C. The ability to develop meaningful status reports.
D. The ability to act without creating negative impact.

Answer: B

Question 8.
Your project team has five developers. Developers 1 has a personal issue with the work schedule of Developer 2, and refuses to work overtime unless Developer 2 also works overtime. All team members, except Developer 2 work five days a week, averaging between 45 to 52 hours per week. Developer 2 works four days a week, and averages 48 hours per week. Your project is 70 percent complete, and is three percent behind schedule. Everyone met their task duration goals up to this point, but the project has been slightly delayed by an external vendor. If everyone works together you think you can make up the slippage. You worry that Developer 1's issue will cause the project to be delayed further. The rest of the group is working well together and Developer 2 is not aware of the issue.

What should you do to resolve the issue?

A. Have the two team members get together and work out their issues.
B. Talk with Developer 1 to find out the real issues and help him work on these issues.
C. See if Developer 2 can change this work schedule until the project is back on track.
D. Conduct a team building process with all the team members and recognize each of them for 
    their accomplishments.

Answer: B

Question 9.
You project plan designates several development phases. Some of the phases overlap. Your plan indicates where executive management involvement should occur. Executive management involvement includes the sign-off upon completion of a phase and approval for the start of the next phase. The plan indicates that the executive management meeting should take place in ten days. You are aware that the current phase will not be completed for 20 days. You are three percent ahead of budget in terms of cost, and one percent ahead of budget in terms of time. These figures are in-line with the variance allowance set for the phase by the executive management at the inception of the phase. 

What should you do?

A. Reduce the estimates of work outstanding to minimize the reported overrun in time and cost.
B. Move some of the incomplete tasks into a later phase as there is some slack in the plan that 
    could be utilized.
C. Speak to the executive on the executive management and explain the need to delay the 
    executive management meeting by 10 days.
D. Hold the executive management meeting in the previously appointed date so there is no 
    inconvenience to the executive management members.

Answer: C

Question 10.
The ratio of Budgeted Cost of Work Performed to Budgeted Cost of Work Scheduled (BCWP/BCWS) is called______ .

A. Critical Ratio (CR)
B. Cost Variance (CV)
C. Cost Performance Index (CPI)
D. Schedule Performance Index (SPI)

Answer: D

Explanation:
Schedule performance index
The schedule performance index (SPI) is a ratio of the work performed on a task versus the work scheduled. Here is its formula:
SPI = BCWP/BCWSAn SPI of less than 1.0 means you're behind schedule; a value over 1.0 means you're taking less time than you expected.



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-529 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-529" Exam

Microsoft .NET Framework 2.0 - Distributed Application Development

 Question 1.
You work as the Microsoft.NET developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers in the domain run Windows Server 2003. The access control to Web services is part of your responsibility. To this end you are currently exposing an existing class as an Extensible Markup Language (XML) Web service. You need to ensure that this Web service is accessible exclusively accessible to Web service clients within the ITCertKeys.com domain. To comply with this requirement you need to change the access modifiers on methods that must be exposed as Web methods.

What should you do?

A. For each Web method, use the Internal or Friend Access modifier.
B. For each Web method, use the Private Access modifier.
C. For each Web method, use the Public Access modifier.
D. For each Web method, use the Protected Access modifier.

Answer: C

Explanation: 
Since only Public methods can be exposed as Web methods, you should make use of the Public Access modifier for each Web method.

Incorrect answers:
A: You cannot use the Internal or Friend Access method, only Public Access method can be exposed as Web methods.
B: You cannot use the Private Access method, only Public Access method can be exposed as Web methods.
D: You cannot use the Protected Access method, only Public Access method can be exposed as Web methods.

Question 2.
You work as the Microsoft.NET developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers in the domain run Windows Server 2003. The development and deployment of Extensible Markup Language (XML) Web Services forms part of your responsibilities at ITCertKeys.com.

The following exhibit illustrates a class definition:
Exhibit:
public class MarketService
{
internal string ObtainMarket(string mobilePhoneNumber)
{
return string.Empty;
}
}
You received instruction to modify this class so that it becomes a Web service, a Web service that will allow internal applications to invoke ObtainMarket as a Web method. You need to ensure that the Web method does not make use of session state and that it must make use of the default namespace.

What should you do?

A. Change the access modifier for the ObtainMarket method to Public.
    Then apply the WebService attribute to the MarketService class.
B. Change the access modifier for the ObtainMarket method to Protected.
    Then apply the WebMethod attribute to the ObtainMarket method.
C. Change the access modifier for the ObtainMarket method to Public.
    Then apply the WebMethod attribute to the ObtainMarket method.
D. Derive the MarketService class from SoapHttpClientProtocol.
    Then apply the WebMethod attribute to the ObtainMarket method.
E. Derive the MarketService class from WebService.
    Then apply the WebMethod attribute to the ObtainMarket method.

Answer: C

Explanation: 
Only public methods can be exposed as Web methods. Thus you need to change the access modifiers to public. And you should also apply the WebMethod attribute to the ObtainMarket method as this attribute will indicate that the public method should be exposed as Web methods.
 
Incorrect answers:
A: The WebService attribute will allow you to specify the namespace and description for the Web service. This is not required to invoke Web methods. (In cases where no namespace has been specified, use will be made of the default namespace.)
B: Since only Public methods can be exposed as Web methods, you should not change the access modifier to Protected.
D: The SoapHttpClientProtocol base class allows for Web service clients to make SOAP calls to Web methods. This is not what is required.
E: The WebService base class is an optional class as it provides direct access to session and application instances for session state. It is mentioned in this question that the Web methods does not make use of session state.

Question 3.
You work as the Microsoft.NET developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers in the domain run Windows Server 2003.

The following exhibit illustrates the class definition for a data processing Web service:
Exhibit:
[WebService(Namespace-"urn:DataProcessingService")]
Public class DataProcessingService : Webservice
{
[WebMethod(MessageName-"ProcessDataSet")]
Public void Process(DataSet dataset)
{
}
}
You have been instructed to apply an attribute to the Process method that will result in an immediate return to the caller without invoking a SOAP response. You need to ensure that the attribute that you apply in your solution is Web Services-Interoperability (WS-1) compliant. You thus need to make use of a code segment.

What should you do?

A. Use the [OneWay] code segment.
B. Use the [WebMethod(BufferResponse=false)] code segment.
C. Use the [WebMethod(BufferResponse=true)] code segment.
D. Use the [SoapDocumentMethod(OneWay=true)] code segment.
E. Use the [SoapRpcMethod(OneWay=true)] code segment.

Answer: D

Explanation: 
If you want the Web method to be WS-1 compliant then you should apply the SoapDocumentMethod attribute to the Process method. Setting the attribute of the OneWay property to true indicates an immediate return to the caller without a response when it is invoked.

Incorrect answers:
A: You should not apply the OneWay attribute to the Process method. This attribute is used with .NET Remoting components when a method should immediately return to the caller without a return value.
B: You should not apply a second Web method. Only one WebMethod attribute can be applied to a Web method. Furthermore, the BufferResponse property of the WebMethod attribute does not determine if execution returns to the caller immediately when the associated method is invoked. It determines whether the entire response is placed in memory before it is sent to the caller. However, in this case no responses should be returned.
C: One does not apply a second Web method as suggested in this option.
E: RPC style is not WS-1 compliant.

Question 4.
You work as the Microsoft.NET developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers in the domain run Windows Server 2003. ITCertKeys.com is a Publishing and distribution company and works in joint ventures with many book stores that carries it products. The provision of stock on hand updates to third party companies (the book stores) forms part of your responsibilities at ITCertKeys.com. You are currently developing an Extensible Markup Language (XML) Web Service that provides stock on hand updates. To this end you created a Web method named GetStock that accesses the third party company's XML Web service to retrieve the required information. 

Following are some factors that you need to keep in mind:
1. The third parties' XML Web Service updates it information regarding stocks once every hour.
2. ITCertKeys.com is charged for each call to the third party Web service.
It is thus essential that you limit the number of calls that the ITCertKeys.com Web service makes to the third party company's Web service:
1. Thus you apply the Webmethod attribute to the GetStock method.
2. You need to configure the attribute to limit the number of calls to the third party Web service.
3. You must ensure that no cookies are required.

What should you do?

A. The CacheDuration property should be set to 3600
B. The EnableSession property should be set to true.
C. The MessageName property should be set to "ClientCache".
D. The BufferResponse property should be set to false.

Answer: A

Explanation: 
This property specifies the number of seconds that a response from a Web method should be cached on a server. With this property set to 3600, you will limit the number of calls to the third party Web service by limiting the number of invocations of your GetStock Web method to once every hour.

Incorrect answers:
B: The EnableSession property indicates whether a session should be enabled to the Web method. Server-side session state, which includes the Application and Session objects, can use a lot a memory on the Web server. Session state requires the use of cookies as well. Thus you should not use this property.
C: The MessageName property distinguishes overloaded Web methods. In Web services Description Language (WSDL) documents, each Web method must be named uniquely and the MessageName property is involved in meeting this requirement. This is not what should happen in this scenario.
D: The BufferResponse property determines whether the entire response is placed in memory on the server before it is sent to the Web Service client. You should thus not set this property to false.

Question 5.
You work as the Microsoft.NET developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers in the domain run Windows Server 2003. The Extensible Markup Language (XML) Web service development forms part of your responsibilities at ITCertKeys.com. You are currently developing an Extensible Markup Language (XML) Web Service that contains four Web methods. Each of these four methods accepts a different number of parameters and each method is configured to make use of remote procedure call (RPC) SOAP formatting. You must ensure that each of these four Web methods is capable of being exposed as a Web method by the Web service.

What should you do?

A. The SoapDocumentMethod attribute should be applied to each of the four methods. 
    Then set the RequestNamespace property of each attribute to a different value.
B. The WebService attribute should be applied to the Web service's class.
    Then set the Namespace property of the attribute to "RPC".
C. The WebMethod attribute should be applied to each of the four web methods.
    Then set the MessageName property of each attribute to a different value.
D. The SoapRpcService attribute should be applied to the Web service's class.
    Then set the RoutingStyle property of the attribute to 
    SoapServiceRoutingStyleRequestElement.

Answer: C

Explanation: 
When you overload Web methods, you need to specify a distinct message name for each web method because Web Services Description Language (WSDL) does not support overloaded operations. You thus need to apply the WebMethod attribute to each of the four methods and set the MessageName property of each of these attributes to a different value.

Incorrect answers:
A: Because the Web methods must make use of RPC formatting, you should apply the SoapRpcMethod attribute to each of the four methods, you cannot apply both a SoapDocumentMethod attribute and a SoapRpcMethods attribute to the same method.
B: The Namespace attribute of the WebService attribute allows you to designate an XML namespace for the operations that are supported by the Web Service, not to ensure exposure.
D: Though it is possible to apply the SoapRpcService attribute to the class OR the SoapRpcMethod attribute to each method to support RPC formatting, it does not allow for overloaded methods to be exposed as Web methods. In this case the methods are already configured to make use of RPC formatting which actually indicates that one of the two attributes is already applied.

Question 6.
You work as the Microsoft.NET developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers in the domain run Windows Server 2003. The development and deployment of Extensible Markup Language (XML) Web Services forms part of your responsibilities at ITCertKeys.com.

The following exhibit illustrates a class definition in a Web service project:
Exhibit:
public class MarketService
{
public Point ObtainMarket(string mobilePhoneNumber)
{
throw new soapException("Not implemented", New
XmlQualifiedName("error"));
}
}
You have received instruction to configure the class in such a way so as to allow SOAP clients to invoke the ObtainMarket method.

What should you do?

A. The class should be derived from WebService.
B. The class should be derived from SoapHttpClientProtocol.
C. The WebMethod attribute should be applied to the method.
D. The WebService attribute should be applied to the class.

Answer: C

Explanation: 
The Webmethod attribute applied to the method will indicate that a public method should be exposed as a Web method of a Web service. Thus you should apply the WebMethod attribute to the method.

Incorrect answers:
A: Since the WebService base class is optional, and it provides direct access to the Session and Application instances, you should not derive the class from WebService.
B: You should derive a proxy class from this class in a SOAP client application. This will allow the client application to make SOAP calls via the proxy class to the Web service. Thus you should not derive the class from SoapHttpClientProtocol.
D: The WebService attribute will allow you to specify a namespace and description for the Web service; you should not apply the WebService attribute to the class.

Question 7.
You work as the Microsoft.NET developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers in the domain run Windows Server 2003. The development and deployment of Extensible Markup Language (XML) Web Services forms part of your responsibilities at ITCertKeys.com.

The following exhibit illustrates a configuration.
Exhibit:









You have just added the above configuration to a new file by means of using a text editor. You need to save this file to a production server to provide the Web service discovery.

What should you do?

A. Use the .disco extension to save the file.
B. Use the .vsdisco extension to save the file.
C. Use the .wsdl extension to save the file.
D. Use the .asmx extension to save the file.

Answer: B

Explanation: 
Dynamic discovery documents are denoted by a file with .vsdisco extension. This will allow the Web service client to discover all Web services that exist at and below the virtual directory that contains the document. You should thus save the file using a .vsdisco extension.

Incorrect answers:
A: The .disco extension is used to denote a static discovery document. This will not suffice under the circumstances.
C: The .wsdl extension represents files what are Web Services Description Language (WSDL) documents. You should not make use of this extension to save the file to the production server.
D: The .asmx extension represents a Web service endpoint. These types of files thus so not allow for dynamic discovery.

Question 8.
You work as the Microsoft.NET developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers in the domain run Windows Server 2003. The development and deployment of Extensible Markup Language (XML) Web Services forms part of your responsibilities at ITCertKeys.com. After receiving instruction you have just finished developing an ASP.NET Web application named WebServices. WebServices contains the Web services for each of the ITCertKeys.com clients. Microsoft Internet Information Services (IIS) 6.0 is hosting the Web application. And the Web application is configured in such a way so as to map host header names to client-specific virtual directories. Each ITCertKeys.com client has its own virtual directory. These virtual directories are located in a root virtual directory named WebServices.

The following exhibit illustrates an example of the virtual directory structure:
Exhibit:
WebSite
WebServices (Web Application)
Client A (VirtualDirectory)
WebService1.asmx
WebService2.asmx
Client B (VirtualDirectory)
WebService3.asmx
WebService4.asmx
Client C (VirtualDirectory)
WebService5.asmx
WebService6.asmx
You received further instructions to ensure that all ITCertKeys.com clients have the ability to discover all of the Web services that are implemented in the Web application for that client. You need to accomplish this task while also making provision for those Web services that is intended for future implementation. However, you also need to ensure that the ITCertKeys.com clients should not have the ability to discover implemented Web services intended for other clients.

What should you do? (Each correct answer presents part of the solution. Choose two.)

A. A .vsdisco file should be added to each ITCertKeys.com client's virtual directory.
B. A .disco file should be added to each ITCertKeys.com client's virtual directory.
C. Both a .vsdisco and a .disco file should be added to the WebServices directory
D. No .vsdisco or .disco files should be placed in the WebServices directory.
E. A .vsdisco file should be placed in the WebServices directory.

Answer: A, D

Explanation: 
A file with a .vsdisco extension will allow for dynamic discovery. This will result in the ITCertKeys.com clients having the ability to discover all the Web services that exist at en below the virtual directory that contains the document. This means that each client will be able to discover all Web services that exist at and below its own virtual directory.

Incorrect answers:
B: You should not place a .disco file to each ITCertKeys.com client's virtual directory because this is a static discovery document. You should manually specify the Web services that should be discovered in this document and the clients will then not be able to automatically discover the Web services that will be added in the future.
C: You should not place a .disco or a .vsdisco file in the WebServices directory. This will result in the violation of one of the requirements in the questions that states the no one ITCertKeys.com client should be able to discover Web services that are not intended for that specific client.
E: You should not place a .vsdisco file in the WebServices directory because you do not want the ITCertKeys.com clients to be able to discover the Web services that are not implemented for them.

Question 9.
You work as the Microsoft.NET developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers in the domain run Windows Server 2003. The development and deployment of Extensible Markup Language (XML) Web Services forms part of your responsibilities at ITCertKeys.com. After receiving instructions you have just completed the development and the deployment of an Extensible Markup Language (XML) Web service application. This XML Web service application contains ten (10) Web services. At present dynamic discovery on the Web server that hosts the application has been disabled. To this end you now need to configure the Web.config file of the application to allow Web service clients the ability to dynamically discover all the Web services. You also want to ensure that the Web service clients will be able to discover any future Web services that will be added.

What should you do? (Choose the correct configuration.)

A. 






B. 






C. 






D. 







Answer: B

Explanation: 
An Http handler should be added for all .vsdisco files. DiscoveryRequestHandler is the default handler class in ASP.NET 2.0. A file with the .vsdicso extension will allow a Web service client to dynamically discover all Web services that exist at and below the virtual directory that contains the document.

Incorrect answers:
A: A .disco file extension denotes a static discovery document. You will need to manually specify the Web services that should be discovered in this document. This will result in clients being unable to automatically discover the Web services that will be added in future.
C: A .wsdl handler denotes a Web Services Description Language (WSDL) document. This type of file will not provide for dynamic discovery of Web services.
D: An .asmx handler denotes a Web service endpoint and will thus not provide clients with the ability to automatically discover Web services.

Question 10.
You work as the Microsoft.NET developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers in the domain run Windows Server 2003. The development and deployment of Extensible Markup Language (XML) Web Services forms part of your responsibilities at ITCertKeys.com. After receiving instructions, you have just finished developing and deploying public and private Extensible Markup Language (XML) Web services to a production server. This production server has been configured with Microsoft Internet Information Services (IIS) 6.0. The Web services are located on different IIS virtual directories. 

Each of these IIS virtual directories hosts either public Web services or private Web services, but not both. Part of the instructions that you received also states that Web service clients must have the ability to discover the public Web services dynamically, but not the private Web services. The Web Service clients should also be granted the ability to ability to dynamically discover any new public Web services that are added to an existing virtual directory. To this end you now need to configure the server to meet these requirements. You should take care that your configuration does not prevent the discovery of Web services in new virtual directories unless you reconfigure the server.

What should you do? (Each correct answer presents part of the solution. Choose three.)

A. Add a .disco file to the Web site's virtual root directory.
B. Add a .vsdisco file to the Web site's virtual root directory.
C. Do not add .vsdisco files anywhere on the server.
D. Add the .vsdisco files to each virtual root directory that exposes public Web services.
E. Configure the .disco file with reference to each public Web service.
F. Configure the .disco file with reference to each .vsdisco file.

Answer: A, D, F

Explanation: 
You need to add a static discovery document, i.e. a .disco file to the IIS root directory and dynamic discovery documents, i.e. .vsdisco files to each virtual directory that exposes public Web services. This way you can ensure that Web service clients have the ability to only discover the public Web services.

Incorrect answers:
B: You should not add .vsdisco files to the IIS root directory.
C: Adding a .vsdisco file anywhere on the server will expose the private Web services.
E: .disco files should not be configured to reference to each public Web service. This means that Web clients will not be able to not automatically discover new Web services that are added to existing virtual directories.


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-620 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-620" Exam

Microsoft Windows Vista, Configuring

 Question 1.
You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The new ITCertKeys.com directive states that all departments in ITCertKeys.com should install Microsoft Windows Vista Business Edition on their respective workstations. You have been assigned to the Research department. To this end you are thus tasked with the responsibility to install Microsoft Windows Vista Business Edition on the Research Department's workstations. 

Following is a list of the workstation specifications as at present in the research department:
1. 1.2 GHz processor.
2. 256 MB of RAM.
3. 10 GB hard drive.
4. SVGA video card.
5. Integrated sound card.
6. 10/100 integrated network adapter.
These computers are not ready to have Microsoft Windows Vista Business Edition installed. They lack certain minimum hardware requirements. You now need to identify these and upgrade the workstations accordingly so as to comply with the new ITCertKeys.com directive.

What should you do? (Each correct answer presents part of the solution. Choose TWO.)

A. You should upgrade the processor.
B. You should upgrade the RAM.
C. You should upgrade the video card.
D. You should upgrade the hard drive.
E. You should upgrade the network adapter.

Answer: B, D

Explanation: 
You must have at least 512 MB of RAM and a minimum 20 GB hard drive with 15 GB of free space to successfully install Windows Vista.

Incorrect Answers:
A: Windows Vista requires an 800 MHz CPU, so the current 1.2 GHz processor will be adequate and will thus not need to be upgraded.
C: Windows Vista will function with an SVGA video card, although improvements in the user experience with Aero would require a Windows Display Driver Model (WDDM) capable video card.
E: Windows Vista does not have a minimum network adapter requirement, making this option irrelevant in the circumstances.

Question 2.
You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The new ITCertKeys.com directive states that all departments in ITCertKeys.com should install Microsoft Windows Vista Business Edition on their respective workstations. You have been assigned to the Research department. However, there is another company policy that states that all new installations and upgrades should be done on test computers prior to mass deployment. The Research department has a test computer named ITCertKeys-WS620. 

Following are the ITCertKeys-WS620 specifications:
1. Drive C (system drive) has 10 gigabytes (GB) of free space.
2. Drive D (programs drive) has 40 GB of free space.
3. Two memory slots exist, but only one is occupied with a 512 megabyte (MB) memory stick.
4. One 1.5 gigahertz (GHz) 32-bit processor is installed.
To comply with the company policy and follow the new directive you thus plan to install Microsoft Windows Vista Business on ITCertKeys-WS620. Now you need to change the hardware configuration so that the computer can run Windows Vista Business.

What should you do?

A. You should install Windows Vista on Drive D.
B. You need to free up space on Drive C.
C. You should add more memory to the computer.
D. You should add a faster processor to the computer.

Answer: B

Explanation: 
Operating systems must be installed on the system drive. In this scenario, the system drive on ITCertKeys-WS620 has only 10 GB of free space. Thus you should free up space on Drive C because Windows Vista requires 15 GB of free space for installation purposes.

Incorrect Answers:
A: You must install operating systems on the system drive. In this scenario, Drive C is the system drive. Thus you should not install Windows Vista on Drive D. 
C: The minimum memory capacity for a computer running Windows Vista is 512 MB and ITCertKeys-WS620 has 512 MB RAM. Thus you do not need to add more memory to the computer.
D: There is no need to add a faster processor to the computer. The minimum processor speed for a computer running Windows Vista is 800 megahertz (MHz).

Question 3.
You work as the Desktop support technician at ITCertKeys.com. You have been instructed to deploy Microsoft Windows Vista operating system on all the ITCertKeys.com client computers. ITCertKeys.com is planning to deploy two sites: a primary and a secondary site. You want to carry out your duty be using the System Management Server (SMS) 2003 operating system deployment (OSD) Feature Pack. Consequently you need to install the SMS 2003 OSD Feature Pack and thus you need to take you first action. 

What should you do?

A. SMS 2003 should be installed on the primary site server.
B. SMS 2003 should be installed on the secondary site server.
C. Windows Deployment Service (WDS) should be installed on the primary site server.
D. Business Desktop Deployment (BDD) 2007 should be installed on the primary site server.

Answer: A

Explanation: 
Installing SMS 2003 on the primary site server will enable you to install SMS 2003 OSD Feature Pack. The System Management Server (SMS) 2003 operating system deployment (OSD) Feature Pack can be used to create a custom image to deploy Windows Vista operating system on the target computers.

Incorrect Answers:
B: SMS 2003 must be installed on the Primary site server and not on the secondary site server. You are however able to install SMS 2003 on all the site servers to support SMS 2003 OSD Feature Pack.
C: WDS is used to deploy Windows Operation System on target computers using PXE network boot. It is in essence an enhanced version of Remote Installation Services (RIS) as it was used in previous versions of the Windows operating systems. You should not first install WDS on the primary site server.
D: BDD 2007 is installed on the deployment server after SMS 2003 OSD Feature Pack is installed.

Question 4.
You work as the Desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. You have been instructed to deploy Microsoft Windows Vista operating system on all the ITCertKeys.com client computers. You plan to make use of System Management Server (SMS) 2003 on a primary site server. You then use System Management Server (SMS) 2003 operating system deployment (OSD) Feature Pack to create a custom Windows Vista image. You need to deploy the Windows Vista image on the ITCertKeys.com client computers. The ITCertKeys.com client computers are currently using a mix of 32- and 64-bit processors. This means that you will need to take certain steps prior to deploying the image to the client computers.

What should you do? (Each correct answer presents part of the solution. Choose TWO.)

A. Check the size of the deployment logs.
B. Identify the differences in 32- and 64-bit deployment.
C. Verify that SMS 2003 OSD Feature Pack is installed on the client computer.
D. Verify that the ITCertKeys.com computers have the appropriate system resources.
E. Verify that the Windows Deployment Service (WDS) is installed on the ITCertKeys.com client 
    computer.

Answer: B, D

Explanation: 
The ZTIvalidate.wsf file is used to determine that the target computer has the available resources required to deploy Windows operating system. Prior to deploying an SMS 2003 OSD Feature Pack on a target computer, you should verify that the computer has the appropriate system resources. You should also identify the differences in 64-bit and 32-bit deployment. BDD 2007 only supports only EM64T-enabled processors and the AMD 64 type processors.

Incorrect Answers:
A: Deployment logs are used to store information regarding the image installation process on each client computer. You should determine the storage capacity required for storing the deployment logs during the image installation process. One does not first determine the size of the deployment logs.
C: The SMS 2003 OSD Feature Pack is installed on the primary site server and is used to create custom Windows image for Windows deployment on the target/client computers. You should thus not install it on the client computer.
E: WDS is used to deploy Windows Operation System on target computers using PXE network boot. It is in essence an enhanced version of Remote Installation Services (RIS) as it was used in previous versions of the Windows operating systems. WDS is not installed on the client computer.

Question 5.
You are employed as an administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All client computers on the ITCertKeys.com network run Microsoft Windows Vista. A ITCertKeys.com policy states that all client computers should be configured to obtain all of the latest operating system updates. A new computer named ITCertKeys-WS624 was recently purchased. You received instructions to verify whether ITCertKeys-WS624 can obtain all of the latest operating system updates.

What should you do? 

A. You need to confirm that ITCertKeys-WS624 has a Microsoft Windows Experience Index base 
    score above 3.0.
B. You need to configure Windows Defender to detect updates before scanning.
C. You need to validate your Windows installation from the Microsoft Windows Genuine 
   Advantage Web page.
D. You need to run Microsoft Windows Vista Upgrade Advisor.

Answer: C

Question 6.
You are employed as a network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com network is divided into several departments of which the Sales department is one. The Sales department was assigned a client computer named ITCertKeys-WS622. 

ITCertKeys NG-WS622 has the following hardware configuration: 
1. 512 MB of RAM
2. 10-GB hard disk
3. 933-MHz processor
4. 64-MB video adapter.
You have received instructions from the manager to install Microsoft Windows Vista on ITCertKeys-WS622.

Which hardware component fails the minimum hardware requirements?

A. Memory.
B. Hard disk.
C. Processor.
D. Video adapter.

Answer: B

Question 7:
ITCertKeys.com has employed you as a desktop technician. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com network is divided into several departments of which the Marketing department is one. The Marketing department was assigned a client computer named ITCertKeys-WS625. ITCertKeys-WS625 is currently running Microsoft Windows XP Professional. All the applications that are used in the Marketing department are third- party applications which are used daily in the department.

You have received instructions from the CIO to upgrade ITCertKeys-WS625 to Microsoft Windows Vista. The CIO wants all the applications in used to be operational after the upgrade. You must comply with the CIO's request and thus need to determine whether the hardware and software on ITCertKeys-WS625 will support the upgrade and still leave all the applications operational.

What should you do?

A. You need to run the winnt32.exe /checkupgradeonly command.
B. You need to run the mbsacli.exe command.
C. You need to run the Microsoft Windows Vista Upgrade Advisor application.
D. You need to compare ITCertKeys-WS625 system's hardware against the Microsoft Windows 
    Vista Hardware Compatibility List (HCL).

Answer: C

Question 8:
DRAG DROP
You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com has a client computer named ITCertKeys-WS626. ITCertKeys-WS626 has a hard disk that has been partitioned in two equal parts of 50 Gigabytes (GB) each. Microsoft Windows XP Home has been installed in the primary partition. The second partition is yet to be formatted. You have been instructed ensure that ITCertKeys-WS626 has dual booting abilities. You need to accomplish this task with the least amount of administrative effort.

What should you do? (Choose the correct options in the column on the left and place them in the correct order of execution in the work area on the right.)
 

Answer:
 

Explanation: 
The correct method would be to first format the second partition with NTFS, then boot the computer with the Windows Vista DVD and then installing Windows Vista on the second partition. This order of procedure would result in the least administrative effort since one should first install the oldest version of the Windows operating system first, then install each newer version in order because every new Windows version preserves backward compatibility for starting earlier Windows versions.

Incorrect Answers:
Do not change the file system on the second partition: If one does not change the file system then one will not be able to install Windows Vista on the computer. You need to either convert the file system to NTFS or format the partition with NTFS to accommodate the installation of Windows Vista. Create two partitions in the extended partition: This would be superfluous since there are already two partitions and you would not require more partitioning. First install Windows Vista on the primary partition: This will not work since you need to install the older version of the Windows operating system first and then install the newer version. First install Windows XP Home on the second partition: This is not the correct method to dual booting the computer. You should begin with installing the Windows XP Home on the primary partition first.

Question 9.
DRAG DROP 
You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. There is currently only one workstation that has been installed with Microsoft Windows Vista Business Edition. This workstation is named ITCertKeys-WS622. You have received instructions from the ITCertKeys.com manager to install Microsoft Windows Vista Business Edition on all the new workstations that has just been purchased. These new workstations must have the same build of Microsoft Windows Vista Business Edition as that deployed on ITCertKeys-WS622. You want to complete your task with the least amount of administrative effort. To this end you need to create an image of ITCertKeys-WS622 to deploy to the new workstations. Thus you take the bootable Windows PE CD that includes all the required deployment tools.

What should you do next? (Choose the correct options in the column on the left and place them in the correct order of execution in the work area on the right.)
 

Answer:
 

Explanation: 
the correct plan of action would be as follows: 
1. Use Sysprep to seal the master. Sysprep prepares an installed OS to be created into a deployable image by removing some computer specific information such as the workstation's Security Identifier (SID), which must be unique.
2. Boot the master with the Windows PE CD. Windows PE is a bootable OS that has many tools that can be used for creating and deploying images. Tools such as ImageX and Diskpart are run from Windows PE.
3. Use ImageX on the master to create the image file. ImageX is the Windows PE tool that is used to capture (and apply) OS images. 
4. Boot the target with the Windows PE CD.
5. Use Diskpart to format the drive. Diskpart is a PE tool that is used to configure the hard drive on a PC.
6. Use ImageX to apply the image to the target.

Question 10.
You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All the ITCertKeys.com workstations run Microsoft Windows 2000 Professional. You are responsible for the installation of operating systems on the ITCertKeys.com computers. You want to make use of the Microsoft Windows Vista DVD to perform a clean installation on the ITCertKeys.com workstations. To this end you place the DVD into the drive and start the first workstation only to find that it boots straight to Windows 2000 without starting the install of Microsoft Windows Vista. You have run checks on the BIOS of the workstations and to boot from DVD-ROM is not allowed, though you need to perform a clean install.

What should you do?

A. You should install new hard drives on these workstations.
B. The BIOS settings of these workstations should be changed to boot from the local hard drive.
C. You should update all the workstations' BIOS.
D. You should use the Windows Vista floppy boot disk.

Answer: C

Explanation: 
If you attempt to boot from the DVD ROM drive and it does not work, the first place to check is the computer BIOS. Alternatively, (though not mentioned as an option to choose from) you can also start the computer with a network boot floppy disk or PXE and connect to the installation files on the DVD or over the network.

Incorrect options:
A: You should not install a new hard drive. Installing a new hard drive will not solve this problem because the Windows Vista setup files on the DVD still needs to be accessed to allow for this install.
B: You should not change the BIOS settings to boot from the local hard drive. Changing the BIOS settings to boot from the local hard drive will only boot to the installed operating system.
D: You cannot use the Windows Vista Setup floppy boot disk. Windows Vista does not come with a Setup floppy boot disk.



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-624 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-624" Exam

Deploying and Maintaining Vista Client and Office System 2007 Desktops

 Question 1.
You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com management wants all client computers to be installed with Microsoft Office 2007.

There are 500 client computers on which you need to deploy Microsoft Office 2007. To this end you create a network installation point. Now you need to ensure that additional Office 2007 components are installed while deploying Office 2007 from the network installation point.

What should you do? (Each correct answer presents part of the solution. Choose TWO.)

A. Install the additional components on the ITCertKeys.com client computers manually using the 
    Microsoft Office 2007 Installation CD.
B. Configure a customized installation that includes all the additional components using the Office 
    Customizing Tool (OCT).
C. Create a setup Customization file (MSP) and store it in the Patches folder on the network 
    installation point.
D. Store resulting MSP file in the Updates folder located on the network installation point.
E. Install the additional components on the ITCertKeys.com client computers using the Group 
    Policy Editor and configuring the appropriate group policies to run from the network installation 
    point.

Answer: B, D

Explanation: 
You should make use of OCT to configure a customized installation and the MSP files should be stored in the Updates folder that is located on the network installation point. This is the recommended method. By default the Office 2007 Setup performs a typical installation that does not include all components of Office 2007.

Incorrect Answers:
A: Installing additional Office 2007 components on all the ITCertKeys.com client computers using the installation CD will work, but it is not the correct approach since it will be time consuming and is not the recommended approach.
C: You should not store the MSP file in the Patches folder. You should rather place it in the Updates folder.
E: Using group policy will not help you to install additional Office 2007 components on client computers from a network installation point. You can however use it to prevent user intervention during Office 2007 installation.

Question 2.
You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com management wants all client computers to run Microsoft Office 2007 with English and Russian as the language environment. You need to comply with the management requirements and must ensure that the ITCertKeys.com users will not be able to permanently modify the language settings.

What should you do?

A. Make use of a Setup Customization file (MSP file).
B. Make use of the Language Settings tool.
C. Make use of group policies to enforce language settings.
D. Make use of Proofing tools.

Answer: C

Explanation: 
Group policies can be used to enforce default language settings which will prevent users fro permanently modifying language settings.

Incorrect Answers:
A: An MSP file is used to specify the default language settings and can be created using the OCT, but it will not prevent users from modifying the language settings permanently.
B: The Language Settings Tool will not prevent users from permanently modifying the language setting. Rather it is used to change language settings while working with Office 2007 applications.
D: Proofing tools allows users to edit Office 2007 documents in multiple languages. It will definitely not help to prevent users from permanently modifying the language settings.

Question 3.
You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com management wants all client computers to be installed with Microsoft Office 2007. You want the Microsoft Office 2007 installation to be automated to all the client computers. To this end you:
1. create an Office 2007 network installation point
2. create an Office2007 folder on a server named ITCertKeys-SR01
3. then you share Office2007
You then make use of the Office Customization Tool (OCT) to create a Setup Customization file (MSP file) named Auto.msp. You then continue to save Auto.msp in the Automate folder which is located in the network installation point. All that is required now is that you must specify a fully qualified path to Auto.msp and thus need to run the appropriate Setup command line.

Which of the following Setup command line options should you run?

A. \\ ITCertKeys-SR01\Office 2007\Setup.Exe /Adminfile
    \\ ITCertKeys-SR01\Office2007\Updates\Auto.Msp
B. \\ ITCertKeys-SR01\Office 2007\Setup.Exe /Adminfile
    \\ ITCertKeys-SR01\Automate\Auto.Msp
C. \\ ITCertKeys-SR01\Office 2007\Setup.Exe /Adminfile
    \\ ITCertKeys-SR01\Office2007 \Automate\Auto.Msp
D. \\ ITCertKeys-SR01\Office 2007\Setup.Exe /Adminfile
    \\ ITCertKeys-SR01\Updates\Auto.Msp

Answer: C

Explanation: 
When the MSP file is created, the file is stored in the Updates folder at the root of the network installation point. If you do not save the MSP file in the Updates folder, you need to specify a fully qualified path to the MSP file. Also if you are using a folder other than Updates folder to save the MSP file, you can also specify its location in the Config.xml file.

Incorrect Answers:
A: \\ ITCertKeys-SR01\Office 2007\Setup.Exe /Adminfile
     \\ ITCertKeys-SR01\Office2007\Updates\Auto.Msp is the incorrect syntax to use. When you 
    use the Updates folder to save the MSP file, there is no need to specify a fully qualified path to 
    the Auto.msp file.
B: \\ ITCertKeys-SR01\Office 2007\Setup.Exe /Adminfile
     \\ ITCertKeys-SR01\Automate\Auto.Msp would be incorrect as it would not specify a fully   
     qualified path to the Auto.msp file. Also the setup command-line is not complete because you    
     also need to specify the shared folder name where you have creates the Automate folder.
D: \\ ITCertKeys- SR01\Office 2007\Setup.Exe /Adminfile
    \\ ITCertKeys-SR01\Updates\Auto.Msp is incorrect. You must specify the complete and correct 
    syntax to specify a fully qualified path to the file.

Question 4.
You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com management wants all client computers to be installed with Microsoft Office 2007. You have been instructed to carry out management orders. To this end you are in the process of deploying Microsoft Office 2007 to the ITCertKeys.com client computers. You thus need to install Office 2007 on client computes from a single distribution point and need to decide on the first step in the process.

What should you do?

A. First create an Office 2007 distribution point. Then create a MSP file and store it in the 
    Updates folder located at the root of the Distribution point.
B. First share the CD-ROM drive on the server and insert the Office 2007 Installation CD and 
    install Office 2007 from the shared CD-ROM drive.
C. First configure the Config.xml file to deploy Office 2007 to all client computers from a single 
    distribution point.
D. First create a shared folder. This folder must be accessible to all client computers then copy 
    the installation files from the Office 2007 Installation CD.

Answer: D

Explanation: 
you first need a shared folder that is accessible from all client computers on the network. Then you should copy the installation files from the Office 2007 Installation CD. Then you will be able to run the Setup on the client computers from the shared folder.

Incorrect Answers:
A: Creating an MSP file and storing it in Updates at the Office 2007 distribution point will not help to install Office 2007 from a single distribution point. If you want to install Office 2007 updates as part of the Office 2007 installation process, then you should create a MSP file that includes the updates and store it in the Updates folder.
B: Sharing a CD-ROM drive is a very inefficient way of deployment; it is not the recommended method to deploy Microsoft Office 2007 to all client computers from a single distribution point.
C: The Config.xml file is located in the product folder. In Microsoft Office Standard 2007, this particular file of located on the Standard.WW folder. The Config.xml file is used to identify products and language you want to install on client computers from a single distribution point.

Question 5.
You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com management instructed you to deploy Microsoft Office 2007 on the ITCertKeys.com client computers. You want the Microsoft Office 2007 installation to be automated all the client computers as well as ensuring that the installation will run quietly on all client computers without displaying a user interface during the installation.

What should you do?

A. Use the Office Customization Tool (OCT) to create a Setup Customization file (MSP file) and in 
    the OCT Setup section set the Display Level to None.
B. Use the Office Customization Tool (OCT) to create a Setup Customization file (MSP file) and in 
    the OCT Setup section set the Display Level to Basic.
C. Use the Office Customization Tool (OCT) to create a Setup Customization file (MSP file) and 
    in the OCT Setup section set the Display Level to Suppress modal.
D. Use the Office Customization Tool (OCT) to create a Setup Customization file (MSP file) and 
    in the OCT Setup section set the Display Level to Full-default.

Answer: A

Explanation: 
While creating the MSP file, the Setup section of OCT will prompt you to specify a number of options such as installation, location, organization name, product key, and display level. If you set the Display Level to None, the Office 2007 installation will run quietly without displaying a user interface. The resulting MSP file should then be placed in the Updates folder in the installation share.

Incorrect Answers:
B: Setting the Display Level to Basic will result in the user being prompted to enter the product key and end-user license agreement as well as displaying the progress bar and completion notice.
C: The Suppress modal option is not part of the Display Level option. And also it should only be selected if you do not want any error messages to be displayed during the installation of Office 2007.
D: Setting the Display Level to Full-default will run Office 2007 installation interactively and will definitely display all user interfaces and messages during the installation process.

Question 6.
You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com staff is divided into two distinctive departments namely Sales and Human Resources. You created a network share, \\ ITCertKeys01\share\Office2007, for the Microsoft Office 2007 installations. You then customized the setup files for the Sales and Human Resources departments. You then created the Sales.msp and HR.msp files and stored them in a folder in the \\ ITCertKeys01\share\installation folder. After several installations were performed from the installation point, Amy Walsh, a Human Resources user informed you that the installations from the installation point have failed. You investigate the issue and discovered that a number of files were missing at the installation point. You need to ensure that such a problem will not happen again.

What should you do?

A. All source folders access should be marked as read-only.
B. All users from the Administrators group on their local computers should be excluded.
C. The Sales.msp and HR.msp files should be removed from the network share and copied to the 
    users' desktops.
D. The \Office2007 folder should have read-only permissions and the Sales.msp and HR.msp 
    files should have read-write permissions.

Answer: A

Explanation: 
If you do not mark the installation point as read-only, then users will have privileges such as to delete contents within the installation point. Also when defining the installation point, you should not define it in the root of the server. It is mentioned in the question that the installation folder is defined in the \share folder. You will need to create the .msp files as per your requirements. You can then use the Office Customization Tool to customize the installation files which need to be present in the root folder of the server.

Incorrect Answers:
B: If you exclude the users belonging to the Administrators group on their local computers, then they will be unable to perform the installation.
C: To enable the users to initiate the installation from the installation point, you actually need to copy the customized .msp files to a folder in the installation point. Thus you should not remove the .smp files from the network share and then copy them to the users' desktops.
D: Both files are .msp source files and as such need to be secured from modifications. This means that it should be set to read-only and not read-write.

Question 7.
You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com staff is divided into two distinctive departments namely Sales and Human Resources. Management decided to have Microsoft Office 2007 deployed on all the client computers but the Sales department should only have Microsoft Word and Microsoft Excel installed while the Human Resources department should only have Microsoft Word and Microsoft Access installed. You thus need to create a separate Setup Customization file (MSP file) for each department and place them in the Updates folder. Now you need to decide which settings should be modified when creating the MSP files to meet the Management's requirements.

What should you do?

A. Go to the Office Customization Tool (OCT) Features section and then modify the feature 
    installation states.
B. Go to the Office Customization Tool (OCT) Features section and then modify the user settings.
C. Go to the Office Customization Tool (OCT) Setup section and then modify the Add installations 
    and run programs section.
D. Go to the Office Customization Tool (OCT) Setup section and then modify the Setup 
    properties.

Answer: A

Explanation: 
The features installation states in the Features section of OCT should be modified. You are allowed to choose from four installation states: Run from My Computer, Run all from My Computer, Installed on First Use, and Not Available. When you need to install only particular applications of Office 2007 on particular client computers, you should set the installation state for that particular application to Not Available. When running the installation you need to specify the proper MSP file for each department in a batch file.

Incorrect Answers:
B: The user settings in the Features section of OCT help one to set the default values of Office application settings. It will not help you to meet the management requirements.
C: The Add installations and run programs section of the Setup section of OCT will not help you to meet the management requirement. It will rather help you to run specific programs before or after Office 2007 installation is complete.
D: The Setup properties of the Setup section of OCT will help you to customize setup properties while performing the Office 2007 Installation. It will not help to meet the ITCertKeys.com management requirements.

Question 8.
You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. There are 300 client computers on the ITCertKeys.com network. The ITCertKeys.com management wants all these client computers to be upgraded to Microsoft Office 2007. Currently the client computers are configured with Microsoft Windows XP Professional Service Pack (SP) 1 and running Microsoft Office 2003. You need to ensure that the migration process from Office 2003 to Office 2007 is done with the least amount of administrative effort.

What should you do?

A. The Office Migration Planning Manager (OMPM) File Scanner Tool should be installed on all 
    Windows XP Professional SP1 client computers.
B. The Windows XP Professional SP1 computers should be upgraded to Windows Vista.
C. The Version Extraction Tool (VET) should be installed on the Windows XP Professional SP1 
    client computers.
D. Service Pack 2 should be installed on the Windows XP Professional SP1 client computers.

Answer: D

Explanation: 
Office 2007 cannot be installed on Windows Professional SP1 client computers. You first need to install Windows XP Professional SP 2. Only then will the migration process be with the least amount of administrative effort. 

Incorrect Answers:
A: The OMPM File Scanner Tool is used to scan files for conversion issues. If you plan to migrate from Office 2003 to Office 2007, you should install OMPM File Scanner tool to check for the compatibility of files, but it is not a requirement.
B: The minimum system requirement to install Microsoft Office 2007 is Windows XP SP2 operating system. This upgrading to Windows Vista would be more administrative effort in this scenario.
C: VET is used to extract previous versions of Microsoft Word 2003 files to a different file format. It is not necessary for performing a migration.

Question 9.
You work as the IT technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. You responsibilities at ITCertKeys.com includes the management of the Microsoft Windows XP computers. Currently the majority of the ITCertKeys.com client computers are configured with Microsoft Office 2003 and some are running Microsoft Office XP. You make use of Microsoft Office 2007. You know that there are a few key differences between the file formats of Office XP, 2003 and 2007. You need to ensure that all the ITCertKeys.com users will be able to make use of the documents that you create in Office 2007.

What should you do? (Each correct answer presents part of the solution. Choose TWO.)

A. The Office XP client computers should be upgraded to Office 2003 and then to Office 2007.
B. Office Compatibility Pack should be installed on the Office XP client computers.
C. The Office 2003 client computers should be upgraded to Office 2007.
D. Office Compatibility Pack should be installed on the Office 2003 client computers.
E. The Office XP and 2003 client computers should be upgraded with the latest service packs.
F. Office Compatibility pack should be installed on your computer.

Answer: B, D

Explanation: 
To ensure that all users will be able to open the documents that you created in Office 2007 you will need to install the Office Compatibility Pack on the Office XP and 2003 client computers.

Incorrect Answers:
A: You need to install Office Compatibility Pack on the Office XP client computers to enable them to use the Office 2007 created documents.
C: You need to install Office Compatibility Pack on the Office 2003 client computers to enable them to use the Office 2007 created documents
E: Installing the latest service packs on the Office XP and 2003 client computers will not enable them to open, read, edit, etc. files that were created in Office 2007.
F: There is no need to install the Office Compatibility Pack on an Office 2007 computer. It is the Office XP and 2003 client computers that need to be installed with the Office Compatibility Pack. They are the one that will require the ability to open files that will be created in Office 2007.

Question 10.
You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. There are 300 client computers on the ITCertKeys.com network. Thirty percent of these client computers are configured with Microsoft Office 2007 and seventy percent still runs Microsoft Office 2003. Currently there are documents that were created in Office 2003 that are to be used by users working in Office 2007 and vice versa. You must ensure that all users will be able to use their required documents. You need to decide on which feature to enable so as to ensure that Office 2007 documents can be converted to a form that can be used by previous versions of Microsoft Office.

What should you do?

A. Use the Compatibility mode Microsoft Office 2007 feature.
B. Use the Compatibility checker Microsoft Office 2007 feature.
C. Use the Compatibility pack Microsoft Office 2007 feature.
D. Use the Feature refresh Microsoft Office 2007 feature.

Answer: A

Explanation: 
The Compatibility mode ion Office 2007 ensures that Office 2007 created documents can be converted to forms that can be used by previous versions of Office. The Microsoft Office 2003 created documents are completely compatible in the compatibility mode in Office 2007 whether they be Microsoft Word, Excel or PowerPoint documents.

Incorrect Answers:
B: The Compatibility checker is used to detect features not available in previous versions of office.
C: The Compatibility pack is used to enable Office 2003 clients to read and edit Office 2007 documents, but it cannot be used to ensure that Office 2007 created documents can be converted. Also the Compatibility pack is installed on computers that run previous versions of Office.
D: The Feature refresh feature does not provide for the conversion of Office 2007 created documents. Instead it allows features changed by Compatibility mode to be available again while opening a document in Microsoft Word 2007, PowerPoint 2007, or Excel 2007.


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for HP0-451 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "HP0-451" Exam

Radia

 Question 1.
What file defines the default client directories for IDMSYS and IDMDATA?

A. C:\\Program Files\\Novadigm\\ndv.ini
B. C:\\Program Files\\Novadigm\\lib\\hp.ini
C. C:\\Program Files\\Novadigm\\lib\\ndv.ini
D. C:\\Program Files\\Novadigm\\ndv.cfg

Answer: C

Question 2.
In Order to effectively and efficiently manage the Radia infrastructure, all changes should be tested prior to implementation in a production environment. This can be best accomplished in the _________________________________.

A. Infrastructure Development lab that mirrors production
B. Unit test environment as any other Radia package would be tested
C. Tiered Radia infrastructure by making the change to a single tier and testing before replication 
    to the next tier
D. Production environment at night when users are not using the system

Answer: A

Question 3.
What are three primary functions performed during a Radia Client Connect? (Choose three)

A. Data Download
B. Resource Compression
C. Desired State Resolution
D. Policy Resolution
E. Actual State Resolution

Answer: A, C, D

Question 4.
What is the correct port number specified in the URL that is used to add an Active Directory to your list of Portal Directory Services?

A. 3466
B. 389
C. 80
D. 3467

Answer: B

Question 5.
When Configuring the LDAP ZMETHOD instance, what is used for the ZMETHOD name?

A. SENDMESSAGE
B. LDAPREXX
C. ZTASKEND
D. RADISH

Answer: D

Question 6.
OpenView Configuraiton Management Using Radia can integrate into customer environment using what open standards? (Choose Four.)

A. LDAP
B. ODBC
C. HTTP/HTTPS
D. WBEM
E. SECAM
F. TAPI

Answer: A, B, C, D

Question 7.
Where would you find the RADIA Proxy Server's default directory for pre-loaded data?

A. C:\\Novadigm\\IntegrationServer\\data\\rps\\pre-load
B. C:\\Novadigm\\IntegrationServer\\data\\rps\\static
C. C:\\Novadigm\\IntegrationServer\\data
D. C:\\Novadigm\\IntegrationServer\\data\\rps

Answer: B

Question 8.
What is considered a best practice for application event reporting during a check installation event?

A. NONE
B. BOTH
C. FAILURE ONLY
D. SUCCESS ONLY

Answer: C

Question 9.
Which ROLE attributes in the SAP class allows data to be downloaded from the SAP instance? (Select two.)

A. A
B. O
C. D
D. R

Answer: A, C

Question 10.
You just increased the TASK_LIM value in the EDMPROF.DAT configuration file from 50 to 100. 

When will your modification take effect?

A. Upon the next full client connection
B. When the Radia Configuration Server Service (ZTOPTASK) has been restarted
C. The next time the Configuration server goes into pushback operation
D. When the next Radia Distributed Configuration Server Cycle is initiated

Answer: B



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 000-079 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "000-079" Exam

System x Director v5.2

 Question 1.
A BladeCenter chassis has 14 blade servers running Microsoft Windows. 

What method can be used to perform an unattended and remote installation of the Director Agent on all 14 blade servers?

A. Insert Media into IBM BladeCenter Media Tray.
B. IBM Remote Deployment Manager's DeployAgent Feature.
C. IBM BladeCenter Management Module Remote Session Feature.
D. Gain access as Level-0 managed objects and use Software Distribution.

Answer: D

Question 2.
Most problematic situations occur due to communication issues between the IBM Director Server and Agent. The genevent tool can be used to test the connectivity between the management server and the managed system. 

Which of the following is a valid genevent command to check this connectivity?

A. genevent TCPIP;Director.ibm.com /message;" Checking communication..." /type:"Test.Event"
B. genevent /sort:"Test.Event" /text:"Checking communication..." /dest TCPlP:: 192.168.10.10
C. genevent /type:"Test.Event" /text:"Checking communication.. ." /dest TCPlP:: 192.168.10.10
D. genevent //type:"Test.Event" //message: "Checking communication..."
    //destTCPlP::Director.ibm.com

Answer: C

Question 3.
When upgrading or updating IBM Director, the IBM Director configuration data should be backed up. 

Which of the following commands should be issued to back up this data?

A. twgsave
B. twgstore
C. twgbackup
D. twgrestore

Answer: A

Question 4.
Which of the following databases are only supported locally on the IBM Director Server running under Windows? (Select two answers.)

A. IBM DB2
B. PostgreSQL
C. Apache Derby
D. Windows SQL Server
E. Microsoft SQL Server Express Edition 2005

Answer: C, E

Question 5.
A customer would like to do an in-place upgrade of their IBM Director Server 4.21 to version 5.20 but has concerns about support for a Microsoft Jet Database in version 5.20. 

Which option below is valid while upgrading from IBM Director 4.21 to version 5.20 without data loss?

A. Drop the existing database and install MSDE.
B. Export the Microsoft Jet database to Apache Derby.
C. IBM Director 5.20 supports Microsoft Jet (upgrade only).
D. IBM Director does not support an upgrade from version 4.21 to version 5.20.

Answer: C

Question 6.
Which of the following is NOT a function of IBM Director 5.20?

A. Managing virtual servers
B. Sending SMTP e-mail messages
C. Viewing Management Module event logs
D. Running tasks or programs on managed systems

Answer: C

Question 7.
An Administrator needs to deploy IBM Director Server in an i5/OS environment. 

Which Database is supported running on i5/OS?

A. Oracle
B. IBM DB2 (local install only)
C. Microsoft SQL Server (remote install only)
D. Apache Derby (included with IBM Director) (local install only)

Answer: B

Question 8.
An IBM Director management package ships with every System x and IBM Blade Server purchased. 

How many IBM DirectorAgent licenses for use on non-IBM hardware are included with each IBM Director Management Server deployed on IBM hardware?

A. 0
B. 14
C. 10
D. 20

Answer: D

Question 9.
A customer would like to deploy applications packaged with the Microsoft Windows Installer through IBM Director. 

Which component is needed to perform this task?

A. IBM Application Portal
B. Remote Deployment Manager
C. Server Configuration Manager
D. Software Distribution Premium Edition

Answer: D

Question 10.
A customer is running VMware ESX Server with multiple virtual machines, all running VMware Tools but without the benefit of VirtualCenter. In the event of a Predictive Failure Alert from the physical host. the customer would like to gracefully shutdown and power off all virtual machines  running on that host. 

With IBM Director and Virtualization Manager installed, what steps should be taken?

A. Create an Event Action Plan to determine PFAs in VMware VirtualCenter.
B. Create an Event Action Plan using "Software Predictive Failure Analysis" as the event filter, 
    and "Manage a Host" as the Action. customized to "Power Off All Virtual Machines." Associate 
    this Event Action Plan with the virtual machines.
C. Create an Event Action Plan, using "Hardware Predictive Failure Analysis" as the event filter. 
     Select "Manage a Virtual Machine" as the Action, customized to "Power Off and Shutdown." 
     Associate this Event Action Plan with the VMware ESX host.
D. Create an Event Action Plan using "Hardware Predictive Failure Analysis" as the event filter. 
     Select "Start a Task on the 'Event System" as the Action, customized to "Shutdown and Power 
     Off All Virtual Machines." Associate this Event Action Plan with the VMware ESX Host.

Answer: D


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 50-704 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "50-704" Exam

Novell Open Enterprise Server for Linux + ZENworks

 Question 1.
By default, the iPrint system uses port ___________ to send non-secure print jobs.

Answer: PORT631

Question 2.
When migrating volumes from a NetWare server to an OES Linux server, which are considerations you should keep in mind? (Choose 2.)

A. Open files on the source volume won't be migrated, by default.
B. The creation date of the files on your migrated volume will be reset to the current date.
C. Linux User Management must be disabled on the destination server before starting the 
    migration.
D. If the source NetWare volume is part of a server cluster and it fails over during the migration, 
    the Server Consolidation utility can continue the migration process using a redundant server in 
    the cluster.
E. The file ownership attribute is not preserved when migrating NetWare NSS volumes to OES 
    Linux volumes.
F. You will lose all trustee rights assignments when migrating a traditional NetWare volumes to 
    OES Linux NSS volumes.

Answer: A, B

Question 3.
You've just completed an upgrade of a NetWare 5.1 server to OES NetWare. You now need to install additional products. 

Which utilities can you use to do this? (Choose 2.)

A. iManager
B. Remote Manager
C. Deployment Manager
D. Novell Application Manager
E. The Install utility in the OES NetWare server GUI

Answer: C, E

Question 4.
Your organization's eGuide service is installed on an OES Linux server with a DNS domain name of da12.da.com. You've configured eGuide to use eDirectory as its LDAP directory service. Your users need to access the eGuide service from their workstations using a web browser. 

What URL should they use to do this?

Answer: HTTP://DA12.DA.COM/EGUIDE

Question 5.
You're setting up an iFolder server in your network that will service 1800 users. The server uses a dual Pentium 4 CPU motherboard and a 500 GB RAID 3 storage array. The server is connected to workstations through a Gigabit twisted-pair Ethernet network. 

Does this system meet Novell's recommended design guidelines for iFolder?

A. Yes, all recommendations are met.
B. No, iFolder is not multiprocessor-enabled.
C. No, iFolder does not support RAID 3 storage devices.
D. No, a single iFolder server should serve a maximum of 1000 users.
E. No, iFolder should be implemented on a fiber-optic Ethernet network.

Answer: D

Question 6.
You're planning the deployment of a new Open Enterprise Server network. You will create a new eDirectory tree with the first OES server you install. Each server in the tree will function in a specified role. You plan to install the following servers:
• DA1. DA1 will be an OES Linux server that will run NCP Server and contain NSS volumes.
• DA2. DA2 will be an OES Linux server that will run NCP Server and NSS. It will also be used to 
  create an iSCSI SAN using the other servers in the network.
• DAS: DA3 will be an OES Linux server that will run NCP Server, NSS, and iFolder.
• DA4: DA4 will be an OES Linux server that will run NCP Server, NSS, and NetStorage.
• DA5: DA5 will be an OES Linux server that will run iManager to provide remote management 
  services for the entire network.

Which server should be the first server installed in the eDirectory tree?

A. DA1
B. DA2
C. DA3
D. DA4
E. DA5
F. It doesn't matter which OES server is installed first in the eDirectory tree.

Answer: F

Question 7.
Which file is used to configure the OpenSSH service on your OES Linux server?

A. /etc/sshd.conf
B. /etc/ssh/sshd.conf
C. /etc/sysconfig/sshd
D. /etc/ssh/sshd_config
E. /etc/rc.d/initd/sshd

Answer: D

Question 8.
Which version of eDirectory is installed by default after a NetWare 5.1 server is upgraded to OES NetWare?

A. eDirectory 8.9
B. eDirectory 8.8
C. eDirectory 8.5.7
D. eDirectory 8.7.3
E. eDirectory 8.6.5

Answer: D

Question 9.
You need to configure a Universal Password Policy to allow users connecting to your OES Linux system to authenticate to the Novell Samba service on the server. Click the iManager category you would use to do this.
 

Answer:
 

Question 10.
You need to deliver applications to your users and workstations that reside in remote locations outside your organization's firewall. 

What is required to accomplish this using ZENworks Desktop Management?

A. Load Nal.nlm with the -N switch.
B. Implement the ZENworks Middle-Tier server
C. Load Appman.nlm with the -PASSTHROUGH switch.
D. Enable dynamic NAT passthrough on the server where ZENworks is installed.

Answer: B



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 50-886 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "50-886" Exam

Foundation of Novell Networking: NetWare 6.5

 Question 1.
Which describes the role of the Novell Distributed Print Services (NDPS) printer agent?

A. It downloads the correct print driver to the workstation.
B. It responds to queries from clients about the status of a print job.
C. It provides a platform for printer objects that reside on the server.
D. It allows NDPS clients to sent print jobs to printers that are not NDPS-aware.
E. It redirects print jobs to directory on the server while waiting for the printer to become available.
F. It takes application-specific data from the application creating the print job and reformats it to 
    work with the printer It Is being sent to.

Answer: B

Question 2.
You're implementing a NetWare 6.5 network for a small business client Jessica's Bakery. There is only one server in the network. You've named the server BAKERY1 and installed it into an eDirectory tree named JESSICASBAKERY-TREE. You've used a random password generator to create a password for the tree's Admin user. To ease administration, you've located the server next to the Point of Sale system in the customer area of the bakery. You deployed Universal Password on the server. All workstations have Novell Client 4.9 installed on them. You created a NFAP share on the server for the SHARED and the FINANCE directories on the server's DATA volume. 

Does this configuration meet Novell's security recommendations?

A. Yes, all Novell security guidelines have been met.
B. No, the server should be placed in a locked closet or room.
C. No, you shouldn't use Universal Password with Novell Client version 4.9.
D. No, you shouldn't use the business name in the server or eDirectory tree names.
E. No, you shouldn't create NFAP shares for directories containing financial information.
F. No, you shouldn't use a random password generator for the Admin password. It's easy to hack.

Answer: B

Question 3.
Which web-based services does Virtual Office provide? (Choose 3.)

A. Chat
B. Calendar
C. Bookmarks
D. Spreadsheet
E. Word processor
F. Project management charts

Answer: A, B, C

Question 4.
During the installation of NetWare 6.5, the server files are installed on the _________volume.

Answer: SYS

Question 5.
You've just finished configuring an iPrint system on your NetWare 6.5 server. The server's DNS name is iprint.widget.com. The Manager object is named IPP-Printer in the SLC.WIDGET container. The Broker object is named IPP-Broker and is also in SLC.WIDGET. You've used the Maptool.htm file to configure a map named slcoffice.htm for location-based printing. 

What URL should you enter in your browser's Address field to test the iPrint map?

A. http://iprint.widget.com/slcoffice.htm
B. http://iprint.widget.com/lpp/slcoffice.htm
C. http://iprint.widget.com/lppdocs/Maptool.htm
D. http://iprint.widget.com/iPrint/slcoffice.htm
E. http://iprint.widget.com/lppdocs/slcoffice.htm
F. http://iprint.widget.com/Ipp/slcoffice.htm -b=IPP-Broker.SLC.WIDGET
G. http://iprint.widget.com/lppdocs/slcoffice.htm -m=IPP-Printer.SLC.WIDGET

Answer: E

Question 6.
Exhibit:
 

Given the explicit right assignments shown, what rights does CGrayson have to the MHoffmann user object?

A. Supervisor
B. Browse
C. Browse, Create
D. Browse, Create, Delete
E. Browse, Create, Delete, Rename, Inheritable
F. Supervisor, Browse, Create, Delete, Rename
G. Supervisor, Browse, Create, Delete, Rename, Inheritable
H. CGrayson has no rights to the MHoffmann user object.

Answer: B

Question 7.
Your company specializes in the production of digital video products. Your company has been recently awarded a very large contract that has a very short deadline. Your NetWare 6.5 server currently uses a single 80 GB IDE hard disk drive. The new contract will require considerably more hard disk storage. You've purchased and installed a 400 GB RAID5 disk array designed specifically for non-linear video editing. The array came with a diskette containing NetWare drivers. 

Which file on your server should you edit to load these drivers?

A. RAID.NCF
B. SERVER.EXE
C. CONFIG.SYS
D. STARTUP.NCF
E. STARTUP.CFG
F. STORAGE.NCF
G. AUTOEXEC.BAT
H. RAID5 array drivers can only be loaded manually from the server console.

Answer: D

Question 8.
Which utilities can you use to manage directory and file attributes on a NetWare 6.5 server? (Choose 2.)

A. ICE
B. FLAG
C. iManager
D. iMonitor
E. NDS Manager
F. Remote Manager

Answer: B, F

Question 9.
Your company's business procedures require the use of triplicate forms. To accommodate this, you have secured an older dot-matrix printer to deploy in your network. It doesn't have a network interface. It will be connected directly to one of your server's LPT ports using an IEEE 1284 parallel cable. You use Novell Distributed Print Services (NDPS) to provide print services to your users. This printer doesn't have an embedded printer agent. 

Can you use it with NDPS?

A. Yes, all prerequisite requirements have been met.
B. No, the NDPS manager doesn't support older dot-matrix printers.
C. No, the NDPS broker is incompatible with the IEEE 1284 standard.
D. No, NDPS doesn't support printers that don't have an embedded printer agent.
E. No, a printer agent can't be created for printers that connect to the server with a parallel cable.

Answer: A

Question 10.
Which utility can be used to create NSS volumes in NetWare 6.5? (Choose 2.)

A. NSSMU
B. iMonitor
C. NWCONFIG
D. ConsoleOne
E. NDS Manager
F. NetWare Administrator

Answer: A, D


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 190-847 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "190-847" Exam

IBM Lotus Notes Domino 8 System Administration Fundamentals

 Question 1.
The user name that creates the original DB2 database must be a member of which of the following groups?

A. SYSADM
B. MANAGERS
C. DB2ADMIN
D. ADMINISTRATORS

Answer: A

Question 2.
Which of the following is enabled by installing the DB2 Access server?

A. Replication
B. DB2 group locking
C. ACLs and reader lists
D. DB2 container storage

Answer: C

Question 3.
It was decided to locate the DB2 server on the same physical box as the Lotus Domino server. 

In this scenario, the DB2 database that stores Domino data is titled which of the following?

A. Lotus
B. Domino
C. NSFDB2
D. DB2Domino

Answer: B

Question 4.
When DB2 is the default database storage type, the databases are stored in what location?

A. In nsf files in the DB2 database
B. As nsf files on a remote db2 server
C. As files in the Domino server's disk space
D. In a DB2 database managed by the DB2 server

Answer: D

Question 5.
John registered a new server. In which one of the following was the Server document placed?

A. NAMES.NSF
B. CERTLOG.NSF
C. CATALOG.NSF
D. DIRECTORY.NSF

Answer: A

Question 6.
What is the maximum number of organizational units that may be listed in a hierarchial name?

A. Two
B. Three
C. Four
D. Five

Answer: C

Question 7.
The site update database in Domino supports which of the following security controls for distributing updates?

A. Schema
B. Encryption
C. Author fields
D. Reader Fields

Answer: D

Question 8.
Which type of server installation provides standard Domino application services and custom Domino databases for Notes and Web clients, as well as support for clusters?

A. Domino Utility Server
B. Domino Database Server
C. Domino Messaging Server
D. Domino Enterprise Server

Answer: A

Question 9.
When the LDAP service can't find information for which an LDAP client is searching, it can return a referral to the client. 

What Domino service does it utilize to provide this referral?

A. MAPS
B. Referrer
C. Replicator
D. Directory Assistance

Answer: D

Question 10.
While configuring an Internet Site document, Kira has left the option blank for which Domino server hosts the site. 

What is the default action the server will perform with this option not configured?

A. The Internet Site will not be loaded on any Domino server
B. The Internet Site will be loaded on all Domino servers in the domain
C. The Internet Site will only accept connections for the first IP Address on the server
D. The Internet Site will only accept connections for the hostname in the server document

Answer: A



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.