Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "50-676" Exam

Please anyone update this site with new 1zo-032 dump thanks

 I need updated dump, can any one update this site with new one 



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for E20-522 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "E20-522" Exam

CLARiiON Solutions Specialist for Storage Administrator

 Question 1.
What are three [3] functions of the Clone Private LUN?

A. Keep track of modified extents of Source LUNs and Clones
B. Stores fracture log for synchronization or reverse synchronization
C. Enable incremental synchronization upon starting an Out-of-Sync Clone LUN
D. Allow continuance of synchronization operation of a Clone upon a failed SP.
E. Store host write data from Source when Clone is fractured from Source LUN

Answer: A, B, D

Question 2.
What are three [3] features that the PowerPath GUI provides to users?

A. Change theCLARiiON SP from active to standby.
B. Change the failover policy of a LUN.
C. Change aCLARiiON path from active to standby.
D. Change a host adapter from standby to active.

Answer: B, C, D

Question 3.
What are three [3] features of VisualSAN?

A. Monitors health of SAN
B. Integration withNavisphere CLI Correct if you mean that Visual SAN runs NaviCLI
C. Performance statistics of LUNS, and RAID groups
D. Track storage utilization of servers on the SAN
E. Visual representation of SAN zones and members

Answer: A, B, E

Question 4.
How are a production LUN and its clone(s) related?

A. Clone Private LUN.
B. Persistent fracture log.
C. Clone Group relationship.
D. Storage Group relationship.

Answer: C

Question 5.
What are three [3] features of VisualSAN?

A. Track storage utilization of servers on the SAN
B. Performance statistics of LUNS, and RAID groups
C. Integration withNavisphere CLI Correct if you mean that Visual SAN runs NaviCLI
D. Monitors health of SAN
E. Visual representation of SAN zones and members

Answer: C, D, E

Question 6.
What is the maximum number of Clone Private LUNs allowed on a CLARiiON CX Series array?

A. 50
B. 1
C. 25
D. 2
E. 100

Answer: D

Question 7.
What is a feature of the Write Intent Log (WIL)?

A. Used to minimize recovery in the event of a failure of the Primary array.
B. Tracks changes on the Primary LUN and synchronizes changes with the Secondary LUN when 
    reachable.
C. Is a volatile log which tracks changes to the Primary LUN during aFracture
D. Captureswrites to the Secondary LUN and release those changes when the Secondary is 
    promoted as Primary.

Answer: A

Question 8.
What is the default stripe element size for a five disk RAID 5 CLARiiON LUN?

A. 8 blocks
B. 32 blocks
C. 128 blocks
D. 64 blocks
E. 16 blocks

Answer: C

Question 9.
For which three [3] databases can VisualSRM provide table level detail?

A. SQLserver
B. Sybase
C. mySQL
D. Oracle
E. Informix

Answer: A, B, D

Question 10.
DRAG DROP
Click the Task button. 

What are the steps, in order, for configuring a Brocade switch for Web management?
 

Answer:
 



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for E20-500 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "E20-500" Exam

EMC Storage and Information Infrastructure Exam

 Question 1.
When data is written to a SnapView source LUN, at what point are the data chunks saved to the Reserved LUN pool?

A. During synchronization
B. Every time data is changed on the source
C. Every time write cache is flushed
D. When source data is changed for the first time

Answer: D

Question 2.
What are the primary goals of an optimization engagement?

A. Avoid future problems, reduce complexity, enable high availability
B. Fix existing problems, avoid future problems, reduce costs
C. Fix existing problems, improve utilization, increase efficiency
D. Reduce costs, reduce complexity, increase efficiency

Answer: D

Question 3.
What does Inter-Switch Link trunking do?

A. Allows ports on the same blade to be used for ISL
B. Enables ISL between switches to reach up to 200 km distances
C. Prohibits a port from becoming an E_Port for fabric security
D. Aggregates the bandwidth of multiple ISLs

Answer: D

Question 4.
After a Data Mover failover, how is the failback operation performed?

A. Automatically
B. Data Mover failover is not supported
C. Manually
D. Recovery is not needed until another failure occurs

Answer: C

Question 5.
A customer implemented BCVs with mirrors for use with the most critical business volumes. The standard volumes were established with the BCVs at the start of the day, but later in the day the customer discovered data corruption. 

Which action would enable a restore from uncorrupted BCV volumes?

A. Differential Split
B. Instant Split
C. Protected Restore
D. Reverse Split

Answer: D

Question 6.
You are giving a presentation to a customer about EMC virtualization products. They specifically ask about file storage virtualization. 

Which EMC product enables file storage virtualization using industry-standard protocols and mechanisms in a heterogeneous environment?

A. Invista
B. Rainfinity
C. RecoverPoint
D. Vmware

Answer: B

Question 7.
An EMC ControlCenter customer is a United States Department of Defense contractor. The contractor needs to show that there is controlled user access to devices and to the modification of these devices. This will allow the contractor to provide proof of compliance and accountability. 

Which security feature of EMC ControlCenter should you discuss with the contractor to satisfy this requirement?

A. Data collection policy (DCP)
B. EMC Secure Remote Support (ESRS) Gateway
C. Role-based access control (RBAC)
D. Secure Socket Layer (SSL)

Answer: C

Question 8.
Your customer is experiencing write performance problems on a RAID 5 LUN used for backup todisk on its CX3 array. The LUN has been placed on ATA drives. The customer has determined that it would like the LUN on Fibre Channel drives instead. The customer has requested you provide the best option to alleviate this performance problem, keeping downtime to a minimum. 

What action would you recommend?

A. Create a new LUN on fibre drives and restore the data from tape to the new LUN.
B. Implement a newer array and use MirrorView to migrate the data.
C. Use Dynamic Virtual LUN functionality to move the LUN from ATA to fibre drives.
D. Use SnapView to make a clone of the LUN on fibre drives and assign the LUN to the 
    appropriate storage group.

Answer: C

Question 9.
A customer has a CX3-80 for Exchange and a critical OLTP database application. Over the last month, during monthly batch processing, users complain of slow response times. 

Which solution will you recommend to solve this issue?

A. Access Logix
B. Performance Manager
C. Navisphere Quality of Service Manager
D. StorageScope

Answer: C

Question 10.
For reporting purposes, which source provides data for the ETL process to populate the StorageScope repository?

A. EMC ControlCenter Repository
B. Host Agents
C. Master Agents
D. Store

Answer: A


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for HP0-A02 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "HP0-A02" Exam

HP-UX 11i v3 Advanced System Administration

 Question 1.
What are the benefits of IPQoS? (Select two.)

A. policy-based bandwidth provisioning
B. automatic configuration of IP interfaces
C. prioritize only inbound network bandwidth
D. prioritize only outbound network bandwidth
E. prioritize both outbound and inbound network bandwidth

Answer: A, D

Question 2.
Using drag and drop, match each record type with its correct definition.
 

Answer:
 

Question 3.
What is the first step when creating an NIS Master server?

A. nisinit -a
B. update all ASCII source files
C. /sbin/init.d/ypinit start
D. /sbin/init.d/nis.server start

Answer: B

Question 4.
Which feature allows concurrent access of NFS and CIFS clients on a file without corrupting it?

A. NFS v4
B. Unified File Cache
C. Memory-Mapped Access
D. CIFS File System Module (CFSM)

Answer: D

Question 5.
Which program initially starts rpcbind at boot?

A. /sbin/init.d/net
B. /sbin/init.d/named
C. /sbin/init.d/nfs.core
D. /sbin/init.d/rpcbind

Answer: C

Question 6.
Which feature allows the LDAP-UX client to retrieve user information from LDAP Directory Servers that do not support the posixAccount objectclass (RFC2307)?

A. SASL
B. attribute mapping
C. configuration profile
D. service search descriptors

Answer: B

Question 7.
What is the configuration file for the HP CIFS Server product?

A. /etc/opt/samba/smb.conf
B. /etc/opt/samba/cifs.conf
C. /etc/opt/samba/swat.conf
D. /etc/opt/samba/samba.conf

Answer: A

Question 8.
When a connection is established with inetd for a service, inetd runs the appropriate server specified in the /etc/inetd.conf file and waits for other connections. 

Which HP-UX application can be used in addition to inetd to verify whether a host or network can execute a service provided in inetd.conf?

A. IPsec
B. IPfilter
C. TCP wrappers
D. Security Advisor

Answer: C

Question 9.
Which command prints out the network routing table?

A. netstat
B. nwmgr
C. ifconfig
D. lanscan
E. lanadmin

Answer: A

Question 10.
Which command uses NTP to keep the local system clock in sync with other nodes on the network?

A. /usr/sbin/ntpsync
B. /usr/sbin/ntpdate
C. /usr/sbin/ntpscan
D. /usr/sbin/ntpd.conf

Answer: B



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for HP0-K02 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "HP0-K02" Exam

Implementing HP BladeSystem

 Question 1.
Which function does the Onboard Administrator perform in the BladeSystem c-Class? (Select two.)

A. configures and troubleshoots the server blade
B. manages connections to the interconnect modules
C. activates Remote Deployment Pack (RDP) when an in-service server fails
D. automates the process of deploying server operating systems and software
E. drives all management features through the Inter-Integrated Circuit (I2C) and Intelligent
Chassis Management Bus (ICMB) interfaces

Answer: B, E

Question 2.
Which options properly power down a c-Class blade server? (Select two.)

A. Use the virtual power button selection through iLO2.
B. Remove the c-Class blade server from the enclosure.
C. Use the virtual power button selection through RILOE II.
D. Switch off the power supplies on the back of the c7000 enclosure.
E. Press and hold the Power On/Standby button for more than 4 seconds.

Answer: A, E

Question 3.
What happens if you install extra fans in bays of a c7000 BladeSystem enclosure in such a way that they do not meet the next higher fan rule?

A. The enclosure will shut down.
B. The new fans will spin up and run at full speed.
C. The red LED will start blinking on the new fans.
D. The new fans will be marked with location errors.

Answer: D

Question 4.
Which LED indicator shows a fan failure?

A. solid blue
B. solid red
C. solid green
D. solid amber

Answer: D

Question 5.
What is the correct way of removing an active cool fan from a c-Class enclosure?

A. Lift the handle upwards and pull the fan from the enclosure.
B. Turn the handle on the fan counterclockwise and remove the fan.
C. Remove the four screws securing the fan and lift it out of the enclosure.
D. Remove the power connector from the fan and lift the fan out of the chassis.

Answer: B

Question 6.
Which port on a BladeSystem c-Class enclosure serves as a service port for temporary connection to a PC?

A. USB port
B. serial port
C. enclosure link-up port
D. enclosure link-down port

Answer: C

Question 7.
Exhibit:
 

You want to enable direct FC SAN connectivity on a c7000 enclosure. 

Where must you install the primary fabric switch?

A. Position 6
B. Position 18
C. Position 21
D. Position 22

Answer: C

Question 8.
Which features are available in Instant Support Enterprise Edition (ISEE) Advanced? (Select three.)

A. monthly OS update and patch downloads
B. real-time hardware event monitoring and automated notification to the HP 3rd level support
C. event management and fault detection to enhance Support Point of Presence (SPOP) 
    availability
D. comprehensive enterprise view of open incidents, history, installed clients, client status, and 
    contact information
E. convenient central point of administration through an HP owned and maintained Support Point 
    of Presence (SPOP) server installed at the customer site

Answer: C, D, E

Question 9.
Which HP service offering provides a two-hour response time for software issues and a four-hour response time for hardware issue resolution?

A. Proactive 24
B. HP Support Plus
C. HP Support Plus 24
D. Software Plus Support Service

Answer: A

Question 10.
What should a customer do before calling for service during the warranty period?

A. Install the ISEE software to automatically log the event.
B. Order a Care Pack online to have service on the same day.
C. Download the maintenance and service guide for the server.
D. Run diagnostics and install the latest firmware, drivers and patches.

Answer: D



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for HP0-M16 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "HP0-M16" Exam

HP QuickTest Professional 9.2 Software

 Question 1.
When a procedure is created in the Function Library editor, what is the extension on the file?

A. .INI
B. .TXT
C. .QFL
D. .VBS

Answer: C

Question 2.
What are the categories in the Step Generator?

A. Object, Operation, Value
B. Library, Built-in, Local Script
C. Operation, Arguments, Return Value
D. Test Objects, Utility Objects, Functions

Answer: D

Question 3.
In Test Settings ->Run the Data Table iteration options are for which data sheet?

A. Local
B. Global
C. Run-time Data Table
D. Design-time Data Table

Answer: B

Question 4.
What can you use to handle unpredictable testing exceptions?

A. A Do Loop
B. Recovery Scenario
C. IFHEN statement
D. Selectase statement

Answer: B

Question 5.
In which command can you associate a function library to a test?

A. Run Options
B. Test Settings
C. View Options
D. Function Definition Generator

Answer: B

Question 6.
Where do you set the action iterations for a specified action?

A. Action Settings
B. Action Properties
C. Action Run Settings
D. Action Call Properties

Answer: D

Question 7.
Where do you mark an action as reusable?

A. Action Settings
B. Action Properties
C. Action Run Settings
D. Action Call Properties

Answer: B

Question 8.
After running a test that contains both input and output parameters, where can the results of an output parameter be found?

A. Local DataSheet
B. Global DataSheet
C. Run-time Data Table
D. Design-time Data Table

Answer: C

Question 9.
If you have a Virtual Object Collection stored on your machine, and you don't want to use it, what must you do?

A. Disable Virtual Objects in Test Settings
B. Remove the Collection from your machine
C. Disable Virtual Objects in General Options
D. Remove the Collections from the Resources list

Answer: C

Question 10.
Which method for the DataTable utility object will allow you to retrieve information from the Data Table during a test run?

A. Value
B. Import
C. GetCell
D. GetValue

Answer: A



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for HP0-P17 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "HP0-P17" Exam

HP-UX 11i v3 Security Administration

 Question 1.
After running /usr/sbin/pwck, the following output is displayed:
smbnull:*:101:101::/home/smbnull:/sbin/sh
Login directory not found

What should you do to tighten the security?

A. Nothing - it is a valid system user ID.
B. Nothing - it is used by CIFS/Samba to represent "nobody" with a positive UID.
C. Edit the /etc/passwd entry to specify a dummy login directory and a false login shell.
D. Delete it from /etc/passwd. Opensource Samba installs it by default and it is not required on 
    HP-UX.

Answer: C

Question 2.
Which chatr syntax enables buffer overflow protection on a per-binary basis?

A. chatr +b enable 
B. chatr -es enable 
C. chatr +es enable 
D. chatr +bo enable 
E. chatr +es default 

Answer: C

Question 3.
What is the effect of the coreadm -e global-setid command?

A. edits the core dump file
B. reads and interprets the core dump file
C. enables the kernel for system crash dumps
D. enables setuid/setgid core dumps system wide
E. causes all running setuid programs to generate a core file

Answer: D

Question 4.
Identify ways HP Process Resource Manager (PRM) can protect a system against poorly designed applications. (Select three.)

A. PRM can limit the amount of memory applications may consume.
B. PRM can limit the amount of swap space applications may consume.
C. PRM can limit the amount of disk bandwidth applications may consume.
D. PRM can limit the amount of CPU resources applications may consume.
E. PRM can limit the amount of network bandwidth applications may consume.
F. PRM can limit the number of inbound network connections to configured applications.

Answer: A, C, D

Question 5.
What is a limitation of HP Process Resource Manager (PRM) as it applies to Denial of Service (DoS) attacks?

A. Processes must be grouped before they can be managed.
B. PRM does not perform memory capping; only entitlement and selection.
C. PRM only applies to time-shared processes; real-time processes are not affected.
D. PRM requires a separate configuration file for time-shared and real-time processes.

Answer: C

Question 6.
After running kctune executable_stack=2, what happens if MyProg executes code from the stack?

A. MyProg continues running without incident.
B. MyProg is killed before a single instruction can be executed.
C. MyProg continues, but logs a warning to /var/adm/syslog/syslog.log.
D. MyProg continues, but a warning message is logged to the kernel message buffer.

Answer: D

Question 7.
You used the dmesg command to display the warning shown in the exhibit.
 

Which kernel parameter setting makes this warning message appear?

A. kill_overflow is set to 1
B. exc_stack_code is set to 0
C. buffer_overflow is set to 1
D. executable_stack is set to 0

Answer: D

Question 8.
Which benefits does chroot provide to an application from a security perspective? (Select three.)

A. forces an application to start in a specified directory
B. allows the users to do a cd above the specified directory
C. prevents an application from starting in a specified directory
D. prevents the users from doing a cd above the specified directory
E. allows the users of the application access to the directory and the directories below it
F. prevents the users of the application access to the directory and the directories below it

Answer: A, D, E

Question 9.
Which commands configure an application to operate within a secure compartment? (Select two.)

A. privrun
B. privedit
C. setrules
D. cmdprivadm
E. setfilexsec

Answer: D, E

Question 10.
Some open source software tools use the /usr/local/sbin and /usr/local/src directories. 

What should you do with the /usr/local directory to maintain a secure system?

A. Verify that /usr/local and its subdirectories are not world writable.
B. Remove /usr/local/bin and /usr/local/sbin from the user's PATH variable.
C. Set permissions on /usr/local and its subdirectories to 047 so all users have access.
D. Use the swlist -l file | grep /usr/local command to see all files installed in those directories.

Answer: A



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for JN0-342 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "JN0-342" Exam

ER Associate (JNCIA-ER)

 Question 1.
Which multicast address does RIPv2 use for route updates by default?

A. 224.0.0.2
B. 224.0.0.5
C. 224.0.0.9
D. 255.255.255.255

Answer: C

Question 2.
What are three methods for managing a Juniper Enterprise Router? (Choose three.)

A. CLI
B. SDX
C. SAP
D. J-Web
E. J-Config

Answer: A, B, D

Question 3.
Which IGP should you use to achieve scalability in a large enterprise network using Juniper enterprise routers?

A. RIP
B. BGP
C. OSPF
D. EIGRP

Answer: C

Question 4.
Which configuration statement allows local non-root users access to the router only when the RADIUS server is unreachable?

A. [edit]
system {
authentication-order radius;
}
B. [edit]
system {
authentication-order [ radius password ];
}
C. [edit]
system {
authentication-order [ radius if-authenticated ];
}
D. [edit]
system {
authentication-order [ radius local ];
}

Answer: A

Question 5.
Which two statements about the Adaptive Services PIC are true? (Choose two.)

A. The Adaptive Services PIC supports the Layer 3 service package by default.
B. The Adaptive Services PIC is required when using the secure shell to access an M-series 
    router.
C. The Adaptive Services PIC can be configured for the Layer 2 and Layer 3 service packages 
    simultaneously.
D. The Adaptive Services PIC can be configured for either the Layer 2 or the Layer 3 service 
    package but not both at the same time.

Answer: A, D

Question 6.
What are two benefits of MLPPP? (Choose two.)

A. Cost-efficient solution when incrementing bandwidth.
B. Provides for fail over when the primary link goes down.
C. Evenly distributes traffic over participating member links.
D. Guarantees that the link will remain up during failure scenarios.

Answer: A, C

Question 7.
Which major J-Web menu should you use to upgrade the JUNOS software on the router?

A. Monitor
B. Manage
C. Diagnose
D. Configuration

Answer: B

Question 8.
How are multiple policies evaluated within the JUNOS software?

A. alphabetically
B. as an ordered list
C. in a round robin manner
D. numerically from lowest to highest

Answer: B

Question 9.
Which statement is true about accessing a Juniper enterprise router using a Web browser?

A. J-series routers are accessible by default.
B. M7i and M10i routers are accessible by default.
C. You need to install a license before accessing a J-series router.
D. You need to enable the HTTP service on M7i, M10i, and J-series routers before accessing 
    them.

Answer: A

Question 10.
What are two ways to create a rescue configuration on a J-series router? (Choose two.)

A. Use the J-Web System > Rescue menu.
B. Use the J-Web Configuration > Rescue menu.
C. Issue the configure rescue save command.
D. Issue the request system configuration rescue save command.

Answer: B, D



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 642-523 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "642-523" Exam

Securing Networks with PIX and ASA

 Question 1.
Which three of these are Cisco ASA syslog message fields? (Choose three.)

A. syslog community string
B. message.text
C. triggering packet copy
D. logging device ip
E. default ASA gateway
F. logging level

Answer: B, D, F

Question 2.
Exhibit:
 

You work as a network technician at ITCertKeys .com. Please study the exhibit carefully.

What does the inspect http HTTP_TRAFFIC command do in this policy map?

A. It adds HTTP traffic inspection to the OUTSIDE_POLICY policy map
B. It adds HTTP traffic limits to the OUTSIDE_POLICY policy map
C. It adds HTTP traffic inspection on TCP port 8080 to the OUTSIDE_POLICY policy map
D. It adds HTTP traffic inspection to the inspection-default global class map

Answer: A

Question 3.
An Administrator wants to protect a DMZ web server from SYN Flood attacks. 

Which three of these commands, used individually would allow the administrator to place limits on the number of embryonic connections? (choose three.)

A. http redirect
B. nat
C. http-proxy
D. static
E. set connection
F. access-list

Answer: B, D, E

Question 4.
Which three of these are Cisco ASA syslog message fields? (Choose three.)

A. triggering packet copy
B. message.text
C. syslog community string
D. logging level
E. default ASA gateway
F. logging device ip

Answer: B, D, F

Question 5.

Exhibit:


You work as a network technician at ITCertKeys .com. Please study the exhibit carefully. An administrator wants to permanently map host addresses on the DMZ subnet to the same host addresses, but a different subnet on the outside interface. 

Which command or commands should the administrator use to accomplish this?
 
A. access-list server_map permit tcp any 192.168.1.0.0 255.255.255.0 nat(outside) 10 access-list 
    server_map global (dmz) 10 172.16.1.9-10 netmask 255.255.255.0
B. static (dmz,outside) 192.168.10.0 172.16.1.0 netmask 255.255.255.0
C. nat (dmz) 1 172.16.1.0 netmask 255.255.255.0 global (outside) 1 192.168.10.9-10 netmask 
    255.255.255.0
D. NAT (dmz) 0 172.16.1.0 netmask 255.255.255.0

Answer: C

Question 6.

Exhibit:
 

You work as a network technician at ITCertKeys .com. Please study the exhibit carefully. 

This adaptive security appliance is configured for which two types of failover? (Choose two.)

A. Stateful Failover
B. LAN-Based Failover
C. Active/Standby Failover
D. Active/Active failover
E. Context/Group failover
F. Cable-based failover

Answer: B, D

Question 7.
Which these commands displays the status of the CSC SSM on the Cisco ASA?

A. show module 1 CSC details
B. show hw 1 details
C. show module 1 details
D. show interface GigabitEthernet 1/0

Answer: C

Question 8.
Which command both verifies that NAT is working properly and displays active NAT translations?

A. show nat translation
B. show running-confugration nat
C. show ip nat all
D. show xlate

Answer: D

Question 9.
The Cisco VPN Client supports which three of these tunneling protocols and methods? (Choose three.)

A. AH
B. LZS
C. IPSec over TCP
D. IPSec over UDP
E. SCEP
F. ESP

Answer: C, D, F

Question 10.
What does the nat 0 command do?

A. The nat 0 command, followed by an access list, specifies the addresses that are not to be 
    translated
B. The nat 0 command, followed by a range of IP Addresses, specifies the addresses that are to 
    be translated using network address translations
C. The nat 0 command, followed by a range of IP Addresses, specifies the addresses that are to 
    be translated when used for IPSec
D. The nat 0 command, followed by an access list, specifies the addresses that are to be used in 
    translations only once

Answer: A


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 642-591 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "642-591" Exam

Implementing Cisco NAC Appliance

 Question 1.
The NAS is configured to autogenerate an IP address pool of 30 subnets with a netmask of /30, beginning at address 192.166.10.0. 

Which IP address is leased to the end-user host on the second subnet?

A. 192.166.10.4
B. 192.166.10.5
C. 192.166.10.6
D. 192.166.10.7

Answer: C

Question 2.
Which derault administrator group has delete permissions?

A. admin
B. help-desk
C. add-edit
D. full-control

Answer: D

Question 3.
What is the result when the condition statement in a Cisco NAA check for required software evaluates to false on a client machine?

A. The required software is automatically downloaded to the user device.
B. The required software is made available after the user is quarantined.
C. The user is put in the unauthenticated role and the software is considered missing.
D. The user is placed in the temporary role and the software is made available.

Answer: B

Question 4.
Which three components comprise a Cisco NAC Appliance solution? (Choose three.)

A. a NAC-enabled Cisco router
B. a Linux server for in-band or out-of-band network admission control
C. a Linux server for centralized management of network admission servers
D. a Cisco router to provide VPN services
E. a read-only client operating on an endpoint device
F. a NAC-enabled Cisco switch

Answer: B, C, E

Question 5.
Drag the default username from the left to the correct description on the right.
 

Answer:
 

Question 6.
Drag each feature of a Cisco NAC Appliance solution from the left to its correct benefit on the right.
 

Answer:
 

Question 7.
When configuring the Cisco NAM to implement Cisco NAA requirement checking on client machines, what is the next step after configuring checks and rules?

A. retrieve updates
B. require the use of the Cisco NAA
C. configure session timeout and traffic policies
D. map rules to requirement
E. configure requirements

Answer: E

Question 8.
When logging in to a Cisco NAC Appliance solution, an end user is prompted for a username, password, and provider.
 

What should be entered in the Provider drop-down field shown in the exhibit?

A. the authenticating NAS
B. the authorizing NAM
C. the name of the ISP
D. the external authenticating server

Answer: D

Question 9.
What are the two types of traffic policies that apply to user roles? (Choose two.)

A. IP-based
B. peer-based
C. host-based
D. manager-based
E. server-based
F. VLAN-based

Answer: A, C

Question 10.
After you implement a network scan and view the report, you notice that a plug-in did not access any of its dependent plug-ins. 

What did you forget to do?

A. enable the Dependent Plug-in check box on the General Tab form
B. configure dependent plug-in support when you mapped the Nessus scan check to the Nessus 
    plug-in rule
C. install dependent plug-ins when you updated the Cisco NAC Appliance plug-in library
D. load the dependent plug-ins for that plug-in in the Plug-in Updates form

Answer: D



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.