Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "1D0-410" Exam

Who is the really for

 

I am currently studying with the 'Official CIW Self-Study Suite' purchased from SmartCertify. I have checked out the Sybex self-study book endorsed by ProsoftTraining. It is approx 50 dollars, the SmartCertify is ALOT more. I have been developing web pages for over a year now. HTML401, CSS, JavaScript, VBScript, and ASP. I thought the CIW certification would be right up my alley..

Well, the CIW Foundations test is not just web development it is an INTERNETWORKING Webmaster certification... Are you Networthy has taken on a new meaning to me!

The Internet Fundamentals covers areas from how to set a security within the main browser types, to knowing the URLs for goverment agency websites, to project management.. and more.

The Web Authoring (which is my strong area) covers HTML 4.01 new specs to the old HTML 3.2 specs, it covers all the and the attibutes of each, and the book finishes off with explanations of DOM, XML.. etc.

The Networking Fundamentals (WHAT A WAKE UP CALL) if you want to just develop web pages and don't want to deal with networking.. THEN FORGET THIS CERTIFICATION. This will definitely filter out the "REAL" internet webmaster and the diddle daddlers.. You'll have to know everything from the OSI/RM, topologies, IEEE standards, RFC numbers, how IP addressing works, to even the different firewall topologies that can be implemented!

I am currently creating spreadsheets and documents for my personal studies that I will make available upon request. I have the CIW Master Designer and the CIW Master Administrator in my sights, so I'll have study material for them soon as well.



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 1Y0-614 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "1Y0-614" Exam

Citrix Access Suite 4.0: Design

 Question 1.
ITCertKeys.com has back-end databases that support HR+, MfgData+, and Outlook. If ITCertKeys.com decides to centralize the MfgData+ databases in New York, where should the Presentation Servers hosting the MfgData+ application be deployed?

A. The Presentation Servers hosting MfgData+ should be deployed in all locations.
B. The MfgData+ application should be deployed in Mexico City, Shanghai and Bangalore.
C. Servers hosting the MfgData+ application should be deployed in New York, Mexico City, 
    Shanghai and Bangalore.
D. Servers hosting MfgData+ should be deployed in New York.

Answer: B

Question 2.
ITCertKeys.com has recently deployed Active Directory on Windows 2003 and has asked for recommendations regarding OU structure, Terminal Services GPOs, and Terminal Services Licensing.

Why are only user-based Group Policies required?

A. This is determined by the location of the timeout settings.
B. User configuration Group Policies will satisfy the access requirements for the mission critical 
    applications.
C. Timeout settings must be applied to all user sessions to meet ITCertKeys.com's security 
    requirements.
D. Policies for Presentation Server can only be applied on the user level.

Answer: A

Question 3.
ITCertKeys.com currently has one Secure Gateway server deployed for access by remote users and has had no issues related to capacity. Secure access is high priority, so they have decided to upgrade to Access Gateway Advanced Edition. Based on the decision to implement two Access Gateway appliances in each data center that houses a Presentation Server zone and remove Secure Gateway from the implementation.

Why should Web Interface be deployed within the internal network?

A. By placing the Web Interface servers on the internal network port 443 does not have to be 
    opened.
B. This prevents internal users from having to traverse the DMZ to access Web Interface through 
    port 443 or port 80. 
C. By placing the Web Interface servers on the internal network, external access can be limited to 
    the Access Gateway appliance through port 443.
D. This is the only way to avoid opening port 80 on the internal firewall.

Answer: A

Question 4.
ITCertKeys.com has decided that remote users will access the environment by means of Access Gateway 4.2 with Advanced Access Control. In addition, they have advised you that they would like to implement as many client types as possible to take advantage of seamless windows, as well as accessibility by means of Program Neighborhood Agent. In regard to the Presentation Server Client deployment.

Why is downloading from the ITCertKeys.com intranet site the best option?

A. All clients can be downloaded automatically.
B. All clients can be downloaded. Clients for Windows and Java download automatically.
C. Users have access to this source and can get clients.
D. Users can get the most up-to-date clients independently.

Answer: A

Question 5.
ITCertKeys.com plans to allow some business partners, over whom they have no jurisdiction, access confidential published content that is specific to each vendor. 

Which features of Access Gateway should they recommend to best maximize security?

A. To maximize security split tunneling, two-factor authentication, HTML Preview, and end-point 
    analysis features should be configured for the Access Gateway. Active Directory authentication 
    should be used, making it necessary that user account be created.
B. To maximize security split tunneling, two-factor authentication, HTML Preview, and end-point 
    analysis features should be configured for the Access Gateway. Users will access by means of 
    Active Directory guest accounts.
C. To maximize security split tunneling, SSL Client certificate, HTML Preview, and end-point 
    analysis should be configured for the Access Gateway. Active Directory authentication should  
   be used, making it necessary that user account be created.
D. To maximize security split tunneling, SSL Client certificate, HTML Preview, and end-point 
    analysis should be configured for the Access Gateway. Users will access by means of Active 
    Directory guest accounts.

Answer: C

Question 6.
ITCertKeys.com plans to allow some customers, over whom they have jurisdiction, access to confidential published content that is specific to each vendor. 

Which features of Access Gateway Advanced Edition should you recommend that best maximize the overall security for ITCertKeys.com's environment in a cost-effective manner?

A. Split tunneling, SSL client certificate, and endpoint analysis. Active Directory authentication 
    should be used, necessitating the need for the creation of user accounts.
B. Split tunneling, SSL client certificate, and endpoint analysis. Users will access by means of 
    Active Directory guest accounts.
C. Split tunneling, two-factor authentication, and endpoint analysis. Users will access by means of 
    Active Directory guest accounts.
D. Split tunneling, two-factor authentication, and endpoint analysis. Active Directory 
    authentication should be used, necessitating the need for the creation of user accounts.

Answer: A

Question 7.
Which type of Terminal Services profile should be deployed?

A. Mandatory profiles with folder redirection
B. Mandatory profiles
C. Roaming profiles with folder redirection
D. Roaming profiles

Answer: C

Question 8.
ITCertKeys.com plans to implement Presentation Server for users in Shanghai.

Why should a static port be defined?

A. To avoid the unprecdictability of a dynamic port, a static port should be defined because it is 
    more secure.
B. By defining a static port, system resources can be conserved.
C. There is no other way to establish communication over firewalls other than defining a static 
    port.
D. A static port will allow for License Server communications to be more secure, this, this is 
    optimal.

Answer: D

Question 9.
How should ITCertKeys.com deploy required Citrix hot fixes?

A. All Citrix hot fixes should be deployed by means of the Access Suite Console. Testing should 
    be done.
B. Emergency hot fixes should be deployed through manual installation with limited 
    documentation. All other hot fixes should be deployed by means if Installation Manger with full 
    documentation.
C. All Citrix hot fixes should be deployed by means of Resource Manager. Testing should be 
    done.
D. All required hot fixes should be deployed by means of Installation Manager. Testing should be 
    done.

Answer: D

Question 10.
In regard to ITCertKeys.com's Advanced Access Control deployment. 

Why should an Advanced Access Control web server be placed at this customer's location?

A. Adding an Advanced Access Control deployment enables the customer to incorporate their 
    own security standards.
B. Adding an Advanced Access Control deployment expedites administrative changes because 
    approval chain is closer to the customer.
C. Adding an Advanced Access Control web server will provide better load balancing across 
    existing hardware.
D. Adding an Advanced Access Control deployment makes administration more cost-effective for 
    the customer.

Answer: A



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 1Z0-221 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "1Z0-221" Exam

Oracle 11i Inventory Management Fundamentals

 Question 1.
ITCertKeys.com is a semiconductor discrete manufacturing organization. It has its own manufacturing and distribution centers located globally.
It has these operating Units:
US - USA operating unit
CAN - Canadian operating unit
UK - UK operating unit
MX - Mexican operating unit
IND - India operating unit
SPA - Spain operating unit
FRA - France operating unit
NL - Netherlands operating Unit
GER - Germany operating unit.
These are the inventory organizations that exist in each operating unit:
Inventory Org - Operating unit
--------------------------------------------
CK (Master Org) - US
US1 (Child Org) - US
US2 (Child Org) - US
CA1 (Child Org) - CAN
MX1 (Child Org) - MX
IN1 (Child Org) - IND
SP1 (Child Org) - SPA
FR1 (Child Org) - FRA
NL1 (Child Org) - NL
GE1 (Child Org) - GER

Which three statements are true? (Choose three.)

A. Master organization CK cannot be shared across operating units.
B. All inventory organizations do not need to be in the same operating unit to assign items.
C. Items defined in CK organization can be assigned to US1,US2, NL1 and MX1 inventory 
    organizations.
D. Organization items in the inventory responsibility assigned to FRA operating unit can be 
    restricted, to not view the organization items assigned to US2 inventory organization.
E. You can define an item in IN1 inventory organization and assign it to GE1 inventory 
    organization.
F. Items cannot be assigned to inventory organizations across operating units.

Answer: B, C, D

Question 2.
You specified cycle count measurement error values when you defined your item at the master item or organization item level. You also specified a cycle count quantity variance approval tolerance at the cycle count item level. If the actual cycle count quantity for your item differs from the system on-hand quantity by less than the specified measurement error, Oracle Inventory _____.(Select one answer)

A. does not consider cycle count approval tolerance but makes a cycle count adjustment
B. applies the measurement error to the cycle count approval tolerance before the approval 
    decision and makes a cycle count adjustment when approved
C. does not consider cycle count approval tolerance and does not make a cycle count adjustment
D. applies the measurement error to the cycle count approval tolerance before the approval 
    decision and does not make a cycle count adjustment when approved

Answer: B

Question 3.
Which three statements are true about defining an item using a template? (Assume that there are no Interdependent Attributes.) (Choose three.)

A. A template can be applied only at the master organization level.
B. A template applied to a master item, which has already been assigned to a child organization, 
    can still update the organization-controlled item.
C. Modifying an item template will automatically update the items that were previously defined 
    using that template.
D. A template can be applied at the master or child organization levels.
E. You can apply multiple templates to an item.
F. Template application is additive. If you apply a second template to an item, the item will retain 
    the values of all the attributes that were not enabled by the second template.
G. Template application is exclusive. If you apply a second template to an item, the item will not 
    retain any values of the prior template.

Answer: D, E, F

Question 4.
You are setting up a requisition move order for which approval is required. At the organization level, you have defined the following: 
However, the approval process is not being enabled for the organization item. 

What is a possible reason?

A. The subinventory source type has not been set to pull level.
B. The Move Order Timeout Action has been set to a value greater than zero.
C. A planner has not been assigned to the organization item.
D. The Move Order Timeout Period has been set to a value greater than zero.

Answer: C

Question 5.
From which Oracle applications can 'in-transit' receipts be received into an organization?

A. Purchasing and Work in Process
B. Purchasing and Order Management
C. Purchasing
D. Purchasing, Inventory, and Work in Process

Answer: C

Question 6.
A customer who distributes widgets has a warehouse with locations where material is stored. In the customer's current system, users may receive material on a purchase order and indicate the location where it should go, but when the material is physically sent to the location, they may discover that the location is full. 

What is the best way to solve the problem?

A. Set up the locations as locators, and use the capacity tab of the locator definition form to enter 
    the maximum number of items that can be stored in the locator.
B. Set up each location as a subinventory and select the nettable flag.
C. Set up each location as a subinventory and select the Allow Reservation flag.
D. Set up each location as an organization and create locators in the organization.

Answer: A

Question 7.
You specified cycle count measurement error values when you defined your item at the master item or organization item level. You also specified a cycle count quantity variance approval tolerance at the cycle count item level. If the actual cycle count quantity for your item differs from the system on-hand quantity by less than the specified measurement error, Oracle Inventory _____.(Select one answer)

A. does not consider cycle count approval tolerance but makes a cycle count adjustment
B. applies the measurement error to the cycle count approval tolerance before the approval 
    decision and makes a cycle count adjustment when approved
C. applies the measurement error to the cycle count approval tolerance before the approval 
    decision and does not make a cycle count adjustment when approved
D. does not consider cycle count approval tolerance and does not make a cycle count adjustment

Answer: B

Question 8.
Which three are Oracle Inventory replenishment methods? (Choose three.)

A. MRP (Materials Requirement Planning)
B. Replenishment Counting
C. Safety Stock
D. Kanban
E. Min-max Planning

Answer: B, D, E

Question 9.
You are defining the staging subinventory for your sales order pick release rule. 

Which flag should be set on the subinventory setup for pick release to work?

A. The subinventory should have the Nettable flag selected.
B. The subinventory should have the Depreciable flag selected.
C. The subinventory should have the Reservable flag selected.
D. The subinventory should have the Pre-Processing Lead Time field populated.

Answer: C

Question 10.
ITCertKeys.com has portable bar code readers that are used to scan and read data about the amount of time charged on a resource that has been utilized on the manufacturing floor. This data about utilization is then processed in the Oracle Work in Process module by using a _____.

A. Material Transaction Manager
B. Cost Manager
C. Lot Move Transaction Manager
D. Concurrent Manager
E. Move Transaction Manager

Answer: C



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 642-642 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "642-642" Exam

Quality of Service (QOS)

 Question 1.
Which of the following markers can be set by Committed Access Rate (CAR)? (Choose all that apply.)

A. DSCP bits
B. QoS Group
C. ATM CLP bit
D. Frame Relay DE bit
E. IP precedence bits

Answer: A, B, E

Explanation:
 
Source: Cisco IP QoS Introduction, Page 64

Question 2.
What makes the DiffServ model more scalable than the IntServ model? (Choose all that apply.)

A. DiffServ makes use of per-aggregate QoS instead of per-flow QoS.
B. DiffServ makes use of hop-by-hop signaling which allows DiffServ to scale to a larger number 
    of application flows.
C. DiffServ is capable of implementing admission control either locally on the routers or be 
    offloaded to a central policy server using the COPS protocol.
D. DiffServ routers are not compelled to track the state information for each individual flow.

Answer: A, D

Incorrect:
B. No hop-by-hop signaling uses per-hop behavior
C. This is a feature of both models Sources: Cisco IP QoS Introduction
http://www.cisco.com/en/US/tech/ ITK5 43/ ITK7 66/technologies_white_paper09186a00800a3e2f.shtml

Question 3.
The newly appointed ITCertKeys trainee technician wants to know what the benefits of
using traffic shaping to implement network rate limiting is.What will your reply be?
(Choose all that apply.)

A. Traffic shaping is an effective tool for rate-limiting VoIP traffic.
B. It will not increase packet loss.
C. It will not add to packet transit delays.
D. Traffic shaping can interact with congestion mechanisms embedded in Frame Relay.
E. Traffic shaping can be used on inbound and outbound traffic on a router.

Answer: B, D

Incorrect:
A. Shaping adds variable delay to traffic, possibly causing jitter
C. A shaper typically delays excess traffic using a buffer
E. This is a feature of policing

Explanation:
 
Source: Cisco IP QoS Traffic Shaping and Policing

Question 4.
Study the Exhibit below carefully:
Router# show interfaces hssi 0/0/0 rate-limit
Hssi0/0/0 45Mbps to R1
Input
matches: all traffic
params: 20000000 bps, 24000 limit, 24000 extended limit
conformed 8 packets, 428 bytes; action: transmit
exceed 0 packets, 0 bytes; action: drop
last packet: 8680ms ago, current burst: 0 bytes
last cleared 00:03:59 ago, conformed 0 bps, exceed 0 bps
Output
matches: all traffic
params: 20000000 bps, 24000 limit, 24000 extended limit
conformed 0 packets, 0 bytes; action: transmit
exceed 0 packets, 0 bytes; action; drop
last packet: 8680ms ago, current burst: 0 bytes
last cleared 00:03:59 ago, conformed 0 bps, exceed 0 bps
According to the exhibit, the router has been configured with Committed Access Rate (CAR) to rate limit traffic.

What data rate has the traffic been limited to?

A. 192 Kbps
B. 2400 Kbps
C. 4,5 Mbps
D. 20 Mbps
E. 40 Mbps

Answer: D

Explanation:
 

In the configuration example, CAR is applied on the input and output of a customer interface on the provider edge router. Traffic is policed to 256 Kbps on input and output, with some bursting allowed. All exceeding traffic is dropped at the provider edge. The result of the configuration is that traffic to and from the customer is limited to the average rate of approximately 256kbps (256000 in the configuration) with sustained bursts of approximately 32kbps (4kBps or 4000 in the configuration). Initial bursts at line speed can last up to 3 seconds because the token bucket can hold up to 96000 tokens (bytes) which equals 768000 bits (3 x 256000 bits).
Source: Cisco IP QoS Traffic Shaping and Policing, Page 4-91

Question 5:
The newly appointed ITCertKeys trainee technician wants to know which type of software queuing mechanism is Frame Relay Traffic Shaping implemented with on the physical interface. 

What will your reply be?

A. Priority Queuing (PQ)
B. Custom Queuing (CQ)
C. FIFO
D. Weighted Fair Queuing (WFQ)
E. IP Real Time Transport Protocol (RTP) Priority

Answer: D

Explanation:
 
Works on any (sub) interface type  
Shapes traffic on that (sub)interface basis
Can use any physical interface queuing (FIFO, PQ, CQ or WFQ)
Only uses WFQ as the shaping queue (that is, on the input of the shaper)
In contrast, Frame Relay Traffic Shaping:
Works only on Frame Relay (sub) interfaces
Shapes traffic inside individual FR Virtual Circuits
Only permits WFQ as the physical interface queuing method
Can use any queuing method as the shaping queue (that is, on the input of the shaper)
Source: Cisco IP QoS Traffic Shaping and Policing, Page 4-47

Question 6.
Why is it beneficial to make use of Enhanced LMI (ELMI) on Cisco networks?

A. ELMI is responsible for providing virtual provisioning tools at the edge of the Frame Relay 
    network.
B. ELMI permits routers to dynamically download QoS information from Cisco switches for use in 
    traffic shaping or for congestion management purposes.
C. ELMI provides the router the ability to use additional QoS tools including rate limiting with CAR 
    and the Modular QoS Command Line Interface (MQC).
D. ELMI allows the router to deliver packets at the line rate of the Frame Relay interface, 
    regardless of the condition of the Frame Relay network.

Answer: B

Explanation:
 

Source: Cisco IP QoS Traffic Shaping and Policing, Page 4-58

Question 7. 
Which of the following statements are true when you compare DSCP and IP Precedence to each other? (Choose all that apply.)

A. DSCP is backwards compatible with IP Precedence.
B. DSCP cannot be easily mapped into QoS because of its expanded classification options.
C. DSCP is more granular the IP Precedence, since more marking combinations are available.
D. DSCP appears stubby when compared IP Precedence, since devices make use of DSCP as 
    defined in RFC exclusively.
E. DSCP is 6 bits long and IP Precedence is 3 bits long.
F. DSCP is more restrictive than IP Precedence, since devices are only allowed to use DSCP as 
    defined in RFCs.

Answer: A, C, E

Explanation:
A)DSCP is backward compatible with IP Precedence (Class Selector Code point, RFC 1812) but not with the ToS byte definition from RFC 791 ("DTR" bits) Reference: Introduction to IP QoS (Course) p.45

Question 8.
Which MQC command would you use to perform marking properly?

A. precedence 5
B. ip precedence 5
C. set ip precedence 5
D. set ip mark precedence 5
E. mark ip precedence 5

Answer: C

Explanation:
IP precedence is encoded into the three high-order bits of the ToS field in the IP header. It supports eight classes of which two are reserved and should not be used for user-defined classes (IP precedence 6 and 7). IP precedence 0 is the default value and is usually used for the best-effort class. The set ip precedence command marks packets of a class with the specified precedence value. 

Reference: 
Introduction to IP QoS (Course) p.9-104

Question 9.
Which of the following statements aptly describes a network well designed for QoS?

A. Packets are classified at each router, based on as many detail as possible, typically using 
    extended IP ACLs to match the packets for classification.
B. Packets are classified at each router, based on socket address only, typically using extended 
    IP ACLs to match the packets for classification.
C. Packets are classified and marked, close to the edge of the network. The packets are treated 
    differently based on this marking at the routers in the middle of the network.
D. Packets are classified based on different parameters, but close to the edge of the network. 
    The packets are automatically characterized based on flow at the routers.
E. Packets are classified based on socket address, at the router closest to the source of the 
    traffic. The packets are automatically characterized based on flow at the routers.

Answer: C

Explanation:
To achieve the same level of quality in both directions the packets going to and coming from the customer network must first be classified and marked.
Classification and marking packets going to the customer network is a more difficult task because:
1) Classifying and marking must be performed on all edge routers.
2) Classifying and marking requires the identification of the customer network. Using PBR, CAR, CB-Policing or CB-Marking does not scale because it involves the use of access lists (this is especially difficult if customer networks are dynamically learned via BGP).

Reference: 
Introduction to IP QoS (Course) p.2-35

Question 10.
The newly appointed ITCertKeys trainee technician wants to know which bit in the ATM header can be marked by the Class Based Marker to extend IP QoS policy into an ATM network. 

What will your reply be?

A. DE
B. PTI
C. FECN
D. CLP
E. BECN

Answer: D

Explanation:
 

The ATM CLP Setting feature somewhat allows users to extend their IP QoS policies into an ATM network by setting the ATM CLP bit in ATM cells based on the IP Precedence value of the packets being sent. As congestion occurs in the ATM network, cells with the CLP bit set are more likely to be dropped, resulting in improved network performance for high priority traffic and applications. The set atm-clp command marks packets of a class with the ATM CLP bit as a part of an input or output policy.
Source: Cisco IP QoS Modular QoS CLI Service Policy, Page 9-110


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 642-825 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "642-825" Exam

Implementing Secure Converged Wide Area Networks

 Question 1.
A few small ITCertKeys locations use HFC cable to connect to the ITCertKeys WAN.

Which HFC cable network statement is true about the downstream data channel to the customer and the upstream data channel to the service provider?

A. The upstream data path is assigned a channel in a higher frequency range than the 
    downstream path has.
B. The downstream data path is assigned a 30 MHz channel and the upstream data path is 
    assigned a 1 MHz channel.
C. The downstream data path is assigned a fixed bandwidth channel and the upstream data path 
    uses a variable bandwidth channel.
D. Both upstream and downstream data paths are assigned in 6 MHz channels.
E. None of the above.

Answer: D

Explanation:
Hybrid fiber-coaxial (HFC): A mixed optical-coaxial network in which optical fiber replaces some or all of the traditional trunk portion of the cable network. The HFC architecture is the evolution of an initial cable system and signifies a network that incorporates both optical fiber along with coaxial cable to create a broadband network. By upgrading a cable plant to an HFC architecture, you can deploy a data network over an HFC system to offer high-speed Internet services and you can serve more subscribers. The cable network is segmented into smaller service areas in which fewer amplifiers are cascaded after each optical node-typically five or fewer. The tree-and-branch network architecture for HFC can be a fiber backbone, cable area network, superdistribution, fiber to the feeder, or a ring. 

Downstream: An RF signal transmission (TV channels, data) from source (headend) to the destination (subscribers). Downstream is also called a forward path.
Upstream: An RF signal transmission opposite to downstream-from subscribers to the headend. Upstream is also called a return or reverse path.
Delivering services over a cable network requires different RF frequencies-the outgoing frequencies are in the 50-to-860 MHz range, the incoming are in the 5-to-42 MHz range. To deliver data services over a cable network TV channels which usually operate at 6 MHz range for the downstream, and 6 MHz or less (for asymmetric cable connections) for upstream traffic from the corresponding frequency range are usually used.

Question 2.
Many small ITCertKeys branch offices use broadband cable for data connection access. 

Which three modulation signaling standards are used in broadband cable technology? (Select three)

A. S-Video
B. NTSC
C. SECAM
D. PAL
E. FEC
F. FDM
G. MLP

Answer: B, C, D

Explanation:
Broadband: Data transmission where multiple pieces of data are sent simultaneously to increase the effective rate of transmission. In cable systems, the term broadband refers to the frequency-division multiplexing (FDM) of many signals in a wide radio frequency (RF) bandwidth over an HFC network, and the capability to handle vast amounts of information. NTSC is a North American TV technical standard for analog TV systems. The standard was created in 1941 and is named after the National Television System Committee formed in 1940. The standard uses a 6-MHz modulated signal. PAL is a color encoding system used in broadcast television systems in most of Europe, Asia, Africa, Australia, Brazil, and Argentina, and uses a 6-MHz, 7-MHz, or 8-MHz modulated signal. The color difference signals an alternate phase at the horizontal line rate. SECAM is an analog color TV system used in France and certain Eastern European countries that uses an 8-MHz modulated signal.

Question 3.
Some of the smaller ITCertKeys locations use HFC cable to connect to the ITCertKeys WAN. 

Which two statements are true about broadband cable (HFC) systems? (Select two)

A. Cable modems operate at Layers 1, 2, and 3 of the OSI model.
B. Cable modems operate at Layers 1 and 2 of the OSI model.
C. A function of the cable modem termination system is to convert the digital data stream from the 
    end user host into a modulated RF signal for transmission onto the cable system.
D. Cable modems only operate at Layer 1 of the OSI model.
E. A function of the cable modem termination system (CMTS) is to convert the modulated signal 
    from the cable modem into a digital signal.

Answer: B, E

Explanation:
Hybrid fiber-coaxial (HFC): A mixed optical-coaxial network in which optical fiber replaces some or all of the traditional trunk portion of the cable network. The HFC architecture is the evolution of an initial cable system and signifies a network that incorporates both optical fiber along with coaxial cable to create a broadband network. By upgrading a cable plant to an HFC architecture, you can deploy a data network over an HFC system to offer high-speed Internet services and you can serve more subscribers. The cable network is segmented into smaller service areas in which fewer amplifiers are cascaded after each optical node-typically five or fewer. The tree-and-branch network architecture for HFC can be a fiber backbone, cable area network, superdistribution, fiber to the feeder, or a ring.

Question 4.
A ITCertKeys remote user is getting Internet access from the local cable provider. 

When an individual is connected to the Internet by way of a CATV cable service, what kind of traffic is considered upstream traffic?

A. Traffic going from the user's home traveling to the headend.
B. Broadcast traffic, including the cable TV signals.
C. Traffic between the headend and the TV signal.
D. Traffic between the headend and the supplier antenna.
E. Traffic from outside the local cable segment serving the user's home.
F. All of the above can be considered upstream

Answer: A

Explanation:
In the CATV space, the downstream channels in a cable plant (cable head-end to subscribers) is a point-to-multipoint channel. This does have very similar characteristics to transmitting over an Ethernet segment where one transmitter is being listened to by many receivers. The major difference is that base-band modulation has been replaced by a more densely modulated RF carrier with very sophisticated adaptive signal processing and forward error correction (FEC). In the upstream direction (subscriber cable modems transmitting towards the head-end) the environment is many transmitters and one receiver. This introduces the need for precise scheduling of packet transmissions to achieve high utilization and precise power control so as to not overdrive the receiver or other amplifier electronics in the cable system. Since the upstream direction is like a single receiver with many antennas, the channels are much more susceptible to interfering noise products. In the cable industry, we generally call this ingress noise. As ingress noise is an inherent part of CATV plants, the observable impact is an unfortunate rise in the average noise floor in the upstream channel. To overcome this noise jungle, upstream modulation is not as dense as in the downstream and we have to use more effective FEC as used in the downstream. 

Reference: 
http://www.cisco.com/warp/public/759/ipj_1-3/ipj_1-3_catv.html

Question 5.
A new cable modem was shipped to the home of a ITCertKeys user, where it is being installed for the first time. 

When a DOCSIS 1.1 compliant cable modem first initializes, (boots up) what does it do?

A. Establishes IP connectivity (DHCP).
B. Determines the time of day.
C. Requests a DOCSIS configuration file from a TFTP server.
D. Scan for a downstream channel and the establishment of timing synchronization with the 
    CMTS.
E. None of the above.

Answer: D

Explanation:
According to the DOCSIS (Data-over-Cable Service Interface Specifications) when you first power up a cable modem it starts scanning (starting at a low frequency) for a cable signal. When it 'hears' a cable modem stream it listens for a broadcast (from the service provider) which contains information (ie. frequency) needed to talk back with the head end. It then 'talks back' and if it communicates the right authentication information, it is allowed to proceed.

References: 
Page 225 of the CCNP Self-Study BCRAN (642-821) ISBN: 1-58720-084-8
http://www.cisco.com/en/US/products/hw/cable/ps2217/products_feature_guide_chapter09186a008019b57f.htm

Question 6.
You are building a small network at your home and you intend on connecting your cable modem to a Cisco router.

Which router interface would you connect the modem to?

A. Synchronous serial
B. Asynchronous serial
C. Ethernet
D. auxiliary
E. BRI

Answer: C

Explanation:
In certain environments where a non Cisco Cable Modem (CM) is used, and the CM is only capable of bridging, a Cisco router such as the Cisco 806 can be connected to the Cable Modem via the Ethernet interface. The routing can then be performed by the Cisco router behind the Cable Modem and the Client PC or Customer Premises Equipment (CPE) will be connected to the Cisco router. Network Address Translation (NAT) can  then be configured on the Cisco router.

When the Cisco router is connected behind the Cable Modem the first problem that might be encountered is not obtaining an IP address dynamically on the Cisco router's Ethernet interface. Most Internet Service Providers (ISPs) allow only one host or PC behind the Cable Modem. Some ISPs assign an IP address to the PC based on the host name. Therefore, if you have a Cisco router behind the Cable Modem, then the host name for the router configured using the hostname command should be the same host name given by the ISP.
Example:
 

Question 7.
When a cable modem is being provisioned to operate with a host system for Internet services, which two options must occur before Layer 1 and 2 connectivity can occur? (Choose two)

A. The cable modem must request an IP address and core configuration information from a 
    Dynamic Host Configuration Protocol (DHCP) server.
B. The cable modem powering up must scan and lock on the RF data channel in the downstream 
    path.
C. The modem must request a DOCSIS configuration file from a TFTP server.
D. The cable modem must register with the CMTS.
E. The modem must read specific maintenance messages in the downstream path.

Answer: B, E

Explanation:
According to the DOCSIS (Data-over-Cable Service Interface Specifications) when you first power up a cable modem it starts scanning (starting at a low frequency) for a cable signal. When it 'hears' a cable modem stream it listens for a broadcast (from the service provider) which contains information (ie. frequency) needed to talk back with the head end. It then 'talks back' and if it communicates the right authentication information, it is allowed to proceed. Once these steps are completed, layers 1 and 2 will be operational.

Question 8.
How is cable broadband technology able to transmit downstream and upstream data while at the same time delivering television content?

A. The cable operator uses the VHF hyperband to transmit and receive data signals.
B. The cable operator assigns any available spectrum to data, depending on how its own 
    television spectrum is being used.
C. The cable operator uses specific bandwidths for data signals specified by DOCSIS.
D. The cable operator places its data signals into clean areas where there is no interference from 
    noise or other signals.

Answer: C

Explanation:
Developed by CableLabs and approved by the ITU in March 1998, Data Over Cable Service Interface Specification (DOCSIS) defines interface standards for cable modems and supporting equipment. In a cable TV system, signals from the various channels are each given a 6-MHz slice of the cable's available bandwidth and then sent down the cable to your house. In some systems, coaxial cable is the only medium used for distributing signals.
 

When a cable company offers Internet access over the cable, Internet information can use the same cables because the cable modem system puts downstream data -- data sent from the Internet to an individual computer -- into a 6-MHz channel. On the cable, the data looks just like a TV channel. So Internet downstream data takes up the same amount of cable space as any single channel of programming. Upstream data -- information sent from an individual back to the Internet -- requires even less of the cable's bandwidth, just 2 MHz, since the assumption is that most people download far more information than they upload.

Question 9.
ITCertKeys operates a DSL network. What does the "dsl operating-mode auto" command configure on a Cisco router?

A. It configures a Cisco router to automatically detect the proper modulation method to use when 
    connecting an ATM interface.
B. It configures a Cisco router to automatically detect the proper DSL type (ADSL, IDSL, HDSL, 
    VDSL) to use when connecting an ATM interface.
C. It configures a Cisco router to automatically detect the proper encapsulation method to use 
    when connecting an ATM interface.
D. It configures a Cisco router to automatically detect the proper authentication method to use 
    when connecting an ATM interface.
E. None of the above

Answer: A

Explanation:
dsloperating-mode auto interface configuration command to specify that the router automatically detect the DSL modulation that the service provider is using and set the DSL modulation to match. An incompatible DSL modulation configuration can result in failure to establish a DSL connection to the DSLAM of the service provider
Example:
 

Question 10.
ITCertKeys is a DSL service provider using providing xDSL to its customers. 

Which statement about xDSL implementations is true?

A. All xDSL standards operate in lower frequencies than the POTS system and can therefore 
    coexist on the same media.
B. Other than providing higher data rates, HDSL is identical to ADSL.
C. The ADSL standard operates in higher frequencies than the POTS system and can therefore 
    coexist on the same media.
D. The HDSL standard operates in higher frequencies than the POTS system and can therefore 
    coexist on the same media.
E. All xDSL standards operate in higher frequencies than the POTS system and therefore can 
    coexist on the same media.
F. None of the above.

Answer: C

Explanation:
DSL is not a complete end-to-end solution, but rather a physical layer transmission technology similar to dial, cable, or wireless. DSL connections are deployed in the "last mile" of a local telephone network-the local loop. The connection is set up between a pair of modems on either end of a copper wire extending between the customer premises equipment (CPE) and the DSL access multiplexer (DSLAM). A DSLAM is the device located at the central office (CO) of the provider and concentrates connections from multiple DSL subscribers. The term xDSL covers a number of DSL variations, such as ADSL, high-data-rate DSL (HDSL), Rate Adaptive DSL (RADSL), symmetric DSL (SDSL), ISDN DSL (IDSL), and very-high-data-rate DSL (VDSL). DSL types not using the voice frequencies band allow DSL lines to carry both data and voice signals simultaneously (for example, ADSL and VDSL), while other DSL types occupying the complete frequency range can carry data only (for example, SDSL and IDSL). Data service provided by a DSL connection is always-on. The data rate that DSL service can provide depends upon the distance between the subscriber and the CO. The smaller the distance, the higher data rate can be achieved. If close enough to a CO offering DSL service, the subscriber might be able to receive data at rates of up to 6.1 Mbps out of a theoretical 8.448 Mbps maximum.


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 642-845 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "642-845" Exam

Optimizing Converged Cisco Networks

 Question 1.
You need to implement QoS for the ITCertKeys VOIP network. 

Which three statements are true about the data traffic characteristics of voice traffic? (Select three)

A. Voice packets require TCP for rapid retransmission of dropped packets.
B. Latency is not a concern as long as jitter is kept below 30 ms.
C. Voice packets require a fairly constant bandwidth reserved for voice control traffic as well as 
    for the voice payload.
D. Voice packets do not require a specific type of queuing.
E. Latency must be kept below 150 ms.
F. Voice packets are rather small

Answer: C, E, F

Explanation:
QoS refers to the ability of a network to provide improved service to selected network traffic over various underlying technologies including Frame Relay, ATM, Ethernet and 802.3 networks, SONET, and IP-routed networks.

QoS features provide improved and more predictable network service by offering the following services:
1. Dedicated bandwidth
2. Improved loss characteristics
3. Congestion management and avoidance
4. Traffic shaping
5. Prioritization of traffic
Voice quality is directly affected by all three QoS quality factors such as loss, delay, and delay variation. Loss causes voice clipping and skips. Industry standard codec algorithms can correct for up to 30 ms of lost voice. Cisco Voice over IP (VoIP) technology uses 20 ms samples of voice payload per VoIP packet. Only a single Real Time Transport (RTP) packet could be lost at any given time. If two successive voice packets are lost, the 30 ms correctable window is exceeded and voice quality begins to degrade.

Delay can cause voice quality degradation if it is above 200 ms. If the end-to-end voice delay becomes too long, the conversation sounds as if two parties are talking over a satellite link or a CB radio. The ITU standard for VoIP, G.114, states that a 150 ms one-way delay budget is acceptable for high voice quality. With respect to delay variation, there are adaptive jitter buffers within IP Telephony devices. These buffers can usually compensate for 20 to 50 ms of jitter.

Question 2.
ITCertKeys uses G.711 for the VOIP calls. When analog signals are digitized using the G.711 codec, voice samples are encapsulated into protocol data units (PDUs) involving which three headers? (Select three)

A. UDP
B. RTP
C. IP
D. TCP
E. Compressed RTP
F. H.323

Answer: A, B, C

Explanation:
When a VoIP device, such as a gateway, sends voice over an IP network, the digitized voice has to be encapsulated into an IP packet. Voice transmission requires features not provided by the IP protocol header; therefore, additional transport protocols have to be used. Transport protocols that include features required for voice transmission are TCP, UDP, and RTP. VoIP utilizes a combination of UDP and RTP.

Question 3.
VOIP has been rolled out to every ITCertKeys location.

What are three features and functions of voice (VOIP) traffic on a network? (Select three)

A. Voice traffic is bursty
B. Voice traffic is retransmittable
C. Voice traffic is time-sensitive
D. Voice traffic is bandwidth intensive
E. Voice traffic is constant
F. Voice traffic uses small packet sizes

Answer: C, E, F

Explanation:
The benefits of packet telephony networks include 
i. More efficient use of bandwidth and equipment: Traditional telephony networks use a 64-kbps channel for every voice call. Packet telephony shares bandwidth among multiple logical connections.
ii. Lower transmission costs: A substantial amount of equipment is needed to combine 64-kbps channels into high-speed links for transport across the network. Packet telephony statistically multiplexes voice traffic alongside data traffic. This consolidation provides substantial savings on capital equipment and operations costs.
iii. Consolidated network expenses: Instead of operating separate networks for voice and data, voice networks are converted to use the packet-switched architecture to create a single integrated communications network with a common switching and transmission system. The benefit is significant cost savings on network equipment and operations.
iv. Improved employee productivity through features provided by IP telephony: IP phones are not only phones, they are complete business communication devices. They offer directory lookups and access to databases through Extensible Markup Language (XML) applications. These applications allow simple integration of telephony into any business application. For instance, employees can use the phone to look up information about a customer who called in, search for inventory information, and enter orders. The employee can be notified of a issue (for example, a change of the shipment date), and with a single click can call the customer about the change. In addition, software-based phones or wireless phones offer mobility to the phone user.

Question 4.
ITCertKeys is rolling out an H.323 VOIP network using Cisco devices. 

Which IOS feature provides dial plan scalability and bandwidth management for H.323 VoIP implementations?

A. Digital Signal Processors
B. Call Routing
C. Gatekeeper
D. Call Admission Control
E. None of the above

Answer: C

Explanation:
Enterprise voice implementations use components such as gateways, gatekeepers, Cisco Unified CallManager, and IP phones. Cisco Unified CallManager offers PBX-like features to IP phones. Gateways interconnect traditional telephony systems, such as analog or digital phones, PBXs, or the public switched telephone network (PSTN) to the IP telephony solution. Gatekeepers can be used for scalability of dial plans and for bandwidth management when using the H.323 protocol.

Question 5.
A Cisco router is being used as a VOIP gateway to convert voice signals in the ITCertKeys network. 

What steps are taken when a router converts a voice signal from analog to digital form? (Select two)

A. Quantization
B. Serialization
C. Packetization
D. Sampling

Answer: A, D

Explanation:
Step 1 Sampling: The analog signal is sampled periodically. The output of the sampling is a pulse amplitude modulation (PAM) signal.
Step 2 Quantization: The PAM signal is matched to a segmented scale. This scale measures the amplitude (height) of the PAM signal.
Step 3 Encoding: The matched scale value is represented in binary format.
Step 4 Compression: Optionally, voice samples can be compressed to reduce bandwidth requirements. Analog-to-digital conversion is done by digital signal processors (DSPs), which are located on the voice interface cards. The conversion is needed for calls received on analog lines, which are then sent out to a packet network or to a digital voice interface.

Question 6.
You need to implement the proper IOS tools to ensure that VOIP works over the ITCertKeys network. 

Which queuing and compression mechanisms are needed to effectively use the available bandwidth for voice traffic? (Select two)

A. Priority Queuing (PQ) or Custom Queuing (CQ)
B. Real-Time Transport Protocol (RTP) header compression
C. Low Latency Queuing (LLQ)
D. Class-Based Weighted Fair Queuing (CBWFQ)
E. TCP header compression
F. UDP header compression

Answer: D, E

Explanation:
1. Class-based weighted fair queuing (CBWFQ) extends the standard WFQ functionality to provide support for user-defined traffic classes. By using CBWFQ, network managers can define traffic classes based on several match criteria, including protocols, access control lists (ACLs), and input interfaces. A FIFO queue is reserved for each class, and traffic belonging to a class is directed to the queue for that class. More than one IP flow, or "conversation", can belong to a class. Once a class has been defined according to its match criteria, the characteristics can be assigned to the class. To characterize a class, assign the bandwidth and maximum packet limit.  The bandwidth assigned to a class is the guaranteed bandwidth given to the class during congestion. CBWFQ assigns a weight to each configured class instead of each flow. This weight is proportional to the bandwidth configured for each class. Weight is equal to the interface bandwidth divided by the class bandwidth. Therefore, a class with a higher bandwidth value will have a lower weight. By default, the total amount of bandwidth allocated for all classes must not exceed 75 percent of the available bandwidth on the interface. The other 25 percent is used for control and routing traffic. The queue limit must also be specified for the class. The specification is the maximum number of packets allowed to accumulate in the queue for the class. Packets belonging to a class are subject to the bandwidth and queue limits that are configured for the class.
2. TCP/IP header compression subscribes to the Van Jacobson Algorithm defined in RFC 1144. TCP/IP header compression lowers the overhead generated by the disproportionately large TCP/IP headers as they are transmitted across the WAN. TCP/IP header compression is protocol-specific and only compresses the TCP/IP header. The Layer 2 header is still intact and a packet with a compressed TCP/IP header can still travel across a WAN link. TCP/IP header compression is beneficial on small packets with few bytes of data such as Telnet. Cisco's header compression supports Frame Relay and dial-on-demand WAN link protocols. Because of processing overhead, header compression is generally used at lower speeds, such as 64 kbps links.

Question 7.
You want to ensure the highest call quality possible for all VOIP calls in the ITCertKeys network. 

Which codec standard would provide the highest voice-quality, mean opinion score (MOS)?

A. G.711, PCM
B. G.729, CS-ACELP
C. G.729A, CS-ACELP
D. G.728, LDCELP
E. None of the above

Answer: A

Explanation:
When a call is placed between two phones, the call setup stage occurs first. As a result of this process, the call is logically set up, but no dedicated circuits (lines) are associated with the call. The gateway then converts the received analog signals into digital format using a codec, such as G.711 or G.729 if voice compression is being used. When analog signals are digitized using the G.711 codec, 20 ms of voice consists of 160 samples, 8 bits each. The result is 160 bytes of voice information. These G.711 samples  (160 bytes) are encapsulated into an RTP header (12 bytes), a UDP header (8 bytes), and an IP header (20 bytes). Therefore, the whole IP packet carrying UDP, RTP, and the voice payload has a size of 200 bytes. When G.711 is being used, the ratio of header to payload is smaller because of the larger voice payload. Forty bytes of headers are added to 160 bytes of payload, so one-fourth of the G.711 codec bandwidth (64 kbps) has to be added. Without Layer 2 overhead, a G.711 call requires 80 kbps.

Question 8.
When a router converts analog signals to digital signals as part of the VoIP process, it performs four separate steps. 

From the options shown below, which set of steps contains the steps in their correct sequence?

A. encoding
    quantization
    optional compression
    sampling
B. optional compression
    encoding
    sampling
    quantization
C. sampling
    quantization
    encoding
    optional compression
D. optional compression
    sampling
    encoding
    quantization
E. sampling
    quantization
    optional compression
    encoding
F. encoding
    optional compression
    quantization
    sampling
G. None of the above

Answer: C

Explanation:
Step 1 Sampling: The analog signal is sampled periodically. The output of the sampling is a pulse amplitude modulation (PAM) signal.
Step 2 Quantization: The PAM signal is matched to a segmented scale. This scale measures the amplitude (height) of the PAM signal.
Step 3 Encoding: The matched scale value is represented in binary format.
Step 4 Compression:
Optionally, voice samples can be compressed to reduce bandwidth requirements. Analog-to-digital conversion is done by digital signal processors (DSPs), which are located on the voice interface cards. The conversion is needed for calls received on analog lines, which are then sent out to a packet network or to a digital voice interface.

Question 9.
ITCertKeys has determined that during its busiest hours, the average number of internal VoIP calls across the WAN link is four (4). Since this is an average, the WAN link has been sized for six (6) calls with no call admission control. 

What will happen when a seventh call is attempted across the WAN link?

A. The seventh call is routed via the PSTN.
B. The call is completed, but all calls have quality issues.
C. The call is completed but the seventh call has quality issues.
D. The call is denied and the original six (6) calls remain.
E. The call is completed and the first call is dropped.
F. None of the above.

Answer: B

Explanation:
IP telephony solutions offer Call Admission Control (CAC), a feature that artificially limits the number of concurrent voice calls to prevent oversubscription of WAN resources. Without CAC, if too many calls are active and too much voice traffic is sent, delays and packet drops occur. Even giving Real-Time Transport Protocol (RTP) packets absolute priority over all other traffic does not help when the physical bandwidth is not sufficient to carry all voice packets. Quality of service (QoS) mechanisms do not associate individual RTP packets with individual calls; therefore, all RTP packets are treated equally. All RTP packets will experience delays, and any RTP packets may be dropped. The effect of this behavior is that all voice calls experience voice quality degradation when oversubscription occurs. It is a common misconception that only calls that are beyond the bandwidth limit will suffer from quality degradation. CAC is the only method that prevents general voice quality degradation caused by too many concurrent active calls.

Question 10.
While planning the new ITCertKeys VOIP network, you need to determine the size of the WAN links to use. To do this, you need to calculate the bandwidth required by each call.

Which three pieces of information are used to calculate the total bandwidth of a VoIP call? (Select three)

A. The serialization of the interface
B. The quantization
C. The TCP overhead
D. The packetization size
E. The UDP overhead
F. The packet rate

Answer: D, E, F

Explanation:
Packet rate: Packet rate specifies the number of packets sent in a certain time interval. The packet rate is usually specified in packets per second (pps). Packet rate is the multiplicative inverse of the packetization period. The packetization period is the amount of voice (time) that will be encapsulated per packet, and is usually specified in milliseconds. Packetization size: Packetization size specifies the number of bytes that are needed to represent the voice information that will be encapsulated per packet. Packetization size depends on the packetization period and the bandwidth of the codec used. IP overhead: IP overhead specifies the number of bytes added to the voice information during IP encapsulation. When voice is encapsulated into Real-Time Transport Protocol (RTP), User Datagram Protocol (UDP), and IP, the IP overhead is the sum of all these headers.

Data link overhead: Data-link overhead specifies the number of bytes added during data-link encapsulation. The data-link overhead depends on the used data-link protocol, which can be different per link. Tunneling overhead: Tunneling overhead specifies the number of bytes added by any security or tunneling protocol, such as 802.1Q tunneling, IPsec, Generic Route Encapsulation (GRE), or Multiprotocol Label Switching (MPLS). This overhead must be considered on all links between the tunnel source and the tunnel destination.


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 650-393 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "650-393" Exam

Cisco Lifecycle Services Express

 Question 1.
Which service component within the design phase does the following describe? Consider the customer's defined business requirements and the associated performance, availability, resiliency, maintainability, resource capacity, and security criteria used to measure and assure the delivery of the required services.

A. Staging Plan
B. Implementation Plan
C. Business Plan
D. Detailed Design Validation
E. Project Kick-off

Answer: B

Question 2.
Which service component within the prepare phase validates the features and functionality documented in the high-level design of a solution?

A. Proof of Concept
B. High-level Design Development
C. Business Case Development
D. Business Requirements Development
E. Operations Technology Strategy Development
F. Technology Strategy Development

Answer: A

Question 3.
In the implement phase, project close-out involves which of the following tasks?

A. deliver education based on Staff Planning Development reports
B. conduct Engagement Profitability Assessment
C. execute network migration plan
D. customize ongoing support hand-off kit

Answer: B

Question 4.
In the implement phase, project close-out involves which of the following tasks?

A. deliver education based on Staff Planning Development reports
B. customize ongoing support hand-off kit
C. conduct Engagement Profitability Assessment
D. execute network migration plan

Answer: C

Question 5.
In the design phase, performing a needs analysis to identify the resource requirements and skills needed to deliver and support a network infrastructure is an activity of which service component?

A. Implementation Kick-off Meeting
B. Implementation Plan
C. Project Kick-off
D. Staging Plan
E. Migration Plan
F. Staff Plan Development

Answer: F

Question 6.
In the implement phase, solution implementation involves which of the following task?

A. Execute test cases
B. Configure core products
C. Perform preliminary Site Assessment
D. Analyze high-level design and technology requirements of the customer

Answer: B

Question 7.
Which one of the following describes the task for completing an operations readiness assessment in the plan phase?

A. determining network elements that will be tested
B. reviewing hardware and software configuration staging plan
C. entering documentation into knowledge management system
D. developing backup/recovery plan
E. creating an escalation plan
F. obtaining and reviewing operation procedures and policies

Answer: F

Question 8.
In the implement phase, solution implementation involves which of the following task? 

A. perform preliminary Site Assessment
B. configure core products
C. execute test cases
D. analyze high-level design and technology requirements of the customer

Answer: B

Question 9.
Which of the following definitions best describes services stack within the Cisco Lifecycle Services approach?

A. the minimum set of services that a customer needs to successfully deploy and operate a Cisco 
    technology or solution
B. the required set of services needed to successfully deploy and support Cisco Advanced 
    Technologies
C. the identification of Advanced Technologies to best support business requirements and 
    objectives
D. the minimum set of services required to operate and optimize Cisco Advanced Technologies

Answer: A

Question 10.
Which of the following definitions best describes business requirements development within the prepare phase?

A. a set of service component activities that assesses and documents the business requirements 
    of a customer
B. part of the systems design activity that identifies and documents business requirements to help 
    deploy network technologies
C. part of the high-level design activity that addresses business and technical requirements of the 
    customer
D. a service component activity that analyzes business requirements and recommends the 
    appropriate technology strategy

Answer: A


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 1D0-450 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "1D0-450" Exam

CIW Server Administrator

 Question 1.
Javier copies a file named "secret" from a folder named "restricted" to a folder named "open". Both folders reside on the same NTFS partition. What happens to the permissions on the file named "secret"?

A. The file inherits the target directory's permissions
B. The file loses its permissions and is assigned to the Everyone group
C. The retains the permissions it has before it was copied
D. The file is copied into the new directory and the old file is deleted, all permissions are retained.

Answer: A

Explanation: 
On a copy, permissions are inherited from the target folder. However, if it was a move, then the permissions move with the file, as long as it is on the same partition.

Incorrect Answers:
B: The new permissions are inherited from the target folder. It is not assigned to the everyone group unless that is what the target folder permissions were set at.
C: Permissions are retained on a MOVE, not a COPY.
D: This is really a move operation, not a copy.

Question 2.
Which of the following steps is necessary to add a new device driver to a Linux machine?

A. Copy the device driver to the device driver directory.
B. Extend the Linux kernel by incorporating the device code.
C. Insert the device into the Linux system and allow the system to choose the device files from its 
    device directory.
D. Insert the cd-rom with the device driver into the machine Linux will detect it and prompt you 
    through installation.

Answer: B

Explanation: 
The process of adding the device driver is done by extending the Linux kernel.

Incorrect Answers:
A: There are directories on Linux for source and executables, but moving code to these directories does not automatically install the device driver.
C: Linux does not currently provide this plug-n-play type of operation, the drivers must be explicitly added through commands to extend the kernel and make the device driver part of that extension.
D: Linux does not currently provide this plug-n-play type of operation, the drivers must be explicitly added through commands to extend the kernel and make the device driver part of that extension.

Question 3.
Nora is a site administrator for a large e-commerce site. She notices that the site is running slower and taking longer to process transactions. 

What should Nora first do to trouble shoot the problem?

A. Identify any bottlenecks in the current system by using the site diagnostic tools such as web 
    trends.
B. Apply any necessary patches to the software running the site.
C. Monitor the CPU usage of the server running the site by using Windows NT performance 
    monitor.
D. Test the site using different connection speeds to verify whether the connection is running 
    more slowly.

Answer: C

Explanation: 
The first thing to do is see what tasks are using the most CPU resources. In Windows NT, the Performance Monitor is the tool that will provide this monitoring.

Incorrect Answers:
A: The site diagnostic tools do not provide enough detail information for troubleshooting this problem. Since CPU processing performance needs to be monitored, a Operating System level tool ill b required.
B: Applying the patches may fix the problem, or make it worse. The first thing that should be done is to analyze the problem, and not just throw on fixes and other code HOPING that the problem may go away. Getting to know the problem helps to identify what is really wrong, and to apply the correct fix or course of action.
D: The observation that the site is running lower implied that the CPU had bottlenecks. Running at different communications speeds would only detect network bottlenecks, not CPU bottlenecks. There I no indication in this question that the network was being congested.

Question 4.
Ingrid is a Red Hat Linux system administrator. She is installing apache on her Linux server. 

Which command should Ingrid execute to determine whether apache is already installed?

A. ps aus|grep apache
B. lynx apache
C. rpm -q apache
D. rpm -i apache

Answer: C

Explanation: 
Red Hat Packet Manager (RPM) commands are used on Red Hat Linux. A query is issued to determine if apache is already there.

Incorrect Answers:
A: Running process status and a grep command (to search the active list) will not provide the information. If the apache server is running, then you caught it, but if the apache server is installed and not running, you will miss it.
B: There is no lynx command.
D: Although we need to run a RPM command, the -I form of the command does not provide the information we need.

Question 5.
Denise is the system administrator of a Linux system. She notices that whenever a specific process is running the performance of the system declines severely. 

What can Denise do to learn exactly how the process affects her system?

A. Use the top program to see if the program is CPU-intensive.
B. Use performance monitor to monitor the process.
C. Kill the process and observe the result.
D. Use pine to check the process.

Answer: A

Explanation: 
The TOP program will provide an interactive screen with information similar to the ps command, and will display performance statistics.

Incorrect Answers:
B: Performance monitor is a Windows term, and is not used in Linux. Performance tools available in Linux are: ps, top, and vmstat.
C: Killing the process will lose the necessary information on how the process degraded the system and affected it. Denise needs to see the effect, ad this has to be done while the task is running and still doing its damage.
D: Pine is a mail program, and does not provide performance checking.

Question 6.
Nadir installed a Perl script in the cgi-bin directory of his Linux system that is running apache server. NO significant modifications have been made to Apache server. He accesses a script named test.cgi via a web browser, but the script does not execute, and Apache server returns a 500 "Internal Server Error" message. Nadir executes the command is-al on the cgi-bin directory of the problem server. He learns that the permissions on test.cgi are 700, and that the file is owned by root. 

Which command should Nadir enter to ensure that his Perl script will execute securely?

A. Chmod 711 test.cgi
B. Chmod test.cgi 100.
C. Chown apache test.cgi.
D. Chmod.test.cgi 711

Answer: A

Explanation: 
The format is chmod xxx filename. 711 Allows full access to the owner, and read access to all others.

Incorrect Answers:
B: This is the wrong syntax of the command, and 100 would restrict the owner to read only and everyone else is still locked out.
C: Change owner will not correct the situation, it is a permission issue.
D: This is the wrong syntax of the command, the permission number 711 comes before the filename.

Question 7.
Stephen has been assigned to install two apache web servers. He only has hardware for one server. So he decides to create a virtual server to host the second site that he will host. 

Which file should Stephen edit to set the virtual servers attributes?

A. Httpd.conf
B. Linux.conf.
C. Access.conf
D. Magic.

Answer: A

Explanation: 
Directives for the Apache Web server are stored in the httpd.conf file.

Incorrect Answers:
B: Linux.conf doesn't hold virtual server attributes.
C: Access.conf is used for access control, to control which directories people can access.
D: Virtual server attributes are not saved in a Magic file.

Question 8.
Which of the following services is an example of a Mail Transfer Agent (MTA)?

A. Simple Mail Transfer Protocol (SMTP)
B. Post Office Protocol version3 (POP3)
C. Microsoft Outlook.
D. Internet Message Access Protocol (IMAP)

Answer: A

Explanation: 
The Mail Transfer Agent is responsible for transmission of mail between servers. SMTP performs that function.

Incorrect Answers:
B: POP3 is a protocol used by a mail client to read mail off the server. It is not used for server to server mail transfer.
C: Microsoft Outlook is a Mail User Agent (MUA), which can be customized to use either POP3 or IMAP to read mail from the mail server.
D: IMAP is a protocol used by a mail client to read mail off the server. It is not used for server to server mail transfer.

Question 9.
Jim is configuring his new mail server but he can't remember the well-known port for SMTP. 

What should Jim configure his mail server?

A. Jim should configure the server using port 80.
B. Jim should configure the server using port 25.
C. Jim should configure the server using port 23.
D. Jim should configure the server using port 24.

Answer: B

Explanation: 
The well known port for SMTP is 25.

Incorrect Answers:
A: Port 80 is the well known port for HTTP
C: Port 23 is the well known port for Telnet.
D: Port 24 is not assigned as a well known port.

Question 10.
Frank is a system administrator for a large network. His company has a large DNS structure that he does not want to reveal to outsiders. He alters the SMTP headers of all messages so that his users appear to be sending mails from a different address. 

What is the name of process that Frank implemented?

A. Aliasing.
B. Masquerading.
C. Forwarding.
D. Relaying.

Answer: B

Explanation: 
Masquerading is the proper technical term for the process of changing SMPT headers to make the origins of the messages appear as if they came from a different source.

Incorrect Answers:
A: Aliasing allows the use of nicknames, the address itself is not hidden in this process, so Frank would not be able to hide anything but user information.
C: Forwarding will forward the messages, but the headers are preserved and Frank has not hidden anything.
D: Relaying is when an intermediate mail server, or hub, is used to pass mail from server to server. Headers are preserved, so nothing is hidden and the original IP addresses and domain names are exposed.



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 1D0-520 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "1D0-520" Exam

CIW v5 Site Designer

 Question 1.
Cookies can be used to:

A. spread viruses on a network.
B. send personal information back to the Web server.
C. execute programs on a Web server.
D. target users for marketing.

Answer: D

Question 2.
Where do SVG files render?

A. On the client side
B. In the XML markup
C. On the server side
D. In the Flash plug-in

Answer: A

Question 3.
Consider the following code:

1942
Casablanca
Michael Curtiz

What kind of code is shown in the preceding example?

A. XML
B. activescript
C. VBScript
D. HTML

Answer: A

Question 4.
You have been asked to insert an image named kayak.jpg in a Web page. 

Which of the following code examples will validate as XHTML 1.0 Transitional?

A. 
B. kayak
C. 
D. kayak

Answer: D

Question 5.
The best way to thwart a dictionary attack is by enforcing a:

A. restricted access policy.
B. proxy server policy.
C. firewall configuration policy.
D. strong password policy.

Answer: D

Question 6.
SVG files can be defined as:

A. a proprietary plug-in for displaying Flash files.
B. a bitmap photo format.
C. a cross-platform image-rendering plug-in.
D. a way to describe two-dimensional graphics in XML.

Answer: D

Question 7.
Which of the following plug-ins would be used to view paper-based documents that cannot be easily re-created using XHTML?

A. Scalable Vector Graphics (SVG)
B. Portable Document Format (PDF)
C. Microsoft Fax Viewer
D. Word processor applications

Answer: B

Question 8.
You are using a style sheet. Which of the following examples of code are best suited for cross-platform design?

A. font-family: Helvetica, Arial, sans-serif;
B. font-family: bold, italics;
C. font-family=monotype, courier
D. font-family: Impact, Verdana, Geneva;

Answer: A

Question 9.
SVG files can be defined as:

A. a way to describe two-dimensional graphics in XML.
B. a cross-platform image-rendering plug-in.
C. a bitmap photo format.
D. a proprietary plug-in for displaying Flash files.

Answer: A

Question 10.
Which of the following is one of the advantages that SWF (Flash) files bring to Web-based environments?

A. SWF files can stream images, so files can be uploaded quickly.
B. SWF files use layers, so animation is linear and parallel.
C. SWF files use vector images, so files can be easily modified.
D. SWF files are compressed, so files download quickly.

Answer: D


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 1D0-525 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "1D0-525" Exam

CIW E-Commerce Designer

 Question 1.
The goals for effective usability in an e-commerce site are to get customers to:

A. find, compare and revisit.
B. visit, learn and return.
C. find, learn and review.
D. visit, learn and purchase.

Answer: D

Question 2.
Which of the following is the most effective way to build community with your online storefront?

A. Provide a quantity discount.
B. Generate an automatic order confirmation.
C. Create an incentive-based program.
D. Accept several different payment options.

Answer: C

Question 3.
Which of the following is often used in place of photo identification and a signature whenever a credit card is used in an e-commerce transaction?

A. Billing address verification
B. Cookies deposited by the site's shopping cart
C. The purchaser's public key
D. Information verified by a Public Key Infrastructure (PKI) company

Answer: A

Question 4.
The details of an e-commerce site order can be kept in memory, stored on the visitor's computer or stored on the Web server. This ability to remember the details of an order is known as:

A. persisting an order.
B. profiling an order.
C. tracking an order.
D. filling the shopping cart.

Answer: A

Question 5.
You are transitioning from a traditional "brick-and-mortar storefront that accepts credit cards to a new e-commerce storefront. 

Which payment method would be most appropriate during the transition?

A. Cash on delivery (c.o.d.)
B. Credit card with offline processing
C. Advance payment using check or money order
D. Open Buying on the Internet (OBI)

Answer: B

Question 6.
Which of the following site creation models would be most appropriate for a site needing easy administration and implementation as well as minimal business owner control?

A. Online instant storefront
B. Mid-level offline instant storefront
C. Mid-level online instant storefront
D. High-level offline instant storefront

Answer: A

Question 7.
Before you can conduct usability testing, you should:

A. identify the most-traveled path of your site.
B. publish your site to a production server.
C. identify browser compatibility issues.
D. identify your potential customers.

Answer: D

Question 8.
You are planning to install a database server in a mission-critical environment. 

What is the best way to ensure continuous data availability and reliability?

A. Install a multiprocessor server.
B. Establish a strict security policy.
C. Provide fail-over clustering.
D. Install multiple hot-swappable hard disk drives.

Answer: C

Question 9.
A customer has placed an online order. The order has been written to a database for processing and the customer's credit card has been charged. 

What is the last interaction with the customer during the order process?

A. Redirect the customer to the home page.
B. Send a confirmation e-mail message to the customer.
C. Update the customer profile.
D. Send a shipping notification via e-mail to the customer.

Answer: B

Question 10.
Which of the following is the most effective option for detecting a site attack by someone who wants to modify your customer database?

A. Using antivirus software
B. Implementing a firewall
C. Limiting the open ports on the system
D. Using an intrusion detection system

Answer: D



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.