Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "1D0-460" Exam

New Dumps

 

Question 1.
Connecting a LAN (Local Area Network) to mainframe can be accomplished using a:

A. bridge
B. gateway
C. transceiver
D. firewall

Answer: B

Explanation:
A LAN and a mainframe are two dissimilar networks. A gateway is used to connect two dissimilar networks.

Incorrect Answers:
A:A bridge connects two similar network segments and keeps traffic separated on both sides of the bridge. It does not connect two dissimilar networks.
C:A transceiver allows a networking device to connect to a different type of media than it was designed for. It is not used to connect networks.
D:A firewall protects the LAN from attackers on the Internet. It is not used to connect networks.

Question 2.
Which networking device works at the upper three layers of the OSI (Open Systems Interconnect) and connects networks with different architectures?

A. Router
B. Firewall
C. Modem
D. Gateway

Answer: D

Explanation:
A gateway is used to connect two dissimilar networks. It operates at all the layers of the OSI.

Incorrect Answers:
A: A router operates at the Network Layer of the OSI. The Network Layer is in the middle layers, not the upper layers, of the OSI.
B: A firewall protects the LAN from attackers on the Internet. It is not used to connect networks.
C: A modem provides access to the Internet. It operates at the lower layers of the OSI.

Question 3.
A client noticed that traffic increased steadily over the last few months and performance is beginning to suffer on its TCP/IP (Transmission Control Protocol/Internet Protocol).

Which network can be installed to reduce the impact of network traffic without dividing the LAN (Local Area Network) into separate subnets?

A. Bridge
B. Repeater
C. Router
D. Gateway

Answer: C

Explanation:
Routers make decisions on how to best network data to its destination based on network performance data that it gathers from the network. This will help alleviate traffic on the LAN.

Incorrect Answers:
A: A bridge connects two similar network subnets and keeps traffic separated on both sides of the bridge. However, this will result in sub netting.
B:A repeater amplifies the signals and is used to extend the maximum length of a network segment. It does not alleviate traffic.
D:A gateway is used to connect two dissimilar networks. It does not alleviate traffic on the internal LAN.

Question 4.
What is the default class A subnet mask?

A. 255.0.0.0
B. 255.255.0.0
C. 255.255.255.0
D. 255.255.255.255

Answer: A

Explanation:
A. 255.0.0.0 is a Class A default subnet mask.

Incorrect Answers:
B: 255.255.0.0 is a Class B default subnet mask.
C: 25.255.255.0 is a Class C default subnet mask.
D: 255.255.255.255 is not really a subnet mask, a subnet mask separates a network from a host. In this case just the full address is used.

Question 5.
Which extension header is identified by value 44 in the Next Header field?

A. Fragment extension header
B. Routing extension header
C. Hop-by-bop extension header
D. Destination options extensions header

Answer: A



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for JN0-141 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "JN0-141" Exam

Juniper Networks Certified Internet Associate, AC (JNCIA-AC)

 Question 1.
What are two ScreeuOS commands son can run on the overlay enforcer to troubleshoot communication with the Infranet Controller? (Choose two.)

A. get event
B. get controller status
C. get auth table infranet
D. execinfranet controller connect

Answer: A, D

Question 2.
Your company requires that users who authenticate using the Web run an approved Web browser and have current antivirus signatures to present their credentials for authentication. If they do not have current signatures or are running an unauthorized browser; they cannot authenticate. 

What do yon configure on the Infranet Controller to implement your company's authentication policy?

A. abrowser restriction on the users role and a Host Checker restriction on the users role
B. abrowser restriction on the users realm and a Host Checker restriction on the users role
C. abrowser restriction on the user's role and a Host Checker restriction on the user's realm
D. abrowser restriction on the users realm and a Host Checker restriction on the user's realm

Answer: D

Question 3.
Yon have created a Host Enforcer policy and want to verify that it has been applied In which two places would yon look to determine if the policy is being enforced? (Choose two.)

A. client browser
B. overlay enforcer
C. Infranet Controller
D. Odyssey Access Client

Answer: C, D

Question 4.
Which two options must be defined to enable the Infranet Controller to respond to RADINS requests from an 802.1X-compliant network access device? (Choose two.)

A. a sign-in policy
B. a shared secret
C. the IP address of the network access device
D. the proper vendor-specific attributes for the network access device

Answer: B, C

Question 5.
if Host Checker restrictions are applied at the role level and the Allow access to the role if any ONE of the select policies is passed option is selected, which statement is true?

A. Host Checker must be set toRequire and enforce.
B. The role will not be removed if the Host Checker stale changes.
C. The endpoint will be assigned the role as long as one policy passes.
D. The endpoint will be assigned the role as long as one rule in the policy passes.

Answer: C

Question 6.
Which log contains information about service restarts, system errors, warbubgs. And requests to check server connectivity?

A. Events log
B. System log
C. User Access log
D. Admin Access log

Answer: A

Question 7.
What are three functions of the infranet Controller? (Choose three.)

A. Verifiescompliance with policies. B.Actsasa802.1 Xenforcer if needed.
C. Assignsroles and resources to users.
D. EnforcesLayer 3 policies dynamically.
E. Maintains communication with client during session.

Answer: A

Question 8.
What are the three main components of Juniper Networks Unified Access Control (UAC) solution? (Choose three.)

A. Infra net Controller
B. endpoint agent software
C. RADINS accounting server
D. distributed policy enforcement points
E. intrusion detection and prevention device

Answer: A, B, D

Question 9.
Which statement is true about the operation of the overlay enforcer?

A. It assigns users a set of roles.
B. It enforces resource access policies.
C. It verifies whether anendponbtneets security Requirements.
D. It configures the UAC agent to allow or deny access to resources.

Answer: B

Question 10.
What is the function of the Host Checker?

A. Runson the Infranet Controller and ensures reach ability agents.
B. Communication with the overlay enforcer and restricts access to resources
C. Communicates with theinfranet Controller and checksendpoint security compliance
D. Runson the endpoint and checks for healthy communication with the overlay enforcer and the 
    infranet Controller.

Answer: C


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.