Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "70-285" Exam

Passed with 95 % - Woodgrove Bank Questions

 

Question 1.
You need to design a storage strategy that meets all business and technical requirements.

What should you do?

A. Create a storage group for each office. Within each storage group, create a single database.
B. Create a storage group for each region. Within each storage group, create a single database.
C. Create a storage group for each region. Within each storage group, create separate databases
for each office in that region.
D. Create a single storage group. Within that storage group, create a separate database for each
office.

Answer: C

Explanation:
Requirements
All user e-mail messages must be backed up daily. If a failure occurs, as much data as possible must be recovered.
The company has 20 branch offices throughout the world.

 Each branch office belongs to one of six regions.
o No region contains more than four branch offices.

Each branch office has 800 users
Each branch office has a single domain controller, which is configured as a global catalog server.
Exchange ORG needs to match the business requirements,
Each Exchange server can contain

 4 Storage groups
o Inside each storage group you include 5 databases

In total you can split your users in 20 databases to speeds the recover of any Exchange crash using new Exchange feature Recovery Storage Group
They tell to you users will connect to a Microsoft Outlook Web Access server and that this server will be hosted at their local branch office.

The have one central office + 6 regions + each branch do not contain more 4 offices this means
7 Exchange servers (1 server for main office plus one server per region)

 1 Server in the Central site
o Four storage groups
 1 Database per group
 1000 users
o 200 user per database
 20 Branch offices inside 6 regions (AD sites)
o 1 Server per region
 4 storage groups per server
 20 Data Bases 1 per office in each region storage office

Storage group configuration
An Exchange 2003 server supports up to four storage groups. Each storage group has its own set of transaction log files and supports up to five databases. How you configure your storage groups affects Exchange performance, including how long it takes to back up and restore Exchange databases.

To achieve better performance, you should consider minimizing the total number of databases on each server.

You should also maximize the total number of databases (five total) per storage group before creating any additional storage groups. To increase the time it takes to back up and restore Exchange, consider limiting the size of each of your Exchange databases so you can recover each database in a reasonable amount of time.

Key differences between Exchange 2003 Standard Edition and Exchange 2003 Enterprise Edition

Feature Exchange 2003 Standard Edition Exchange 2003 Enterprise Edition

Storage group support 1 storage group 4 storage groups
Number of databases per storage 2 databases group 5 databases

Storage Group Configuration
The Exchange store uses two types of databases: mailbox stores and public folder stores. These stores are organized into storage groups. All of the databases in a storage group share a single set of transaction log files, a single backup schedule, and a single set of logging and backup-related settings.

Reference:
MS white paper Exchange Server 2003 High Availability Guide
MS white paper Exchange Server Using Exchange Server 2003 Recovery Storage Groups.doc

http://go.microsoft.com/fwlink/?LinkId=23233

Question 2.
You need to design an administrative model that meets all business and technical requirements.

What should you do?

A. Place the mailboxes for each region on a separate server. Create an administrative group for
each region. Assign each regional technician Exchange Full Administrator permission over that
region's administrative groups. Assign the main office IT staff Exchange Full Administrator
permission over each administrative group.
B. Place the mailboxes for each region on a separate server. Create an administrative group for
each region. Assign each regional technician Exchange Full Administrator permission over all
administrative groups. Assign the main office IT staff Exchange Full Administrator permission
over each administrative group.
C. Place the mailboxes from multiple regions on each server. Create an administrative group for
each server. Assign each regional technician Exchange Full Administrator permission over the
administrative groups that contain servers that hold mailboxes for that region. Assign the main
office IT staff Exchange Full Administrator permission over each administrative group.
D. Place the mailboxes from multiple regions on each server. Create a single administrative
group for all servers. Assign each regional technician and the main office IT Staff Exchange
Full Administrator permission over the administrative group.

Answer: A

Explanation
They tell you

 The IT staff at the main office will control all new Exchange servers. However, each region also has a server technician who must be able to modify the Exchange configuration on server that contains mailboxes for that region although they tool us that must be able to modify the configuration they do not tell us if they need to be able to modify the permissions

Exchange Full Administrator

When you assign a user or a group Exchange Full Administrator permissions, the user or the group can fully administer Exchange Server computer information and modify permissions. A user who has Exchange Full Administrator permissions has the following rights:

Organization Rights

 Full Control permissions on the MsExchConfiguration container (this object and its subcontainers).
 Deny Receive-As permissions and Send-As permissions on the Organization container (this object and its subcontainers).
 Read permissions and Change permissions on the Deleted Objects container in the Configuration naming context (Config NC) (this object and its subcontainers).

Administrative Group Rights

 Read, List object, and List contents permissions on the MsExchConfiguration container (this object only).
 Read, List object, and List contents permissions on the Organization container (this object and its
 subcontainers).
 Full Control, Deny Send-As, and Deny Receive-As permissions on the Administrator Groups container (this object and its subcontainers).
 Full Control permissions (except for Change) on the Connections container (this object and its subcontainers).
 Read, List object, List contents, and Write properties permissions on the Offline Address Lists container (this object and its subcontainers).

Note:
Administrators, who have Exchange Full Administrator permission can install, upgrade, remove, and perform disaster recovery on servers in that Administrative Group.

Incorrect Answers:
B, Too much permission for Regional Technician over other Admin Groups is not a required question
C and D uses suggests to put multiple regions on each server, that's cannot achieve the requirements and require more administrative effort

Reference:
Overview of Exchange Administrative Role Permissions in Exchange 2003 KB article 823018

Question 3.
You need to design a strategy for managing the messages that are sent to the customer service mailboxes.

What should you do?

A. Create a separate storage group and database to contain the customer service mailboxes.
Enable circular logging for this storage group.
B. Create a separate storage group and database to contain the customer service mailboxes. Set
the deleted item retention period for this database to zero.
C. Place the customer service mailboxes on a new mailbox store in the storage group that
contains the main office user mailboxes. Enable circular logging for this storage group.
D. Place the customer service mailboxes on a new mailbox store in the storage group that
contains the branch office user mailboxes. Set the deleted item retention period for this
database to zero.

Answer: A

Explanation:
Since the requirement is: messages sent to the database of "Customer Service" do not need to be backed up and recovered, letter A is the best choice.

Effect of Having Circular Logging Turned On
When circular logging is on, Exchange writes transaction logs as usual; however, after the checkpoint (Edb.chk) file has been advanced, the inactive portion of the transaction log is discarded and overwritten. Typically, this represents the majority of the potential log data, because by definition, the total size of the active transactions is less than the total amount of random access memory (RAM) on a given computer. Thus, when circular logging is on, the system still has complete recoverability with respect to hard and soft failures. The element that is sacrificed is the extra protection against media failure. Also, because the transaction logs are used for incremental and differential backups, these backup methods are no longer valid. If you try to do an incremental or a differential backup on a server that has circular logging enabled, Microsoft Windows NT Backup generates an error message that informs you that the incremental or differential backup cannot be done.

When circular logging is enabled you can see more than one transaction log in the log directory. For example, if a user sends a message with a 25-MB attachment, because the maximum log file size is 5 MB, four logs are likely to be created to process this transaction in addition to the Edb.log file. That is, you see Edb00001.log, Edb00002.log, Edb00003.log, and Edb00004.log. After the transaction is processed completely, these log files remain until a full backup is performed on the database, at which time they are removed. If the number of log files generated with circular logging enabled is equal to or greater than four (not including Edb.log) the logs remain until a full backup is performed.

When circular logging is enabled, high-volume conditions also cause the number of log files to increase.

Because the inactive portion of a transaction log is only discarded and reused after the Edb.chk file has moved past the inactive portion, many transactions may build up in the logs before they can be processed. If the total number of unprocessed transactions exceeds 5 MB and more continue to build up, another log file (for example, Edb00001.log) is created to hold these transactions. If the high-volume conditions continue, the log files continue to increase in number until the transactions can be processed completely. After the transaction processing catches up and the Edb.chk file is advanced past the transactions in these log files, these log files become inactive and again are not be removed until a full backup is performed. Other possible causes of log files growing with circular logging enabled are faulty small computer system interface (SCSI) controllers or hard drives that cause the transactions not to be completed in a timely manner, and the Edb.log files being held open exclusively by another process other then
Jet (for example, backup programs, copying operations, and so on).

Reference
XADM: How Circular Logging Affects the Use of Transaction Logs KB article 147524

Question 4.
You need to design the Exchange 2003 server configuration for remote e-mail access.

What should you do?

A. Configure the front-end servers in each branch office to be members of a new Active Directory
site.
B. Configure the back-end servers to have server encryption certificates issued by a commercial
certification authority (CA).
C. Configure two back-end servers to be members of a Network Load Balancing cluster.
Configure Network Load Balancing for inbound RPC connections.
D. Configure multiple front-end servers in each branch office to be members of a Network Load
Balancing cluster. Configure Network Load Balancing for inbound HTTPS connections.

Answer: D

Explanation:
Chief Executive Officer
I know that the antivirus software for the Exchange system is purchased on a server-by-server basis.

I want to minimize the number of servers on which we must install the software.
We need to ensure that the failure of a single Microsoft Outlook Web Access server dies not prevent our users from accessing their e-mail when they work from home.

We also need to ensure that the failure of any server will have only a minimal impact on the ability of users in each branch office to send and receive e-mail while they are in the office.

CIO is concerned about spending too much in antivirus licenses but CIO requests an OWA system with fault tolerance in the whole organization. The only way to achieve this with the given answers; is with answer D.

Question 5.
You need to design the deployment of antivirus software. What should you do?

A. Install the antivirus software on each mailbox storage server.
B. Install the antivirus software on each Outlook Web Access server.
C. Install the antivirus software on one Outlook Web Access server at each office.
D. Install the antivirus software on a back-end server that contains no mailboxes.

Answer: A

Explanation:
They do not offer an infrastructure using smtp in and out connector to access Exchange server If the requirement of the CIO is to reduce the numbers of servers that will have AV installed and also to protect the external and internal system, the AV should be installed in the Mailbox server. front end servers do not have mail enabled recipients.

Reference:
MS white paper Slowing and Stopping E-Mail Transmitted Viruses in an Exchange 2003 Environment

Question 6.
You need to design access to e-mail by Internet users. What should you do?

A. Configure front-end servers to use HTTP to communicate with back-end servers.
B. Configure the internal firewall to allow IPSec traffic between front-end and back-end Exchange
servers.
C. Require all users to encrypt all outbound e-mail messages.
D. Issue digital certificates to all remote users Require the certificates to be used when
authenticating to Outlook Web Access.

Answer: B
 



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 310-200 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "310-200" Exam

Sun Certified System Administrator for the Solaris 10 OS, Part I

 Question 1.
You accidentally initiated an abort sequence. As a consequence, your SPARC-based SYSTEM WENT INTO THE prom MODE.

Which two actions disable the default keyboard abort sequence? (Choose two)

A. detach serial console device
B. run the kbd -a disable command
C. run the eeprom command to disable KEYBOARD_ABORT
D. in PROM mode, change the value of keyboard to disable
E. edit / etc/default/kbd to change the value of the variable KEYBOARD_ABORT to disable

Answer: B, E

Question 2.
Your x86-based system with Solaris 10 OS installed on it is not booting correctly. You think the problem might be that a BIOS setting is not correctly configured. 

What should you do to abort the boot process and reboot into the BIOS configuration menu?

A. While holding down the reset button, you power cycle the system.
B. You press the middle mouse button, When the screen times out, you enter the BIOS 
    configuration menu and examine the BIOS settings.
C. You press the stop-A keys then typ reset-all. You reboot directly into the BIOS configuration 
    menu and examine the BIOS settings.
D. You press the Ctrl-Alt-Del keys and reboot the system, or press the reset button. When the  
    screen tells indicates the key to enter the BIOS, you press it and examine your BIOS settings.

Answer: D

Question 3.
Given:
ap: : sysinit:/sbin/sutopush -f/etc/iu.ap
sp: : sysinit:/sbin/soconfig -f /etc/sock2path
smf: :sysinit:/lib/svc/bin/svc.startd >/dev/msglog 2<>/dev/msglog /dev/msglog 2<>/dev/msglog

Which two statements are true? (choose two)

A. This file must be read by the process inetd.
B. When booting this system, svc.startd will start.
C. This is a part of the content of the /etc/inittab file
D. This system starts/lib/svc/bin/svc.startd for run level 1.
E. When this system gets the powerfail signal, svc.startd will be respawned.

Answer: B, C 

Question 4.
There is a problem on a SPARC-based system that has several permanent, customized device aliases . The system's use of these aliases needs to be temporarily disabled, so that when the problem is cleared, they can be enabled without having to redefine them.

Which sequence of OBP commands temporarily disables the customized device aliases defined on the system?

A. use-nvramrc=false
    reset
B. use-nvramrc?=false
    reset
C. setenv use-nvramrc? false
    reset
D. setenv use-nvramrc? = false
    reset

Answer: C

Question 5.
An x86-based laptop has just had Solaris 10 OS installed. The graphics configuration has NOT been automatically detected and it is running without graphics.

Which program can you run to create an Xsun configuration file?

A. /user/X11/bin/Xserver
B. /user/dt/bin/xsession
C. /usr/x11/binxorgconfig
D. /usr/openwin/bin/kdmconfig
E. /usr/x11/bin/xorg -configure

Answer: D

Question 6.
The SPARC-based workstation system in your accounts department need their PROMs upgraded. Some of the systems fail to upgrade.

What is the cause?

A. The patch is corrupt.
B. The systems do not have enough memory
C. The write protect jumper has not been set correctly.
D. The system is running an earlier version of Solaris OS.

Answer: C

Question 7.
A SPARC-based system does not boot and displays the message:
"Timeout waiting for ARP/RARP packet"

Which three actions should you take to check the boot environment of the system? (Choose three)

A. check if the frame buffer is working properly
B. check if the NVRAM alias net is set properly
C. check if the NVRAM alias boot-file is set properly
D. check if the PROM variable boot-device is set properly
E. check if the PROM variable local-mac-address?

Answer: B, D, E

Question 8.
 

You receive a complaint from a user who is unable to use the SSH service to access the user's lab system. You use a serial line to get in and check the SSH service. The svcs output is shown in the exhibit.

What has caused the disruption of the SSH service?

A. The service is disabled.
B. The contract_id is missing
C. There is no "next state" defined
D. One of the dependencies has NOT been met.

Answer: D
As you can see /network/physical is disabled
One of dependencies has not been meet therefore ssh not running
So right answer is D

Question 9.
A SPARC-based system, but you are not sure of the physical path information;

Which OBP command shows you this information/

A. printenv
B. probe-all
C. show-devs
D. prtdiag -v
E. probe-scsi-all

Answer: C

Question 10.
As system administrator, you are asked to shut down the Apache HTTPD service that is running on a development server. You run the svcs grep apache command, and receive this output.
Legacy_run Feb_02 1RC:/ETC/RC3_D/S50APACHE

Based on this output, which two statements are tru?

A. This service is managed by LRC.
B. This service is NOT managed by SMF
C. Any legacy_run state can NOT be manually shut down.
D. In order to shut down this service, you need to execute the shutdown script in the /tc/init.d 
    directory
E. In order to shut down this service, you need to execute the following shutdown script svcadm –
    v disable /etc/init.d/s50apache

Answer: B, D


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.