Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "70-300" Exam

Analyzing Requirements and Defining Microsoft .Net Solution Architectures

 Question 1.
You are preparing the functional specification for the new reservation application. Which two functionalities should you specify? (Each correct answer presents part of the solution. Choose two)

A. Localization
B. Monitoring of application performance
C. Secure storage of customer profile information
D. Availability of application for mobile phones and personal digital assistants
E. Integration with Active Directory

Answer: B, C

Explanation: 
We do have requirements to monitor the application and to secure it.

Incorrect Answers:
A: There is no requirements for this.
D: The case study makes no mention of any requirement to support mobile phones or PDA's. Therefore it would not be appropriate to prepare a functional specification for this functionality.
E: There is no requirements for this.

Question 2.
You are completing the technical specification for the new reservation application.
Which technique should you recommend for state management?

A. ASP.NET ViewState
B. Server-side database
C. Client-side cookies
D. Application cache

Answer: B

Explanation:
A: This will not be retained when the customer closes the session.
C: They may not be allowed on the client machine’s browser.
D: Incorrect.

Question 3.
Which business constraint poses the greatest potential risk to completing your project for Blue Yonder Airlines?

A. The current IT staff must support the solution in the future
B. All testing scenarios and all necessary rework must be completed during the one-month testing 
    period. 
C. The scheduling vendor will begin providing access by XML Web service in three months
D. The application must be completed within a five-month development period before it is tested

Answer: C

Explanation:
C: Business Manager says that the vendor only meets its deadlines for delivering updates 
    only 50 percent of the time. This will have the greatest impact.
A: The question is asking for risks to completing the project. This does not have any
     impact.
B: This is all a matter of resources.
D: Since there is enough funding it should not be a problem.

Question 4.
You are establishing a policy to measure the effectiveness of your deployment process.
You decide to track one or more phases of development to identify defects. Which phase or phases should you track?(Choose all that apply)

A. Design and analysis
B. Development
C. Stabilization
D. Requirements

Answer: C

Explanation:
C: It is during the stabilizing phase that the Testing team completes the tasks and creates the deliverables that move the feature-complete build to a state in which the defined quality level is reached and the solution is ready for full production deployment.
The two main tasks in the stabilizing phase are:

• Testing the solution: The team implements the test plans that were created during the planning phase, which were enhanced and tested during the development phase.

• Conducting the pilot: The team moves a solution pilot from development to a staging area to test the solution with actual users and real scenarios. The pilot is conducted before the deploying phase is begun.

A pilot is a test of the solution in the production environment, and a trial of the solution by installers, systems support staff, and end users. The primary purposes of a pilot are to demonstrate that the design works in the production environment as expected and that it meets the organization’s business requirements. A secondary purpose is to give the deployment team a chance to practice and refine the deployment process.

Question 5.
You are listing the operational requirements for the new reservation application. 
Which requirement should you include?

A. Extensibility
B. Localization
C. Maintainability
D. Availability
E. Deployability

Answer: D

Explanation:
D: The Chief Executive Officer, who is a Business Stakeholder, wants to allow customers to make reservations at any time, on any day of the week.

Incorrect Answers:
B: There is no mention of Localization in the case study.
A, C: These are not the best answers.

Question 6.
You are writing the primary scenario of a use case named Customer retrieves a saved itinerary. Which action or actions should be included?(Choose all that apply)

A. Application informs customers that no itineraries exist
B. Application informs customers that a saved flight is no longer available
C. Customer asks for saved itineraries
D. Application offers alternate flights
E. Application queries the database for saved itineraries
F. Application displays retrieved itineraries

Answer: C, E, F

Explanation:
C,E,F: The question is asking for the Primary Scenario.

Question 7.
You need to select a strategy that will provide detailed usage information for the new reservation application. Information must be provided with a minimum development effort. What should you do?

A. Use Microsoft .NET performance counters in the application
B. Create a Microsoft Management Console(MMC) snap-in for the application
C. Add Windows Management instrumentation to the application
D. Use the application’s configuration file to enable and disable logging

Answer: A

Explanation:
A: This method will require a minimum development effort.

Question 8.
You must ensure that the new reservation application can be monitored while it is running. Which approach should you use?

A. TraceSwitch objects
B. Diagnostic tools
C. PerformanceCounter objects
D. Windows Management Instrumentation Job Object provider

Answer: C

Explanation:
Using the Performance Counter object within the solution would allow developers to write performance specific information that can be monitored by Performance Monitor while the application is running.

Question 9.
You are creating the logical design for a use case named “Customer updates customer profiles”. Which object or objects should you include in the design? (Choose all that apply)

A. Data access object
B. Customer object
C. Flight object
D. Logging object
E. Airline object

Answer: A, B, D 

Explanation:
A, B: These are definitely needed for the use case in question.
D: The Business Manager wants detailed logging of usage information for analysis.

Incorrect Answers
C, E: These are not related to the use case named “Customer updates customer profiles”.

Question 10.
You are creating constraints for tables named Flight and Airport. You must ensure data integrity. Which action or actions should you take?(Choose all that apply)

A. Create a primary key constraint on the AirportCode column and the CityOfOrigin column in the 
    Airport table
B. Create a primary key constraint on the FlightNumber column in the Flight table
C. Create a cascading delete constraint on the AirportCode column in the Airport Table 
D. Create a foreign key constraint on the ArriveAirportCode column in the Flight table to reference 
     the AirportCode column in the Airport table.
E. Create a primary key constraint on the FlightNumber column, the FilghtDate column and the 
    DepartAirportCode column in the Flight table
F. Create a foreign key constraint on the DepartAirportCode column in the Flight table to 
    reference the AirportCode column in the Airport table.
G. Create a primary key constraint on the AirportCode column in the Airport table. 
H. Create a foreign key constraint on the AirportCode column in the Airport table to reference the 
    DepartAirportCode column in the Flight table

Answer: D, E, F, G


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for EE0-511 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "EE0-511" Exam

F5 BIG-IP V9 Local traffic Management

 Question 1.
Which three methods can be used for initial access to a BIG-IP system? (Choose three.)

A. serial console access
B. SSH access to the management port
C. SSH access to any of the switch ports
D. HTTP access to the management port
E. HTTP access to any of the switch ports
F. HTTPS access to the management port
G. HTTPS access to any of the switch ports

Answer: A, B, F

Page 1-9 of BIG-IP Essentials v9 Student Guide

Question 2.
Which three files/data items are included in a BIG-IP backup file? (Choose three.)

A. the BIG-IP license
B. the BIG-IP log files
C. the BIG-IP host name
D. the BIG-IP administrator addresses

Answer: A, C, D

The BIG-IP backup file contains the following:
System-specific configuration files
Product licenses
User account and password information
Domain Name Service (DNS) zone files
Installed SSL Keys and certificates
Page 16-1 BIG-IP Network and System Management Guide

Question 3.
Which two statements are true concerning differences between BIG-IP platforms? (Choose two.)

A. The 1500 host more ports than the 3400
B. All F5 switch ports are tri-speed; 10 100 or 1000 Mbps.
C. All BIG-IP platforms use both an ASIC and CPU(s) to process traffic.
D. The 1500 and 3400 are in a 1U chassis while the 6400 is in a 2U chassis.
E. The 1500,3400 and 6400 have grater SSL capabilities after the initial SSL handshake than the 
    1000, 2400, and 5100,

Answer: D, E

Not A: The 1500 has 4 ethernet ports + 2 gig fiber and the 3400 has 8 ethernet ports + 2gig fiber.
Page 1-3 of BIG-IP Essentials v9 Student Guide

Question 4.
Which three methods are available for remote authentication of users allowed to administer a BIG-IP system through the Configuration Utility? (Choose three.)

A. LDAP
B. OCSP
C. Radius
D. VASCO
E. Active Directory

Answer: A, C, E

Page 1-11 of BIG-IP Essentials v9 Student Guide

Question 5.
What is the default IP address on a BIG-IP's management port?

A. 192.168.1.245/16
B. 192.168.1.245/24
C. 192.168.245.245/16
D. 192.168.245.245/24

Answer: B

Page 1-6 of BIG-IP Essentials v9 Student Guide

Question 6.
Which two can be a part of a pool's definition? (Choose two.)

A. rule(s)
B. profile(s)
C. monitor(s)
D. persistence type
E. load-balancing method

Answer: C, E

Pool definition can include the following:
1. Name (1-31 characters)
2. Members
3. Load Balancing Method
4. Optional Monitors
5. Priority Group Activation

Page 2-4 of BIG-IP Essentials v9 Student Guide

Question 7.
A site has six members in a pool. All of the servers have been designed, built, and configured with the same applications. It is known that each client's interactions vary significantly and can affect the performance of the servers. 

If traffic should be sent to all members on a regular basis, which load-balancing method is effective if the goal is to maintain a relatively event load across all servers?

A. Priority
B. Observed
C. Round Robin
D. Ration Member

Answer: B

Priority is not a load balancing method. Observed is the best answer, since round robin and ratio load balance without regard to system performance.

Page 2-10 of BIG-IP Essentials v9 Student Guide

Question 8.
Which statement accurately describes the relation between the two load-balancing modes specified as "member" and "node"?

A. There is no difference; the two terms are referenced for backward compatibility purposes.
B. When the load-balancing choice references "node", priority group activation is unavailable.
C. Load-balancing options referencing "nodes" are available only when the pool members are 
    defined for the "any" port.
D. When the load-balancing choice references "node', the address' parameters are used to make  
    the load-balancing choice rather than the member's parameters.

Answer: D

Nodes have only an IP address and may represent multiple pool members while pool members always have an IP address and service port designation.

Page 2-17 of BIG-IP Essentials v9 Student Guide

Question 9.
A load-balancing virtual server has been associated with a pool with multiple members.

 Assuming all other settings are left at their defaults, which statement is always true concerning traffic processed by the virtual server?

A. The client IP address is unchanged whether the traffic is between the BIG-IP and client or the 
    BIG-IP and server.
B. The server IP address is unchanged whether the traffic is between the BIG-IP and client or the 
    BIG-IP and server
C. The TCP port used in the client to BIG-Ip connection are the same as the TCP ports in the
    BIG-IP to server connection
D. The IP addresses used in the client to big-IP connection are the IP addresses in the BIG-IP to 
    server connection.

Answer: A

Page 2-1 of BIG-IP Essentials v9 Student Guide

Question 10.
Which two properties can be assigned to a pool? (Choose two.)

A. ratio values
B. priority values
C. health monitors
D. connection limits
E. load-balancing mode

Answer: C, E

Pool definition can include the following:
1. Name (1-31 characters)
2. Members


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.