Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "1Z0-147" Exam

Oracle9i Program with PL/SQL

 Question 1. 
Examine this function:

CREATE OR REPLACE FUNCTION CALC_PLAYER_AVG
(V_ID in PLAYER_BAT_STAT.PLAYER_ID%TYPE)
RETURN NUMBER
IS
V_AVG NUMBER;
BEGIN
SELECT HITS / AT_BATS
INTO V_AVG
FROM PLAYER_BAT_STAT
WHERE PLAYER_ID = V_ID;
RETURN (V_AVG);
END;

Which statement will successfully invoke this function in SQL *Plus?

A. SELECT CALC_PLAYER_AVG(PLAYER_ID) FROM PLAYER_BAT_STAT;
B. EXECUTE CALC_PLAYER_AVG(31);
C. CALC_PLAYER(.RUTH.);
D. CALC_PLAYER_AVG(31);
E. START CALC_PLAYER_AVG(31)

Answer: A

Explanation:
A function can be invoked in SELECT Statement provided that the function does not modify any database tables. The function must use positional notation to pass values to the formal parameters. The formal parameters must be of the IN mode. They should return data types acceptable to SQL and they should not include any transaction, session, or system control statements.

Incorrect Answers
B. You can't call a function in this way, in this way you can call a procedure, because function must return a value, to call a function using EXECUTE command you should declare a bind variable using the VARIABLE command then assign the value returned from the function to this variable, in the following way:

SQL> VARIABLE v_get_value NUMBER
SQL> EXECUTE :v_get_value := CALC_PLAYER_AVG(31)
PL/SQL procedure successfully completed.
SQL> PRINT v_get_value
V_GET_VALUE
1
C. Again this way can't be use for calling a function in PL/SQL block because the function return a value and this values must be assigned to PL/SQL variable or to bind variable. Like this
DECLARE
v_get_from_fn NUMBER;
BEGIN
v_get_from := CALC_PLAYER_AVG(31);
END;
/
D. Same as C.
E. START is use to execute a script.

Question 2. 
Which three are true statements about dependent objects? (Choose three)

A. Invalid objects cannot be described.
B. An object with status of invalid cannot be a referenced object.
C. The Oracle server automatically records dependencies among objects.
D. All schema objects have a status that is recorded in the data dictionary.
E. You can view whether an object is valid or invalid in the USER_STATUS data 
     dictionary view.
F. You can view whether an object is valid or invalid in the USER_OBJECTS data  
    dictionary view.

Answer:  A, C, F

Incorrect Answers:
B, D, E

Question 3. 
You have created a stored procedure DELETE_TEMP_TABLE that uses dynamic SQL to remove a table in your schema. You have granted the EXECUTE privilege to user A on this procedure. When user A executes the DELETE_TEMP_TABLE procedure, under whose privileges are the operations performed by default?

A. SYS privileges
B. Your privileges
C. Public privileges
D. User A.s privileges
E. User A cannot execute your procedure that has dynamic SQL.

Answer: B

Explanation:
When you create a procedure, it will be executed under the privileges of the creator, unless the procedure has the following statement AUTHID CURRENT_USER. If you specify AUTHID CURRENT_USER, the privileges of the current user are checked at run time, and external references are resolved in the schema of the current user. Like this example

SQL> CREATE OR REPLACE PROCEDURE delete_temp_table(v_table varchar2)
2 AUTHID CURRENT_USER
3 IS
4 BEGIN
5 EXECUTE IMMEDIATE 'DROP TABLE '||V_TABLE;
6 END;
7 /

Procedure created.
If the procedure is create in this way then the EXECUTE IMMEDIATE statement will be execute under the privilege of the user who executes the procedure, but if we skip line 2 then the procedure will be executed under the privilege of the owner of the procedure.

Incorrect Answers
A: SYS privilege has nothing with is.
C: What is the public privileges? There is nothing called public privileges.
D: This will be true if the procedure contains the AUTHID CURRENT_USER.
E: There is no problem in having a dynamic SQL statement in Procedure.

Question 4. 
Examine this code: 

CREATE OR REPLACE PRODECURE add_dept(p_dept_name VARCHAR2 DEFAULT 'placeholder', p_location VARCHAR2 DEFAULT 'Boston')
IS
BEGIN
INSERT INTO departments
VALUES (dept_id_seq.NEXTVAL, p_dept_name, p_location);
END add_dept;
/

Which three are valid calls to the add_dep procedure ? (Choose three)

A. add_dept;
B. add_dept( .Accounting .);
C. add_dept(, .New York .);
D. add_dept(p_location=> .New York .);

Answer: A, B, D

Explanation:
A is correct because both of the parameter have a default values.
B is correct because here we call the procedure using position notation, and the first parameter for the procedure will have the value 'Accounting', and since the second parameter has a default value then we can skip it, and in this case it will take the default value.
D is correct because here we are calling the procedure using naming notation, the value 'New York' will go to the parameter p_location, and the parameter p_dept_name will have the default value.

Incorrect Answer
C: You can't use this way and assume that the PL/SQL will understand that he should assign the default value for the first parameter. This is incorrect way for calling.

Question 5. 
Which two statements about packages are true? (Choose two)

A. Packages can be nested.
B. You can pass parameters to packages.
C. A package is loaded into memory each time it is invoked.
D. The contents of packages can be shared by many applications.
E. You can achieve information hiding by making package constructs private.

Answer: D, E

Explanation:
Actually theses are some of the advantages of the package, sharing the package among applications and hide the logic of the procedures and function that are inside the package by declaring them in the package header and write the code of these procedures and functions inside the package body.

Incorrect Answers:
A: Packages can not be nested
B: Parameters can't be passed to a package; parameters can be passed to procedures and functions only.
C: By the first time you call a procedure, function, or reference a global variable within the package, the whole package will be loaded into the memory and stay there, so when ever you need to reference any of the package's constructs again you will find it in the memory.

Question 6. 
Which two programming constructs can be grouped within a package? (Choose two)

A. Cursor
B. Constant
C. Trigger
D. Sequence
E. View

Answer: A, B

Explanation:
The constructs that can be grouped within a package include:
Procedures and Functions
Cursors, Variables and Constants
Composite data types, such as TABLE or RECORD
Exceptions
Comments
PRAGMAs

Incorrect Answers:
C: Triggers are objects that we create are created on the tables.
D: Sequences can't be grouped inside the packages, but we can reference then inside the package.
E: Views are created and they are database objects, and they can't be grouped inside the packages.

Question 7. 
Which two statements describe the state of a package variable after executing the package in which it is declared? (Choose two)

A. It persists across transactions within a session.
B. It persists from session to session for the same user.
C. It does not persist across transaction within a session.
D. It persists from user to user when the package is invoked.
E. It does not persist from session to session for the same user.

Answer: A, E

Explanation:
You can keep track of the state of a package variable or cursor, which persists throughout the user session, from the time the user first references the variable or cursor to the time the user disconnects.

1. Initialize the variable within its declaration or within an automatic, one-time-only procedure.
2. Change the value of the variable by means of package procedures.
3. The value of the variable is released when the user disconnects.

Incorrect Answers
B: Each session will have its own value for the variables
C: It persists across the transactions and through the user session.
D: Each user has his own values and results, because each user has his own users.

Question 8. 
Which code can you use to ensure that the salary is not increased by more than 10% at a time nor is it ever decreased?

A. ALTER TABLE emp ADD CONSTRAINT ck_sal CHECK (sal BETWEEN sal AND   
     sal*1.1);
B. CREATE OR REPLACE TRIGGER check_sal BEFORE UPDATE OF sal ON emp 
     FOR EACH ROW
     WHEN (new.sal < old.sal OR
      new.sal > old.sal * 1.1) BEGIN RAISE_APPLICATION_ERROR ( - 20508, .Do not   
     decrease salary not
     increase by more than 10% );
     END;
C. CREATE OR REPLACE TRIGGER check_sal BEFORE UPDATE OF sal ON emp    
     WHEN (new.sal <
     old.sal OR new.sal > old.sal * 1.1)
     BEGIN RAISE_APPLICATION_ERROR ( - 20508, .Do not decrease salary not    
     increase by more than 10% );
     END;
D. CREATE OR REPLACE TRIGGER check_sal AFTER UPDATE OR sal ON emp  
     WHEN (new.sal <
     old.sal OR -new.sal > old.sal * 1.1)
     BEGIN RAISE_APPLICATION_ERROR ( - 20508, .Do not decrease salary not   
     increase by more than 10% );
     END;

Answer: B

Explanation:
Row triggers are the correct chose for solving the problem. A row trigger fires each time the table is affected by the triggering event. If the triggering event affects no rows, a row trigger is not executed. Row triggers are useful if the trigger action depends on data of rows that are affected or on data provided by the triggering event itself. You can create a BEFORE row trigger in order to prevent the triggering operation from succeeding if a certain condition is violated.
Within a ROW trigger, reference the value of a column before and after the data change by prefixing it with the OLD and NEW qualifier.

Incorrect Answers:
A: Check constraint can't do this job lets take a look:
SQL> ALTER TABLE emp ADD
2 CONSTRAINT ck_sal CHECK (sal BETWEEN sal AND sal*1.1)
3 /
Table altered.
SQL> select ename, sal
2 from emp
3 where ename = 'CERT';
ENAME SAL
CERT 5000
Now let's issue an update statement
SQL> update emp
2 set sal = 10
3 where ename = 'CERT';
1 row updated.

As you can see the check constraint can't compare the old value with the new value.
D,C: You can use NEW and OLD qualifier with row level triggers, If in the CREATE TRIGGER statement you didn't say FOR EACH ROW then the trigger will be statement level trigger

Question 9. 
Examine this code: 

CREATE OR REPLACE PACKAGE bonus
IS
g_max_bonus NUMBER := .99;
FUNCTION calc_bonus (p_emp_id NUMBER)
RETURN NUMBER;
FUNCTION calc_salary (p_emp_id NUMBER)
RETURN NUMBER;
END;
/
CREATE OR REPLACE PACKAGE BODY bonus
IS
v_salary employees.salary%TYPE;
v_bonus employees.commission_pct%TYPE;
FUNCTION calc_bonus (p_emp_id NUMBER)
RETURN NUMBER
IS
BEGIN
SELECT salary, commission_pct
INTO v_salary, v_bonus
FROM employees
WHERE employee_id = p_emp_id;
RETURN v_bonus * v_salary;
END calc_bonus
FUNCTION calc_salary (p_emp_id NUMBER)
RETURN NUMBER
IS
BEGIN
SELECT salary, commission_pct
INTO v_salary, v_bonus
FROM employees
WHERE employees
RETURN v_bonus * v_salary + v_salary;
END cacl_salary;
END bonus;
/

Which statement is true?

A. You can call the BONUS.CALC_SALARY packaged function from an INSERT  
     command against the
     EMPLOYEES table.
B. You can call the BONUS.CALC_SALARY packaged function from a SELECT  
     command against the
     EMPLOYEES table.
C. You can call the BONUS.CALC_SALARY packaged function form a DELETE  
     command against the
     EMPLOYEES table.
D. You can call the BONUS.CALC_SALARY packaged function from an UPDATE   
     command against the
     EMPLOYEES table.

Answer: B

Explanation:
For the Oracle server to execute a SQL statement that calls a stored function, it must know the purity level of a stored functions, that is, whether the functions are free of side effects. Side effects are changes to database tables or public packaged variables (those declared in a package specification). Side effects could delay the execution of a query, yield order-dependent (therefore indeterminate) results, or require that the package state variables be maintained across user sessions. Various side effects are not allowed when a function is called from a SQL query or DML statement. Therefore, the following restrictions apply to stored functions called from SQL expressions:

• A function called from a query or DML statement may not end the current transaction, create or roll back to a savepoint, or alter the system or session
• A function called from a query statement or from a parallelized DML statement may not execute a DML statement or otherwise modify the database
• A function called from a DML statement may not read or modify the particular table being modified by that DML statement

Question 10. 
Which statement is valid when removing procedures?

A. Use a drop procedure statement to drop a standalone procedure.
B. Use a drop procedure statement to drop a procedure that is part of a package. Then  
     recompile the package specification.
C. Use a drop procedure statement to drop a procedure that is part of a package. Then  
     recompile the package body.
D. For faster removal and re-creation, do not use a drop procedure statement. Instead,  
     recompile the procedure using the alter procedure statement with the REUSE  
     SETTINGS clause.

Answer: A

Explanation:
The DROP DROCEDURE statement is used to drop a stand alone procedure

Incorrect Answers:
B: You can't drop a procedure that's inside a package, you have to drop the package, and in this case the whole procedures, functions,... that are inside the packages will be dropped.
C: Same as B.
D: REUSE SETTINGS is used to prevent Oracle from dropping and reacquiring compiler switch settings. With this clause, Oracle preserves the existing settings and uses them for the recompilation.


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-643 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-643" Exam

Windows Server 2008 Applications Infrastructure, Configuring

 Question 1.
ITCertKeys.com has a domain with Active Directory running on it. Windows Server 2008 is installed on all the servers. You plan to deploy an image to 50 computers with no operating system installed. For this you install Microsoft Windows Deployment Services on the network. When you install the image on a test computer, a driver error shows up on the screen. 

What would you do to change the image to include the correct driver?

A. Configure and map the image file to the installation folder which hosts the correct driver
B. Take the image file and mount it. Using the System Image Manager (SIM) utility, change the 
    image file
C. Open WDS server and update the driver through Device Manager
D. Take the image file and mount it. Run the sysprep utility to get the correct driver
E. None of the above

Answer: B

Explanation:
To include the correct driver, you should mount the image file and change it using System Image Manager (SIM). You need to include the correct driver in the image file so it will install with all the correct drivers. You should not configure and map the image file to the installation folder hosting the correct driver because the image file is deployed in full. Windows Server 200 will not consider the contents of the folder where image file resides. It will deploy the image file only with all its content You cannot update the driver through Device Manager on WDS server. It has nothing to do with the image file. You cannot mount the image file and run sysprep utility. Sysprep utility cannot get the correct driver for you and change the image file. Sysprep utility is related to WDS server and the deployment of images to the client computers.

Question 2.
ITCertKeys.com has a server that runs Windows Server 2008. As an administrator at ITCertKeys.com, you install Microsoft Windows Deployment Service (WDS). While testing an image, you find out that the image is outdated. 

What should you do to remove the image from the server?

A. Open the command prompt at WDS server and execute WDSUTIL/Remove-Image and 
    /ImageType:install options
B. Open the command prompt at WDS server and execute theWDSUTIL command with/Export-
    Image and /ImageType: install options
C. Open the command prompt at WDS server and execute theWDSUTIL with /Export-Image and 
    /ImageType: boot options
D. Open the command promt at WDS server and execute theWDSUTIL command with /Remove-
    Image and /ImageType:boot options
E. All of the above

Answer: A

Explanation:
To remove the image from the server, you should execute WDSUTIL/remove-image on the command prompt at WDS server. Then execute WDSUTIL/image-type:install command and install the new image. The WDSUTIL is a command specific to modify and view the images at WDS server. You need to remove the image and then install the updated one using these commands. You cannot use the export-image parameter with WDSUTIL in this scenario. You have to remove the image not to export it to a folder. You should not use the /image-type:boot parameter because you need to install a fresh image. You don't need to boot the service for this.

Question 3.
ITCertKeys.com has four branch offices. To deploy the images, you install Microsoft Windows Deployment Services (WDS) on the network. ITCertKeys.com creates 4 images for each branch office. There are a total of 16 images for ITCertKeys.com. You deploy these images through WDS. A problem occurs in one branch office where the administrator reports that when he boots the WDS client computer, some of the images for his regional office does not show up in the boot menu. 

What should you do to ensure that every administrator can view all the images for his branch office?

A. Create separate image group for each branch office on the WDS server
B. Create unique organizational unit for each branch office and create profiles for each computer 
    in the branch office
C. Organize a global group for each branch office and create profiles of each computer in a 
    branch office
D. Create a Global Unique Identifier for each computer to recognize its branch office and connect 
    it to the WDS server
E. None of the above

Answer: A

Explanation:
To ensure that every administrator can view all the images for his branch office, you should create separate image group for each branch office on WDS server. A separate image will enable all the administrators to view each image from their machine in the branch office. You should not create an OU for each branch office. There is no logic in creating an OU for each branch office and profiles for each computer in the branch office. You should not organize a global group for each branch office. A global group can host all the branch offices of ITCertKeys.com

Question 4.
Microsoft Windows Deployment Services (WDS) is running on a Windows 2008 server. When you try to upload spanned image files onto WDS server, you received an error message.

What should you do to ensure that image files could be uploaded?

A. Combine the spanned image files into a single WIM file
B. Grant the Authenticated Users group Full Control on the \REMINST directory
C. Run the WDSutil/Convert command from command line on the WDS server
D. Run the WDSutil/add-image/imagefile:\\server\share\sources\install.wim/image type: install 
    command for each component file individually at the command line on WDS server
E. None of the above

Answer: A

Explanation:
When you try to upload spanned image files onto WDS server, you received an error message because you can only mount a single WIM file once for read/write access and therefore you need to combine the spanned image files into a single WIM file to correct the problem.

Reference: 
The Desktop Files The Power User's Guide to WIM and ImageX / Using /mount, /mountrw, and /delete http://technet.microsoft.com/en-us/magazine/cc137794.aspx

Question 5.
ITCertKeys.com has upgraded all servers in its network to Windows Server 2008. ITCertKeys.com also directed you to install Windows Vista on all client machines. You install Windows Vista on client machines and Windows Server 2008 on the servers. You use Multiple Activation Key (MAK) to activate the new operating systems on the network. You use proxy activation over the internet using Volume Activation Management Tool (VAMT). The Windows Vista on client computers were successfully activated using this method but the Windows Server 2008 failed to activate using VAMT. 

What should you do to ensure that the Windows Server 2008
is activated on all the servers?

A. Contact Microsoft Support Center and activate the Windows server 2008 over the phone
B. Upgrade VAMT using Windows Server 2008 RTM for VAMT to function with Windows Server 
    2008 Volume Licensing
C. Upgrade VAMT using Key Management Service (KMS) for Windows Server 2008 RTM to 
    function with Windows Server 2008 Volume Licensing
D. Contact Microsoft Support Center and activate Windows Server 2008 over the internet using 
    MAK only
E. All of the above

Answer: B

Explanation:
To ensure that the Windows Server 2008 is activated on all the servers, you should upgrade VAMT using Windows Server 2008 RTM for VAMT. You have to update VAMT at Windows Server 2008 RTM for VAMT to function with Windows Server 2008 volume licensing. VAMT (Volume Activation Management Tool) is a volume licensing tool for all flavors of Windows Vista. There are various activation methods available for volume licensing. These methods use two types of customer specific keys: Multiple Activation Key (MAK) and Key Management Service (KMS). The VAMT tool is used to activate the license through proxy over internet. VAMT is a tool for Windows Vista and to use it for Windows Server 2008, it needs an update.

Question 6.
ITCertKeys.com has added 5 servers to its network. As an administrator at ITCertKeys.com, you install Windows Server 2008 Enterprise edition on two servers and Windows Server 2008 storage server enterprise on other two servers. You want to automatically activate both editions of Windows Server 2008 without any administrator or Microsoft intervention. You also want the activation to occur every 6months. 

Which volume activation service should you use to automatically activate both editions of Windows Server 2008?

A. Multiple Activation Key(MAK)
B. Volume Activation Management Tool (VAMT)
C. Volume Activation 1.0 (VA 1.0)
D. Key Management Service (KMS)
E. None of the above

Answer: D

Explanation:
You should use KMS to activate both editions of Windows Server 2008. KMS automatically activates Windows Vista and Windows Server 2008. Computers that are been activated by KMS are required to reactivate by connecting to a KMS host at least once every six months. The VL editions of Windows Serve 2008 and Windows Vista are installed as KMS clients by default. The clients can automatically discover the KMS hosts on the network with a properly configured KMS infrastructure. The clients can also activate using KMS infrastructure without administrative or user intervention.

Question 7.
ITCertKeys has main office and a Branch office. Main office is running 20 Windows Server 2008 computers and 125 computers running Microsoft Windows XP Professional. Branch office is running 3 Windows Server 2008 computers and 50 Windows XP Professional computers running on its network. Computers in the main office have access to Internet. All servers are having the same security configuration and there are no plans in near future to add new servers or systems in the network. You installed Volume Activation Management Tool (VAMT) on a server named ITCertKeys_DC1 in the main office and added all servers to VMAT server and configured the servers for Multiple Activation Key (MAK) independent activation. Servers at Branch office are unable to activate Windows Server 2008. 

What should you do to activate Windows server 2008 on all servers?

A. Install a Management Activation Key (MAK) server on the network
B. Configure MAK Proxy activation on all servers in the Branch office
C. Configure Windows Management Instrumentation (WMI) Firewall Exception on all servers in 
    the Branch office
D. Open VAMT on ITCertKeys_DC1 and export the Computer Information List (CIL). Send this 
    file to Microsoft Technical support for activation
E. None of the above

Answer: B

Explanation:
To activate Windows server 2008 on all servers, you need to configure MAK Proxy activation on all servers in the BRanch office. The MAK can be activated by using two methods, MAK Independent Activation and MAK Proxy Activation. MAK Independent Activation is used when each computer is activated individually by connecting to Microsoft servers over the Internet or by telephone and MAK Proxy Activation is used when Volume Activation Management Tool (VAMT) is installed on a server and you need to activate multiple computers at the same time through a single connection to Microsoft servers over the Internet or phone. Therefore, instead of MAK Independent Activation you need to use MAK Proxy activation on all servers in the BRanch office.

Reference: 
Frequently Asked Questions About Volume License Keys for Windows Vista and Windows Server 2008 http://www.microsoft.com/licensing/resources/vol/ActivationFAQ/default.mspx

Question 8.
You are network administrator for ITCertKeys network. You configured a Windows server 2008 server named ITCertKeys_KM1 as Key Management Service (KMS) host. This server is also configured as Windows Sharepoint Services server. This location has currently 18 computers having Windows Vista KMS client and you have added 10 more Windows Vista KMS client systems in the network recently. These 10 additional client computers are installed using Windows Vista image file. The KMS host is unable to activate any of the KMS client computers in the network. 

What should you do?

A. Install KMS on a dedicated Windows Sever 2008
B. Run Sysprep /generalize on the Vista reference computer used to create image
C. Run slmgr.vbs/rearm Vista reference computer used to create image
D. Run slmgr.vbs/dli on the KMS host computer
E. Run slmgr.vbs/cpri on the KMS host computer
F. None of the above

Answer: B

Explanation:
To activate the KMS client computers in the network, you need to run the Sysprep /generalize on the Vista reference computer used to create image. sysprep/generalize is used to reset activation and other system-specific information as the last step before storing or capturing the VM image. If sysprep /generalize is not used, the activation timer will run down while the product is in storage and the KMS host will be unable to activate any of the KMS client computers in the network.

Reference: 
KMS host is unable to activate any of the KMS client computers in the network
http://blog.windowsvirtualization.com/virtualization/faq-virtalization-and-volume-activation-20

Question 9.
ITCertKeys.com has a server with single Active Directory domain. For security, ITCertKeys.com has an ISA 2006 server functioning as a firewall. You configure user access through virtual private network service by deploying the PPTP (Point-to-Point Tunneling Protocol). When a user connects to the VPN service, an error occurs. The error message says "Error 721: The remote computer is not responding." 

What should you do to ensure that the users connect to the VPN service?

A. Open the port 2200 on the firewall
B. Open the port 1423 on the firewall
C. Open the port 1723 on the firewall
D. Open the port 721 on the firewall
E. All of the above

Answer: C

Explanation:
To ensure that users connect to VPN service, you should open the port 1723 on the firewall. The port 1723 is a TCP port for PPTP tunnel maintenance traffic. For VPN connections, you need to open this port for PPTP tunnel maintenance traffic and permit IP Type 47 Generic Routing Encapsulation (GRE) packets for PPTP tunnel data to pass to your RRAS server's IP address. You cannot open port 721. The port 721 on the firewall is a printer port so it is not related to VPN connection

Question 10.
DRAG DROP
ITCertKeys has a server named ITK1 that runs Windows Server 2008 and Microsoft Virtual Server 2005 R2. You want to create eight virtual servers that run Windows Server 2008 and configure the virtual servers as an Active Directory forest for testing purposes in the ITCertKeys Lab. You discover that ITK1 has only 30 GB of hard disk space that is free. You need to install the eight new virtual servers on ITK1 .

From the steps shown, what steps need to be completed in a specific order?
 

Answer:
 

Explanation:
To install the eight new servers on ITK1, you need to create a virtual server with a 10 GB fixed-size virtual hard disk and then install Windows Server 2008. After that, you should create eight differencing virtual hard disks and then create eight virtual servers with a differencing virtual hard disk attached. The virtual hard disk should be created first because you need space for eight virtual servers. The fixed-size virtual hard disk can be created through a virtual server. Then you install Windows Server 2008 on it. After that you have to allocate the space for eight virtual servers. To do that, you create differencing virtual hard disk to solve the space problem. Then you create the eight virtual servers with differencing virtual hard disk attached.


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.