Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "1D0-475" Exam

PASSED!!!

 THANKS TO ITCERTKEYS..




Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 642-631 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "642-631" Exam

looking for a dump

 looking for a dump
thanks


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-638 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-638" Exam

Help with Latest Dumps

 Help with Latest Dumps
thanks buddy


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 9L0-005 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "9L0-005" Exam

Plz provide the Dump

 Pl provide the Dump
thanks


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 412-79 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "412-79" Exam

Certified Security Analyst (ECSA)

 Question 1.
Your company's network just finished going through a SAS 70 audit. This audit reported that overall, your network is secure, but there are some areas that needs improvement. The major area was SNMP security. The audit company recommended turning off SNMP, but that is not an option since you have so many remote nodes to keep track of. 

What step could you take to help secure SNMP on your network?

A. Change the default community string names
B. Block all internal MAC address from using SNMP
C. Block access to UDP port 171
D. Block access to TCP port 171

Answer: A

Question 2.
At what layer of the OSI model do routers function on?

A. 3
B. 4
C. 5
D. 1

Answer: A

Question 3.
An "idle" system is also referred to as what?

A. Zombie
B. PC not being used
C. Bot
D. PC not connected to the Internet

Answer: A

Question 4.
What operating system would respond to the following command?

A. Mac OS X
B. Windows XP
C. Windows 95
D. FreeBSD

Answer: D

Question 5.
Why are Linux/Unix based computers better to use than Windows computers for idle scanning?

A. Windows computers will not respond to idle scans
B. Linux/Unix computers are constantly talking
C. Linux/Unix computers are easier to compromise
D. Windows computers are constantly talking

Answer: D

Question 6.
How many bits is Source Port Number in TCP Header packet?

A. 48
B. 32
C. 64
D. 16

Answer: D

Question 7.
Why are Linux/Unix based computers better to use than Windows computers for idle scanning?

A. Windows computers are constantly talking
B. Linux/Unix computers are constantly talking
C. Linux/Unix computers are easier to compromise
D. Windows computers will not respond to idle scans

Answer: A

Question 8.
Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack into his former company's network. Since Simon remembers some of the server names, he attempts to run the axfr and ixfr commands using DIG. 

What is Simon trying to accomplish here?

A. Enumerate all the users in the domain
B. Perform DNS poisoning
C. Send DOS commands to crash the DNS servers
D. Perform a zone transfer

Answer: D

Question 9.
You are carrying out the last round of testing for your new website before it goes live. The website has many dynamic pages and connects to a SQL backend that accesses your product inventory in a database. You come across a web security site that recommends inputting the following code into a search field on web pages to check for vulnerabilities:

When you type this and click on search, you receive a pop-up window that says: "This is a test."

What is the result of this test?

A. Your website is vulnerable to web bugs
B. Your website is vulnerable to CSS
C. Your website is not vulnerable
D. Your website is vulnerable to SQL injection

Answer: B

Question 10.
After attending a CEH security seminar, you make a list of changes you would like to perform on your network to increase its security. One of the first things you change is to switch the RestrictAnonymous setting from 0 to 1 on your servers. This, as you were told, would prevent anonymous users from establishing a null session on the server. Using Userinfo tool mentioned at the seminar, you succeed in establishing a null session with one of the servers. Why is that?

A. RestrictAnonymous must be set to "2" for complete security
B. RestrictAnonymous must be set to "3" for complete security
C. There is no way to always prevent an anonymous null session from establishing
D. RestrictAnonymous must be set to "10" for complete security

Answer: A



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 350-023 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "350-023" Exam

CCIE Written: WAN Switching

 Question 1.
What is the primary benefit of the "timE. to-live" field in the IP header?

A. To improve buffer utilization
B. To reduce the impact of routing loops
C. To allow calculation ofrounD. trip delays
D. To remind us that all earthly joys are fleeting
E. To avoid delivery of packets that are no longer useful

Answer: B

Question 2.
A router interface address is 180.60.45.96 with a mask of 255.255.255.224. 

What configuration statement

A. routerospf 1 network 180.60.45.96 255.255.255.32 area 0
B. routerospf 1 network 180.60.45.96 0.255.255.224 area 0
C. router ospf 1 network 180.60.45.96 0.0.0.31 area 0
D. routerospf 1 network 180.60.45.96 0.0.0.224 area 0

Answer: C

Question 3.
An IGX-8 identifies itself as an IGX-32 on the configuration screen. What has gone wrong?

A. The NPM was originally in an IGX-32.
B. Database corruption has occurred.
C. The user must physically set a jumper on the SCM to correct this.
D. Use thesetnovram command to change the switch type.

Answer: C

Question 4.
In PNNI networks, AESA has the following general format:

A. 12-byte network prefix plus a 7-byte End System Identifier plus 1 byte Selector
B. 11-byte network prefix plus an 8-byte End System Identifier plus 1 byte Selector
C. 7-byte network prefix plus a 12-byte End System Identifier plus 1 byte Selector.
D. 13-byte network prefix, a 6-byte End System Identifier plus 1 byte Selector

Answer: D

Question 5.
To eliminate the need for adjacent routers on broadcast networks to form n(n-1)/2 adjacencies, ISIS defines a pseudonode or Designated Intermediate System, DIS. All router on the broadcast medium form an adjacency with the DIS. The Backup DIS is called:

A. Redundant DIS
B. BDR
C. There is no concept of a backup DIS in IS-IS
D. Designated Redundant System

Answer: C

Question 6.
Cisco/StrataCom (Gang of four) LMI uses what DLCI for messages?

A. 0
B. 1023
C. It should be configurable, as per the specification.
D. It is negotiated when the ports become active.

Answer: B

Question 7.
Click the Exhibit button to view the topology. Using the above diagram, which are valid BGP AS_Path Attributes received at Net1 for a route originating from AS65100? (multiple answer)
 
A. 200 57000 100 65100
B. 200 57000 100100
C. 100 57000 200
D. 200 57000 100
E. 65100 100 57000 200

Answer: A, D, E

Question 8.
The default network clocking source in a BPX network is:

A. The internal oscillator of the lowest-numbered node
B. The internal oscillator of the highest-numbered node
C. Each node's own internal oscillator
D. The clock chip on the network management system

Answer: B

Question 9.
When using IS-IS for IP routing, Dual IS-IS defined by RFC 1195, what is true? (multiple answer)

A. It is necessary to configure a NSAP address.
B. it is not possible to perform both IP and CLNS routingwih the same process.
C. IP address and subnet information is carried in the TLVfield on the L-1/L-1 LSPs.
D. Dual IS-IS does not support VLSM information.

Answer: A, C

Question 10.
What is true about the DLCI field in the Frame Relay header?

A. It consists of two portions, source and destination, which map data to a logical channel.
B. It generally has significance only between the local switch and the DTE device.
C. It is an optional field in the ITU-T specification.
D. It is present only in data frames sent through the network.

Answer: B



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 350-020 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "350-020" Exam

CCIE SP Optical Qualification

 Question 1.
What IE is not mandatory in a Q.931 Service msg?

A. Bearer capability
B. Channel ID
C. Message Type
D. Change Status
E. Call Reference

Answer: A

Question 2.
The purpose of Administrative Distance, as used by Cisco routers, is:

A. To choose between routes from different routing protocols when receiving updates for the 
   Same network
B. To identify which routing protocol forwarded the update
C. To define the distance to the destination used in deciding the best path
D. To be used only for administrative purposes

Answer: A

Question 3.
What is the maximum PMD value of a 100km fiber segment if the cable is specified with 0.5ps/km? (worst case)?

A. 0.005ps
B. .05ps
C. 5ps
D. 50ps
E. 500ps

Answer: C

Question 4.
What is the equivalent of 50 GHz spacing in DWDM in terms of nm?

A. 1.6 nm
B. 0.8 nm
C. 0.4 nm
D. 0.2 nm

Answer: C

Question 5.
Click the Exhibit to view the topology.
 

Router A has a 512K-access port into the frame relay cloud. Router B has 128K-access port into the frame relay cloud. The two routers are connected with symmetrical PVCs that are configured for 64K committed information rate (CIR). What Frame Relay Traffic Shaping map-class subcommand should be entered on Router A to prevent workstation A from overrunning the access port on Router B?

A. frame-relay traffic-rate 128000 512000
B. frame-relay traffic-rate 64000 512000
C. frame-relay traffic-rate 512000 64000
D. frame-relay traffic-rate 128000 64000
E. frame-relay traffic-rate 64000 128000

Answer: E

Question 6.
If a host sends a TCP segment with the RST flag set, it means:

A. The receiver should send all data in the reassembly buffer to the application receiving it 
    immediately.
B. The receiver should reset the session.
C. Any routers between the source and destination hosts should reset the state of the connection 
   in their buffers.
D. The receiver should make certain its send buffer is pushed onto the wire.

Answer: B

Question 7.
How many E1 channels can STM-1 frame transport?

A. 7
B. 21
C. 63
D. 84

Answer: C

Question 8.
BGP can implement a policy of 'Route Dampening' to control route instability. 

What statement about route dampening is NOT correct?

A. A numeric penalty is applied to a route each time it flaps.
B. The penalty is exponentially decayed according to parameters, such as halF. life-time.
C. The history of unstable routes is forwarded back to the sender to control future updates.
D. The route is eventually suppressed based on a configurable 'suppress limit'.

Answer: C

Question 9.
MPLS traffic engineering data is carried by:

A. Opaque LSAs or IS-IS TLVs
B. BGPMEDs
C. RTP or RTCP packets
D. MBGP

Answer: A

Question 10.
Click the Exhibit button.
 

In the diagram, if a resilient packet ring (RPR) is built between ML-series cards,____restoration exists on the ring, while the redundant connections to the 7609 rely on protection.

A. 50ms,STP
B. STP.STP
C. STP, 1+1 APS
D. 50ms, 50ms

Answer: A


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 310-880 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "310-880" Exam

SUN Certified Senior System Support Engineer

 Question 1.
You are configuring the eri0 network interface using the ifconfig command with the options netmask + and subnet mask 255.255.255.0.
# /usr/sbin/ifconfig eri0 netmask +
To verify the system is properly set up you issue an ifconfig -a command. You notice that the eri0 network interface has the netmask incorrectly set for 255.255.0.0.

Which file do you need to check first?

A. /etc/hosts
B. /etc/netmasks
C. /etc/hostname.eri0
D. /etc/nsswitch.conf

Answer: B

Question 2.
You are installing a StorEdge A3500. You have created 5 LUNS, but after a boot -r can only see one of them in the format output. 

What should you modify/run to increase the single LUN issue?

A. /kernel/drv/rdriver.conf
B. /etc/osa/rmparams
C. /kernel/drv/sd.conf
D. /usr/lib/osa/bin/symconf

Answer: C

Question 3.
You replaced a failed system board on a Sun Fire E20K. The new system board has no memory and needs to be tested. How should you test the new board?

A. Add the line ?$GGWKHOLQHno_memory_ok?in the postrc file.
B. Use the option -m with hpost command.
C. You need memory in a system board to test it.
D. Add the line ?$GGWKHOLQHmemory_ok?in the postrc file.

Answer: A

Question 4.
You have completed repairs on a Sun Fire E25K and the next step is to run extended POST to verify the service action.

How can you run extended post level 32 on domain A only?

A. Enter level 32 in the /etc/opt/SUNWSMS/config/.postrc file.
B. Enter level 32 in the /etc/opt/SUNWSMS/config/A/.postrc file.
C. Enter 2 in the /etc/opt/SUNWSMS/config/A/.postrc file.
D. Enter 2 in the /etc/opt/SUNWSMS/config/.postrc file.

Answer: B

Question 5.
A customer wants to install four domains on their Sun Fire 6900. 

What needs to be configured using the setupplatform command on the System Controller?

A. COD for all domains
B. System controller failover
C. ACL's for all domains
D. Dual partitioning

Answer: D

Question 6.
You have installed a Sun Enterprise 5500 onto a customer's network. The customer's networking department has told you that you must force the production interface, qfe0, to 100Mbps, Full Duplex. 

Which two ndd commands will you need to add to your startup script to ensure that your interface is running at the correct settings? (Choose two.)

A. ndd -set /dev/qfe autoneg_cap 0
B. ndd -set /dev/qfe adv_100fdx_cap 1
C. ndd -set /dev/qfe link_mode 1
D. ndd -set /dev/qfe 100fdx_cap 1
E. ndd -set /dev/qfe link_speed 1

Answer: A, B

Question 7.
You install a system to customer specifications and after rebooting you get the following message:
NIS server not responding for  ... retrying
The customer tells you that there is a network problem which prevents this machine from reaching the NIS server. You boot the machine into single user mode.

What action should you take to allow the system to operate until the NIS server is reachable again?

A. Edit /etc/nsswitch.conf so that file is first for all entries and reboot into multiuser mode.
B. Copy /etc/nsswitch.files to /etc/nsswitch.conf and reboot into multiuser mode.
C. Edit /etc/resolv.conf so that the domain entry is commented out and reboot into multiuser 
    mode.
D. Rename /etc/rc2.d/S72inetsvc to /etc/rc2.d/DisabledS72inetsvc and reboot into multiuser 
    mode.

Answer: B

Question 8.
You have performed a setkeyswitch on for domain A on a Sun Fire 6800 where the auto-boot? OBP variable is set to false. 

What command at the OBP should you run to find the status of the POST?

A. show-post-results
B. showlog-results
C. show-log-results
D. showlog results
E. showpost-results
F. showpost results

Answer: A

Question 9.
A customer has been receiving the following message:
unix: WARNING: /tmp: File system full, swap space limit exceeded
You are asked to create a swapfile to increase swap space. The swap file specifications are:
- File name: swap1
- Destination directory: /delta
- Length of swap1: 20 Megabytes

Which command should you use to create the swap file?

A. mkfile 20m /delta/swap1
B. mkfile -a 20m /delta/swap1
C. swap -a 20m /delta/swap1
D. swap 20m /delta/swap1

Answer: A

Question 10.
A customer has a number of Sun Fire 25Ks and you need to identify which one to work on. You are in the data center but not at the keyboard. 

Which command should you ask the customer to run to determine the chassis serial number?

A. showplatform
B. showcsn
C. showenvironment
D. showserial

Answer: A


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 9L0-509 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "9L0-509" Exam

Server Essentials 10.5

 Review the image, and then answer the question below. You have managed the Dock preferences to define where on the computer screen the Dock will appear for these four accounts:
Lab (a computer group), Science1 (a computer in the Lab computer group), Teachers (a workgroup), and John (a member of the Teachers workgroup). 

When John logs in on the Science1 computer, where on the computer screen does the Dock appear?
 

A. Bottom of the screen
B. Left side of the screen
C. Right side of the screen
D. John will be prompted to choose whether his user preferences or the Teachers workgroup 
    preferences should be used. The Dock will appear at the location of his choice.

Answer: C

Question 2.
You are setting up a Mac OS X Server v10.5 computer to store the home folders for 10 users. The computer has 510 GB of free space on the volume where the home folders reside. 

Which of these procedures will ensure that each user has an equal amount of storage space, yet leave at least 10 GB free?

A. In AFP service in Server Admin, select Limit disk usage to, and set the value to 50 GB.
B. In AFP service in Server Admin, select Limit disk usage to, and set the value to 500 GB.
C. In Workgroup Manager, in the Home pane for each user account, set the Disk Quota to 50 GB.
D. In Workgroup Manager, in the Quota pane for a group containing all of the users, set the Limit 
    to 50 GB.

Answer: C

Question 3.
You have enabled AFP service on your Mac OS X Server v10.5 computer. You configured the authentication method as Any. The server will attempt to authenticate file service users using which authentication methods, and in what order?

A. (1) Kerberos; (2) SSH
B. (1) Standard; (2) Kerberos
C. (1) Kerberos; (2) Standard
D. (1) SSH; (2) Standard; (3) Kerberos
E. (1) Standard; (2) Kerberos; (3) SSH

Answer: C

Question 4.
Which utility should you use on a Mac OS X v10.5 computer to create resources, such as rooms and projectors, in an LDAP directory so that those resources can be scheduled by iCal service users?

A. Directory
B. Address Book
C. Directory Utility
D. Directory Access

Answer: A

Question 5.
Which of these is a zone that is configurable from Server Admin?

A. Cache
B. Master
C. Pointer
D. Forward

Answer: B

Question 6.
Which utility can you use to display the status of ticket-granting tickets on a Mac OS X v10.5 computer?

A. Kerberos
B. Server Admin
C. KerberosAgent
D. Keychain Access
E. Directory Utility
F. Certificate Assistant

Answer: A

Question 7.
Your company has a set of site-licensed fonts in a folder named Fonts, on the share point, Resources, on your Mac OS X Server v10.5 computer. You are configuring the Resources share point so that these fonts will be automatically accessible by all your Mac OS X users. 

After you have enabled the Automount option for the Resources share point, how should you configure the share point in the automount configuration sheet?

A. Choose User home folders.
B. Choose Shared Library folder.
C. Choose Shared Applications folder.
D. Choose Custom mount path and enter ~/Library/Fonts for the path.

Answer: B

Question 8.
What is the maximum number of replicas of one Open Directory master that can be used in a Mac OS X Server v10.5 Open Directory infrastructure?

A. 31
B. 64
C. 256
D. 1024
E. 1056

Answer: E

Question 9.
A MacBook computer running Mac OS X v10.5 was formerly managed, but its managed preferences have been disabled on the server. Still, the user is unable to change some preferences on the MacBook. 

Which statement presents a valid method for restoring the users access to these preferences?

A. Delete the /Library/Managed Preferences/ folder.
B. Delete the MCX attributes from the user records in the NetInfo database.
C. Deselect the Managed Accounts option in the Services pane of Directory Utility.
D. Deselect the Managed Accounts option in the Accounts pane of System Preferences.

Answer: A

Question 10.
Which protocol does the iChat service in Mac OS X Server v10.5 use to send messages?

A. IRC (Internet Relay Chat)
B. SMP (Symmetric Messaging Protocol)
C. AIMP (AOL Instant Messaging Protocol)
D. XMPP (Extensible Messaging and Presence Protocol)

Answer: D


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 9L0-402 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "9L0-402" Exam

Mac OS X Support Essentials v10.5

 Question 1.
Which of these can you use to determine whether there is network connectivity between your computer and a web server on the Internet?

A. Whois
B. Finger
C. Lookup
D. Traceroute

Answer: D

Question 2.
You are an admin user, and have enabled the Ignore Volume Ownership option for an external FireWire hard disk. 

What will happen the next time a standard user attempts to mount the disk?

A. The disk will mount, and the user will be able to read, modify, and delete any file on the disk.
B. The disk will mount, and the user will be able to read any file on the disk; the user will be 
    required to enter an administrator password to modify or delete files on the disk.
C. The user will be required to enter an administrator password to mount the disk; once the disk 
    is mounted the user will be able to read, modify, and delete any file on the disk.
D. The user will be required to enter an administrator password to mount the disk; once the disk 
    is mounted, the user will be able to read any file on the disk, but will be required to re-enter an 
    administrator password to modify or delete files.

Answer: A

Question 3.
Review the screenshot of a user's home folder, and then answer the question below.

Which folder did the user create?
 

A. Music
B. Pages
C. Pictures
D. Downloads

Answer: B

Question 4.
Mac OS X v10.5 can read files on a volume that is ________-formatted, but it cannot write to files on the volume.

A. UFS
B. NTFS
C. EXT2
D. FAT32

Answer: B

Question 5.
Which procedure will let someone who does not have a local user account log in to a local admin user account on a Mac OS X v10.5 computer that does NOT have a firmware password enabled?

A. Log in to the computer with the user name "root" and the master password, open Accounts 
    preferences, and reset the admin user password.
B. Remove a RAM DIMM from one of the computers RAM slots, restart the computer while 
    holding down the Command-Option-O-F keys until you hear the startup sound, then type 
    "reset-all" at the prompt.
C. Start the computer from the internal hard disk, log into a guest user account, open the Reset 
    Password utility in the /Applications/Utilities folder, then reset the password on the admin 
    user account that resides on the hard disk volume.
D. Press the C key while restarting the computer with the Mac OS X v10.5 Install DVD inserted, 
    then choose Reset Password from the Utilities menu. Select the hard disk volume and the
    admin user account, then enter a new password for the account and click Save.

Answer: D

Question 6.
You have configured your Mac OS X v10.5 computer to share its connected USB printer. Mac OS X users can locate and print to it, but Windows users can not. 

What additional step must you take to allow Windows users to print to it?

A. In Sharing preferences, enable file sharing over SMB.
B. In Print & Fax preferences, enable the SMB printer driver.
C. In Printer Setup Utility, enable Windows Printing from the Printers menu.
D. In Print & Fax preferences, configure the Windows Printer name and queue.

Answer: A

Question 7.
Review the screenshots of a files permissions, as seen in Finder and from Terminal, and then answer the question below. 

Why are Kim's permissions to the file, Report.rtf, NOT visible in the Terminal listing?
 

A. Kims permissions are stored as POSIX settings.
B. Kims permissions are stored in the volume catalog.
C. Kims permissions are stored in the file data segment.
D. Kims permissions are stored in an Access Control List (ACL).

Answer: D

Question 8.
Tom wants to share a document with Harriet. Both have standard user accounts on the same Mac OS X v10.5 computer. 

Which of these is NOT a location where Tom can store the document so that Harriet can read it?

A. /Users/Shared/
B. /Users/tom/Public/
C. /Users/harriet/Public/
D. /Users/harriet/Public/Drop Box/

Answer: C

Question 9.
The primary role of the master password in Mac OS X v10.5 is to let you ________.

A. Access all the passwords stored in a local keychain
B. Reset the password of an account that has FileVault enabled
C. Change the startup device by holding down the Option key while the computer starts up
D. Connect to any password-protected web server whose password is stored in a local keychain

Answer: B

Question 10.
Which statement identifies a potential effect of resetting the master password for a Mac OS X v10.5 computer?

A. Users with keychain files created before you changed the master password must use the old 
    master password to unlock their keychains.
B. Users who enabled FileVault before you changed the master password will not be able to 
    access their home folder if they have forgotten their account password.
C. Users with keychain files created before you changed the master password will have their 
    keychain passwords automatically updated to match the new master password.
D. Users whose accounts were created before you changed the master password must use the 
    firmware password to access their home folder if they have forgotten their account password.

Answer: B



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.