Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "50-681" Exam

A Complete Score 100%

 

Here are a few questions from ITcertkeys.com guide seen in the exam.
Hopefully will help you in the exam.

Question 1.
During the installation of NetWare 6, which network protocol option uses the 802.2 frame type by default?

A. IP
B. IPX
C. IP/IPX
D. IPX Encapsulation
E. Compability Mode

Answer: C

Question 2.
Which statements are true about eDirectory partitions? (Choose two)

A. Partitions can overlap each other.
B. A container object can reside in 2 partitions.
C. A partition provides fault tolerance for the file system.
D. A partition contains only eDirectory objects and related data.
E. Partitions are logical divisions of eDirectory that enable the database to be divided among
several servers.

Answer: D, E

Question 3.
Which tasks do you perform to set up the ACU to update the Novell Client software across the network? (Choose two)

A. Add the ACU.EXE instructions to each user login script.
B. Copy the client upgrade files to each user's workstation.
C. Place the upgrade files in a directory that all users have access to.
D. Run NCIMAN.EXE to create the ACU.BAT file for each workstation.
E. Configure the ACU.INI file to specify how you want ACU.EXE to execute.

Answer: A, C

Section 3. page 3-31/37

Question 4.
What is the default block size for a 3 GB traditional NetWare volume?

A. 8 KB
B. 15 KB
C. 32 KB
D. 64 KB

Answer: D

Section 5, page 5-22

Question 5.
Enter the NetWare 6 console command that starts the DNS server.

Answer: NAMED

Section 4, page 4-55

Question 6.
Which activates are appropriate to help you be better prepared for recurring network problems? (Choose three)

A. Maintain an updated network map.
B. Remove unnecessary components.
C. Perform regular network health checks.
D. Keep documentation available for reference.
E. Open an electronic incident with Novell support.

Answer: A, C, D

Section 1, page 1-8

Question 7.
Which of the following file is use to map service names to TCP and UDP ports.

A. Hosts files
B. Networks File
C. Protocol File
D. Services File

Answer: D

Explanation:
SERVICES File maps service names to TCP and UDP ports

NETWORKS File maps network names to network addresses

HOSTS File maps hostnames to IP addresses

PROTOCOL File maps protocol names to IP protocol numbers

Question 8.
Which NLM is required to be running on a server with a replica in order to perform a backup of eDirectory?

A. JAVA
B. TSANDS
C. DSDIAG
D. SMSANDS
E. DSTRACE

Answer: B

Section 12, page 12-35

Question 9.
You need to fill out a replica table.
Which tools can you use to get replica ring information? (Choose three)

A. iMonitor
B. MONITOR
C. DSREPAIR
D. NWCONFIG
E. Console One
F. NetWare Administrator

Answer: A, C, E

Question 10.
Which URL redirects you to NetWare Remote Manager?

A. http://server IP address:8008
B. http://server IP address:2200
C. https://server IP address:8008
D. https://server IP address:2200

Answer: A

Section 4, page 5-4

Question 11.
By default, which statement is true regarding the UAL licensing model in NetWare 6?

A. NDPS printers use a user or connection license.
B. The license is releases from the user immediately when the user logs out.
C. The search for the license starts at the user's context and goes up the tree.
D. A different license is required for each NetWare 6 server that a user authenticates to.

Answer: D

Question 12.
Configuring your firewall to ensure all outbound packets contain source IP addresses that originate from your internal network will defend against what type of DoS attack?

A. FIN
B. SYN
C. Smurf
D. Teardrop

Answer: B

Section 6, page 6-70

Question 13.
Before installing the first NetWare 6 server in an existing tree, the user performing the installation should verify they have what rights? (Choose three)

A. Supervisor rights to the Admin object.
B. Read rights to the Security container.
C. Supervisor rights to the Root of the tree.
D. Supervisor rights to the server hosting the CA.
E. Supervisor rights at the container where the server will be installed.
F. Read and Write rights to all servers holding a replica of the partition where the new server will
be installed.

Answer: C, D, E

Question 14.
DA2_DATA_POOL requires maintenance.
Click the object, menu, or button that lets you deactivate your NSS pool.

Answer: Click on the server object DA2

Section 11, page 11-26

Question 15.
What are true regarding NetWare 6 swap files for virtual memory? (Choose two)

A. The minimum allowable size for a swap file is 2 MB.
B. A swap file cannot be added to a volume unless the volume is mounted.
C. Swap files are dynamic and change size as data is swapped in and out of memory.
D. A swap file created on a volume other than SYS only stored information for the volume it is
created on.
E. Unless commands are added to the AUTOEXEC.NCF to recreate them, all swap files on
volumes other than SYS are lost when the server is restarted.

Answer: B, C

Explanation:
When you dismount a volume, the swap file is deleted. To keep a swap file on that volume, you must create the swap file again when the volume is mounted. The exception is the swap file for volume SYS:, which is created by default. For convenience, add the commands to create swap files to the AUTOEXEC.NCF file, so the files are created each time the server is started. Swap files are dynamic; they expand and contract as data is swapped in and out of memory.

Refer to
http://www.novell.com/documentation/lg/nw6p/index.html?page=/documentation/lg/nw6p/smem_enu/data/hmiplme1.html

Not E: E is tempting but you only need to dismount the volume to lose the swap file. Server restart is unnecessary. E is also wrong in that the swap file on SYS is recreated automatically on restart. The old swap file is lost.

Question 16.
You are documenting your network to help save time with future troubleshooting. What information is beneficial to document? (Choose three)

A. A diagram of the network cabling.
B. A list of current user and file system rights.
C. The configuration and type of each workstation.
D. The performance statistics during poor network operation.
E. A chronological log of software upgrades and hardware changes.

Answer: A, C, E

Section 1, page 1-9

Question 17.
You have lost volume SYS on your server in a single server network due to hard disk failure.
What steps must you take to restore the server? (Choose three)

A. Restore eDirectory
B. Restore the file system
C. Restore SERVERDATA.NDS
D. Repair or replace the failed hardware
E. Recover eDirectory information from a replica

Answer: A, B, D

Question 18.
In order to avoid conflict with other web-based services you need to change the IP address of your iFolder server. Which files do you need to modify? (Choose two)

A. HTTPD.CONF
B. IFOLDER.CONF
C. STOPIFOLDER.NCF
D. STARTIFOLDER.NFC
E. HTTPD_ADDITIONS_NW.CONF

Answer: A, E

Question 19.
Click the iMonitor link or button that lets you verify inbound and outbound synchronization as well as view several other background processes.

Answer: AGENT ACTIVITY

Question 20.
While creating a Cache only DNS server, how many zones are required.

A. !
B. 2
C. 3
D. No zone is required.

Answer: D

Explanation:
After you have created the DNS Server as a cache only server, do not assign any zones for it to serve.

Question 21.
What should be done after a server is upgraded to eDirectory 8.6?

A. Reboot the server.
B. Upgrade Novell Certificate Server.
C. Perform an eDirectory health check.
D. Delete the server object and recreate it.
E. Reinitialize the eDirectory database by entering the SET DSTRACE=*. command at the server
console prompt.

Answer: C

Explanation:
Described in Chapter 9 of Self-Study Guide

Question 22.
The Novell® TCP/IP stack consists of how many NetWare Loadable Module?

A. 2
B. 3
C. 4
D. 5

Answer: D

Explanation:
The Novell® TCP/IP stack consists of the following five NetWare® Loadable ModuleTM (NLMTM) programs:
BSDSOCK.NLM provides the BSD standards sockets interface.
TCP.NLM provides the transport layer TCP and UDP interfaces.
TCPIP.NLM provides IP, ICMP, IGMP, Routing, and other networking layer protocols.
NETLIB.NLM is a library of the entire stack.
INETCFG.NLM allows you to configure the stack with the help of TCPCFG.NLM. The configuration is stored in SYS:\ETC\TCPIP.CFG and SYS:\ETC\NETINFO.CFG.

Question 23.
Which statements are true regarding Novell Certificate Server and upgrading to eDirectory 8.6? (Choose two)

A. Only one Organizational CA object can exist in an eDirectory tree.
B. An organizational CA gets created on each server upgraded to eDirectory 8.6.
C. Before upgrading to eDirectory 8.6, any Organizational CA object must be deleted.
D. After additional servers are upgraded to eDirectory 8.6, it is recommended to delete and re-
create the Organizational CA object.
E. When upgrading to eDirectory 8.6, Certificate Server gets installed by default if there is no
organizational CA in your tree.

Answer: A, E

Section 9, page 9-3

Question 24.
Which of the following file is use to map hostnames to IP addresses.

A. Hosts files
B. Networks File
C. Protocol File
D. Services File

Answer: A

Explanation:
HOSTS File maps hostnames to IP addresses

NETWORKS File maps network names to network addresses

PROTOCOL File maps protocol names to IP protocol numbers

SERVICES File maps service names to TCP and UDP ports

Question 25.
Which is an example of single reference time synchronization method for a network that has 15 NetWare 6 servers?

A. 1 primary time server and 14 secondary time servers.
B. 2 primary time servers and 13 secondary time servers.
C. 1 single reference time server and 14 secondary time servers.
D. 2 single reference time servers and 13 secondary time servers.
E. 1 reference time server, 2 primary time servers, and 12 secondary time servers.
F. 1 single reference time server, 1 primary time server, and 13 secondary time servers.

Answer: C

Normally in environments with 30 or less servers, the network will be set up with a SINGLE time server and the rest of the servers will be secondary
Refer to http://support.novell.com/cgi-bin/search/searchtid.cgi?/10058645.htm

Question 26.
Which statement is true regarding which server License Server Provider (LSP) is installed on?

A. It must be installed on a server that holds a master replica of the [Root] partition.
B. It must be installed on a server that holds a master or read/write replica of the [Root] partition.
C. It must be installed on a server that holds a master or read/write replica of every partition in the
tree.
D. It must be installed on a server that holds a master or read/write replica of the partition that
contains the security container.
E. It must be installed on a server that holds a master or read/write replica of each partition that
contains license certificate objects.

Answer: E

Question 27.
IPX operates at the which OSI layer?

A. Physical Layer
B. Data Link Layer
C. Network Layer
D. Transport Layer

Answer: C

Explanation:
IPX operates at the OSI Network layer.

Question 28.
Some users have been assigned to a user licence, but they log into the network infrequently.

You need to release the licences from these users so regular users can have the licenses assigned to them.

Which utility do you use to release licenses from users?

A. iMonitor
B. iManager
C. Remote Manager
D. NWCONFIG.NLM
E. Server Console Manager

Answer: B

Question 29.
You are configuring a new site for NetDrive.

Which protocol should you specify in the URL to use WebDAV and SSL encryption?

A. FTP
B. SSL
C. HTTP
D. HTTPS
E. iFolder
F. WebDAV

Answer: D

Question 30.
Which statements are true regarding the use of Schema Manager? Select two.

A. You can delete any unused class.
B. You cannot delete or attributes.
C. You cannot add optional attributes to existing classes.
D. You cannot add mandatory attributes to existing classes.
E. You can delete unused attributes that aren't part of the base schema.

Answer: A, E

Question 31.
Which time server types participate in voting for the correct time? Select two

A. Master
B. Primary
C. Reference
D. Secondary
E. Single reference
F. Secondary reference

Answer: B, C

Question 32.
When you install NSS; what is the default percentage of cache buffers that NSS reserves for its use?

A. 10%
B. 20%
C. 30%
D. 40%
E. 50%
F. 60%

Answer: F

Question 33.
In an LDIF ASCII file, what LDIF fields are required? Select two.

A. cn
B. dn
C. uid
D. objectClass
E. attribute type

Answer: B, D

Question 34.
When backing up eDirectory on a NetWare 6 server with an SMS-compliant utility, which items are stored on the backup media? Select two.

A. schema
B. partition information
C. Trustee assignments
D. The objects' fully distinguished names
E. The object ID for every object in the tree

Answer: A, C

Question 35.
Which NetWare 6 tool do you use to configure DNS/DHCP services?

A. iMonitor
B. ConsoleOne
C. Novell iManager
D. NetWare Management Portal

Answer: C

Question 36.
You have decided to create additional Server Certificates objects for the applications on your server.

From within ConsoleOne you bring up the objects list in the New Objects dialog.

What object type should you select to create the Server Certificate object?

A. NDSPKI: Certificate
B. NDSPKI: Key Server
C. NDSPKI: Key Material
D. NDSPKI: Server Certificate
E. NDSPKI: Certificate Authority

Answer: C

Question 37.
You are installing the Native File Pack (NFAP) and do not want to require a simple password to log in to a NetWare server.

Which authentication should you select to meet your criteria?

A. NICI
B. Local
C. Domain
D. Simple
E. Network

Answer: C

Question 38.
Which command performs a read-only assessment of the NSS pool named APPS_POOL?

A. NSS /VERIFY APPS_POOL
B. NSS /REBUILD APPS_POOL
C. NSS /CHECKPOOL.APPS_POOL
D. NSS /POOLVERIFY=APPS_POOL
E. NSS /CHECK /POOL=APPS_POOL

Answer: D

Question 39.
Enter the command that loads the SMS NLMS needed to perform a backup of eDirectory.

Answer: smsstart

Question 40.
Which tool do you use to configure NAT?

A. iMonitor
B. ConsoleOne
C. NATCFG.NLM
D. INETCFG.NLM
E. Novell iManager
F. NetWare Management Portal

Answer: D

Question 41.
In a time provider group, which server carries the most weight when voting on a time?

A. Master
B. Primary
C. Reference
D. Secondary
E. Single reference

Answer: C

Question 42.
Which utility do you use to remove an iFolder account?

A. iMonitor
B. NWCONFIG
C. Novell iManager
D. NetWare Remote Manager
E. Server Management Console

Answer: E

Question 43.
You have a workstation that needs to access IPX applications on an IP-only network.
Where must Compatibility Mode (CMD) be configured in this situation?

A. Nowhere
B. On the workstation
C. On the application server
D. On any NetWare 4.x servers
E. On both the workstation and application server
F. On the workstation and any NetWare 4.x servers

Answer: C

Question 44.
Which file is used to customize the iMonitor configuration?

A. CONFIG.INI
B. NDSIMON.INI
C. IMONITOR.INI
D. NDSIMON.NCF
E. IMONITOR.NCF
F. AUTOEXEC.NCF

Answer: D

Question 45.
You are preparing to upgrade to eDirectory 8.6 and are verifying the version of Novell Certificate Server.

Which utility or server console command is used to verify the version of Novell Certificate Server?
Select two.

A. iMonitor
B. MODULES
C. ConsoleOne
D. MONITOR.NLM
E. NWCONFIG.NLM

Answer: C



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 920-165 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "920-165" Exam

yeah...its very easy to pass!!!!!!

  yeah...its very easy to pass!!!!!!
visit itcertkeys.com
thanks buddy


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-122 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-122" Exam

Designing and Providing Microsoft Volume License Solutions to Large Organizations

 Question 1.
You work as a Microsoft licensing specialist at ITCertKeys.com. ITCertKeys.com consists of a Sales department and a Marketing department. The Sales department has 500 Windows XP Professional client computers while the Marketing department has 200 Windows 2000 Professional client computers. The licenses for the client computers in the Sales department have Software Assurance and were obtained under a Select License agreement. ITCertKeys.com wants to standardize all client computers on the latest version of Windows. However, the Marketing department uses an in-house accounting application that is not compatible with Windows XP Professional.

What should you suggest is a cost-effective license solution for the Marketing department?

A. Use ITCertKeys.com's Select License agreement and obtain a Virtual PC 2004 licenses.
B. Acquire licenses and Software Assurance for Windows 2000 Professional in Sales department.
C. Acquire only Software Assurance for the Sales department, which are licensed for Windows XP Professional.
D. Use the Independent Software Vendor (ISV) Royalty Licensing Program for the custom software solutions and obtain a Services Provider Licensing Agreement (SPLA) for Windows 2000 Professional.

Answer: A

Question 2.
You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com consists of two department named Research and Finance. ITCertKeys.com has hired a new technician named Mia Hamm. Mia Hamm wants to know which offers downgrade rights.

A. All agreements on Select License, Open License and also Software Assurance.
B. Original Equipment Manufacturer (OEM) licenses.
C. Small Business Server Client Access Licenses.
D. User client access licenses

Answer: A

Question 3.
You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. A ITCertKeys.com customer named Rory Allen as contact you. Their company named AB Motors Software Assurance is expiring today. Currently AB Motors has and an Enterprise 5.x Agreement, a Select 5.x License agreement with Software Assurance. Rory Allen wants to know the time-window in which to renew the Software Assurance.

What should you tell him?

A. 1 month and 30 days.
B. 2 month.
C. 90 days.
D. 1 month.

Answer: C

Question 4.
You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. A ITCertKeys.com customer named Andy Booth as contact you. You need to calculate the cost per year of Software Assurance for Systems, Applications, and Servers licenses.

What should you do?

A. Calculate 29% of the Systems license price and Applications license price, and 25% of the Servers license price.
B. Calculate 14% of the Systems license price, Applications license price, and of the Servers license price.
C. Calculate 20% of the Systems license price, 25% of the Applications license price, and 30% of the Servers license price.
D. Calculate 10% of the Systems license price, 12% of the Applications license price, and 12% of the Servers license price.

Answer: A

Question 5.
You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows 2000 Professional. ITCertKeys.com wants to replace the client computers and standardize it to run Microsoft Windows XP Professional and Microsoft Office Professional 2003 without activating the client computers.

Which of the following is the best licensing solution?

A. Obtain licenses and Software Assurance for the Windows XP Professional upgrade and Office 2003 Professional.
B. Use Original Equipment Manufacturer (OEM) to obtain licenses and add Software Assurance.
C. Obtain only Software Assurance for the client computers.
D. Obtain a Services Provider Licensing Agreement (SPLA) to run Windows XP Professional upgrade and Office 2003 Professional.

Answer: B

Question 6.
You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. A ITCertKeys.com customer named Dean Austin as contact you. Dean Austin wants to know more about the Enterprise Agreement. 

With regards to Enterprise Agreement, what is the least amount number of qualified desktops to qualify for it? 

A. 25 desktops.
B. 50 desktops.
C. 100 desktops.
D. 250 desktops.

Answer: D

Question 7.
You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003. ITCertKeys.com consists of a Sales department. The laptop of ITCertKeys.com is used by the sales representatives that has Office XP Professional preinstalled and is running Microsoft Windows 2000 Professional. ITCertKeys.com is using a Select License agreement, which is in use for 24 months. A few weeks ago, ITCertKeys.com acquired 150 desktops with Windows XP Professional and Office 2003 Professional OEM licenses. The CIO of ITCertKeys.com wants to know which are eligible to be enrolled in Software Assurance.

What should you tell him?

A. The laptop computers with the Select License agreement.
B. The Microsoft Windows 2000 Professional laptops.
C. The laptops and the new desktops.
D. The 150 desktops with Windows XP Professional and Office 2003 Professional OEM licenses.

Answer: D

Question 8.
You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. A ITCertKeys.com customer named Clive Wilson as contact you. Clive Wilson has acquired 50 new client computers that have Microsoft Windows XP Professional preinstalled. The licences of Clive Wilson's company needs to be enroll in Software Assurance.

What is the time limit to enroll these licenses in Software Assurance?

A. 2 months.
B. 1 month.
C. 90 days.
D. 3 months.

Answer: C

Question 9.
You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com contains 20,000 desktop computers that run Microsoft Office Professional 2003. ITCertKeys.com has quite a few branch offices in Columbia, Germany, Japan and USA. The ITCertKeys.com users need to adjust the user interface languages often. You need to  assign an Enterprise Agreement.

Which of the following language licensing solution should you choose?

A. On the Enterprise Agreement enrolment you should use the All Languages option.
B. Choose the Listed Languages option on the Enterprise Agreement enrolment and the Cross Language use rights.
C. Use the Cross Language use rights in the Enterprise Agreement and the All Languages option.
D. Use the Platform Independent use rights in the Enterprise Agreement and the All Languages option.

Answer: A

Question 10.
You work as a Microsoft licensing specialist at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. A year ago, ITCertKeys.com has signed a Select License agreement. Because of the abundance of the license acquisitions, ITCertKeys.com had qualified for Select Level B in the Server pool. Last week ITCertKeys.com only purchased only 780 points in the Server pool.

How will the licensing agreement be affected?

A. ITCertKeys.com need to assign a new enrollment under the name.
B. ITCertKeys.com will be re-leveled to Select Level A.
C. ITCertKeys.com needs to purchase software under its current agreement until the agreement expires.
D. ITCertKeys.com must re-negotiate the Select License agreement and must forecast Select Level A.

Answer: B



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 9L0-613 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "9L0-613" Exam

Podcast and Streamed Intemet Media Administration Exam

 Question 1.
Which file format and audio codec should you use when creating enhanced audio podcasts?

A. M4A and AAC
B. WAV and MP3
C. WAV and MP3 VBR
D. M4A and Protected AAC

Answer:  A

Question 2.
Podcast aggregators are applications that search, format, and display podcasts, based on subscriptions to ________.

A. metadata
B. RSS feeds
C. entries from the iTunes Music Store
D. HTML files associated with podcasts

Answer:  B

Question 3.
Weblogs can be published and syndicated using which THREE protocols? (Choose THREE.)

A. RSS
B. RTP
C. RSS2
D. RTSP
E. Atom
F. PCAST

Answer:  A, C, E

Question 4.
Which application can be used to create a live stream that anyone with an Internet connection can access?

A. QuickTime Pro
B. QuickTime Player
C. QuickTime Broadcaster
D. QuickTime Streaming Server

Answer:  C

Question 5.
What feature of the Weblog Server is defined below? An electronic link between two entries that lets a weblog author (or blogger) respond or refer to another blogger's entry by using an entry on his or her own weblog.

A. GUID URL
B. trackback URL
C. syndication URL
D. default domain URL

Answer:  B

Question 6.
You have created a podcast and want users to access it via iTunes or their iPod. 

Which of the following hosting options will NOT help you achieve your goal?

A. iWeb and .Mac
B. Web Server in Mac OS X Server
C. Weblog Server in Mac OS X Server
D. QuickTime Streaming Server in Mac OS X Server

Answer:  D

Question 7.
Where are QuickTime Streaming Server user accounts stored by default?

A. /var/db/netinfo/local.nidb
B. /Library/QuickTimeStreaming/Config/qtusers
C. /System/Library/QuickTimeStreaming/Config/qtusers
D. /Library/Application Support/Apple/QuickTime/Streaming/Users/qtusers

Answer:  B

Question 8.
You want to post a podcast to your new weblog server. You have logged in, configured your first weblog category, and clicked New Entry to create your first weblog entry. 

Which of these steps should you perform NEXT?

A. Click Advanced to add your podcast file.
B. Test your podcast subscription from iTunes.
C. Test your podcast weblog entry from a web browser.
D. Click New Episode to add the first podcast episode to your weblog.

Answer:  A

Question 9.
What is an advantage of streaming media via HTTP?

A. Streaming media via HTTP allows you to multicast live streams.
B. Streaming media via HTTP ensures that all movie packets are delivered and that dropped packets are retransmitted.
C. Streams delivered via HTTP allow users to skip to any point in a movie on the server without downloading the intervening material.
D. Streams delivered via HTTP allow long movies and continuous transmissions to be viewed without having to store more than a few seconds of data locally.

Answer:  B

Question 10.
Which TWO are valid iPod video formats? (Choose TWO.)

A. H.264 (768 kbps, 320x240, AAC-LC up to 160 kbps, 48 kHz)
B. .MOV (2.5 Mbps, 640x480, AAC-LC up to 160 kbps, 48 kHz)
C. MPEG-2 (768 kbps, 320x240, AAC-LC up to 160 kbps, 48 kHz)
D. MPEG-3 (2.5 Mbps, 480x480, AAC-LC up to 160 kbps, 48 kHz)
E. MPEG-4 (2.5 Mbps, 480x480, AAC-LC up to 160 kbps, 48 kHz)

Answer:  A, E 



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 9L0-614 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "9L0-614" Exam

Mac OS X Server Command and Line Install and Configuration v10.4

 Question 1.
A new Xserve is booted from the Mac OS X Server v10.4 installation disc. 

Which password will let you connect to the Xserve remotely?

A. the sequence of characters, "PASSWORD"
B. the first eight characters of the Xserve serial number
C. the first eight characters of the Xserve Ethernet MAC address
D. the first eight characters of the Mac OS X Server software serial number

Answer:  B

Question 2.
Which command-line tool can help you identify the configuration file that is written to when you change an option from the graphical interface?

A. ps
B. otool
C. tcpdump
D. fs_usage
E. netstat -a

Answer:  D

Question 3.
Certain tools must be used to configure a Mac OS X Server computer from the command line. Other tools are optional. 

Which tool below is optional when configuring Mac OS X Server from the command line?

A. ifconfig
B. serversetup
C. networksetup

Answer:  A

Question 4.
You want to enable secure connections to your AFP service. 

Which command can you use to do so?

A. sudo serveradmin settings afp:SSHTunnel = yes
B. sudo serveradmin command afp:setSSHTunnel:yes
C. sudo networksetup -CreateBond afp:SSHTunnel
D. sudo networksetup settings -setappletalk "Built-in Ethernet" = SSH

Answer:  A

Question 5.
Where are records for share points stored?

A. in /etc/afpd.conf
B. in /etc/aftovertcp.cfg
C. in the local NetInfo database
D. in the LDAP database of the Open Directory Master

Answer:  C

Question 6.
Server Admin typically sends commands to servermgrd using ________.

A. SSH
B. SNMP
C. XML over HTTPS
D. an Apple-proprietary data stream over HTTP

Answer:  C

Question 7.
Which statement is true of Server Admin's default SSL configuration?

A. Each server has a unique, self-signed certificate.
B. SSL is disabled because no valid certificates are pre-installed.
C. Each server has a unique certificate signed by Apple's Certificate Authority.
D. All servers use the identical, pre-installed certificate signed by Apple's Certificate Authority.

Answer:  A

Question 8.
You are using the command-line installer to install PretendCoTools.pkg. You want to install it on a non-boot volume mounted on a server. 

Which command will help you determine whether the package supports installation on that volume?

A. hdiutil verify PretendCoTools.pkg
B. installer-volinfo -pkg PretendCoTools.pkg
C. lsbom PretendCoTools.pkg/Contents/Archive.bom
D. cat PretendCoTools.pkg/contents/Resources/preflight

Answer:  B

Question 9.
You want to use the built-in software RAID in Mac Os X Server to create a RAID 1 set across two disks in an Xserve. 

Which command will accomplish this goal?

A. megaraid create R1 -drive 0 1 -stripesize 64
B. diskutil createRAID mirror RAID_Volume HFS+ disk0 disk1
C. diskutil createRAID stripe RAID_Volume HFS+ disk0 disk1
D. diskutil createRAID stripe-distributed-parity RAID_Volume HFS+ disk0 disk1

Answer:  B

Question 10.
You want to update the software on a headless Xserve over an SSH connection to the server, but one of the component installers has a graphical element that displays a splash screen. 

How can you prevent the installer from launching this graphical element?

A. Run softwareupdate with the -headless option.
B. Set the environment variable COMMAND_LINE_INSTALL to 1.
C. Use SystemStarter to start the HeadlessStartup startup item.
D. Download the updates with softwareupdate -d, then install them with installer -noGUI.

Answer:  B


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 9L0-615 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "9L0-615" Exam

Network Account Management v10.1 Exam

 Question 1.
Which comparison of Mac OS X Server and Windows user account password policy enforcement is TRUE?

A. Mac OS X Server does not let you set inactivity limits on user account passwords, but Windows does.
B. Both Mac OS X Server and Windows allow you to enforce a minimum length for user account passwords.
C. Neither Mac OS X Server nor Windows has a graphical user interface for entering user account password policies.
D. Both Mac OS X Server and Windows require that user account passwords be different from account names.
E. Mac OS X Serverlets you require that account passwords be different from account names, but Windows does not.

Answer:  A

Question 2.
How do you configure an Apple Remote Desktop admin computer to use a remote Task Server?

A. Run the cfgtaskserver command line utility with the Task Server's IP address as its parameter.
B. Open Remote Desktop and select your Task Server from the list that appears in the Task Server window.
C. Open Remote Desktop on the Task Server, and type the host name or lP address of the ARD admin computer.
D. Open Remote Desktop and select "Use remote Task Server" in the Task Server preferences pane of Remote Desktop, then enter the host name or IP address of your Task Server.

Answer:  D

Question 3.
In Workgroup Manager, which managed preference pane lets you configure proxy server settings for accounts?

A. Sharing
B. Internet
C. Network
D. Applications
E. System Preferences

Answer:  C

Question 4.
What is the maximum number of computers that can appear in the All Computers list in Remote Desktop?

A. 1,000
B. 10,000
C. There is no defined upper limit.
D. The upper limit depends on your user license.

Answer:  D

Question 5.
In Workgroup Manager, which management frequency cannot be used to manage the System Preferences for accounts?

A. Never
B. Once
C. Often
D. Always

Answer:  B

Question 6.
Which Login preference can you set in Workgroup Manager for computer lists, but not for users or for groups?

A. Enable Fast User Switching
B. Open Specified Items at Login
C. Add Network Home Share Point
D. Hide Opened Login Items after Login

Answer:  A

Question 7.
How must you authenticate if you want to create a managed network view?

A. You must authenticate in the managed domain as a domain administrator.
B. You must authenticate with the Apple Remote Desktop password on your server computer.
C. You must authenticate as an administrator on the Mac OS X Server computer that manages your domain.
D. No special authentication is required; anyone can use Network preferences to create a network view named 'Managed" which will be managed automatically by the Mac OS X Server computer that manages your domain.

Answer:  A

Question 8.
You want your Mac OS X Server to provide SMB service. 

What directory service role should it be configured to use?

A. The Mac OS X Servers role must be Domain Member.
B. The Mac OS x Server's role must be Standalone Server.
C. The Mac OS X Server's role must be Backup Domain Controller.
D. The Mac OS X Server's role must be Primary Domain Controller.
E. The Mac OS X Server can use any directory service role available.

Answer:  E

Question 9
Which statement best describes how you configure managed Applications preferences in
Workgroup Manager?

A. You create a list of users who can open any application on the local drive.
B. You create a list of users who can open specified applications when logged into their mobile account.
C. You select an account, then create a list of applications that can or cannot be opened by that account.
D. You create a list of approved or unapproved applications, then apply the list to selected user accounts.

Answer:  C

Question 10.
You can generate client computer reports on your Apple Remote Desktop admin computer, but not using your remote ARD Task Server. 

What is the most likely cause of this problem?

A. SSH is disabled on client computers.
B. The Mac OS X firewall is blocking port 22.
C. The Mac OS X firewall is blocking port 3283.
D. The network DNS is improperly configured.

Answer:  C



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 9L0-616 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "9L0-616" Exam

Xsan Administration v10.4 Exam

 Question 1.
Which method of increasing the storage capacity of a SAN does NOT require that a volume be unmounted and stopped?

A. add LUNs
B. add volumes
C. add storage pools
D. reduce block allocation size

Answer:  B

Question 2.
You want to use different block allocation sizes for two applications. To do so, you must set up a ________ for each application.

A. LUN
B. volume
C. storage pool
D. metadata controller

Answer:  B

Question 3.
You try to save a file from an Xsan client to an Xsan volume, but receive an alert message that indicates error -1425 has occurred. 

What is the MOST LIKELY cause?

A. The Xsan volume is busy.
B. Saving the file would cause you to exceed your hard quota.
C. Another user is saving changes simultaneously to the same file on the Xsan volume.
D. You are trying to save the file to a folder or volume where you do not have write permissions.

Answer:  B

Question 4.
Xsan is a ________ file system.

A. local
B. cluster
C. network
D. distributed

Answer:  B

Question 5.
You are creating an Xsan volume in Xsan Admin. Below is a list of steps required to accomplish this task. 

In what order should you perform these steps?

A. label LUNs
B. create LUNs
C. create volumes
D. create storage pools
E. add LUNs to storage pools

A. BACDE
B. BADEC
C. CBADE
D. CDBAE

Answer:  A

Question 6.
In Xsan, you can set up an affinity between a folder and a ________.

A. volume
B. hard disk
C. storage pool
D. metadata controller

Answer:  C

Question 7.
Fibre Channel switched fabrics use ____-bit addresses.

A. 8
B. 16
C. 24
D. 32

Answer:  C

Question 8.
Which command-line utility can you use to return a LUN to a state in which Disk Utility can initialize it?

A. cvfsck
B. cvmkfs
C. cvlabel
D. cvadmin
E. cvupdatefs

Answer:  C

Question 9.
You try to set up an access control list (ACL) for several folders on your Xsan volume, but you are unable to do so. 

What is MOST LIKELY preventing you from completing this task?

A. ACLs have not been enabled for your Xsan volume.
B. Your client is not bound to the Open Directory master.
C. Your controller is not bound to the Open Directory master.
D. Your Xsan volume has not been mounted on the primary metadata controller.

Answer:  A

Question 10.
Setting up a separate storage pool to store both metadata and journal data can ________.

A. complicate user quota configuration
B. improve I/O throughput for user data
C. increase free disk space on the primary metadata controller
D. cause data loss due to multiple files having the same address

Answer:  B


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 156-215 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "156-215" Exam

Check Point Security Administration NGX

 Question 1.
Which VPN-1 NGX feature or command allows Security Administrators to revert to earlier versions of the same Security Policy?

A. Policy Package management
B. cpinfo
C. cpconfig
D. Database Revision Control
E. upgrade_export/import

Answer:  D

Question 2.
In SmartView Tracker, you see an entry for an outbound connection showing address translation. But when setting SmartView Tracker to show all entries for that connection, only outbound entries show. 

What is the possible cause for this?

A. The entry is for a Manual Dynamic NAT connection, from a specific host infected by a worm.
B. The entry is for a Manual Static NAT connection, where inbound traffic is managed by a separate rule.
C. The entry is for a Static NAT connection, from a specific host that has been infected by a worm.
D. The entry is for a Dynamic NAT connection from a specific host.

Answer:  B

Question 3.
Which of the following commands is used to restore VPN-1 NGX configuration information?

A. gunzip
B. cpconfig
C. fw ctl pstat
D. cpinfo
E. upgrade_import

Answer:  E

Question 4.
Which OPSEC server is used to prevent users from accessing certain Web sites?

A. CVP
B. DEFENDER
C. URI
D. FTP
E. UFP

Answer:  E

Question 5.
Your organization ITCertKeys.com's security infrastructure separates Security Gateways geographically. You must request a central license for one remote Security Gateway. 

How would you request and apply the license?

A. Request a central license, using the remote Security Gateway's IP address. Apply he license locally with the fwputlic command.
B. Request a central license, using the SmartCenter Server's IP address. Apply the license locally on the remote Gateway with the fwputlic command.
C. Request a central license, using your SmartCenter Server's IP address. Attach the license to the remote Gateway via SmartUpdate.
D. Request a central license, using the remote Gateway's IP address. Attach the license to the remote Gateway via SmartUpdate.
E. Request local licenses for all Gateways separately. Apply the license locally on the remote Gateways with the fwputlic command.

Answer:  C

Question 6.
How do you create more granular control over commands, such as CWD and FIND, in FTP data connections?

A. Use Global Properties > Security Server settings.
B. Use the gateway object's Security Server settings.
C. Use the Service field of the Rule Base.
D. Use an FTP resource object.
E. Use FTP Security Server settings in SmartDefense.

Answer:  E

Question 7.
Which of the following is the final step in a VPN-1 NGX backup?

A. Test restoration in a non-production environment, using the upgrade_import command.
B. Move the *.tgz file to another location.
C. Copy the conf directory to another location.
D. Run the upgrade_export command.
E. Run the cpstop command.

Answer:  B

Question 8.
Choose the BEST sequence for configuring user management on SmartDashboard, for use with an LDAP server:

A. Configure a server object for the LDAP Account Unit, enable LDAP in Global Properties, and create an LDAP server using an OPSEC application.
B. Configure a server object for the LDAP Account Unit, enable LDAP in Global Properties, and create an LDAP resource object.
C. Enable LDAP in Global Properties, configure a host-node object for the LDAP Server, and configure a server object for the LDAP Account Unit.
D. Configure a server object for the LDAP Account Unit, and create an LDAP resource object.
E. Configure a workstation object for the LDAP server, configure a server object for the LDAP Account Unit, and enable LDAP in Global Properties.

Answer:  C
340, Check Point Security Administration NGX I Student Handbook

Question 9.
You want to create an IKE VPN between two VPN-1 NGX Security Gateways, to protect two networks. The network behind one Gateway is 10.15.0.0/16, and network 192.168.9.0/24 is behind the peer's Gateway. 

Which type of address translation should you use, to ensure the two networks access each other through the VPN tunnel?

A. Hide NAT
B. None
C. Dynamic NAT
D. Static NAT
E. Manual NAT

Answer:  B

Question 10.
Yoav is a Security Administrator preparing to implement a VPN solution for his multisite organization. 

To comply with industry regulations, Yoav's VPN solution must meet the following requirement:
* Portability: Standard
* Key management: Automatic, external PKI
* Session keys: Changed at configured times during a connection's lifetime
* Key length: No less that 128-bit
* Data integrity: Secure against inversion and brute-force attacks

What is the most appropriate setting Yoav should choose?

A. IKE VPNs: AES encryption for IKE Phase 1, and DES encryption for Phase 2; SHA1 hash
B. IKE VPNs: SHA1 encryption for IKE Phase 1, and MD5 encryption for Phase 2; AES hash
C. IKE VPNs: CAST encryption for IKE Phase 1, and SHA1 encryption for Phase 2; DES hash
D. IKE VPNs: DES encryption for IKE Phase 1, and 3DES encryption for Phase 2; MD5 hash
E. IKE VPNs: AES encryption for IKE Phase 1, and AES encryption for Phase 2; SHA1 hash

Answer:  E


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 642-544 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "642-544" Exam

Implementing Cisco Security Monitoring, Analysis and Response

 Question 1.
The definitions on the left to the appropriate terms on the right
 
Answer:
 
Question 2.
What will happen if you try to run a Cisco Security MARS query that will take a long time to complete?

A. After submitting the query, the Cisco Security MARS GUI screen will be locked up until the query is completed.
B. The query will be automatically saved as a rule.
C. The query will be automatically saved as a report.
D. You will be prompted to "Submit Batch" to run the query in batch mode.

Answer:  D

Question 3.
The Cisco Security MARS appliance supports which protocol for data archiving and restoring?

A. NFS
B. TFTP
C. FTP
D. Secure FTP
E. SSH

Answer:  A

Question 4.
What is a benefit of using the dollar variable (as in $TARGET01) when creating queries in Cisco Security MARS?

A. The dollar variable enables multiple queries to reference the same common 5-tuple information using a variable.
B. The dollar variable ensures that the probes and attacks that are reported are happening to the same host.
C. The dollar variable allows matching of any unknown reporting device.
D. The dollar variable allows matching of any event type groups.
E. The dollar variable enables the same query to be applied to different reports.
F. The dollar variable enables the same query to be applied to different cases.

Answer:  B

Question 5.
A Cisco Security MARS appliance cannot access certain devices through the default gateway. Troubleshooting has determined that this is a Cisco Security MARS configuration issue. 

Which additional Cisco Security MARS configuration will be required to correct this issue?

A. use the Cisco Security MARS GUI or CLI to enable a dynamic routing protocol
B. use the Cisco Security MARS CLI to add a static route
C. use the Cisco Security MARS GUI to configure multiple default gateways
D. use the Cisco Security MARS GUI or CLI to configure multiple default gateways

Answer:  B

Question 6.
What are three ways to add devices to the Cisco Security MARS appliance? (Choose three.)

A. import the devices from CiscoWorks
B. import the devices from Cisco Security Manager
C. load the devices from seed files
D. use SNMP auto discovery
E. use CDP to automatically discover the neighboring devices
F. manually add the devices, one at a time

Answer:  C, D, F

Question 7.
Which action enables the Cisco Security MARS appliance to ignore false-positive events by either dropping the events completely, or by just logging them to the database?

A. creating system inspection rules using the drop operation
B. creating drop rules
C. inactivating the rules
D. inactivating the events
E. deleting the false-positive events from the Incidents page
F. deleting the false-positive events from the Event Management page

Answer:  Pending

Question 8.
Which three statements are true about Cisco Security MARS rules? (Choose three.)

A. There are three types of rules.
B. Rules can be saved as reports.
C. Rules can be deleted.
D. Rules trigger incidents.
E. Rules can be defined using a seed file.
F. Rules can be created using a query.

Answer:  B

Question 9.
Which of the following alert actions can be transmitted to a user as notification that a Cisco Security MARS rule has fired, and that an incident has been logged? (Choose two.)

A. Distributed Threat Mitigation
B. Short Message Service
C. SNMP trap
D. XML notification
E. syslog
F. OPSEC-LEA (clear and encrypted)

Answer:  A, D, F

Question 10.
To configure a Microsoft Windows IIS server to publish logs to the Cisco Security MARS, which log agent is installed and configured on the Microsoft Windows IIS server?

A. pnLog agent
B. Cisco Security MARS agent
C. SNARE
D. None. Cisco Security MARS is an agentless device.

Answer:  B, D



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for FN0-405 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "FN0-405" Exam

Foundry Networks Certifed Network Professional

 Question 1.
Exhibit:
 
Which bridge or bridges in the exhibit will be a Non-Designated Bridge?

A. R&D
B. HR
C. Distribution_1
D. Distribution_2

Answer:  A, B

Question 2.
Which of the following would be used to apply the same policies to a group of BGP neighbors?

A. route-reflector group
B. Community group
C. Confederation group
D. Peer group

Answer:  D

Question 3.
Exhibit:
 
Which port or ports in the exhibit will be blocked?

A. R&D e3
B. R&D e1
C. R&D 20
D. HR e10
E. HR e11
F. HR e20
G. Distribution_2 e10
H. Distribution_2 e1

Answer:  C,H

Question 4.
Exhibit:
 
Which bridge in the exhibit will be a Non-Designated Bridge?

A. R&D
B. HR
C. Distribution_1
D. Distribution_2

Answer:  D

Question 5.
Exhibit:
 
Which port or ports the exhibit will be blocked?

A. R&D e3
B. R&D e1
C. HR e10
D. HR e11
E. Distribution_2 e10
F. Distribution_2 e1

Answer:  A, D

Question 6.
Router ITCertKeys A has three iBGP peers: Router ITCertKeys 1 Router ITCertKeys 2 and Router ITCertKeys 3. Routers ITCertKeys 1, ITCertKeys 2, and ITCertKeys 3 are advertising the same destination networks. Router ITCertKeys 1 announces routes with the default local preference. Router ITCertKeys 2 announces the same routes with a local preference of 200. Router ITCertKeys 3 announces the same routes with a local preference of 1. 

Which path does Router ITCertKeys A take?

A. Router ITCertKeys 1
B. Router ITCertKeys 2
C. Router ITCertKeys 3
D. not applicable, because local preference only applies to ebgp peers
E. not applicable, because local preference only applies to local router

Answer:  C

Question 7.
A change in a route state, from up to down or down to up is called?

A. route dampen
B. port flap
C. route flap
D. port dampen

Answer:  C

Question 8.
What cli command shows the flap dampening statistics?

A. show ip bgp summary
B. show ip bgp neighbor  flap-summary
C. show ip bgp neighbor  flap-statistics
D. show ip bgp neighbor  route-flap

Answer:  C

Question 9.
What is the BGP4 state called when the router is waiting to start the BGP4 process?

A. Admin
B. Connect
C. Active
D. Idle
E. Confirm
F. Established

Answer:  D

Question 10.
Exhibit:
 
What does the * in the status field of network 204.17.220.0/24 indicate?

A. This is the best route to use
B. This route is currently dampened and is unusable
C. Has a history of flapping and is unreachable now
D. Has a history of flapping but is currently usable

Answer:  D


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.