Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "50-654" Exam

pass today & thanks

 

Question 1.
Identify the NDS user object created by default.

A. Supervisor
B. Container
C. Admin
D. Template

Answer: C

Question 2.
What are the mandatory property values for a user object?

A. Login name, preferred server.
B. Login name, lastname.
C. Login name, location.
D. Login name, workstation type.

Answer: B

Question 3.
Which statement best describes the implications of giving a user the supervisor object right to a server object?

A. This gives the user ability to create another server object in the tree.
B. This gives the user ability to shut down the server using the NetWare Administrator utility.
C. This gives the user the ability to place IRFs on any container in the tree.
D. This gives the user Supervisor file system rights to all volumes linked to that server.
E. This gives the user ability to delete any object in the tree.

Answer: D

Question 4.
Identify the correct statements concerning All Property Rights vs. Selected Property Rights. (Choose two)

A. The All Properties option can only be used at the container level.
B. The Selected Properties option grants the level of access an object trustee has to all properties
of the object.
C. The Selected Properties option can only be used at the container level.
D. Rights granted through Selected Properties overwrite rights granted through All Properties for
the selected property.
E. The All Properties option grants the level of access an object trustee has to all properties of the
object.

Answer: D, E

Question 5.
Which statement is true regarding Novell Application Launcher?

A. It creates and displays application objects.
B. It takes a snap shot of the current machine configuration.
C. It delivers application to the start menu.
D. It allows applications to be distributed to users workstations and to be managed as objects in
the NDS tree.

Answer: D

Question 6.
Which statement is true of a public access printer? (Choose two)

A. It has no corresponding NDS object.
B. It offers simple or automatic client installation.
C. It has low security.
D. It offers a full range of event and status notification options.

Answer: A, C

Question 7.
Which statement object best describes the container object?

A. An NDS object located at the end of a branch in the NDS tree.
B. An NDS object that serves as an originator and the final destination of network traffic.
C. An NDS object that holds other objects and provides them with rights and services.
D. An NDS object that identifies categories of information associated with an object.

Answer: C

Question 8.
What is the maximum number of node addresses available on the IP Supernet 215.100.16.0/21?

A. 254
B. 510
C. 1022
D. 2046
E. 4094

Answer: D

Question 9.
What us the responsibility of the Application layer of the OSI model?

A. Error control.
B. Frame synchronization.
C. Session administration.
D. Provide network services.
E. End-to-end delivery and session multiplexing.

Answer: D

Question 10.
Which layer of the OSI model is responsible for routing?

A. Network
B. Session
C. Physical
D. Transport
E. Data link
F. Application

Answer: A

Question 11.
A network administrator was assigned two class C network addresses despite needing a single network with 600 nodes. How might the administrator achieve a single, 600 node network?

A. Route the networks.
B. Bridge the networks.
C. Subnet the networks.
D. Supernet the networks.

Answer: D

Question 12.
Which two IP address criteria are required for Supernetting? (Choose two)

A. Addresses must be consecutive.
B. The address must be Class B.
C. The subnetmask must contain at least 20 bits.
D. The third octet of the first address must be evenly divisible by 2.
E. The third octet of the first address must be evenly divisible by 23.

Answer: A, D

Question 13.
Which features are associated with link state routing? (Choose two)

A. Counts hops.
B. Converges quickly.
C. Uses a cost metric.
D. Requires very little configuration.
E. Recalculates entire routing database before forwarding changes.

Answer: B, D

Question 14.
Which elements form an IPX address used for internetwork communication? (Choose three)

A. Subnet mask
B. Node address
C. Socket number
D. Network address

Answer: B, C, D

Question 15.
Select the link state routing protocol. (Choose two)

A. RIP
B. LAT
C. SNA
D. NLSP
E. RTMP
F. OSPF

Answer: D, F

Question 16.
Which statement is true of a controlled access printer? (Choose two)

A. It has low security.
B. It offers simple or automatic silent installation.
C. It has no corresponding NDS object.
D. It offers a full range of event and status notification options.

Answer: B, D

Question 17.
Network Address Translation (NAT) can be configured to operate in three different modes.
Which mode is used for permanent one-to-one mapping of public registered IP addresses to unregistered IP addresses inside a private network?

A. IP
B. IPX
C. Static
D. Dynamic
E. Static and Dynamic

Answer: C

Question 18.
Which type of DHCP object should you configure to manually assign an IP address to a specific workstation on the network?

A. IP Address object
B. DHCP Subnet object
C. Subnet Address object
D. Subnet Address Range object

Answer: A

Question 19.
Which NetWare service provides a way to update DNS with accurate A records and Pointer records for address assignments?

A. DNS
B. DHCP
C. Dynamic DNS
D. Dynamic DHCP

Answer: C

Question 20.
Network Address Translation (NAT) can be configured to operate in 3 different modes. Certain hosts (such as web or FTP servers) on the private network need to be accessed by hosts on the public network, but hosts on the private network do not need to access resources on the public network.
Which mode should NAT be configured to use?

A. IP
B. IPX
C. Static
D. Dynamic
E. Static and Dynamic

Answer: C

Question 21.
When you are configuring DHCP, which object identifies the IP addresses available for dynamic assignment?

A. DHCP Server object
B. Subnet Pool object
C. DNS-DHCP Locator object
D. Subnet Address Range object

Answer: D

Question 22.
Which statement regarding DNS zones and Ipv6 addresses is true?

A. The standard DNS zone supports both Ipv4 and Ipv6 addresses by default.
B. The IN-ADDR.ARPA zone maps Ipv6 addresses to domain names.
C. The IP6.INT zone type is used to resolve domain names to Ipv6 addresses.
D. The standard DNS zone contains records that resolve domain names into Ipv6 addresses.

Answer: C

Question 23.
Which utility is used to configure Network Address Translation on a NetWare 5.1 server?

A. INETCFG
B. NIASCFG
C. NWADMIN
D. NWCONFIG

Answer: A

Question 24.
Which type of DHCP object should you configure to manually assign an IP address to a specific workstation on the network?

A. IP Address object.
B. Subnet Pool object.
C. IP Configuration object.
D. Subnet Address Range object.

Answer: A

Question 25.
As the system administrator, you have decided to do a full backup every Sunday followed by daily differential backups. On Wednesday, what data will be backed up by the differential backup, and what happens to the archive bit?

A. It will back up all data, regardless of when or if it has previously been backed up, and the
archive bit is cleared.
B. It will back up all files that have been created or modified since the Tuesday differential
backup, and the archive bit will be cleared.
C. It will back up all files that have been created or modified since the Tuesday differential
backup, and the archive bit will not be cleared.
D. It will back up all data that has been created or modified since Sunday’s full backup, and the
archive bit will be cleared.
E. It will back up all data that has been created or modified since Sunday’s full backup, and the
archive bit will not be cleared.

Answer: E

Question 26.
In preparation for backing up the file system using NWBACK32 on the backup host NetWare 5.1 server, you have completed the following steps:
1. Loaded the tape device driver on the host server.
2. Configured a print queue for the backup operation.
What is the next step?

A. Load TSANDS on the NetWare 5.1 host server.
B. Load TSA500 on the NetWare 5.1 host server.
C. Load TSA500 on the NetWare 5.1 target server.
D. Load TSANDS on a NetWare 5.1 server with a replica.
E. Load the NetWare BackupRestore NLMs on the host server.

Answer: B

Question 27.
What IPX routing protocol offers load balancing capabilities without reducing the physical size of the internetwork?

Answer: NLSP

Question 28.
What IPX routing protocol is best suited for an internetwork that contains 138 routers, multiple redundant routes that require load balancing, and three WAN links?

Answer: NSLP

Question 29.
What network standard specifies two counter-rotating rings?

A. FDDI
B. IEEE 802.3
C. IEEE 802.5
D. IEEE 802.3u
E. IBM Token Ring

Answer: A

Question 30.
Which network IP address is reserved for loopback?

A. 0.0.0.0
B. 1.0.0.0
C. 127.0.0.0
D. 255.0.0.0

Answer: C

Question 31.
If a node has an Ipv4 address of 200.100.98.97, on what class of network is the node located?

A. Class A.
B. Class B.
C. Class C.
D. Class D.
E. Class E.

Answer: C

Question 32.
What is the maximum segment length allowed in a 100BASE-TX LAN?

A. 100 meters
B. 412 meters
C. 1000 meters
D. 10,000 meters

Answer: A

Question 33.
A network administrator needs to create 12 subnets. What is the minimum number of bits required to create the 12 subnets?

A. 3 bits
B. 4 bits
C. 5 bits
D. 12 bits

Answer: B

Question 34.
What NetWare utilities will allow you to delete or move directories and their contents?

A. NetWare Administrator, NCOPY, FILER, FLAG, RENDIR.
B. NetWare Administrator, NCOPY, FILER, FLAG.
C. NetWare Administrator, NCOPY, FILER, FLAG, RENDIR, NDIR.
D. NetWare Administrator, FILER.
E. NetWare Administrator, NCOPY, FILER

Answer: D

Question 35.
Which object allow you to restrict available volume space? (Choose two)

A. User
B. Organizational unit
C. Container
D. Directory
E. Tree

Answer: A, D

Question 36.
User MarcJ has a container profile and user scripts. In what order will these scripts be executed?

A. User, profile, container.
B. Profile, user, container.
C. User, container, profile
D. Container, user, profile.
E. Container, profile, user.

Answer: E

Question 37.
Which Z.E.N work agents allows you to connect to and manage a workstation using the remote control utility?

A. Printer Agent.
B. Workstation Registration Agent.
C. Remote Control Agent.
D. Remote User Agent.

Answer: B

Question 38.
Which NDS object or objects are associated with the container policy package?

A. Users, user groups and containers.
B. Workstation, workstation groups and containers.
C. Containers only.
D. User groups and containers.
E. Users and containers.

Answer: C

Question 39.
Identify the true statement concerning Help Desk Policies.

A. They only apply to users and appear only in user policy packages.
B. They only apply to the containers and appear only in container policy packages.
C. They only apply to workstation and appear only in the workstation policy packages.
D. They apply to both users and workstations and appear in user and workstation policy
packages.

Answer: A

Question 40.
Which utility do you use to configure DHCP objects that reside in the NDS tree?

A. NDS Manager
B. NetWare Administrator
C. NetWare Management Portal
D. DNS/DHCP Management Console

Answer: D

Question 41.
Which type of DNS zone maps IP addresses to domain names?

A. IP6.INT zones
B. Primary zones
C. IN-ADDR.ARPA zones
D. RootServerInfo zones

Answer: C

Question 42.
Which DHCP object contains all server-specific configuration and policy information?

A. DHCP Server object
B. DHCP Subnet object
C. Subnet Pool object
D. Subnet Address Range object

Answer: A

Question 43.
Which DNS object points to a root name server on the Internet?

A. DNS Zone object.
B. DNS Name Server object.
C. RootServerInfo Zone object
D. Resource Record Set object.

Answer: C

Question 44.
You need to assign multiple Subnet objects to service the same physical network segment. Which DHCP object should you create?

A. IP Address Object.
B. Subnet Pool object.
C. DHCP Subnet object.
D. Subnet Address Range object.

Answer: B

Question 45.
After you have installed Novel DNS/DHCP Services, which NLM do you run to extend the NDS schema and create the three DNS/DHCP default objects?

Answer: DNIPINST.NLM

Question 46.
As the system administrator, you have decided to do a full backup every Sunday followed by daily incremental backups. On Friday, what data will be backed up by the incremental backup, and what happens to the archive bit?

A. It will back up all data, regardless of when or if it has previously been backed up, and the
archive bit is cleared.
B. It will back up all files that have been created or modified since the Thursday incremental
backup, and the archive bit will be cleared.
C. It will back up all files that have been created or modified since the Thursday incremental
backup, and the archive bit will not be cleared.
D. It will back up all data that has been modified since Sundays’ full backup, and the archive bit
will be cleared.
E. It will back up all data that has been modified since Sunday’s full backup, and the archive bit
will not be cleared.

Answer: B

Question 47.
What IPX routing protocol generally uses the least bandwidth, provides the fastest routing updates, and offers scalability for large internetworks?

Answer: NLSP

Question 48.
Which two protocols in the TCP/IP protocol stack correspond to the Transport layer of the OSI model? (Choose two)

A. IP
B. UDP
C. FTP
D. TCP
E. HTTP
F. ICMP

Answer: B, D

Question 49.
How many bits are there in an Ipv4 address?

Answer: 32

Question 50.
What is a responsibility of the Application layer of the OSI model?

A. Error control.
B. Frame synchronization.
C. Session administration.
D. Provide network services.
E. End-to-end delivery and session multiplexing.

Answer: D
 



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-162 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-162" Exam

Forefront Protection for Endpoints and Applications, Configuring

 Question 1.
You work as a Security Administrator at ABC.com. The network consists of a single Active Directory Domain Services (AD DS) domain with servers running Windows Server 2008 and client computers running Windows 7 Professional. A pool of Windows 2008 Servers hosts the Microsoft Exchange Server 2007 environment. You have recently implemented Forefront Protection for Exchange Server (FPE) 2010 to improve the security of the Microsoft Exchange Server 2007 environment. You discover that some mailboxes have been infected by malware. However there are no malware infection notifications in the Forefront Protection for Exchange Server Console. You need to immediately check specific mailboxes to see if they are infected by the malware.

What should you do?

A. You should run a Forefront Client Security scan on the client computers.
B. You should use Forefront Protection for Exchange to perform a real-time scan of the 
    mailboxes.
C. You should use Forefront Protection for Exchange to perform an on-demand scan of the  
    mailboxes.
D. You should install Microsoft Security Essentials on client computers.

Answer: C

Explanation:

Question 2.
You work as a Network Administrator at ABC.com. Your responsibilities include the security of the computers in the network. The network consists of a single Active Directory Domain Services (AD DS) domain with servers running Windows Server 2008 and client computers running Windows 7 Professional. A pool of Windows 2008 Servers hosts the Microsoft Exchange Server 2007 environment. You have recently implemented Forefront Protection for Exchange Server (FPE) 2010 to improve the security of the Microsoft Exchange Server 2007 environment.

How would you configure FPE to enable spam filtering?

A. By using the Forefront Management Shell to run the Set-FSEScheduledScan cmdlet.
B. By using the Forefront Management Shell to run Set-FseSpamFiltering the cmdlet.
C. By using the Forefront Management Shell to run the Set-FseSpamContentCheck cmdlet.
D. By using the Forefront Management Shell to run the Set-FSERealtimeScan cmdlet.

Answer: B

Explanation:

Question 3.
You are responsible for the security of the ABC.com network. The network consists of a single Active Directory Domain Services (AD DS) domain with servers running Windows Server 2008 and client computers running Windows 7 Professional. The company uses Forefront Protection for Exchange Server (FPE) 2010 to protect the Microsoft Exchange Server 2007 environment. While monitoring the logs in the FPE console, you discover that users in the company have received spam emails. The subject line in each of the emails is: “Free access to our new online tournament!” You note that the sender email address is spoofed to appear to be from a different domain for each email.

How can you block this spam attack in future?

A. You should configure an allowed sender custom filter in FPE.
B. You should configure a file filtering custom filter in FPE.
C. You should configure a keyword filtering custom filter in FPE.
D. You should configure a sender-domain custom filter in FPE.
E. You should configure a subject line filtering custom filter in FPE.

Answer: E

Explanation:

Question 4.
You work as a Network Administrator at ABC.com. Your responsibilities include the security of the computers in the network. The network consists of a single Active Directory Domain Services (AD DS) domain named ABC.com and includes servers running Windows Server 2008 and client computers running Windows 7 Professional. Four servers running Windows 2008 Server host the Microsoft Exchange Server 2007 environment. Two servers named ABC-Edge1 and ABC-Edge2 are configured as Microsoft Exchange Edge Transport servers.

Two servers named ABC-Mbox1 and ABC-Mbox2 are configured as Microsoft Exchange Mailbox Servers and also run the Microsoft Exchange Hub Transport server roles. You have recently implemented Forefront Protection for Exchange Server (FPE) 2010 to improve the security of the Microsoft Exchange Server 2007 environment. You need to configure email scanning in Forefront Protection for Exchange Server (FPE) 2010.

How should you configure FPE to scan all emails sent from within the ABC.com domain to email recipients in the ABC.com domain?

A. You should configure FPE to perform Internal scanning on ABC-Mbox1 and ABC-Mbox2.
B. You should configure FPE to perform Internal scanning on ABC-Edge1 and ABC-Edge2.
C. You should configure FPE to perform Inbound scanning on ABC-Mbox1 and ABC-Mbox2.
D. You should configure FPE to perform Inbound scanning on ABC-Edge1 and ABC-Edge2.
E. You should configure FPE to perform Outbound scanning on ABC-Edge1 and ABC-Edge2.

Answer: A

Explanation:

Question 5.
You are responsible for the security of the ABC.com network. The network consists of a single Active Directory Domain Services (AD DS) domain named ABC.com and includes servers running Windows Server 2008 and client computers running Windows 7 Professional. The network environment is secured using Microsoft Forefront. A server named ABC-ShPoint1 runs Microsoft Office SharePoint Server 2010. The SharePoint system is protected by Forefront Protection 2010 for SharePoint (FPSP). 

How can you configure the environment to ensure that scanning is performed on all documents that pass through the SharePoint Portal?

A. By logging into the SharePoint portal and configuring the scanning for uploaded and 
    downloaded documents.
B. By logging into the SharePoint Central Administration website and configuring the scanning for 
    uploaded and downloaded documents.
C. By logging into the Forefront Protection for SharePoint console and configuring the scanning 
    for uploaded and downloaded documents.
D. By logging into IIS Manager on the SharePoint Web Server and configuring the scanning for 
    uploaded and downloaded documents.
E. By logging into the Security Centre on the SharePoint Database Server and configuring the 
    scanning for uploaded and downloaded documents.

Answer: B

Explanation:

Question 6.
You work as a Security Administrator at ABC.com. The network consists of a single Active Directory Domain Services (AD DS) domain with servers running Windows Server 2008 and client computers running Windows 7 Professional. The company uses Forefront Protection for Exchange Server (FPE) 2010 to protect the Microsoft Exchange Server 2007 environment. While monitoring the logs in the FPE console, you discover that users in the company have received spam emails.

How can you block a future spam attack based on repeated words in the body of the email?

A. by configuring an allowed sender custom filter in FPE.
B. by configuring a file filtering custom filter in FPE.
C. by configuring a sender-domain filtering custom filter in FPE.
D. by configuring a keyword custom filter in FPE.
E. by configuring a subject line filtering custom filter in FPE.

Answer: D

Explanation:

Question 7.
You work as a Network Administrator at ABC.com. Your responsibilities include the security of the computers in the network. The network consists of a single Active Directory Domain Services (AD DS) domain with servers running Windows Server 2008 and client computers running Windows 7 Professional. The company uses Forefront Protection for Exchange Server (FPE) 2010 to protect the Microsoft Exchange Server 2007 environment. While monitoring the logs in the FPE console, you discover that users in the company have received spam emails. You examine the email headers and discover a common source IP address.

How can you block a future spam attack based on the IP address?

A. by configuring an allowed sender custom filter in FPE.
B. by configuring a file filtering custom filter in FPE.
C. by configuring a sender-domain filtering custom filter in FPE.
D. by configuring a keyword custom filter in FPE.
E. by configuring a connection filter in FPE.

Answer: E

Explanation:

Question 8.
You are responsible for the security of the ABC.com network. The network consists of a single Active Directory Domain Services (AD DS) domain with servers running Windows Server 2008 and client computers running Windows 7 Professional. A pool of Windows 2008 Servers hosts the Microsoft Exchange Server 2010 environment. You have recently implemented Forefront Protection for Exchange Server (FPE) 2010 to secure the Microsoft Exchange Server 2010 environment. You need to ensure the maximum security when users access their emails on the Exchange servers. You want to ensure that emails are scanned for as much malware as possible.

Which two of the following actions should you perform? (Choose two).

A. You should enable on-demand scanning.
B. You should enable real-time scanning.
C. You should select the option to scan message body.
D. You should select the option to scan after engine update.
E. You should increase the scanning timeout value.

Answer: B, D

Explanation:

Question 9.
You work as a Security Administrator at ABC.com. The network consists of a single Active Directory Domain Services (AD DS) domain with servers running Windows Server 2008 and client computers running Windows 7 Professional. A pool of Windows 2008 Servers hosts the Microsoft Exchange Server 2010 environment. You have recently implemented Forefront Protection for Exchange Server (FPE) 2010 to secure the Microsoft Exchange Server 2010 environment. A new scan engine definition is released for Exchange Server 2010.

How can you immediately apply new definitions in Forefront Protection for Exchange Server?

A. by running the Set-FseSignatureUpdate PowerShell cmdlet.
B. by running the Start-FseSignatureUpdate PowerShell cmdlet.
C. by running the Get-FseSignatureOptions PowerShell cmdlet.
D. by running the Set-FseEngineManagement PowerShell cmdlet.

Answer: B

Explanation:

Question 10.
You work as a Network Administrator at ABC.com. Your responsibilities include the security of the computers in the network. The network consists of a single Active Directory Domain Services (AD DS) domain named ABC.com and includes servers running Windows Server 2008 and client computers running Windows 7 Professional. A pool of servers running Windows 2008 Server hosts the Microsoft Exchange Server 2010 environment.

Two servers named ABC-Edge1 and ABC-Edge2 are configured as Microsoft Exchange Edge Transport servers. Two servers named ABC-Mbox1 and ABC-Mbox2 are configured as Microsoft Exchange Mailbox Servers and also run the Microsoft Exchange Hub Transport server roles. You have recently implemented Forefront Protection for Exchange Server (FPE) 2010 to secure the Microsoft Exchange Server 2010 environment. You receive reports from users saying that they receive undeliverable mail bounce messages for emails that they did not send. You suspect that the sender field has been forged in the failed messages.

How can you ensure that users do not receive undeliverable mail messages for emails that they did not send?

A. You should configure a sender filter on ABC-Mbox1 and ABC-Mbox2.
B. You should configure a backscatter filter on ABC-Edge1 and ABC-Edge2.
C. You should disable Delivery Status Notifications (DSN) messages on ABC-Edge1 and 
    ABCEdge2.
D. You should configure a separate Exchange mailbox to receive all Delivery Status Notifications 
    (DSN) messages.

Answer: B

Explanation:



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.