|
Question 1.
Rewards, feedback, encouragement, and support are essential for which types of learners?
A. Learners who are well-motivated
B. All of the above
C. Learners who are not motivated
D. Learners who are easily distracted
Answer: B
Question 2.
While teaching a course, you notice that one of your students is extremely shy. They have not contributed to class discussions or answered any questions. As an instructor, you want to be able to monitor their progress. What can you do to accomplish this objective?
A. Ask them questions during individual exercises
B. Ask them questions during class discussions
C. Look for non-verbal indications of understanding
D. Ask them questions during group exercises
Answer: A, C
Question 3.
What are the advantages of using a computer with a LCD projector over a flip-chart?
A.) Visibility is typically better
B.) Class discussion notes can be easily distributed
C.) Most suited to remain visible as a reference point throughout a class
D.) Chance of failure is less
Answer: A, B
Question 4.
An instructor has an anecdote that would be an effective example but may also be offensive to certain people. What should the instructor do?
A. Privately ask one of the students to tell the anecdote
B. Warn the class that the following anecdote is not meant to be offensive
C. Choose another more appropriate anecdote
D. Test the anecdote out on this class to determine if is offensive
Answer: C
Question 5.
Assessment tools (tests, exercises and other instruments to measure learner performance) are usually developed by:
A. The students
B. The client
C. The course designer
D. The instructor
Answer: C
Question 6.
For this question, determine if the instructor's action will likely or unlikely meet the given objective. Objective: Learners identify appropriate reasons for expending time and energy in learning Action: During the course introduction, the instructor lists a few ways in which the instructor feels the course material will benefit the learners work and personal lives, and then proceeds in the first section.
A. Likely, because the instructor has illustrated how the organization will benefit
B. Unlikely, because students have already displayed appropriate reasons for expending time
and energy by attending the course
C. Likely, because the learners will translate the benefits of the course material to their work and
personal lives.
D. Unlikely, because the instructor did not solicit learner feedback to uncover work and personal
motivations
Answer: D
Question 7.
An instructor uses general analogies and applications to further explain concepts presented in the course. Judging the effectiveness of this approach, did the instructor's communication skills enhance or limit the value of the course content to the learners?
A. Enhanced the value by using valid examples.
B. The instructor's communication skills do not typically affect the value of the course content
C. Limited the value of the course content by not using specific analogies and applications related
to the audience
D. Enhanced the value by using general analogies and applications that everyone should
understand
Answer: C
Question 8.
The two major components being assessed when Evaluating the Delivery of Instruction are:
A. The students performance
B. The modifications to course materials
C. The facilities adequacy
D. The instructor's abilities
Answer: B, D
Question 9.
How often should an instructor change the presentation medium to maintain interest and retention?
A. Every 10 minutes
B. Every 5 minutes
C. Every hour
D. Every 30 minutes
Answer: A.
Question 10.
An instructor wants to use direct questioning to assess the individual learners understanding. The instructor asks questions by going up and down rows in the class. Is this an effective application of direct questioning?
A. Yes, this method does not show favoritism
B. Yes, this method ensures all learners participate
C. No, by using a predictable pattern can cause lack of interest
D. No, predictable patterns show favoritism
Answer: C
Question 11.
Which of the following would be the most effective presentation style?
A. Keep the course materials closed and do not use any notes or references
B. Read only key points from your notes and course materials, followed by explanations
C. Read the course materials word for word from the book so nothing is missed
D. Read your own notes word for word so nothing is missed but appropriate course adjustments
are used
Answer: B
Question 12.
Who should contribute to the evaluation of the delivery of instruction?
A. The students only
B. The students, the client, and the instructor
C. The students and the client
D. The students and the instructor
Answer: B
Question 13.
At the beginning of a topic, an instructor plans a short motivational activity followed by an one hour lecture on an LCD projector. Is this an effective motivational strategy?
A. Yes, because adult learners respond best to long lecture presentation formats
B. Yes, because the learners are engaged at the beginning
C. No, because learner interest needs to be maintained
D. No, because adult learners do not respond well to being involved in course activities
Answer: C
Question 14.
In a number of course evaluations, the students indicated that the instructor did not appear comfortable with all of the course content. What competency does the instructor need to work on?
A. Manage the learning environment
B. Analyze course materials and learner information
C. Use media effectively
D. Assure preparation of the instructional site
Answer: B
Question 15.
When administering a test, it is important for the instructor to inform the students of which of the following?
A. The instructions on how to complete the test
B. The plans for disseminating and using the results
C. The score of each student of the previous class
D. The rationale for the test
Answer: A, B, D
Question 16.
When motivational strategies are modified by the instructor, what further action should the instructor take?
A. Indicate which modifications may indicate possible design changes
B. Modify the course materials, documenting the necessary course changes
C. Document and provide reasons for the changes
D. Indicate which modifications were unique to specific situations
Answer: A, C, D
|
Question 1. Exhibit: ITCertKeys router#show ip route Codes: C - connected, S - static, I - IGRP, R - RIP, M -mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, EEGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, *-candidate default U - per-user static route, o - ODR T - traffic engineered route Gateway of last resort is not set 172.16.0.0/24 is subnetted, 2 subnets B 172.16.10.0 [20/0] via 10.1.1.100, 00:00:24 B 172.16.11.0 [20/0] via 10.1.1.100, 00:00:24 172.26.0.0/28 is subnetted, 3 subnets B 172.26.1.48 [200/0] via 192.168.1.50, 00:00:31 B 172.26.1.32 [200/0] via 192.168.1.50, 00:00:31 B 172.26.1.16 [200/0] via 192.168.1.50, 00:00:31 10.0.0.0/8 is variable subnetted, 2 subnets, 2 masks B 10.0.0/8 [20/0] via 10.1.1.100, 00:00:24 C 10.1.1.0/24 is directly connected, Serial3 192.168.1.0/28 is subnetted, 3 subnets C 192.168.1.32 is directly connected, Serial1 C 192.168.1.48 is directly connected, Serial2 C 192.168.1.16 is directly connected, Serial0 192.168.2.0/24 is variably subnetted, 2 subnets, 2 masks B 192.168.2.64/28 [20/0] via 10.1.1.100, 00:00:26 Based on the show ip route output in the exhibit, how can you tell if a BGP route is learned via IBGP or EBGP? A. By the Metric B. By the Next Hop C. By the Admin Distance D. By the code "B" or "B Ex" Answer: C Explanation: admin distance. Distance of EBGP is 20, Distance of IBGP is 200. Question 2. What is the range of values from which an ISP can assign a private AS number? A. 32768 to 65535 B. 64512 to 65535 C. 65101 to 65535 D. 65001 to 65535 Answer: B Explanation: An autonomous system (AS) is a collection of networks under a single technical administration. Some other definitions refer to a collection of routers or IP prefixes, but in the end they all mean the same entity. The important principle is the technical administration, which means sharing the same routing protocol and routing policy. Legal and administrative ownership of the routers does not matter in terms of autonomous systems. Autonomous systems are identified by AS numbers, 16-bit unsigned quantities ranging from 1 to 65535. Public AS numbers are assigned by Internet registries. For customers that need AS numbers to run BGP in their private networks, a range of private AS numbers (64512 - 65535) has been reserved. Reference: Configuring BGP on Cisco Routers volume 1 p.2-4 Question 3. Network topology exhibit What can prevent the corresponding BGP session from being successfully established? A. ITCertKeys 2 and ITCertKeys 5 cannot establish the IBGP session because ITCertKeys 2 and ITCertKeys 5 are not directly connected. B. ITCertKeys 1 and ITCertKeys 2 establish the EBGP session if the BGP holddown timers between the two EBGP neighbors are different. C. ITCertKeys 2 and ITCertKeys 5 cannot establish the IBGP session using the loopback0 interface if the EBGP-multihop value is set to the default value. D. ITCertKeys 1 and ITCertKeys 2 cannot establish the EBGP session using the loopback0 interface if the EBGP-multihop value is set to the default value. Answer: D Question 4. Exhibit: How should the EBGP session between R1 and R2 be established to enable load balancing? (Choose three) A. Use the maximum-paths 2 option. B. Use the ebgp-multihop 2 option. C. Use static routes on R1 and R2 to reach the other router's loopback. D. Establish a single EBGP session using the loopback0 interface IP address on R1 and R2. E. Establish twp EBGP sessions using both the S0 and S1 interface IP address on R1 and R2. Answer: B, C, D Explanation: 1. B R1 - R2 requires a EBGP ebgp-multihop of 2. 2. C Requires two static routes going to each other router loopback interface 3. D A BGP session of course is required. Only a single connection is required. Use the loopback is what allows things to work even during a failure Wrong Answer 1. A This is not required because there is only on EBGP path. Would need two if static routes were not define and were going between different routers 2. E Not an efficient way of doing things requires double the tables and bandwidth for updates Question 5. Which two statements are true about an EBGP session or an IBGP session? (Choose two.) A. IBGP uses AS-Path to detect routing information loops within the AS. B. EBGP routes have a default Admin Distance of 20 and IBGP routes have a default Admin Distance of 200. C. No BGP attributes are changed in EBGP updates except for the next-hop attribute if next-hop- self is configured. D. Routes learned from an EBGP peer not advertised to another EBGP peer to prevent routing information loops. E. IBGP uses split horizon to prevent routing information loops; routes learned from an IBGP peer are not advertised to another IBGP peer. Answer: B, E Question 6. Network Topology Exhibit Exhibit #2: ITCertKeys2 configuration When ITCertKeys2 sends the TCP SYN packet to ITCertKeys3 to establish the IBGP session, what will be the source IP address of the TCP SYN packet from ITCertKeys2 to ITCertKeys3? A. 2.2.2.2 B. 3.3.3.3 C. 10.1.1.1 D. 10.1.1.2 Answer: C Question 7. Network topology Exhibit How should the EBGP session between ITCertKeys1 and ITCertKeys2 be established to enable load balancing? (Choose three.) A. Use the maximum-paths 2 option B. Use the ebgp-multihop 2 option C. Use static routes on ITCertKeys1 and ITCertKeys2 to reach the other router's loopback D. Establish a single EBGP session using the loopback0 interface IP address on ITCertKeys1 and ITCertKeys2 E. Establish two EBGP sessions using both the S0 and D1 interface IP address on ITCertKeys1 and ITCertKeys2 Answer: B, C, D Question 8. Exhibit: What can prevent the corresponding BGP session from being successfully established? A. ITK2 and ITK5 cannot establish the IBGP session if the BGP Hello Timer between the two IBGP neighbors is different. B. ITK1 and ITK2 cannot establish the EBGP session if the BGP Hello Timer between the two EBGP neighbors are different. C. ITK1 and ITK2 cannot establish the EBGP session using the loopback0 interface if the EBGP- mutlihop value is set to 2. D. ITK2 and ITK5 cannot establish the IBGP session because they are not using the loopback0 interface to establish the IBGP session. E. ITK2 and ITK5 cannot establish the IBGP session if ITK3 and ITK4 have an access list permitting only TCP port 80 and IP protocol number 89 traffic. Answer: E Question 9. The Outbound Route Filter (ORF) capability is negotiated between BGP neighbors during the BGP ____ process via the _____ message. A. route propagation; Update B. session establishment; Open C. route propagation; Notification D. route propagation; Route Refresh E. session establishment; Route Refresh Answer: B Explanation: Capabilities are negotiated during session establishment in the open message. Appendix C P456 Internet routing Architectures. Wrong 1. A needs to be decided before update 2. C notification is an error message 3. D not a message type 4. E not a message type Question 10. BGP table Address Prefix AS-Path Next hop Communities Other attr. 10.0.0.0 /8 65100 65101 1.1.1.1 65101:111 … … … … … … IP routing table Protocol Address Prefix Next-hop Outgoing interface BGP 10.0.0.0 /8 1.1.1.1 OSPF 1.1.1.1 /32 172.16.1.2 Ethernet 0 conn. 172.16.1.0 /24 Ethernet 0 IP routing table Protocol Address Prefix Next-hop Outgoing interface BGP 10.0.0.0 /8 1.1.1.1 OSPF 1.1.1.1 /32 172.16.1.2 Ethernet 0 conn. 172.16.1.0 /24 Ethernet 0 To forward a packet to 10.0.0.0/8, the router perform the following steps: Step 1. Search the ip routing table for a route to reach the 10.0.0.0/8 network. Step 2. ___________________________ Step 3. Find the connected outgoing interface to reach 172.16.1.2. Step 4. Arp for the 172.16.1.2 MAC address if it is not already in the ARP cache. Step 5. Store the 172.16.1.2 MAC address in the Fast Switching cache for successive packets to network 10.0.0.0. What is step 2? A. Search the BGP table for an IGP route to reach the BGP next-hop 1.1.1.1. B. Search the BGP table for an IBGP route to reach the BGP next-hop 1.1.1.1. C. Search the IP routing table for an IGBP route to reach the BGP next-hop 1.1.1.1. D. Search the IP routing table for an IGP route to reach the BGP next-hop of 1.1.1.1. Answer: D Explanation: Routing table specifies to get to 10.0.0.0 goto 1.1.1.1. To get to 1.1.1.1 do a lookup in the routing table on the next hop.
|
Question 1. How is a community string used by IBM Tivoli Application Dependency and Discovery Manager V7.1? A. To authenticate Apache servers B. As an access credential for SNMP devices C. To access only non-Cisco network devices D. As a base value to encrypt passwords incollation.properties Answer: B Question 2. Data level security has been enabled on an IBM Tivoli Application Dependency and Discovery Manager V7.1 (TADDM) server. Access Collection 'AC1' contains all Linux Computer Systems. 'User1' has access to AC1 and AC2, an Access Collection of Oracle databases. A discovery finds new Linux computer systems. Which statement is true? A. User1 receives notification of the new Linux computer systems. B. AC1 is flagged and the administrator must reset the Access Collection. C. User1 will only see the details of the original set of Linux computer systems. D. User1 will see the details of both the original set of Linux computer systems and the newly discovered systems. Answer: C Question 3. You suspect that an IBM Tivoli Application Dependency and Discovery Manager V7.1 process is having memory problems. Which action should be taken first to determine if the application has failed because of an out of memory condition? A. Check the log/services/core.log file B. Check for core.files in the bin directory C. Check thecore.XXX.XXX.XXX.dmp files found in the log directory D. Check the service log file of the service suspected of running out of memory Answer: B Question 4. Which api command is used to delete all configuration items from the IBM Tivoli Application Dependency and Discovery Manager V7.1 topology? A. api.sh -u -p delete all B. api.sh -u -p topology clear C. api.sh -u -p topology delete all D. api.sh -u -p collation topology all Answer: B Question 5. Which log settings are available in IBM Tivoli Application Dependency and Discovery Manager V7.1? A. ERROR, WARN, INFO, DEBUG, EXTRA, OFF B. DEBUG, INFO, WARN, EXTRA, TRACE, NONE C. FATAL, ERROR, WARN, INFO, DEBUG, TRACE D. INFO, DEBUG, WARN, TRACE, EXTRA, MINIMUM Answer: C Question 6. Which command found in the support/bin directory can be used in testing whether an IBM Tivoli Application Dependency and Discovery Manager V7.1 has valid access credentials for a UNIX machine? A. testssh.py B. wmiscan.jy C. encryptprops.sh D. testconnection.sh Answer: A Question 7. Which command is used to test SSH? A. UNIX: sshtest.sh or Windows: sshtest.bat B. UNIX: testssh.sh or Windows: testssh.cmd C. UNIX: execssh.sh or Windows: execssh.bat D. UNIX: testssh.py or Windows: testssh.bat Answer: D Question 8. What is the effect of turning on the SplitSensorLog setting? A. Messages from sensors are in separate folders with a file for each discovery. B. Messages from sensors are in separate files within a folder for each discovery. C. Messages from sensors are grouped by log levels and placed in files within a folder for each discovery. D. Messages from sensors are in separate files in the folder Log/sensors that contains only the latest discovery. Answer: B Question 9. Which parameter in the collation.properties file holds the value that is used by Jetty HTTPS server, GUI HTTPS server, and is required for adding domains to the IBM Tivoli Application Dependency and Discovery Manager V7.1 Enterprise Server? A. com.collation.websslport B. com.collation.commsslport C. com.collation.sslpassphrase D. com.collation.JettyGui.sslpwd Answer: C Question 10. What are two available application descriptor file format types? (Choose two.) A. Base application descriptor B. Module application descriptor C. Component application descriptor D. Hardware server application descriptor E. Application server application descriptor Answer: A, C
|
Question 1. HATS Web applications can be deployed to WebSphere Application Server running on which operating systems? A. Windows, AIX, IBMi, z/OS, or Linux on z B. IBMi or z/OS only C. Linux on Systemi or System z only D. Windows or Linux only Answer: A Question 2. Text replacement can be defined at various artifact levels. What is NOT a valid level to define text replacement? A. project level B. rendering item level C. screen customization level D. transformation level Answer: D Question 3. To help with debugging HATS applications on a test or production system, a display terminal window can be displayed. Which statement is FALSE about the display terminal window? A. Turning on the display terminal option can seriously affect performance or overload the server. B. The display terminal functions can be turned on using the extended HATS application button standard. C. It is possible to interact with the host application using the host screen in the terminal window. D. The display terminal functions can be turned on for any new host connections by selecting the Enable Display Terminal box on the Trace Settings panel. Answer: B Question 4. What happens when a user double-clicks an item in the HATS rich client Applications view? A. A new instance of the selected application is opened. B. The existing instance of the selected application is activated. C. The user is prompted to update the connection settings for the selected application. D. The user is shown a list of all running instances of the application. Answer: A Question 5. Which widget allows manual entry of text and provides a valid value list? A. Combo B. List C. Popup D. Text input Answer: C Question 6. Which statement is true about SSL connection security in HATS? A. The connection from Web browser to application server can be encrypted using the SSL tab in the connection editor. B. An encrypted connection can be used without importing a certificate if the server certificate is signed by a well-known certificate signer, such as Thawte. C. An SSL-secured application can be tested offline using the host simulator facility. D. 3270, 3270e, 5250, 5250W, and VT connections can be encrypted with SSL. Answer: B Question 7. After creating a custom host component class, which action must be performed to ensure it functions properly at runtime? A. store the new component in the /CustomComponent folder in the Navigator view B. turn on Global Variable Overrides in Project Settings C. enable the CustomComponent class in the style sheet D. modify the WAR class loader policy of the HATS application Answer: D Question 8. What is the scope of shared global variables in a rich client environment? A. only instances of the same HATS rich client application B. only instances of HATS rich client applications in the same EAR C. all application instances running in the environment D. Shared global variables are not available in a HATS rich client environment. Answer: C Question 9. On which environment(s) are HATS Web applications, developed using the HATS Toolkit, supported to be deployed and run? A. Eclipse RCP and Lotus (R) Expeditor Client B. IBMWebSphere application server production runtime C. IBM and non-IBM Portal Server production runtime D. any J2EE-compatible application server available on the market Answer: B Question 10. Which action will NOT disconnect the transformation connection when designing a HATS Web application? A. requiring end users to press the Disconnect button on the HATS application keypad B. using of theDisconnectOnClose parameter for a HATS portlet C. configuring a session timeout for the Web application D. using the Disconnect action on an application or screen customization event Answer: B
|
Question 1. You work as the exchange administrator at ITCertKeys.com. The ITCertKeys.com network contains an Exchange Server 2007 Organization. The Active Directory structure of ITCertKeys.com consists of a root domain and a single child domain. The root domain is in ITCertKeys1 and the child domain in ITCertKeys2. You are in the process of installing Exchange Server 2007 in the child domain. In order to accomplish this task you decide to run the Setup /PrepareADcommand in the root domain. In your solution you need to ensure that Exchange can be installed on the child domain as well. What should you do? (Each correct answer presents a complete solution. Choose TWO.) A. You should run the Setup /ForestPrep command in the root domain. B. You should run the Setup /PrepareAllDomains command in the root domain. C. You should run the Setup /PrepareDomain command in the root domain. D. You should run the Setup /PrepareDomain command in the child domain. Answer: B, D Question 2. You work as the exchange administrator at ITCertKeys.com. The ITCertKeys.com network contains an Exchange Server 2007 Organization. The Active Directory forest of ITCertKeys.com contains a single site named ITCertKeysA. ITCertKeysA consists of a root domain and a single child domain. You have received instruction from the CIO to prepare the Active Directory as well as the domains. This task needs to be accomplished before you install the Exchange Server 2007 server. What should you do? (Each correct answer presents part of the solution. Choose TWO.) A. You should run the Setup /PrepareAllDomains command. B. You should run the Setup /ForestPrep command. C. You should run the Setup /PrepareAD command. D. You should run the Setup /DomainPrep command. Answer: A, C Question 3. You are employed as the exchange administrator at ITCertKeys.com. The ITCertKeys.com network contains an Exchange 2007 Organization. ITCertKeys.com has its headquarters in Stockholm where you are located. Due to company growth ITCertKeys.com opens a branch office in Athens and hires another administrator named Amy Wilson. You have received instruction from the CIO to configure the least amount permissions necessary for Amy Wilson who must be enabled to prepare Active Directory for Exchange Server 2007. What should you do? A. You must add the user account of the administrator to an Enterprise Admins group. You must add the administrator to an Exchange Full Administrator at the organizational level. B. You must add the user account of the administrator to the Exchange Enterprise Server group. You must add the user account of the administrator to the Domain Admins group. C. You must add the user account of the administrator to an Enterprise Admins group. You must add the user account of the administrator to a Schema Admins group. D. You must add the user account of the administrator to the Domain Admins group. You must add the administrator to an Exchange Full Administrator at the organizational level. Answer: D Explanation: The user is required to be a domain admin and Exchange Full Administrator. Does not require to be a member of the schema admins group as it does not mention having to extend the schema due to Windows 2008 upgrade etc. Question 4. You are employed as the exchange administrator at ITCertKeys.com. The ITCertKeys.com Exchange Server network has just been migrated to Exchange Server 2007. You are responsible for managing the Exchange network for ITCertKeys.com. Every mailbox server on the ITCertKeys.com network is configured with two storage groups as well as two databases for each of the storage groups. You have received instruction from the CIO to ensure that the ITCertKeys.com Exchange Server network is fault tolerant. You thus decide to implement local continuous replication (LCR). Now you need to configure the Mailbox server with LCR. What should you do? A. First change the ratio to a single database per storage group. Then run the Enable-DatabaseCopy cmdlet. Then run the Enable-StorageGroupCopy cmdlet. B. First run the Disable-StorageGroupCopy cmdlet. Then change the databases into a single storage group. Then run the Enable-StorageGroupCopy cmdlet. C. First change the database ratio to a single database per storage group. Then run the Disable-StorageGroupCopy cmdlet. Then run the Enable-DatabaseCopy cmdlet. D. First run the Disable-StorageGroupCopy cmdlet. Then change the databases ratio into a single storage group. Then run the Enable-DatabaseCopy cmdlet. Answer: A Question 5. You are employed as the exchange administrator at ITCertKeys.com. You are in the process of installing a new Exchange Server 2007 Organization. The native Exchange Server 2007 environment of ITCertKeys.com has the following server roles installed: * One Edge Transport server named ITCertKeys-EX01 * One Hub Transport server named ITCertKeys-EX02 You have received instruction from the CIO to configure the e-mail routing. In your solution you need to ensure that ITCertKeys-EX01 is configured is such a way so as to route e-mail between the Exchange organization and the Internet; and that ITCertKeys-EX02 is configured in such a way so as to route Internet e-mail to ITCertKeys-EX01. What should you do? (Each correct answer presents part of the solution. Choose TWO.) A. On ITCertKeys-EX02, first open the Exchange Management Console. Then import the Edge Subscription file. B. On ITCertKeys-EX01, first create a new Send connector named ITKEdge - Internet. Then add the *domain as an address space and specify to use DNS to route e-mail automatically. Then add ITCertKeys-EX01 as a source server. C. On ITCertKeys-EX02, first create a new Send connector named ITKHub. Then add the *domain as an address space and specify to use DNS to route e-mail automatically. Then add ITCertKeys-EX02 as a source server. D. On ITCertKeys-EX01, first open the Exchange Management Shell. Then export a new Edge Subscription file. Answer: A, D Question 6. You work as the exchange administrator at ITCertKeys.com. The ITCertKeys.com network contains an Exchange Server 2007 Organization. You are responsible for managing the Exchange network for ITCertKeys.com. You are currently preparing your Exchange 2007 organization in order to install the Mailbox server role on a newly purchased Exchange Server 2007 server named ITCertKeys-EX10. You have received instruction from the CIO to ensure that the ITCertKeys-EX10 read and write performance is optimal. In addition you also need to implement redundancy on ITCertKeys-EX10. You thus have to choose the appropriate type of array on which the mailbox database should be placed. What should you do? A. Make use of a dedicated RAID 10 array. B. Make use of a dedicated RAID 0 array. C. Make use of a dedicated RAID 1 array. D. Make use of a RAID 1 array that contains the operating system partition. Answer: A Question 7. You are employed as the exchange administrator at ITCertKeys.com. You are in the process of converting your Exchange 2000 Server environment to Exchange Server 2007. The ITCertKeys.com network contains a Windows 2000 native mode Active Directory domain as well as an Exchange 2000 organization. The Exchange 2000 organization is configured to run in mixed mode. You have been informed by the CIO that the schema master, the domain naming master as well as the PDC emulator all run on a Microsoft Windows 2000 Server domain controller. You receive instructions to prepare the environment for Exchange 2007. What should you do? (Each correct answer presents part of the solution. Choose TWO.) A. You should change the mixed mode Exchange 2000 organization to native mode. B. You should move the PDC emulator role to a Windows Server 2003 domain controller that has Service Pack 1 installed. C. You should move the schema master role to a Windows Server 2003 domain controller that has Service Pack 1. D. You should move the domain naming master role to a Windows Server 2003 domain controller that has Service Pack 1. Answer: A, C Question 8. You are employed as the exchange administrator at ITCertKeys.com. The ITCertKeys.com network contains an Exchange 2007 Organization. You are responsible for managing the Exchange network for ITCertKeys.com. You decide to install a two-node Single Copy Cluster (SCC) Mailbox server on the Exchange Server 2007 organization of ITCertKeys.com. You then name the network adapters ITKPublic and ITKPrivate. You have received instruction from the CIO to configure the TCP/IP binding order for the cluster servers. What should you do? A. You should move the Public connection to the top of the Adapters and Bindings tab. B. You should move the Private connection to the top of the Adapters and Bindings tab. C. You should open the properties of the cluster and move the ITKPrivate network to the top of the Network Priority tab. D. You should open the properties of the cluster and move the ITKPublic network to the top of the Network Priority tab. Answer: A Explanation: The Public connection must be first in order in the binding tab. Question 9. You are employed as the exchange administrator at ITCertKeys.com. The ITCertKeys.com network contains an Exchange Server 2007 Organization. ITCertKeys.com has its headquarters in Chicago and a branch office in Dallas. You have been assigned to the Dallas site office. Your instructions are to install Exchange Server 2007 on the new server. To ensure that no problems occur that might hinder the users of the Dallas site to perform their duties you decide to install the required components on the new server before you install Exchange Server 2007. What should you do? (Each correct answer presents part of the solution. Choose THREE.) A. Install Windows PowerShell 1.0. B. Install Network News Transfer Protocol (NNTP). C. Install Simple Mail Transfer Protocol (SMTP). D. Install Microsoft Management Console (MMC) 3.0. E. Install Microsoft .NET Framework 1.1. F. Install Microsoft .NET Framework 2.0 Answer: A, D, F Question 10. You work as the exchange administrator at ITCertKeys.com. The ITCertKeys.com network contains an Exchange Server 2007 Organization. You are responsible for managing the Exchange network for ITCertKeys.com. The ITCertKeys.com network contains a stand-alone server named ITCertKeys-EX01. You have received instruction from the CIO to install the appropriate Exchange Server 2007 server role on ITCertKeys-EX01. What should you do? A. The Hub Transport server role should be installed on ITCertKeys-EX01. B. The Mailbox server role should be installed on ITCertKeys-EX01. C. The Client Access server role should be installed on ITCertKeys-EX01. D. The Edge Transport server role should be installed on ITCertKeys-EX01. Answer: D
|
Question 1. Some of the computers in your company run Microsoft Office 2003. Other computers run Microsoft Office 2007. Users report that when they save documents on computers that run Office 2007, users on computers that run Microsoft Office 2003 are unable to edit those documents. You need to ensure that users on computers that run Office 2003 are able to edit Office 2007 documents. What should you do? A - Add the Office Compatibility Pack to the computers that run Office 2007. B - Add the Office Compatibility Pack to the computers that run Office 2003. C - Install Office 2003 Service Pack 2 on the computers that run Office 2003. D - Install MSXML 6.0 on computers that run Microsoft Office 2003. Answer: B Question 2. You are planning to upgrade to Microsoft Office 2007. You need to identify documents that are not compatible with Office 2007. What should you do? A - Run the OMPM File Scanner tool. B - Run the Application Compatibility Analyzer. C - Run the Office File Converter. D - Run the Office Customization Tool. Answer: A Question 3. You need to install Microsoft Office 2007 on computers in the Sales department and computers in the Accounting department. The Sales department requires only Microsoft Word and Microsoft Excel. The Accounting department requires only Microsoft Excel and Microsoft InfoPath. You need to deploy Office 2007 to computers in the Sales department and the Accounting department. You create a shared folder named \\Server1\Office. What should you do next? A - Copy the Microsoft Office 2007 installation files to the \\Server1\Office folder. Create an .MSP file for each department. Create a script for each department that uses the appropriate .MSP file. B - Copy the Microsoft Office 2007 installation files to the \\Server1\Office folder. Create an .MST file for each department. Create a script for each department that uses the appropriate .MST file. C - In the \\Server1\Office folder, create a folder for each department. Copy the Microsoft Office 2007 installation files to each folder. Create a CUSTOM.MSP file in each folder. Instruct users to run setup from the appropriate folder. D - In the \\Server1\Office folder, create a folder for each department. Copy the Microsoft Office 2007 installation files to each folder. Create a CUSTOM.MST file in each folder. Instruct users to run setup from the appropriate folder. Answer: A Question 4. Your company is deploying Windows Vista. You create a reference computer and capture an image of that computer by using the ImageX utility. You need to modify the reference computer image to meet the following requirements: Set the Internet Explorer home page to your companys home page. Remove Games from the image. Add a new network card device driver. You must accomplish this task by using the least administrative effort. What should you do? A - Use the ImageX utility to mount the image. Copy an unattended setup answer file to the \Windows folder in the image. B - Use the ImageX utility to mount the image. Apply an unattended setup answer file to the image. C - Restore the image of the reference computer. Modify the configuration of the reference computer. Recapture an image of the reference computer. D - Restore the image of the reference computer. Copy an unattended setup answer file to the \Windows folder on the reference computer. Recapture an image of the reference computer. Answer: B Question 5. You are deploying Microsoft Office 2007 to computers that run Windows Vista. The computers are configured to support the English, Spanish, and French languages. Users report that only the English language is displayed in Office 2007 applications. You need to ensure that Office 2007 displays the English, Spanish and French languages. What should you do? A - Add the Microsoft Office 2007 Single Language Packs to the root of the Office 2007 installation share. Instruct users to run the Office 2007 Setup program. B - Create a subdirectory for each language on the Office 2007 installation share. Add the Office 2007 Single Language Packs to the appropriate subdirectory. Edit the config.xml file on the installation share. Instruct users to run the Office 2007 Setup program. C - Use the PKGMGR command to add the Windows Vista language packs to the client computers. Edit config.xml file on the installation share. Instruct users to run the Office 2007 Setup program. D - Use the PKGMGR command to add the Windows Vista language packs to the installation source for Windows Vista. Edit the unattend.xml file in the Windows Vista installation source. Instruct users to run the Office 2007 Setup program. Answer: B Question 6. You are installing Microsoft Office 2007. You configure two distribution points. One distribution point is named \\Server1\Office2007. The other distribution point is named \\Server2\Office 2007. You need to ensure that if one distribution point becomes unavailable, Microsoft Office 2007 will use the other distribution point. What should you do? (Each correct answer presents a complete solution. Choose two.) A - On each distribution server, create an administrative installation point. B - On the root of each distribution point, create a shortcut which points to the additional distribution point. C - Create a Custom.MSP file. D - Configure the Config.XML file. Answer: C, D Question 7. You plan to deploy Microsoft Office 2007 using a script. You need to create a distribution share for Microsoft Office 2007. You create a shared folder on a server. What should you do next? A - Run the Microsoft Office 2007 installation program with the /config switch. B - Run the Microsoft Office 2007 installation program with the /admin switch C - Install Microsoft Office 2007 on a reference computer. Copy the MSOCache folder to the root of the installation share. D - Copy the installation files from the source media to the root of the shared folder. Answer: D Question 8. You use the Application Compatibility Toolkit (ACT) to analyze computers before deploying Windows Vista. You create a data collection package which contains the Internet Explorer Compatibility Evaluator and the Inventory Collector. Company policy requires that all software package installation be done during non-peak hours. You need to ensure the data collection package is deployed to computers. What should you do? A - Create a user logon script. Add the data collection package to the logon script. B - Create a computer software installation policy in a Group Policy object. C - Create an SMS Package which contains the data collection package. Advertise the package to install at a specified time. D - Create a user software installation policy in a Group Policy object. Answer: C Question 9. You deploy Windows Vista on 500 computers in your network. You discover that one of your applications does not function correctly in Windows Vista. You also discover that the application requires Windows XP Service Pack 2. You need to ensure that the application functions correctly in Windows Vista. You must accomplish this task with the least administrative effort. What should you do? A - Disable the User Account Control: Virtualize file and registry write failures to per-user locations security option. B - Set the Compatibility mode to Windows XP (Service Pack 2) on the properties of the application properties C - Use the Compatibility Administrator to create a new application fix that sets the Operating System Mode to Microsoft Windows XP (SP2). D - Use the Compatibility Administrator to create a new application fix that sets the WinXPSP2VersionLie compatibility mode. Answer: C Question 10. You plan to upgrade computers to Windows Vista. One of the applications uses a custom Windows logon dialog box. You use the Application Compatibility Toolkit (ACT) to collect compatibility information on the computers in your network. You need to ensure that there are no known compatibility issues with the application. What should you do? A - Examine the Vista Compatibility Evaluation Report B - Examine the Update Compatibility Evaluation Report C - Examine the Impact Analyzer Reports D - Examine the Impact Application Reports Answer: A
|
Question 1. Select the two Connectrix MDS Models that are Multiprotocol (iSCSI / FCIP Storage Services Module) Ready? (Choose two) A. MDS 9140 B. MDS 9120 C. MDS 9509 D. MDS 1032 E. MDS 9216 Answer: C, E Question 2. For what reason is having BCVs attached to the R2 devices at the remote site in a SRDF/A configuration recommended? A. To preserve a consistent copy of data at the remote site before a split operation. B. To mirror R2 devices for backup purpose in a disaster recovery scenario. C. To preserve extra tracks that would not fit into the cache of R2's COVD devices. D. To preserve a consistent copy of data at the remote site before a resynchronization operation. Answer: D Question 3. EMC Replication Manager supports which three of the following features? (Choose three) A. Provides incremental establish and restore functionality on CLARiiON storage arrays. B. Exploits the incremental establish and restore capabilities of TimeFinder on Symmetrix storage systems. C. Automates tape backup based user specified schedule. D. Restore automatically take advantage of the CLARiiON array's Protected Restore feature. E. Performs TimeFinder Snap on Symmetrix Storage Systems. Answer: A, B, D Question 4. DRAG DROP You are an instructor at ITCertKeys.com and they enquire as to how you created a recoverable copy of data, using TimeFinder. By way of explanation, arrange the tasks in the order you carried it out. Answer: Question 5. ITCertKeys.com's storage administrator wants to synchronize one device pair within a TimeFinder device group. Which of the following command will achieve this objective? A. symrdf namedf incremental BCV dev 0b3 B. symdev namedg full establish BCV dev 0b3 C. symmir namedg incremental BCV dev 0b3 D. symmir namedg full establish DEV003 BCV dev 0b3 Answer: D Question 6. The ControlCenter's interaction with its components can be described by what three statements?(Choose three) A. The ECC Store retrieves real-time data requested by the Console. B. The repository maintains current and historical data relating to EMC ControlCenter. C. ControlCenter commands are passed over a TCP/IP network from the Console periodically directly to the Agents. D. The EMC ControlCenter Server provides most of the common services, which tie the infrastructure together. E. The Console relies on the EMC ControlCenter Server for information. Answer: B, D, E Question 7. DRAG DROP As an instructor at ITCertKeys.com, you are required to match the correct ECC agents with the tasks on the right, by placing them in the space provided on the left. (NOTE: agents may be used more than once.) Answer: Question 8. Which two are Symmetrix Host Adapters that is supported by Powerpath4.2? (Choose two) A. iSCSI B. Fibre C. Ficon D. ESCON E. SCSI Answer: B, E Question 9. Which of the following are three Operating systems that support PowerPath pseudo devices? (Choose three) A. SUN Solaris B. HP-UX C. Linux D. AIX E. Windows 200/2003 Answer: A, C, D Question 10. DRAG DROP You are an instructor at ITCertKeys.com and they ask you to match the control center component pairs with the given maximum recommended network latency times, bearing in mind that these latency times may be used more than once. Answer:
|
Question 1. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com network contains six servers. A server named ITCertKeys-SR01 is configured to run Windows Small Business Server 2003 premium edition and the other servers run Windows Server 2003. These servers, together with its configurations, are named as follows: * ITCertKeys-SR02 is configured to run Exchange Server 2003. * ITCertKeys-SR03 is configured to run Microsoft ISA Server 2000. * ITCertKeys-SR04 is configured to run Windows Server 2003 Active Directory * ITCertKeys-SR05 is configured to run Microsoft Windows SharePoint Services. * ITCertKeys-SR06 is configured to run Microsoft SQL Server 2000. You have received instruction from the CIO to start designing a solution that will result in a reduction of the amount of servers that are currently in use. This reduction of servers will be a result of server consolidation. You successfully complete the server consolidation instruction and now you are required to implement a solution to increase fault tolerance. What should you do? (Choose all that apply) A. An uninterruptible power supply should be used B. The Health Monitor should be used C. Small Computer Interface (SCSI) adapters should be used D. Multiple Network cards should be used E. Redundant Array of Independent Disks (RAID) arrays should be used Answer: A, C, D, E Explanation: The UPS is also an important factor when increasing fault tolerance saving your system from power surges and failures. Multiple SCSI can also be used effectively to improve fault tolerance. Multiple Network cards are a must to implement when you are looking to increase the fault tolerance of the network. RAID arrays can also be used effectively to improve fault tolerance. Incorrect Answers: B: The Health monitor is used to check Windows Small Business Server 2003. Question 2. You work as the network administrator at ITCertKeys.com. Everyone of the 20 employees of the company have a computer that runs Windows 95 and make use of floppy disks as well as compact disks to share their information. At present the CEO makes use of the DSL connection. These methods of information sharing amongst the ITCertKeys.com users have become costly. To this end you have received instruction from the CIO that all employees must have access to the Internet by using a single connection and that they must disseminate their information effortlessly and quickly without making use of floppies or compact disks. Thus a dedicated e-mail and the centralized management of user data are required for ITCertKeys.com. You need to ensure that your design solution for the ITCertKeys.com network infrastructure is cost-effective. What should you do? A. You must install a Windows Small Business Server 2003, Premium Edition computer. Then upgrade the client computers to Windows XP Professional. Use the existing DSL connection to connect to the Internet. B. You must install a Windows Small Business Server 2003, Standard Edition computer. Then upgrade the client computers to Windows XP Professional. Use the existing DSL connection to connect to the Internet. C. You must install a Windows Small Business Server 2003, Standard Edition computer. Then upgrade the client computers to Windows XP Professional. Purchase a separate DSL connection to connect to the Internet. D. You must install a Windows Small Business Server 2003, Standard Edition computer. Then upgrade the client computers to latest Windows 95 service pack. Use the existing DSL connection to connect to the Internet. Answer: B Explanation: The Windows Small Business Server 2003, Standard Edition can be used as a file server, an e-mail server and to connect to the Internet. The Windows Small Business Server 2003 computer allows you to connect to the Internet by making use of the existing DSL connection. The client computers must be upgraded to Windows XP Professional to be able to connect to the Windows Small Business Server 2003 network. Incorrect Answers: A: The Premium Edition of Windows Small Business Server 2003 offers more products than you need, including SQL Server 2000 and ISA Server 2000. The Premium Edition is more expensive than the Standard Edition therefore it is not the most cost effective solution. All the other parts of the suggested solution would make sense in this scenario. C: A separate DSL connection is not required. This will only incur more costs than is required. D: Windows 95 is not able to communicate on a Windows Small Business Server 2003 network therefore it is unnecessary to upgrade the users to the latest Windows 95 service pack. Question 3. You work as the network administrator at ITCertKeys.com. At present the ITCertKeys.com network consists of 30 Windows XP Professional computers that have a peer-to -peer network. Due to work pressure some ITCertKeys.com employees also want the ability to connect to their work from their homes after office hours. ITCertKeys.com has a cable connection for Internet access at the office. The employees who requested access to their work after hours all have access to the Internet from their homes via their own ISPs. You have received instruction from the CIO to make sure that communication between the employees work computers and that of the office network over the Internet is protected. You have to accomplish this objective and keep costs as low as possible. What should you do? A. You should install Windows Small Business Server 2003, Standard Edition on the employees' home computer. B. You should install Windows Small Business Server 2003 Premium Edition on the employees' home computer. C. You should install Windows Small Business Server 2003 Standard Edition on a ITCertKeys.com computer. D. You should install Windows Small Business Server 2003 Premium Edition on a ITCertKeys.com computer. Answer: C Explanation: When you install the Windows Small Business Server 2003, Standard Edition on an office computer you will ensure a secure VPN connection over the Internet. The L2TP protocol or the PPTP protocol can be used to protect the VPN connections. Incorrect Answers: A: Preferably user operating systems like Windows XP Professional or Windows 2000 Professional should be installed on the employees' computers at home. This should keep costs down since a Server OS would not be cost effective. B: This option would be too expensive to implement. The server operating systems such as Windows Small Business Server 2003 and Windows Server 2003 are costly and should only be installed when needed. D: If you install the Windows Small Business Server 2003, Premium Edition in the office it will meet the connectivity objective but it is more costly than the Windows Small Business Server 2003, Standard Edition. Question 4. You are hired as a network consultant at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com network has one network server named ITCertKeys-SR02. The ITCertKeys-SR02 is configured to run Microsoft Windows Small Business Server 2003. ITCertKeys.com makes use of a third-party line-of-business (LOB) application. You have received instruction from the CIO to upgrade ITCertKeys-SR02 to the Microsoft Windows Server 2003 Standard Edition. You need to carry out this instruction whilst ensuring that the LOB application is successfully migrated. You must achieve this with the least amount of administrative effort. What should you do? (Choose all that apply) A. Upgrade the Windows Server 2003 Standard Edition and install the Application Migration Wizard on the server. Run the Application Migration Wizard to check the compatibility of the LOB application with the Windows Server 2003 Standard Edition operating system. B. The Application Migration Wizard should be installed on the on the server. Run the Application Migration Wizard to check the compatibility of the LOB application with the Windows Server 2003 Standard Edition operating system. C. Set up a test network that runs Windows Server 2003 Standard Edition. Install a LOB application and test its compatibility with the Windows Server 2003 Standard Edition operating system. D. Create a full backup of the current network environment. Then upgrade the server to Windows Server 2003 Standard Edition and install the application on the server. Thereafter the server information can be restored from the backup tapes. Answer: B, C Explanation: These options represent a complete solution to guarantee the successful migration of the LOB application. Incorrect Answers: A, D: It you install the first Windows server without checking the compatibility the application might not run. Question 5. You work as a network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The CEO of ITCertKeys.com makes uses a broadband connection to connect to the Internet from the head office. The ITCertKeys.com network contains 15 user workstations that are configured to run Microsoft Windows 95 in a peer-to-peer network. ITCertKeys-WS282 is a workstation on the ITCertKeys.com network. ITCertKeys-WS282 functions as the file server. The users make use of floppy disks to share information. They do not have access to the Internet. You have received instruction from the CIO to modify the network environment to meet the subsequent requirements: * Users are able to share information without making use of floppy disks, * Users are able to access the Internet through a single connection, * Centralized user administration, * A dedicated e-mail server and * The ability to encrypt files on user workstations. You thus need to identify solutions that will meet these requirements while reducing the costs. What solutions can you recommend? (Choose all that apply) A. Upgrade the user workstations to Windows XP Professional and to make use the existing broadband connection. B. Recommend that ITCertKeys.com buy a leased broadband connection to the Internet. C. On the company network the server that is configured to run Microsoft Windows Small Business Server 2003 Standard Edition should be installed. D. The user workstations should all be upgraded to the latest Windows 95 service pack. Answer: A, D Explanation: The existing broadband connection is enough. Windows XP have the ability to encrypt files on the user workstations. Microsoft Windows Small Business Server 2003 Standard Edition completes the requirements. Question 6. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com has its headquarters in London and a branch office in Paris. You have received instruction from the CIO to install a new server at the Paris office. This new server will host the company web site as well as perform user authentication. In your solution you need to make sure that an operating system is installed on the new server. What should you do? A. Ensure that Microsoft Windows Small Business Server 2003 Premium Edition is installed on the new server. B. Ensure that Microsoft Windows Small Business Server 2003 Standard Edition is installed on the new server. Thereafter she can add the server to the domain as the domain controller. C. Install Microsoft Windows Server 2003 Web Edition on the new server. D. Ensure that Microsoft Windows Server 2003 Standard Edition is installed on the new server. Thereafter the server can be added to the domain as the domain controller. Answer: D Question 7. You are employed as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com makes use of a Microsoft Windows Small Business Server 4.5 as its network operating system. The ITCertKeys.com network consists of one file server and fifteen computers. These computers use a mixed environment of Microsoft Windows XP Professional and Microsoft Windows 2000 Professional. Management of ITCertKeys.com is considering upgrade the network to a Microsoft Windows Server 2003 product. You have received instruction from the CIO to identify the key characteristics of Microsoft Windows Server products that allows team building and collaboration. Management wants you to guarantee a moderate investment however, reliability is a high priority. You thus need to formulate a proposal that will benefit the need for ITCertKeys.com to improve team building as well as to provide a cost-effective network solution. What should you propose? (Choose all that apply) A. Submit a proposal to upgrade the existing file server as well as upgrading the Microsoft Windows 2000 Professional computers to Microsoft Windows XP Professional. B. Submit a proposal to replace the current file server with a new file server. Thereafter he should submit a case study that emphasizes the characteristics of Microsoft Windows Server 2003, Enterprise Edition. C. Submit a proposal that shows Microsoft Windows Small Business Server 2003 offers more team building and collaboration tools than Microsoft Windows Server 2003, Standard Edition. D. Submit a proposal stating that Microsoft Exchange 2000 Server with Microsoft Outlook 11 should be purchased individually. Answer: A, C Explanation: Windows Small Business Server permits institutions with as little as three or as many as 75 computers to have an affordable, real client/server network with all the security and efficiencies that implies. Microsoft Windows Small Business Server 2003, encompasses Microsoft Windows Server 2003, Windows SharePoint Services, Exchange Server 2003, Routing and Remote Access firewall technology and five client access licenses. That is just for the Standard Edition. In the Premium Edition, includes the above mentioned plus Microsoft SQL Server 2000, Internet Security and Acceleration Server 2000 and Microsoft Office FrontPage 2003. In both the Standard and the Premium editions, the technologies are optimized to work as a package for the small business user. Incorrect Answers: B: This option is incorrect. A new file server alone will not be improving on the current situation. Microsoft Windows Enterprise Edition is but a component included in Microsoft Windows Small Business Server 2003. D: This option is incorrect. Exchange 2000 Server with Microsoft Outlook 11 alone will not improve the current network system for team building purposes. Reference: Charlie Russel, Sharon Crawford, Jason Gerend, Microsoft Windows Small Business Server 2003: Administrator's Companion, Microsoft Press, Redmond, 2004 Question 8. You work as the technical administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. You are requested by management to do the technical assessment of the business. One of the computers at ITCertKeys.com is configured to run Microsoft Windows XP Professional. This computer is located in the Finance department. The accountant of ITCertKeys.com enters transactions on the computer during business hours. The manager of ITCertKeys.com wants to be able to access the accounting information after working hours from his home. You have received instruction from the CIO to install broadband connections at the office and the manager's home. The broadband connection at the office has a static IP address. The manager does not want to spend more money than is necessary to accomplish his objectives. You thus need to create a solution to meet the owner's objectives. What should you do? A. Install a Microsoft Windows XP Professional computer at the manager's residence. B. Install a Microsoft Windows Server 2003, Standard Edition computer in the Finance department and a Microsoft Windows 98 computer at the manager's residence. C. Install a Microsoft Windows Server 2003 computer in the Finance department as well as at the manager's residence. D. A Microsoft Windows Small Business Server 2003 computer needs to be installed in the Finance department. Install a Microsoft Windows XP Professional computer at the manager's residence as well. Answer: A Explanation: The manager needs to have a Microsoft Windows XP Professional computer installed at his residence since the Finance department has one computer configured to run Microsoft Windows XP Professional with a static IP address broadband connection. This would permit the manager to enter the information as well as accessing accounting information from his residence onto the store computer. Incorrect Answers: B: This option is incorrect. This option involves extra expense with the added inability to be able to access accounting data from the manager's residence if he is to have a Microsoft Windows 98 computer at his residence. C, D: These options are incorrect. There is no need for extra expense as is proposed by these options. Reference: Lisa Donald & James Chellis, MCSA/MCSE: Windows XP Professional Study Guide, Second Edition, Sybex Inc. Alameda, 2003, p. 408 Question 9. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com is relatively new and currently the ITCertKeys.com network contains ten client computers that runs Windows98 configured to operate in a work group. You have received instruction from the CIO that the ITCertKeys.com network is increasing by 50 employees. To this end you were instructed to design a solution that will enable the upgrading of the networks existing infrastructure with the least amount of expenses in the most effective manner. What should you do? (Choose all that apply) A. You acquire 40 client computers and install Windows XP Professional. Then you upgrade the existing computers to Windows XP Professional. B. You acquire 40 client computers and install Windows XP Home Edition. Then you upgrade the existing computers to Windows XP Home Edition. C. You install Windows Small Business Server 2003 on the newly acquired server computer. D. You should upgrade to a client/server configuration. E. You make use on the existing workgroup. F. You acquire and install Windows Server 2003 Enterprise Edition on the new server computer. Answer: A, C, D Explanation: Windows XP Professional is the most effective and extensively used operating system and provides a range of features relating to security and data integrity. The Windows Small Business Server 2003 the most effective Network Operating System and is able to support up to 75 users and is the most cost effective server operating system. The client server computer operates as a hub for users to access and share network resources. Incorrect Answers: B: Windows XP Home Edition does not support NOS. E: The infrastructure of the existing network, also known as peer-to-peer network, is not easy to manage compared to the client/server infrastructure. F: The Windows Enterprise Server 2003 Enterprise Edition is the most efficient Network Operating System for big institutes that consists of numerous client computers and users. Question 10. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network has one network server named ITCertKeys-SR01. The ITCertKeys-SR01 is configured with a Pentium III 450 MHz processor 20 GB hard disk space and 128 MB RAM that runs with Windows Small Business Server 4.5. You have received instruction from the CIO to upgrade the network. This upgrade has become necessary due to company growth and is meant to support the maximum amount of users or devices and to implement SQL Server 2000 which will supply data warehousing and line-of-business (LOB) solutions. One requirement that you need to keep in mind in your solution is that ITCertKeys-SR01 must be able to work in a medium-load network environment after the upgrade. And another requirement is that the upgrade of the ITCertKeys.com network should be performed with the least amount of expenses. What should you do? (Choose all that apply) A. ITCertKeys-SR01 needs to be upgraded to Windows Small Business Server 2003, Standard Edition. B. ITCertKeys-SR01 needs to be upgraded to 1GB of RAM. C. ITCertKeys-SR01 needs to be upgraded to Windows Small Business Server 2003, Premium Edition D. ITCertKeys-SR01 needs to be upgraded to 512 MB of RAM. Answer: B, C Explanation: 1 GB RAM is the least amount of RAM recommended for a server running Windows Small Business Server2003 in a medium-load environment. The SQL Server 2000 component includes the Windows Small Business Server 2003, Premium Edition and provides data warehousing and line-of-business solutions. Incorrect Answers: A: The SQL Server 2003 component that offers data warehousing and line-of-business solutions is not supported by the Windows Small Business Server 2003, Standard Edition. D: The 512 MB RAM is the least amount of memory needed for Windows Small Business Server 2003 for it to operate in a light-load environment. The tasks executed and the number of applications and features that is run on the server is dependant on the load environment.
|
Question 1. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. At ITCertKeys.com there are two Routing and Remote Access servers named ITCertKeys-SR12 and ITCertKeys-SR21. There is also an Internet Authentication Services server named ITCertKeys-SR15. The IAS server is set to provide accounting and centralized authentication of users connecting via ITCertKeys-SR12 and ITCertKeys-SR21. There are certain ITCertKeys.com network users who need to work from home. They will all require 24 hour access 7 days a week. It is your responsibility to create the appropriate remote access policies for ITCertKeys.com. To accommodate all the Remote access users you create a remote access policy that is configured to allow the Remote Users group the appropriate access to the VPN. For a while the network operated normally but certain remote users started complaining about not being able to access the VPN. You investigate and discover all the successfully connected users connected using a local user account located on ITCertKeys-SR15. You need to ensure that remote access is available whilst using the least amount of administrative effort. What should you do? A. Check whether ITCertKeys-SR12 and ITCertKeys-SR21 are set to support RADIUS accounting and authentication B. Add ITCertKeys-SR12 and ITCertKeys-SR21 to the RAS and IAS Servers group in Active Directory C. Promote the IAS server ITCertKeys-SR15 to a domain controller D. Add ITCertKeys-SR15 to the RAS and IAS Server group in Active Directory Answer: D Explanation: The IAS server requires being able to read all user objects attributes which can be achieved by adding ITCertKeys-SR15 to the RAS and IAS Servers group in Active Directory. Incorrect Answers: A: The scenario states that some users connect successfully. Thus it means that the Routing and Remote Access servers are configured properly. B: These servers do not require being added to the RAS and IAS Servers group as they do not actually authenticate the user accounts. C: This option will also achieve the scenario objective but requires too much administrative effort. Question 2. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003. Half the client computers are portable computers, and the rest are desktop computers. The client computers are running a mix of Windows 2000 Professional Windows XP Professional. There are many ITCertKeys.com Sales department users that work out of the office due to the nature of their job description. These Sales department users require access to resources on ITCertKeys.com when out of the office. It is your responsibility to provide the Sales department users with access to the network. To this end you have five servers that are running with Routing and Remote Access services configured for VPN connectivity. All these servers are configured with the same remote access policy. A new written security policy has recently been issued by the ITCertKeys.com management and consequently you had to reconfigure the policies on each of these servers. Because of the policy changes you received instruction to centralize the remote access policies to ensure that any future changes to the policies can be made once and applied to all remote access servers. What should you do? A. A Domain Group Policy to apply any changes should be configured. B. The Routing and Remote Access servers must be configured to use Internet Authentication Services (IAS). C. An application directory partition must be implemented. D. Extensible Authentication Protocol (EAP) should be configured on all the Routing and Remote Access servers. Answer: B Explanation: IAS makes use of Remote Authentication Dial-In User Service (RADIUS) to centralize policies, logging, and authentication services from a single location. This would be ideal under the circumstances of ever-changing policy application. Incorrect answers: A: Remote policies are not stored in group policies. Thus configuring a Domain Group policy will not centralize the policies. C: Implementing an application directory partition will not centralize remote access policies. These partitions are used to create a section of the Active Directory database for application specific data to control replication and not for centralization of remote policies. D: EAP is an authentication protocol and is not used to centralize remote access policies. Question 3. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and some run Windows 2000 Server and all client computers are laptop computers that run Windows XP Professional. At ITCertKeys.com there are two Routing and Remote Access servers named ITCertKeys-SR02 and ITCertKeys-SR05 respectively. The Routing and Remote Access servers are configured to accept connection requests through VPN and dial-up connections. The laptop client computers of the ITCertKeys.com domain currently make use of the MS-CHAP v2 protocol for authenticating to the network. A new ITCertKeys.com written security policy requires centralized remote connection authentications. The policy further states that all remote connections to the ITCertKeys.com corporate network authenticate using smart cards ensuring the data is encrypted with L2TP with IPSec. To this end you have received instruction from the CIO to comply with the security policy. You thus need to plan a new design for both VPN and dial-up connections. What should you do? A. An IAS server and VPN server must be added to the domain. ITCertKeys-SR02 and ITCertKeys-SR05 and the new VPN server must be configured to use the IAS server for authentication and make use of the EAP-TLS protocol for authentication on the IAS server B. An additional VPN server must be added to the domain. ITCertKeys-SR02 and ITCertKeys- SR05 must be configured to use the new VPN server for authentication and make use of the EAP-TLS protocol for authentication on the VPN server. C. An additional IAS server and VPN server must be added to the domain. ITCertKeys-SR02 and ITCertKeys-SR05 and the new VPN server must be configured to use the IAS server for authentication and make use of the MS-CHAP v2 protocol for authentication on the IAS server. D. An additional VPN server must be added to the domain. ITCertKeys-SR02 and ITCertKeys- SR05 must be configured to use the new VPN server for authentication and make use of the MS-CHAP v2 protocol for authentication on the VPN server. Answer: A Explanation: In the scenario you are required to use smartcards authentication and this will be achieved by adding the additional IAS server to the domain and configuring your Routing and Remote Access Service servers to use the added IAS server which should be configured to use EAP-TLS for authentication as this protocol supports the use of smartcards. Incorrect Answers: B: The problem with this implementation is that the authentication will not be centralized as the scenario state it is imperative authentication is centralized. C: There is only one problem in this option and that's the use of MS-CHAP v2 as this protocol does not support smartcard authentication. D: The problem with this implementation is that the authentication will not be centralized as the scenario state it is imperative authentication is centralized. Question 4. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. ITCertKeys.com has its headquarters in Chicago and a branch office in Dallas. You are responsible for the management of the Routing and Remote Access services at ITCertKeys.com. You enable Routing and Remote Access on a server named ITCertKeys-SR05. You received a list of telephone numbers of those that are allowed to connect to the ITCertKeys.com network via remote access together with instruction from the CIO to configure ITCertKeys-SR05 to accept only connections from those numbers. You need to configure ITCertKeys-SR05 to support Automatic Number Identification/Calling Line Identification (ANI/CLI). You then create a user account for each of the phone numbers on the list from which calls will be accepted. You then create a remote access policy to support these ANI/CLI connections. Now you just need to apply the policy. What should you do? A. Enable the Unencrypted authentication option on the Authentication tab of the remote access profile for the policy. B. Enable the Unauthenticated access option on the Authentication tab of the remote access profile for the policy. C. Enable the Encrypted authentication option on the Authentication tab of the remote access profile for the policy. D. Enable the MD5-challenge authentication option on the Authentication tab of the remote access profile for the policy. Answer: B Explanation: Because a user name and password are not going to be sent when an ANI/CLI connection is made, you need to allow unauthenticated access. Thus you should enable support for unauthenticated access on the Authentication tab of the remote access policy profile for the policy. Alternative you could also configure the User Identity setting for remote access policies in the registry to direct ITCertKeys-SR05 or IAS server to use the number from which the user is calling as the user identity. Incorrect answers: A: If you enable unencrypted authentication support then you will be allowing support for clients that use the Password Authentication Protocol (PAP) and this is not what is required in this scenario. C: You enable encrypted authentication support to allow support for clients that use CHAP and MS-CHAP. This is not what is required in this scenario. D: You do not need to enable support for MD5-challenge authentication. Question 5. You work as the network domain administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory forest named ITCertKeys.com. The ITCertKeys.com network contains ten Windows Server 2003 Standard Edition computers and 1,200 client computers running Windows XP Professional. You are responsible for the management of security related settings and computer accounts in the domain. You need to define a custom security template to manage configuration settings for the computers. This custom security template will have to be imported into a Group Policy Object (GPO) that is linked to the domain. Which of the following Group Policy Object categories' related configuration settings can be managed using a security template? (Choose all that apply.) A. Account policies B. Disk Quotas C. Event Log D. File System E. Windows File Protection F. Local Policies G. Registry H. Group Policy I. Restricted Groups J. System Services Answer: A, C, D, F, G, I, J Explanation: You can make use of a security template to manage the configuration settings for the following categories: Account policies, Event Log, File System, Local Policies, Registry, Restricted Groups, and System Services Incorrect answers: B: Disk Quotas management: i.e. defining and setting is done using the System\Disk Quotas portion of Administrative Template. E: Windows File Protection enabling and management of its cache is done using the System\Windows File Protection portion of Administrative Template. H: Group Policy is managed using the System\Group Policy portion of Administrative Template Question 6. You work as the network domain administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory forest named ITCertKeys.com. The ITCertKeys.com network contains several Windows Server 2003 Standard Edition computers and 1,500 client computers running Windows XP Professional. You are responsible for the management of security related settings and computer accounts in the domain. You need to configure settings that are related to passwords, account lockout, and Kerberos. This custom security template will be imported into a Group Policy Object (GPO) that is linked to the domain. You must thus make use a of a security template node to accomplish the task. What should you do? A. Use the Event Log security template node. B. Use the Local Policies security template node. C. Use the Account Policies security template node. D. Use the Restricted Groups security template node. Answer: C Explanation: The Account Policies node of the Security template is used to configure password- account lockout-, and Kerberos settings. Incorrect answers: A: The Event Log node is used to configure settings for the application, security and system event logs and not to configure passwords, account lockouts or Kerberos. B: The Local Policies node is used to configure auditing, user rights and other security-related options and not passwords, accounts lockouts or Kerberos settings. D: The Restricted Groups node is used to configure and manage the membership for specific security groups. Question 7. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory forest that contains three domains named ITCertKeys.com, us. ITCertKeys.com and, uk. ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com domain and organizational unit (OU) structure is illustrated by the following Exhibit. Exhibit: Accounts department employees have user accounts in the us.ITCertKeys.com domain, Research and Development employees have user accounts in the uk.ITCertKeys.com domain, and all other users have user accounts in the ITCertKeys.com domain. Each domain has an OU named DC_OU that only contains the computer accounts of the domain controllers in that particular domain. A new ITCertKeys.com security policy requires the following: 1. All Accounting department users must use complex passwords with a minimum length of ten characters. 2. These password restrictions should only affect the Accounting department users. You thus need to ensure that these requirements are successfully achieved. What should you do? A. Create a GPO named PWRestrict. Link it to the DC_OU OU in the uk. ITCertKeys.com domain. B. Create a GPO named PWRestrict. Link it to the ITK_Users OU in the ITCertKeys.com domain. C. Create a GPO named PWRestrict. Link it to the DC_OU OU in the ITCertKeys.com domain. D. Modify the appropriate password policy settings in the Default Domain Policy GPO. E. Create a GPO named PWRestrict. Link it to the R&D OU in the uk. ITCertKeys.com domain. F. Create a GPO named PWRestrict. Link it to the DC_OU OU in the us. ITCertKeys.com domain. G. Create a GPO named PWRestrict. Link it to the Accounts OU in the us. ITCertKeys.com domain. Answer: D Explanation: Three domain-wide account policy settings (Password Policy, Account Lockout Policy and Kerberos Policy) should be unique to the domain and should always be defined at the domain level. These settings are enforced by the domain controller computers in the domain, regardless of the container holding the domain controllers or the OU structure in the domain. Therefore, all domain controllers always retrieve the values of these user account policy settings from the Default Domain Policy GPO. Incorrect Answers: A, C, F: If you use these options, the settings you have configured will be overridden by those in the Default Domain Policy GPO. B: Using this option would only apply the settings to users in this OU. Also, the settings you have configured will be overridden by those in the Default Domain Policy GPO. E: There are no members of the Accounting department added to the RandD OU. This GPO will not affect these users. G: The password policy settings are enforced on the domain controllers. While settings in a GPO linked at the OU level will apply to users or computers in the container, password policies should always be applied at the domain level so that the policy will be applied to all domain computers. Question 8. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com with sites All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. All users and computers belong to the ITCertKeys.com domain. All file servers reside in an organizational unit (OU) named FileServers. Each file server hosts several shared folders, some of which contain confidential financial data. All domain users have permissions to access the information in the shared folders. You suspect that a domain user account has been used by a hacker to access confidential financial information stored on a file server named ITCertKeys-SR16. You need to determine which user account has been compromised. You plan to use auditing to track which users are logging on to the domain. However, your desire is not to examine large volumes of information to view logon attempts to domain resources. You want to use the least amount of disk space when you audit access to domain resources. What should you do? A. Configure a Group Policy Object (GPO) that enables the Logon Events audit policy for failure auditing and success auditing. Link the GPO to the Active Directory container that contains your domain controllers. B. Configure a Group Policy Object (GPO) that enables the Logon Events audit policy for success auditing. Link the GPO to the Active Directory container that contains your domain controllers. C. Configure a Group Policy Object (GPO) that enables the Account Logon Events audit policy for success auditing. Link the GPO to the Active Directory container that contains your domain controllers D. Configure a Group Policy Object (GPO) that enables the Account Logon Events audit policy for failure auditing. Link the GPO to the Active Directory container that contains your domain controllers. Answer: C Explanation: The Account Logon Events policy setting is used to track which users are logging on to your domain. The Account Logon Events policy is enabled on domain controllers. Enabling success auditing will result in an entry being placed in the security log whenever a user makes a successful attempt to log on to the ITCertKeys.com domain by using a domain user account. Incorrect Answers A: The Logon Events audit policy is used to audit logon attempts using local computer accounts. This policy will only log an event when a user logs on to a domain controller. B: The Logon Events audit policy is used to audit logon attempts using local computer accounts. This policy will only log an event when a user logs on to a domain controller. D: Enabling failure auditing will result in an entry being placed in the security log whenever a user makes an unsuccessful attempt to log on to the ITCertKeys.com domain by using a domain user account. You suspect that a domain user account is already being used to access domain resources. Question 9. You work as the senior network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. You have noticed that some unauthorized changes have been made to the registry of several computers. You suspect that one of your junior network administrators is changing the registry. You decide to: 1. Enable auditing to log all changes being made to the registry. 2. All attempts made to change the registry keys to be logged. 3. No other type of event to be included in your auditing effort. 4. Use Event Viewer to view all logged event entries. You open the domain audit security policy and navigate to the audit policy settings under the Security Settings node. You then enable the Audit object access audit policy setting for failed events. When viewing the logged events, you discover though that there are no events logged for any successful changes made to the Registry. You want all events to be logged, and not only failed attempts to change the Registry. How should you configure the audit policy settings of the domain audit security policy? A. Configure the Audit privilege use audit policy setting so that successful and failed events are logged. B. Configure the Audit directory service access audit policy setting so that successful and failed events are logged. C. Configure the Audit Policy change audit policy setting so that successful and failed events are logged. D. Configure the Audit object access audit policy setting so that successful and failed events are logged Answer: D Explanation: While you have enabled the correct audit policy setting in the Security Settings node, you have specified that only failed attempts to change the Registry be logged. You SHOULD configure the Audit object access setting if you want to track and log when a user accesses operating system components such as files, folders or registry keys. Because you need both successful and failed events logged, you should reconfigure the Audit object access audit policy setting so that both successful and failed events are logged. Incorrect Answers: A: You would configure the Audit privilege use audit policy setting to log when a user affects a user right. B: The Audit directory service access policy audit policy setting logs events that pertain to when users access Active Directory objects which have system access control lists (SACLs). The Registry is not an Active Directory object. You should regard it as being computer specific. C: The Audit Policy change audit policy setting is used to log changes that are made to the security configuration settings of the computer. Question 10. You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. Clive Wilson is a manager in the Human Resources department. Clive Wilson frequently accesses files that contain confidential information on ITCertKeys.com's employees. The files reside in several shared folders on his Windows XP Professional computer. Both Dean and employees working in the Human Resources department modify these files. Clive Wilson complains that this morning, when he attempted to access a file in one of the shared folders, the shared folders and files were deleted. You decide to use last nights backup to restore the files. You successfully restore the latest available backup of these files. You must immediately determine who the culprit is that deleted the files. You suspect that someone deleted Clive's files from across the network. You log on to Clive Wilson's computer. You want to configure local security policy, so that you can determine who connected to Clive's computer and deleted the files. You want to use Event Viewer to produce a listing of all logged entries. What should you do? (Choose the two actions which you should perform. Each correct answer presents only part of the complete solution. Choose two answers that apply.) A. Enable the Privilege Use - Success audit policy on Clive Wilson's computer. Use Event Viewer to configure a filter that will list all entries produced by the audit policy. B. Enable the Logon Events - Success audit policy on Clive Wilson's computer. Use Event Viewer to configure a filter that will list all entries produced by the audit policy. C. Enable the Account Logon Events - Success audit policy on Clive Wilson's computer. Use Event Viewer to configure a filter that will list all entries produced by the audit policy. D. Enable the Object Access - Success audit policy on Clive Wilson's computer. Use Event Viewer to configure a filter that will list all entries produced by the audit policy. Answer: A, D Explanation: The Privilege Use - Success audit policy will allow you to see who deleted the files from Clive Wilson's computer, and also when these files were deleted. The Object Access - Success audit policy will let you know when an individual successfully accessed Clive Wilson's files. You can then use Event Viewer to configure a filter that will list all entries produced by the audit policy. Incorrect Answers: C: The Logon Events - Success and Account Logon Events - Success audit policies would not work because the question states that Clive Wilson's files were deleted from over the network. These policies would inform you on who logged on to the local computer, and whether a user account was compromised. B: The Logon Events - Success and Account Logon Events - Success audit policies would not work because the question states that Clive Wilson's files were deleted from over the network. These policies would inform you on who logged on to the local computer, and whether a user account was compromised.
|
Question 1. A medium-sized insurance company has outgrown power capacity of their existing datacenter and is evaluating options to accommodate workload growth. All of the following are key benefits of CoolBlue. Which one is of the MOST benefit to the customer in this situation? A. System x can maximize datacenter density while lowering TCO. B. Power Executive gives the client the ability to optimize energy utilization. C. The IBM Rear Door Heat exchanger can be installed to reduce cooling requirements. D. IBM energy efficient blade servers reduce the clients high energy costs for power and cooling. Answer: D Question 2. A potential new customer needs servers and requests a response to their hardware requirements. The customer requests a quote from IBM within 48 hours. Which of the following should the System x Sales Specialist do to MAXIMIZE the odds of winning this business? A. Request an extension because 48 hours will not be enough time to propose an appropriate solution. B. Ask the customer for a brief meeting or call to learn more about their needs and respond to Their request with a complete solution. C. Use the configuration guide or spreadsheet configurator to assemble server configurations that meet the specification, and then look for the lowest price. D. Contact the IBM Client Representative for this account and ask for assistance in setting up a meeting with the technical decision maker of the prospective customer. Answer: B Question 3. A customer is interested in the ability to increase a system's computing power as needed. Which of the following System x server attributes should the Sales Specialist promote? A. Ability to hot-plug additional processors on demand B. Low cost of System x servers makes scaling out an option C. "Pay as you Grow" scalability of the IBM System X3950 server D. Integration of System x servers with the existing servers using an interconnect Answer: C Question 4. A potential new customer needs servers and requests a response to their hardware specifications, which are all related to hardware speeds, disk, and memory configuration. The customer requests a quote from IBM within 48 hours. Which of the following should the System x Sales Specialist do to MAXIMIZE the odds of winning this business? A. Request an extension because 48 hours will not be enough time to propose an appropriate solution. B. Ask the customer for a brief meeting or call to learn more about their needs and respond to Their request with a complete solution. C. Use the configuration guide or spreadsheet configurator to assemble server configurations that meet the specification, and then look for the lowest price. D. Contact the IBM Client Representative for this account and ask for assistance in setting up a meeting with the technical decision maker of the prospective customer. Answer: B Question 5. A customer currently buys HP ProLiant servers and EMC storage. The customer has encountered various problems getting certain servers to work with their storage. Which of the following arguments can the Sales Specialist present to best position IBM? A. IBM's server division regularly tests their products with other vendors' storage products. B. IBM's storage division regularly tests their products with other vendors' server products. C. IBM sells other vendors' products and will test compatibility with the customer's products. D. IBM's ServerProven program assures a customer of compatibility with specific third-party products. Answer: D Question 6. Which option best represents the way Capacity Manager aids optimizing performance and maximizing availability of managed servers? A. System monitor resources are managed by thresholds. B. Scheduled rejuvenation achieves server software peak efficiency. C. Slot manager identifies best slot for installation of PCI/PCI-X adapters. D. Performance analysis identifies system bottlenecks and recommends solution. Answer: D Question 7. Which of the following customer requirements would suggest a systems management solution on System x? A. Higher scalability B. Reduced operating costs C. Improved server performance D. Consolidation to one operating system Answer: B Question 8. A customer uses a 3rd-party management system to manage all the servers in their data center. They have approached their Sales specialist about purchasing some IBM System x servers for a new project. The customer has heard about IBM Director, but is concerned that this will produce additional administrative overhead. Which of the following statements will be MOST useful in addressing the customer's concern? A. Most third party management systems are IBM ServerProven products. B. IBM Director will run concurrently with third party management systems. C. The IBM Director Console can be run on the third party management server. D. Upward integration modules for many prominent third party management systems are Available with IBM Director. Answer: D Question 9. A customer already has an HS21 blade server and wishes to upgrade the blade to 32GB of RAM (8 x4GB DIMMs). What should be proposed to the client? A. 8 x4GB DIMMs to go in their existing HS21 B. 8 x 4GB DIMMs and a Memory and I/O expansion module C. 8 x 4GB DIMMs and a Storage and I/O expansion module D. An alternative server solution; the HS21 does not support 32GB of RAM Answer: B Question 10. IBM Director allows for upward integration into some management tools. Which management tool does NOT allow for this upward integration? A. IBM Tivoli B. BMC Patrol C. HP Openview D. Microsoft SMS E. Microsoft WSUS Answer: E
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.