|
What differences are there between -001 and -002? Are the -001 dumps still useable for this exam?
|
Question 1.
The typical antenna for a root bridge in a multipoint deployment is a(n) ______.
A. Yagi antenna
B. Sector antenna
C. Parabolic dish antenna
D. Omni-directional antenna
Answer: D
Question 2.
A customer in Europe needs an 11 MB wireless bridge link that is 1.3 km. You run the range calculation and determine that the BR350 product at 5 mW with 13.5 dB yagis at both sites would work. Fifty feet of standard Cisco cabling is long enough to connect the bridge to the antenna.
There is small grove of trees between sites,
What needs to be done to make this link successful?
A. An amplifier needs to be installed at one of the sites,
B. The antenna must be raised high enough to clear the trees.
C. The Yagis need to be used in a horizontally polarized orientation.
D. Due to the trees, a 21 dBi dish needs to be used for its narrower beamwidth.
Answer: B
Question 3.
Which statement is true about the Cisco Aironet 1400 Series Bridge?
A. It does not support wireless clients.
B. It supports wireless clients only on a root-bridge per IEEE specification.
C. It supports wireless clients only on a non-root bridges with valid links to a root bridge.
D. It supports wireless clients on a root bridge when a wireless client MAC address is set to
forward.
Answer: A
Question 4.
Which two statements are true? (Choose two)
A. Bridge in root mode will connect to bridge in root.
B. Bridge in root mode will connect to bridge in non-root.
C. Bridge in non-root mode will connect to Access-Point in root.
D. Access point in non-root mode will associate to a bridge in root mode.
E. Access point in root mode will associate to a bride in non-root mode.
Answer: B, D
Question 5
If the gain of the antenna goes up, the beamwidth _______.
A. increases
B. decreases
C. changes polarity
D. becomes circularly polarized
Answer: B
Question 6.
A customer has a current site with an omni-directional antenna. It has 50 ft of cabling that they are increasing to 100 ft.
This change in cabling could _______.
A. increase the data rate
B. increase the coverage area
C. decrease the coverage area
D. decrease the angle of radiation from the antenna
Answer: C
Question 7.
EIRP is a measurement typically calculated in _____.
A. dBi
B. dBr
C. dBd
D. dBm
Answer: D
Question 8.
A theoretical antenna, which is the basis for ALL other antennas, is called a/an _____ antenna.
Answer: boy
Question 9.
When a client is connected to an Access Point in repeater mode, what is the effect on that client's throughput?
A. no effect in throughput
B. 25% degradation in throughput
C. 33% degradation in throughput
D. 50% degradation is throughput
Answer: D
Question 10.
Which three are recommended security practices for deploying Cisco APs? (Choose three)
A. Use SSH encryption for Telnet.
B. Create VLAN for management traffic.
C. Disable admin authentication on the APs/bridges.
D. Use RADIUS or TACACS+ for admin user authentication.
Answer: A, B, D
|
i appear next monday.
|
thanks to ITCertKeys send me nice dumps.
|
Passed with 865--ITCertKeys is the best
|
|
Question 1.
You are the Exchange administrator for ITCertKeys. ITCertKeys hosts Exchange e-mail for other companies.
The service level agreement (SLA) for a customer named Trey Research states that failed Exchange mailbox stores must be online again in one hour or less. The SLA also states that all e-mail data must be retained for one year. Trey Research uses two mailbox stores named MBX01, and MBX02. Both mailbox stores reside on a Storage Area Network.
MBX01 is 25 GB in size and MBX02 is 22 GB in size. There is 153 GB of available disk space on the Storage Area Network for Trey Research data. You can back up or restore Trey Research mail at a rate of 12 GB per hour. You need to ensure that you can meet the SLA requirements for the Trey Research mailbox stores.
What should you do?
A. Every night, perform full backups to tape and archive them. Then perform a shadow copy
backup to the Storage Area Network.
B. Perform full backups to tape on Saturday night and archive them. Perform differential backups
to tape every Sunday through Friday night.
C. Perform full backups to tape on Saturday night and archive them. Perform differential backups
to tape every Sunday through Friday night.
D. Perform full backups to tape on Saturday night and archive them. Perform incremental
backups to tape every Sunday through Friday night.
Answer: A
Explanation:
There is 153 GB of available disk space on the Storage Area Network for Trey Research data.
By default, when you perform a backup in Windows Server 2003, the volume shadow copy method is used to create the backup. Shadow Copies and full backups made every night and archived would allow us to meet the SLA requirements.
However, the Exchange 2003 Writer supports only a Full backup at the storage group (SG) level.
VSS performs Exchange Full backups at the SG level, even though the Exchange Writer treats individual databases as separate components.
VSS uses the AddComponent call to add each database component to the Shadow Copy set, which in the case of a Full backup, is the entire SG (i.e., databases or log files).
In a Full backup of a SG, VSS creates a complete Shadow Copy of all volumes-the Shadow Copy contains database and transaction log files associated with that SG.
In addition, as is the case with non-VSS Full backups, VSS truncates the transaction log files after successfully creating and backing up the Shadow Copy.
To truncate the transaction log files, the Shadow Copy set must include all databases
Although VSS backup for Exchange 2003 is at the SG level, you can recover individual databases from the SG Shadow Copy set.
VSS-based restoration of an Exchange 2003 SG is useful when data in one or more databases in the SG is lost or corrupted, but the current log files remain intact on disk; when the current log files on disk are lost or corrupted, but the databases remain intact; or when databases and current log files within an SG are lost or corrupted.
Incorrect Answers:
Answers B, C and D cannot be correct, as it is stated that a restore of 12GB takes an hour.
It means that restoring a 24GB database would take at least 2 hours; which is more that required by n SLA. Both databases are occupying 47GB on SAN. Lets assume the worst scenario, when 100% of emails in the databases are being replaced with new ones during 24 hours and that Shadow Copies are being made every hour. The "first" snapshot would consume around 47GB and each next would consume around 2GB (1/24 of 47GB). This solution would require maximum 96GB of space on SAN.
As there is plenty of disk space (153GB) on SAN in this scenario this solution would be possible. Normally Shadow Copies would be much smaller as only the "first one" makes a full snapshot of a resource. Next snapshots are containing only changes to the "first one".
References:
Overview of Dependencies and Requirements for Exchange Server 2003 Features 822178
Exchange Server 2003 Data Back Up and Volume Shadow Copy Services 822896
Question 2.
The service level agreement (SLA) for a customer named ITCertKeys states that failed Exchange mailbox stores must be online again in one hour or less. The SLA also states that all e-mail data must be retained for one year.
ITCertKeys uses two mailbox stores named MBX01 and MBX02. Both mailbox stores reside on a Storage Area Network. MBX01 is 25 GB in size and MBX02 is 22 GB in size. There is 153 GB of available disk space on the Storage Area Network for ITCertKeys data. You can back up or restore ITCertKeys mail at a rate of 12 GB per hour. You need to ensure that you can meet the SLA requirements for the ITCertKeys mailbox stores.
What should you do?
A. Every night, perform full backups to tape and archive them. Then perform a shadow copy
backup to the Storage Area Network.
B. Perform full backups to tape on Saturday night and archive them. Perform differential backups
to tape every Sunday through Friday night.
C. Perform full backups to tape on Saturday night and archive them. Perform incremental
backups to tape every Sunday through Friday night.
D. Enable circular logging for the Exchange storage groups. Every night, perform shadow copy
backups to the Storage Area Network and copy the shadow copy backups to tape. Archive the
tapes.
Answer: A
Question 3.
You are the Exchange administrator for ITCertKeys. The Exchange organization contains a single server that runs Exchange Server 2003. The Exchange server contains one storage group and one mailbox store. You discover that the mailbox store is corrupted and will not mount.
You need to ensure that you restore the most current data possible.
What should you do?
A. Create the Recovery Storage Group. Set the path to the same as the path for the existing
mailbox store.
B. Create the Recovery Storage Group. Set the database path to C:\Program
Files\Exchsrvr\Recovery Storage Group.
C. Restore the mailbox store and then mount the mailbox store.
D. Delete the database and transaction log files. Then mount the mailbox store.
Answer: C
Explanation:
We assume that default setting for circular logging was not changed. To restore most current data we need to restored the database from the last full backup, mount it and let the system to reply all information kept in logs to the restored database. Answer A and B doesn't make sense as there is only one storage group and there is no need to create Recovery Store Group. RSC are used to restore mailboxes anyway.
D. Deleting transaction log files will cause the loss all data since last full backup.
From Randall Hatfield: I believe the answer to this question is "B" Here is why:” A" is incorrect, as performing this step will overwrite the existing mailbox store, and will not allow for the recovery and replay of the log files. This will result in loss of all data since the last full backup. "C" is incorrect due to the fact that all data since the backup will be lost. This violates the requirement that the most current data possible be restored. "D" is incorrect since doing this will result in the loss of all data since the last backup.
See Recovery Storage Groups: KB824126
Incorrect answers:
A Using the same path for the existing mailbox store for the Recovery Storage Group is incorrect, as performing this step will overwrite the existing mailbox store, and will not allow for the recovery and replay of the log files. This will result in loss of all data since the last full backup.
B The Recovery Storage Group is designed to recover one mailbox or a group of mailboxes to an existing, RUNNING store. It is not designed to bring back an entire store.
D Deleting the database and transaction log files is incorrect since doing this will result in the loss of all data since the last backup.
Reference:
KB824126 - "How to Use Recovery Storage Groups in Exchange Server 2003"
Question 4.
You are the Exchange administrator for ITCertKeys. The Exchange organization contains a single
Exchange Server 2003 computer named Exch1. Exch1 contains one storage group and one mailbox store. You build an Exchange server in your lab to test the defragmentation utilities against the Exchange store. The Exchange data you are currently using in the lab is two months old. You want to use the most current data on the lab server. You perform a full backup of the data on Exch1 every night. You obtain a second tape with a full backup for the lab environment. You need to ensure that the lab server contains the most current copy of the data from Exch1. You must maintain the existing backup rotation schedule on Exch1. What are two possible ways to achieve this goal?
(Each correct answer presents a complete solution. Choose two)
A. Perform a full backup of the Exch1 data to the second tape. Restore this data to the lab server.
B. Perform a copy backup of the Exch1 data to the second tape. Restore this data to the lab
server.
C. Perform a differential backup of the Exch1 data to the second tape. Use this tape with the most
recent full backup to restore the production data to the lab server.
D. Perform an incremental backup of the Exch1 data to the second tape. Use this tape with the
most recent full backup to restore the production data to the lab server.
Answer: B, C
Explanation:
Copy backups and differential backups do not reset the archive bit. When doing backups, the backup program uses this archive bit to determine whether a file has been backed up or not. (Note that this is true regardless of the backup being performed. It does not apply to only Exchange.)
Incorrect Answers:
A. Performing a full backup will reset the archive bit. Even if the two backups were taken back to-back, there would still be some files that change, as the transaction logs would continue to write, the database will continue to be modified, etc. Therefore, the normal rotation backup will be slightly out of sync with the database. If the database needed to be restored, it would end up in an inconsistent state.
D. Incremental backups will reset the archive bit. This would cause a problem due to the fact that the normal rotation would need to have this incremental tape before a restore could be performed. As this would throw off the normal schedule, this is not an option.
Reference:
Microsoft Windows Backup Help
Question 5.
You are the Exchange administrator for ITCertKeys. The Exchange organization contains a single
Exchange Server 2003 computer. The Exchange server contains one storage group that has three mailbox stores. Each mailbox store contains 200 mailboxes. ITCertKeys's service level agreement (SLA) requires that Exchange must not be offline for more than four hours. The SLA requires that in the event of data corruption, the most current data must be restored. You want to test the recovery process on the existing Exchange server after business hours. You need to ensure that the mailbox stores can be restored within four hours without losing the current production data.
What should you do before performing the test restore operation?
A. Create a new storage group that contains three mailbox stores. Select the option to allow the
mailbox stores to be overwritten by a restore operation.
B. On the existing mailbox stores, select the option to allow the mailbox stores to be overwritten
by a restore operation.
C. Create the Recovery Storage Group and add the three mailbox stores. Configure the Recovery
Storage Group to use the default Recovery Storage Group path for each of the mailbox stores.
D. Create the Recovery Storage Group and add the three mailbox stores. Configure the Recovery
Storage Group to use the existing database path for each of the mailbox stores.
Answer: C
Explanation:
Creating the Recovery Storage Group will set up the databases to be restored. The restore can then occur in the recovery group, and this can be timed. Since the restore is being done to an alternate location, there is no danger to the existing databases. In addition, as long as answer "B" is NOT done, the databases can not be accidentally overwritten. This will give the best indication regarding the length of time a database will take to be restored, and the mailbox store will be set up to test this.
Incorrect Answers:
A. Creating a new storage group and allowing it to be overwritten seems like a good idea. However, when the restore is attempted, it will fail since the restore MUST happen to the same locations as the backup, or put into the Recovery Storage Group. The group defined in this answer is not a valid location for the restore operation.
Only the Recovery Storage Group can be used to recover databases in the same organization.
B. Setting the option to have the existing mailbox stores overwritten is dangerous and unnecessary. When the test is performed (using old data from backup) the test will overwrite the database, and any transactions made since that backup will be lost. This will result in lost e-mail, which violates the question stating that production data must not be lost.
D. Using the existing database paths for the mailbox stores will overwrite the existing database. Simply creating the Recovery Storage group is not sufficient. In order for it to be used, that location must be the one specified for the restore. Remember that this does not violate the explanation for answer "A" since the Recovery Storage Group is a special group that can house any mailbox store in the storage group.
Reference:
Microsoft Help -> Recovery Storage Groups
Question 6.
You are the Exchange administrator for ITCertKeys. The Exchange organization contains a single new Exchange Server 2003 computer. The Exchange server contains one storage group and one mailbox store. You create mailboxes on the new mailbox store. At the end of the day, before your first backup job has run, the disk controller fails. You replace the disk controller. You discover that the mailbox store is corrupted. You also discover that the mailbox store is dismounted. You need to ensure that you can mount the mailbox store with the minimum amount of data loss.
What should you do?
A. Run the exchdump command. Then run the isinteg -fix command to repair the mailbox store.
B. Move the files in the transaction log folder to a safe location. Run the isinteg –fix command to
repair the mailbox store.
C. Move the files in the transaction log folder to a safe location. Then run the eseutil /p command
in repair mode.
D. Run the eseutil /r command in recovery mode. Then, if necessary, run the eseutil /p command
in repair mode.
Answer: D
Microsoft Knowledge Base Article - 258243, 296788
Explanation:
Eseutil is the Exchange Server command line utility to manipulate the Exchange databases. The /r switch will attempt to do a recovery of the damaged database. The /p switch will attempt to patch the database.
This is the preferred method if there is no backup available. You will need to run Eseutil /r e00 /l "c:\program files\exchsrvr\mdbdata"
Incorrect Answers:
A. Isinteg -fix will attempt to do a repair of the database. However, this process almost always results in more data loss than the eseutil utility will. Therefore, this is not the best option. For more details, see the KB article listed in the reference.
B. Moving the transaction log files will prevent the database from being brought back to a consistent state. This violates the requirement of minimum data loss.
C. Incorrect for the same reason as "B". The transaction log files are needed to bring the database back to the most current position. Moving the transaction log files prevents the database (once corrected) from continuing to read transactions into the database. This violates the requirement of minimum data loss.
Reference:
Microsoft Knowledge Base Articles - 259851 "Ramifications of running the eseutil /p" and 328763
"Troubleshooting a Corrupt Exchange Database
|
Question 1.
A JSP page needs to set the property of a given JavaBean to a value that is calculated with the JSP page.
Which three jsp:setProperty attributes must be used to perform this initialization? (Choose three)
A. id
B. val
C. name
D. param
E. value
F. property
G. attribute
Answer: D, E, F
Question 2.
Which two are valid and equivalent? (Choose two)
A. <%! Int i; %>
B. <%= Int i; %>
C. <jsp:expr>int ;</jsp:expr>
D. <jsp:scriptlet>int ;</jsp:scriptlet>
E. <jsp: declaration>int ;</jsp:declaration>
Answer: B, C
Question 3.
A custom JSP tag must be able to support an arbitrary number of attributes whose names are unknown when the tag class is designed.
Which two are true? (Choose two)
A. A <body-content> element in the echo tag LTD must have the value JSP
B. The echo tag handler must define the setAttribute (String key, String value) method
C. The <dynamic-attributes>true</dynamic-attributes> element must appear in the echo tag TLD
D. The class implementing the echo tag handler must implement the
javax.sevlet.jsp.tagext.IterationTag interface
E. The class implementing the echo tag handler must implement the
javax.sevlet.jsp.tagext.DynamicAttributes interface
Answer: C, E
Question 4.
Which JSTL code snippet can be used to import content from another web resource?
A. <c:import url=*foo.jsp"/>
B. <c:import page=*foo.jsp"/>
C. <c:include url=*foo.jsp"/>
D. <c:include page=*foo.jsp"/>
E. Importing cannot be done in JSTL. A standard action must be used instead.
Answer: A
Question 5.
Given:
http://com.example/myServlet.jsp?num=one&num=two&num=three
Which two produce the output "one, two and three"? (Choose two)
A. ${param.num[0].[1] and [2]}
B. ${param.values[0].[1] and [2]}
C. ${param.num[0]}, ${param.num[1]} and ${param.num [2]}
D. ${param.values[0]}, ${param.values[1]} and ${param.values [2]}
E. ${param.values["num"][0]}, ${param.values["num"][1]} and
${param.values["num"][2]}
F. ${param.values.num[0]}, ${param.values.num[1]} and
${param.values.num[2]}
G. ${param.values["num"]["0"]}, ${param.values["num"]["1"]} and
${param.values["num"]["2"]}
Answer: A, E
|
Question 1.
Which two statements are characteristics of data link layer broadcasts? Select two
A. Broadcasts are not forwarded by routers.
B. Broadcasts do not occur at Layer 3.
C. Broadcasts are restricted to ports with active, end-user devices.
D. Broadcasts can be controlled with the use of VLANs.
Answer: A, D
|
Question 1.
Which PBX features are unnecessary for Cisco Unity to support a full integration? (Choose all that
apply.)
A. Message call service.
B. Call message retrieval.
C. Easy message access.
D. Direct message retrieval.
E. Message waiting indication.
F. Call forward to personal greeting.
Answer: A, B, D
Question 2.
Which of the following cannot be managed using the Cisco Unity
Assistant? (Choose all that apply.)
A. Password.
B. Class of service.
C. Message playback.
D. Message notification.
E. Public distribution lists.
Answer: B, E
Question 3.
Which of the following are invalid standard features of the Cisco Unity software? (Choose three)
A. voice mail
B. fax notification
C. multiple languages
D. audiotext application
E. RSA enhanced security
Answer: B, C, D
Question 4.
Which of the following are not the required objects that you should configure before adding the subscribers to Cisco Unity System? (Choose all that apply.)
A. The account policy
B. The subscriber IDs
C. The access control list
D. The subscriber template
Answer: B, C
Question 5.
You are the administrator of a Cisco Unity system at ITCertKeys. ITCertKeys is experiencing a problem with MWI performance. A number of ITCertKeys users have reported that their message lights are going on and off very slowly. This happens most often between 10:00 a.m. and 2.00 p.m.
Which of the following are unnecessary steps to troubleshoot this problem? (Choose all that apply.)
A. run a port usage report for all the ports on the Unity system for the past seven days.
B. check the MWI off codes in UTIM and on the telephone switch to ensure that they match.
C. check the ports page to see if the ports that perform MWIs are also answering calls.
D. run two port usage reports for the past seven days, one for the ports that turn MWIs on and the
other for all ports that answer calls.
Answer: A, B
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.