|
THANKS TO ITCERTKEYS..
|
looking for a dump thanks
|
Help with Latest Dumps thanks buddy
|
Pl provide the Dump thanks
|
Question 1. Your company's network just finished going through a SAS 70 audit. This audit reported that overall, your network is secure, but there are some areas that needs improvement. The major area was SNMP security. The audit company recommended turning off SNMP, but that is not an option since you have so many remote nodes to keep track of. What step could you take to help secure SNMP on your network? A. Change the default community string names B. Block all internal MAC address from using SNMP C. Block access to UDP port 171 D. Block access to TCP port 171 Answer: A Question 2. At what layer of the OSI model do routers function on? A. 3 B. 4 C. 5 D. 1 Answer: A Question 3. An "idle" system is also referred to as what? A. Zombie B. PC not being used C. Bot D. PC not connected to the Internet Answer: A Question 4. What operating system would respond to the following command? A. Mac OS X B. Windows XP C. Windows 95 D. FreeBSD Answer: D Question 5. Why are Linux/Unix based computers better to use than Windows computers for idle scanning? A. Windows computers will not respond to idle scans B. Linux/Unix computers are constantly talking C. Linux/Unix computers are easier to compromise D. Windows computers are constantly talking Answer: D Question 6. How many bits is Source Port Number in TCP Header packet? A. 48 B. 32 C. 64 D. 16 Answer: D Question 7. Why are Linux/Unix based computers better to use than Windows computers for idle scanning? A. Windows computers are constantly talking B. Linux/Unix computers are constantly talking C. Linux/Unix computers are easier to compromise D. Windows computers will not respond to idle scans Answer: A Question 8. Simon is a former employee of Trinitron XML Inc. He feels he was wrongly terminated and wants to hack into his former company's network. Since Simon remembers some of the server names, he attempts to run the axfr and ixfr commands using DIG. What is Simon trying to accomplish here? A. Enumerate all the users in the domain B. Perform DNS poisoning C. Send DOS commands to crash the DNS servers D. Perform a zone transfer Answer: D Question 9. You are carrying out the last round of testing for your new website before it goes live. The website has many dynamic pages and connects to a SQL backend that accesses your product inventory in a database. You come across a web security site that recommends inputting the following code into a search field on web pages to check for vulnerabilities: When you type this and click on search, you receive a pop-up window that says: "This is a test." What is the result of this test? A. Your website is vulnerable to web bugs B. Your website is vulnerable to CSS C. Your website is not vulnerable D. Your website is vulnerable to SQL injection Answer: B Question 10. After attending a CEH security seminar, you make a list of changes you would like to perform on your network to increase its security. One of the first things you change is to switch the RestrictAnonymous setting from 0 to 1 on your servers. This, as you were told, would prevent anonymous users from establishing a null session on the server. Using Userinfo tool mentioned at the seminar, you succeed in establishing a null session with one of the servers. Why is that? A. RestrictAnonymous must be set to "2" for complete security B. RestrictAnonymous must be set to "3" for complete security C. There is no way to always prevent an anonymous null session from establishing D. RestrictAnonymous must be set to "10" for complete security Answer: A
|
Question 1. What is the primary benefit of the "timE. to-live" field in the IP header? A. To improve buffer utilization B. To reduce the impact of routing loops C. To allow calculation ofrounD. trip delays D. To remind us that all earthly joys are fleeting E. To avoid delivery of packets that are no longer useful Answer: B Question 2. A router interface address is 180.60.45.96 with a mask of 255.255.255.224. What configuration statement A. routerospf 1 network 180.60.45.96 255.255.255.32 area 0 B. routerospf 1 network 180.60.45.96 0.255.255.224 area 0 C. router ospf 1 network 180.60.45.96 0.0.0.31 area 0 D. routerospf 1 network 180.60.45.96 0.0.0.224 area 0 Answer: C Question 3. An IGX-8 identifies itself as an IGX-32 on the configuration screen. What has gone wrong? A. The NPM was originally in an IGX-32. B. Database corruption has occurred. C. The user must physically set a jumper on the SCM to correct this. D. Use thesetnovram command to change the switch type. Answer: C Question 4. In PNNI networks, AESA has the following general format: A. 12-byte network prefix plus a 7-byte End System Identifier plus 1 byte Selector B. 11-byte network prefix plus an 8-byte End System Identifier plus 1 byte Selector C. 7-byte network prefix plus a 12-byte End System Identifier plus 1 byte Selector. D. 13-byte network prefix, a 6-byte End System Identifier plus 1 byte Selector Answer: D Question 5. To eliminate the need for adjacent routers on broadcast networks to form n(n-1)/2 adjacencies, ISIS defines a pseudonode or Designated Intermediate System, DIS. All router on the broadcast medium form an adjacency with the DIS. The Backup DIS is called: A. Redundant DIS B. BDR C. There is no concept of a backup DIS in IS-IS D. Designated Redundant System Answer: C Question 6. Cisco/StrataCom (Gang of four) LMI uses what DLCI for messages? A. 0 B. 1023 C. It should be configurable, as per the specification. D. It is negotiated when the ports become active. Answer: B Question 7. Click the Exhibit button to view the topology. Using the above diagram, which are valid BGP AS_Path Attributes received at Net1 for a route originating from AS65100? (multiple answer) A. 200 57000 100 65100 B. 200 57000 100100 C. 100 57000 200 D. 200 57000 100 E. 65100 100 57000 200 Answer: A, D, E Question 8. The default network clocking source in a BPX network is: A. The internal oscillator of the lowest-numbered node B. The internal oscillator of the highest-numbered node C. Each node's own internal oscillator D. The clock chip on the network management system Answer: B Question 9. When using IS-IS for IP routing, Dual IS-IS defined by RFC 1195, what is true? (multiple answer) A. It is necessary to configure a NSAP address. B. it is not possible to perform both IP and CLNS routingwih the same process. C. IP address and subnet information is carried in the TLVfield on the L-1/L-1 LSPs. D. Dual IS-IS does not support VLSM information. Answer: A, C Question 10. What is true about the DLCI field in the Frame Relay header? A. It consists of two portions, source and destination, which map data to a logical channel. B. It generally has significance only between the local switch and the DTE device. C. It is an optional field in the ITU-T specification. D. It is present only in data frames sent through the network. Answer: B
|
Question 1. What IE is not mandatory in a Q.931 Service msg? A. Bearer capability B. Channel ID C. Message Type D. Change Status E. Call Reference Answer: A Question 2. The purpose of Administrative Distance, as used by Cisco routers, is: A. To choose between routes from different routing protocols when receiving updates for the Same network B. To identify which routing protocol forwarded the update C. To define the distance to the destination used in deciding the best path D. To be used only for administrative purposes Answer: A Question 3. What is the maximum PMD value of a 100km fiber segment if the cable is specified with 0.5ps/km? (worst case)? A. 0.005ps B. .05ps C. 5ps D. 50ps E. 500ps Answer: C Question 4. What is the equivalent of 50 GHz spacing in DWDM in terms of nm? A. 1.6 nm B. 0.8 nm C. 0.4 nm D. 0.2 nm Answer: C Question 5. Click the Exhibit to view the topology. Router A has a 512K-access port into the frame relay cloud. Router B has 128K-access port into the frame relay cloud. The two routers are connected with symmetrical PVCs that are configured for 64K committed information rate (CIR). What Frame Relay Traffic Shaping map-class subcommand should be entered on Router A to prevent workstation A from overrunning the access port on Router B? A. frame-relay traffic-rate 128000 512000 B. frame-relay traffic-rate 64000 512000 C. frame-relay traffic-rate 512000 64000 D. frame-relay traffic-rate 128000 64000 E. frame-relay traffic-rate 64000 128000 Answer: E Question 6. If a host sends a TCP segment with the RST flag set, it means: A. The receiver should send all data in the reassembly buffer to the application receiving it immediately. B. The receiver should reset the session. C. Any routers between the source and destination hosts should reset the state of the connection in their buffers. D. The receiver should make certain its send buffer is pushed onto the wire. Answer: B Question 7. How many E1 channels can STM-1 frame transport? A. 7 B. 21 C. 63 D. 84 Answer: C Question 8. BGP can implement a policy of 'Route Dampening' to control route instability. What statement about route dampening is NOT correct? A. A numeric penalty is applied to a route each time it flaps. B. The penalty is exponentially decayed according to parameters, such as halF. life-time. C. The history of unstable routes is forwarded back to the sender to control future updates. D. The route is eventually suppressed based on a configurable 'suppress limit'. Answer: C Question 9. MPLS traffic engineering data is carried by: A. Opaque LSAs or IS-IS TLVs B. BGPMEDs C. RTP or RTCP packets D. MBGP Answer: A Question 10. Click the Exhibit button. In the diagram, if a resilient packet ring (RPR) is built between ML-series cards,____restoration exists on the ring, while the redundant connections to the 7609 rely on protection. A. 50ms,STP B. STP.STP C. STP, 1+1 APS D. 50ms, 50ms Answer: A
|
Question 1. You are configuring the eri0 network interface using the ifconfig command with the options netmask + and subnet mask 255.255.255.0. # /usr/sbin/ifconfig eri0 netmask + To verify the system is properly set up you issue an ifconfig -a command. You notice that the eri0 network interface has the netmask incorrectly set for 255.255.0.0. Which file do you need to check first? A. /etc/hosts B. /etc/netmasks C. /etc/hostname.eri0 D. /etc/nsswitch.conf Answer: B Question 2. You are installing a StorEdge A3500. You have created 5 LUNS, but after a boot -r can only see one of them in the format output. What should you modify/run to increase the single LUN issue? A. /kernel/drv/rdriver.conf B. /etc/osa/rmparams C. /kernel/drv/sd.conf D. /usr/lib/osa/bin/symconf Answer: C Question 3. You replaced a failed system board on a Sun Fire E20K. The new system board has no memory and needs to be tested. How should you test the new board? A. Add the line ?$GGWKHOLQHno_memory_ok?in the postrc file. B. Use the option -m with hpost command. C. You need memory in a system board to test it. D. Add the line ?$GGWKHOLQHmemory_ok?in the postrc file. Answer: A Question 4. You have completed repairs on a Sun Fire E25K and the next step is to run extended POST to verify the service action. How can you run extended post level 32 on domain A only? A. Enter level 32 in the /etc/opt/SUNWSMS/config/.postrc file. B. Enter level 32 in the /etc/opt/SUNWSMS/config/A/.postrc file. C. Enter 2 in the /etc/opt/SUNWSMS/config/A/.postrc file. D. Enter 2 in the /etc/opt/SUNWSMS/config/.postrc file. Answer: B Question 5. A customer wants to install four domains on their Sun Fire 6900. What needs to be configured using the setupplatform command on the System Controller? A. COD for all domains B. System controller failover C. ACL's for all domains D. Dual partitioning Answer: D Question 6. You have installed a Sun Enterprise 5500 onto a customer's network. The customer's networking department has told you that you must force the production interface, qfe0, to 100Mbps, Full Duplex. Which two ndd commands will you need to add to your startup script to ensure that your interface is running at the correct settings? (Choose two.) A. ndd -set /dev/qfe autoneg_cap 0 B. ndd -set /dev/qfe adv_100fdx_cap 1 C. ndd -set /dev/qfe link_mode 1 D. ndd -set /dev/qfe 100fdx_cap 1 E. ndd -set /dev/qfe link_speed 1 Answer: A, B Question 7. You install a system to customer specifications and after rebooting you get the following message: NIS server not responding for... retrying The customer tells you that there is a network problem which prevents this machine from reaching the NIS server. You boot the machine into single user mode. What action should you take to allow the system to operate until the NIS server is reachable again? A. Edit /etc/nsswitch.conf so that file is first for all entries and reboot into multiuser mode. B. Copy /etc/nsswitch.files to /etc/nsswitch.conf and reboot into multiuser mode. C. Edit /etc/resolv.conf so that the domain entry is commented out and reboot into multiuser mode. D. Rename /etc/rc2.d/S72inetsvc to /etc/rc2.d/DisabledS72inetsvc and reboot into multiuser mode. Answer: B Question 8. You have performed a setkeyswitch on for domain A on a Sun Fire 6800 where the auto-boot? OBP variable is set to false. What command at the OBP should you run to find the status of the POST? A. show-post-results B. showlog-results C. show-log-results D. showlog results E. showpost-results F. showpost results Answer: A Question 9. A customer has been receiving the following message: unix: WARNING: /tmp: File system full, swap space limit exceeded You are asked to create a swapfile to increase swap space. The swap file specifications are: - File name: swap1 - Destination directory: /delta - Length of swap1: 20 Megabytes Which command should you use to create the swap file? A. mkfile 20m /delta/swap1 B. mkfile -a 20m /delta/swap1 C. swap -a 20m /delta/swap1 D. swap 20m /delta/swap1 Answer: A Question 10. A customer has a number of Sun Fire 25Ks and you need to identify which one to work on. You are in the data center but not at the keyboard. Which command should you ask the customer to run to determine the chassis serial number? A. showplatform B. showcsn C. showenvironment D. showserial Answer: A
|
Review the image, and then answer the question below. You have managed the Dock preferences to define where on the computer screen the Dock will appear for these four accounts: Lab (a computer group), Science1 (a computer in the Lab computer group), Teachers (a workgroup), and John (a member of the Teachers workgroup). When John logs in on the Science1 computer, where on the computer screen does the Dock appear? A. Bottom of the screen B. Left side of the screen C. Right side of the screen D. John will be prompted to choose whether his user preferences or the Teachers workgroup preferences should be used. The Dock will appear at the location of his choice. Answer: C Question 2. You are setting up a Mac OS X Server v10.5 computer to store the home folders for 10 users. The computer has 510 GB of free space on the volume where the home folders reside. Which of these procedures will ensure that each user has an equal amount of storage space, yet leave at least 10 GB free? A. In AFP service in Server Admin, select Limit disk usage to, and set the value to 50 GB. B. In AFP service in Server Admin, select Limit disk usage to, and set the value to 500 GB. C. In Workgroup Manager, in the Home pane for each user account, set the Disk Quota to 50 GB. D. In Workgroup Manager, in the Quota pane for a group containing all of the users, set the Limit to 50 GB. Answer: C Question 3. You have enabled AFP service on your Mac OS X Server v10.5 computer. You configured the authentication method as Any. The server will attempt to authenticate file service users using which authentication methods, and in what order? A. (1) Kerberos; (2) SSH B. (1) Standard; (2) Kerberos C. (1) Kerberos; (2) Standard D. (1) SSH; (2) Standard; (3) Kerberos E. (1) Standard; (2) Kerberos; (3) SSH Answer: C Question 4. Which utility should you use on a Mac OS X v10.5 computer to create resources, such as rooms and projectors, in an LDAP directory so that those resources can be scheduled by iCal service users? A. Directory B. Address Book C. Directory Utility D. Directory Access Answer: A Question 5. Which of these is a zone that is configurable from Server Admin? A. Cache B. Master C. Pointer D. Forward Answer: B Question 6. Which utility can you use to display the status of ticket-granting tickets on a Mac OS X v10.5 computer? A. Kerberos B. Server Admin C. KerberosAgent D. Keychain Access E. Directory Utility F. Certificate Assistant Answer: A Question 7. Your company has a set of site-licensed fonts in a folder named Fonts, on the share point, Resources, on your Mac OS X Server v10.5 computer. You are configuring the Resources share point so that these fonts will be automatically accessible by all your Mac OS X users. After you have enabled the Automount option for the Resources share point, how should you configure the share point in the automount configuration sheet? A. Choose User home folders. B. Choose Shared Library folder. C. Choose Shared Applications folder. D. Choose Custom mount path and enter ~/Library/Fonts for the path. Answer: B Question 8. What is the maximum number of replicas of one Open Directory master that can be used in a Mac OS X Server v10.5 Open Directory infrastructure? A. 31 B. 64 C. 256 D. 1024 E. 1056 Answer: E Question 9. A MacBook computer running Mac OS X v10.5 was formerly managed, but its managed preferences have been disabled on the server. Still, the user is unable to change some preferences on the MacBook. Which statement presents a valid method for restoring the users access to these preferences? A. Delete the /Library/Managed Preferences/ folder. B. Delete the MCX attributes from the user records in the NetInfo database. C. Deselect the Managed Accounts option in the Services pane of Directory Utility. D. Deselect the Managed Accounts option in the Accounts pane of System Preferences. Answer: A Question 10. Which protocol does the iChat service in Mac OS X Server v10.5 use to send messages? A. IRC (Internet Relay Chat) B. SMP (Symmetric Messaging Protocol) C. AIMP (AOL Instant Messaging Protocol) D. XMPP (Extensible Messaging and Presence Protocol) Answer: D
|
Question 1. Which of these can you use to determine whether there is network connectivity between your computer and a web server on the Internet? A. Whois B. Finger C. Lookup D. Traceroute Answer: D Question 2. You are an admin user, and have enabled the Ignore Volume Ownership option for an external FireWire hard disk. What will happen the next time a standard user attempts to mount the disk? A. The disk will mount, and the user will be able to read, modify, and delete any file on the disk. B. The disk will mount, and the user will be able to read any file on the disk; the user will be required to enter an administrator password to modify or delete files on the disk. C. The user will be required to enter an administrator password to mount the disk; once the disk is mounted the user will be able to read, modify, and delete any file on the disk. D. The user will be required to enter an administrator password to mount the disk; once the disk is mounted, the user will be able to read any file on the disk, but will be required to re-enter an administrator password to modify or delete files. Answer: A Question 3. Review the screenshot of a user's home folder, and then answer the question below. Which folder did the user create? A. Music B. Pages C. Pictures D. Downloads Answer: B Question 4. Mac OS X v10.5 can read files on a volume that is ________-formatted, but it cannot write to files on the volume. A. UFS B. NTFS C. EXT2 D. FAT32 Answer: B Question 5. Which procedure will let someone who does not have a local user account log in to a local admin user account on a Mac OS X v10.5 computer that does NOT have a firmware password enabled? A. Log in to the computer with the user name "root" and the master password, open Accounts preferences, and reset the admin user password. B. Remove a RAM DIMM from one of the computers RAM slots, restart the computer while holding down the Command-Option-O-F keys until you hear the startup sound, then type "reset-all" at the prompt. C. Start the computer from the internal hard disk, log into a guest user account, open the Reset Password utility in the /Applications/Utilities folder, then reset the password on the admin user account that resides on the hard disk volume. D. Press the C key while restarting the computer with the Mac OS X v10.5 Install DVD inserted, then choose Reset Password from the Utilities menu. Select the hard disk volume and the admin user account, then enter a new password for the account and click Save. Answer: D Question 6. You have configured your Mac OS X v10.5 computer to share its connected USB printer. Mac OS X users can locate and print to it, but Windows users can not. What additional step must you take to allow Windows users to print to it? A. In Sharing preferences, enable file sharing over SMB. B. In Print & Fax preferences, enable the SMB printer driver. C. In Printer Setup Utility, enable Windows Printing from the Printers menu. D. In Print & Fax preferences, configure the Windows Printer name and queue. Answer: A Question 7. Review the screenshots of a files permissions, as seen in Finder and from Terminal, and then answer the question below. Why are Kim's permissions to the file, Report.rtf, NOT visible in the Terminal listing? A. Kims permissions are stored as POSIX settings. B. Kims permissions are stored in the volume catalog. C. Kims permissions are stored in the file data segment. D. Kims permissions are stored in an Access Control List (ACL). Answer: D Question 8. Tom wants to share a document with Harriet. Both have standard user accounts on the same Mac OS X v10.5 computer. Which of these is NOT a location where Tom can store the document so that Harriet can read it? A. /Users/Shared/ B. /Users/tom/Public/ C. /Users/harriet/Public/ D. /Users/harriet/Public/Drop Box/ Answer: C Question 9. The primary role of the master password in Mac OS X v10.5 is to let you ________. A. Access all the passwords stored in a local keychain B. Reset the password of an account that has FileVault enabled C. Change the startup device by holding down the Option key while the computer starts up D. Connect to any password-protected web server whose password is stored in a local keychain Answer: B Question 10. Which statement identifies a potential effect of resetting the master password for a Mac OS X v10.5 computer? A. Users with keychain files created before you changed the master password must use the old master password to unlock their keychains. B. Users who enabled FileVault before you changed the master password will not be able to access their home folder if they have forgotten their account password. C. Users with keychain files created before you changed the master password will have their keychain passwords automatically updated to match the new master password. D. Users whose accounts were created before you changed the master password must use the firmware password to access their home folder if they have forgotten their account password. Answer: B
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.