Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "156-210" Exam

passed!

 passed with first attempt, thanks for itcertkeys.


 


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 350-040 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "350-040" Exam

Storage Networking

 Question 1.
Which statements are true about a cascaded FICON topology? Select three.

A. It requires Fabric binding to be configured in all the switches.
B. Only one hope (ie:traversing 2 switchs) is supported.
C. Separate ISLs must be used dedicated to FICON traffic.
D. Two byte link addressing as defined in FC-SB2, is mandatory.

Answer: A, B, D

Question 2.
MDS3 _ 9509# install all system bootflash:m9500-sf1 ek9-mz.1.3.4.bin kickstart
bootflash:m9500-sfek9-kickstart-mz.1.3.4.bin
Verifying image bootflash:/m9500-sf1ek9kickstart-mz.1.3.4.bin
[####################] 100% -- SUCCESS
Verifying image bootflash:/m9500-sf1ek9kickstart-mz.1.3.4.bin
[####################] 100% -- SUCCESS
Extracting "sic"version from image bootflash:/m9500-sf1ek9kickstart-mz.1.3.4.bin
[####################] 100% -- SUCCESS
Extracting "ips" version from image bootflash:/m9500-sf1ek9kickstart-mz.1.3.4.bin
[####################] 100% -- SUCCESS
Extracting "system" version from image bootflash:/m9500-sf1ek9kickstart-mz.1.3.4.bin
[####################] 100% -- SUCCESS
Extracting "kickstart"version from image bootflash:/m9500-sf1ek9kickstart-mz.1.3.4.bin
[####################] 100% -- SUCCESS
Extracting "loader" version from image bootflash:/m9500-sf1ek9kickstart-mz.1.3.4.bin
[####################] 100% -- SUCCESS
Compatibility check is done:
Module bootable impact install-type reason
--------- --------- ---------- ------- ----- ---------
2 yes non-disruptive rolling
3 yes disruptive rolling Hitless upgrade is not supported
5 yes non-disruptive reset
6 yes non-disruptive reset
Images will be upgraded according to following table:
Module Image Running-Version Net-Version Upg-Required
--------- ------- ---------- ----------- ------ ----------
2 slc 1.3(4b) 1.3(4) yes
2 bios v1.1.0(10/24.03) v10.8(08/07/03) no
3 slc 1.3(4b) 1.3(4) yes
3 bios v1.1.0(10/24.03) v10.8(08/07/03) no
5 system 1.3(4b) 1.3(4) yes
5 kickstart 1.3(4b) 1.3(4) yes
5 bios v1.1.0(10/24.03) v10.8(08/07/03) no
5 loader 1.2(2) 1.2(2) no
6 system 1.3(4b) 1.3(4) yes
6 kickstart 1.3(4b) 1.3(4) yes
6 bios v1.1.0(10/24.03) v10.8(08/07/03) no
6 loader 1.2(2) 1.2(2) no
Do you want to continue with the installation (y/n)? [n]

What is the reason the upgrade would not be hit-less for the entire switch, above?

A. The supervisor module requires a BIOS upgrade, which is disruptive.
B. The "rolling-upgrade" for module 2 requires a second "slc" to be hit-less.
C. Module 3 is an IPS-8 card, which does not support non-disruptive downgrades.
D. Nodule 3 is an IPS-8 and the switch does not have a second IPS-8 card for route diversity 
    which could provide a "stable" upgrade.
E. No reason - the upgrade is non-disruptive and hit-less.

Answer: C

Question 3.
Which methods can be used to control Iscsi INITIATOR ACCESS TO VIRTUAL TARGETS? Select three.

A. Zoning
B. Specifying on which Gigabitethernet port the virtual target is advertised.
C. Setting up Iscsi PROXY MODE FOR THE INITIATORS
D. Specifying which IP subnet virtual target can be accessed
E. Enabling role-based access control.

Answer: A, B, C

Question 4.
In a scenario with three lSLs between two switches, a single host in VSAN 5 on switch A, and a single storage device on switch B in the same VSAN. 

What would be the effect on the lSLs if Flow based load balancing option was enabled in VSAN 5?

A. Each subsequent frame will use the least utilized link, based on FCC.
B. Each subsequent frame will use a different link.
C. All frames between source and destination would follow same link for given flow.
D. Flow based load balancing is not enabled for an individual VSAN.

Answer: C

Flow based load balancing : all frames between source and destination would follow same link for given flow.

Question 5.
Which organization produce standards related to SCSI, Fiber Channel or Fiber Channel protocol? Select two.

A. SNIA
B. T11 Committee
C. Cisco Systems
D. T10 Committee
E. T12 Committee

Answer: B, D

=> T11 for fiber channel, T10 for SCSI

Question 6.
What is the User-specified VSAN Ids range?

A. 1-4093
B. 2-4093
C. 2-4094
D. 2-4092

Answer: B
=> user-specific VSAN 2-4093

Question 7.
What can be configured on a FCIP Profile?

A. Max and Min bandwidth, peer-info, compression ratio
B. Passive mode, peer-info, compression ratio
C. TCP port number, sack-enable, Max and Min bandwidth
D. Sack-enable, TCP port number peer-info
E. TCP port number, write accelerator compression ratio

Answer: C
=> FCIP profile for TCP port, sack-enable, Max and Min bandwidth

Question 8.
A Brocade 12000 in its native corePID mode (1) is connected to VSAN 1009 on an MDS. 

What is the correct output of the "show vsan 1009" command?

A. vsan 1009 information:
    name: VSAN 1009 state:active
    interoperability mode:default loadbalancing:src-id/dst-id/oxid
    operational state:up.
B. vsan 1009 information:
   name: VSAN 1009 state:active
   interoperability mode:1 loadbalancing:src-id/dst-id/oxid
   operational state:up.
C. vsan 1009 information:
    name: VSAN 1009 state:active
    interoperability mode:2 loadbalancing:src-id/dst-id/oxid
    operational state:up.
D. vsan 1009 information:
    name: VSAN 1009 state:active
   interoperability mode:3 loadbalancing:src-id/dst-id/oxid
   operational state:up.
E. vsan 1009 information:
   name: VSAN 1009 state:active
   interoperability mode:Brocade Native loadbalancing:src-id/dst-id/oxid
   operational state:up.

Answer: D

=> interop mode 3 for Brocade 12000

Question 9.
What TCP feature reduces the chances of an oversized IP packets from being fragmented?

A. SACK
B. Extended ping
C. PMTU
D. Retransmit timeout
E. Send buffer size

Answer: C

Question 10.
In Raid 0+1 the loss of a single drive:

A. Does not affect the redundancy of the array
B. Reduces the array redundancy to that of a Raid level 0
C. Same level of redundancy to that of a Raid level 1+0
D. Reduces the performance of the array
E. Has no affect what so ever on the array

Answer: B


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 350-020 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "350-020" Exam

CCIE SP Optical Qualification

 Question 1.
What IE is not mandatory in a Q.931 Service msg?

A. Bearer capability
B. Channel ID
C. Message Type
D. Change Status
E. Call Reference

Answer: A

Question 2.
The purpose of Administrative Distance, as used by Cisco routers, is:

A. To choose between routes from different routing protocols when receiving updates for the 
    same network
B. To identify which routing protocol forwarded the update
C. To define the distance to the destination used in deciding the best path
D. To be used only for administrative purposes

Answer: A

Question 3.
What is the maximum PMD value of a 100km fiber segment if the cable is specified with 0.5ps/km ? (worst case)?

A. 0.005ps
B. .05ps
C. 5ps
D. 50ps
E. 500ps

Answer: C

Question 4.
What is the equivalent of 50 GHz spacing in DWDM in terms of nm?

A. 1.6 nm
B. 0.8 nm
C. 0.4 nm
D. 0.2 nm

Answer: C

Question 5.
Exhibit:
 

Router ITK1 has a 512K-access port into the frame relay cloud. Router ITK2 has 128K-access port into the frame relay cloud. The two routers are connected with symmetrical PVCs that are configured for 64K committed information rate (CIR). 

What Frame Relay Traffic Shaping map-class sub-command should be entered on Router A to prevent workstation A from overrunning the access port on Router B?

A. frame-relay traffic-rate 128000 512000
B. frame-relay traffic-rate 64000 512000
C. frame-relay traffic-rate 512000 64000
D. frame-relay traffic-rate 128000 64000
E. frame-relay traffic-rate 64000 128000

Answer: E

Question 6.
If a host sends a TCP segment with the RST flag set, it means:

A. The receiver should send all data in the reassembly buffer to the application receiving it 
    immediately.
B. The receiver should reset the session.
C. Any routers between the source and destination hosts should reset the state of the connection 
    in their buffers.
D. The receiver should make certain its send buffer is pushed onto the wire.

Answer: B

Question 7.
How many E1 channels can STM-1 frame transport?

A. 7
B. 21
C. 63
D. 84

Answer: C

Question 8.
BGP can implement a policy of 'Route Dampening' to control route instability.

What statement about route dampening is NOT correct?

A. A numeric penalty is applied to a route each time it flaps.
B. The penalty is exponentially decayed according to parameters, such as half-life-time.
C. The history of unstable routes is forwarded back to the sender to control future updates.
D. The route is eventually suppressed based on a configurable 'suppress limit'.

Answer: C

Question 9.
MPLS traffic engineering data is carried by:

A. Opaque LSAs or IS-IS TLVs
B. BGP MEDs
C. RTP or RTCP packets
D. MBGP

Answer: A

Question 10.
Exhibit:
 

In the diagram, if a resilient packet ring (RPR) is built between ML-series cards, ____ restoration exists on the ring, while the redundant connections to the 7609 rely on _____protection.

A. 50 ms, STP
B. STP, STP
C. STP, 1+1 APS
D. 50ms, 50ms

Answer: A


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-642 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-642" Exam

TS: Windows Server 2008 Network Infrastructure, Configuring

 Question 1.
Your company has a single Active Directory forest that has an Active Directory domain named na.contoso.com. A server named Server1 runs the DNS server role. You notice stale resource records in the na.contoso.com zone. You have enabled DNS scavenging on Server1. Three weeks later, you notice that the stale resource records remain in na.contoso.com. You need to ensure that the stale resource records are removed from na.contoso.com. 

What should you do?

A. Stop and restart the DNS service on Server1.
B. Enable DNS scavenging on the na.contoso.com zone.
C. Run the dnscmd Server1 /AgeAllRecords command on Server1.
D. Run the dnscmd Server1 /StartScavenging command on Server1.

Answer: D

Question 2.
Your company has an Active Directory domain named ad.contoso.com. The company also has a public namespace named contoso.com. You need to ensure that public DNS zone records cannot be copied. You must achieve this goal without impacting the functionality of public DNS name resolutions. 

What should you do?

A. Disable the Notify feature for the contoso.com zone.
B. Disable the Allow - Read permission for the Everyone group on the contoso.com DNS domain.
C. Configure the All domain controllers in the domain zone replication option on ad.contoso.com.
D. Configure the Allow zone transfers only to servers listed on the Name Servers option on 
    contoso.com.

Answer: D

Question 3.
Your company has a main office and a branch office. The main office has a domain controller named DC1 that hosts a DNS primary zone. The branch office has a DNS server named SRV1 that hosts a DNS secondary zone. All client computers are configured to use their local server for DNS resolution. You change the IP address of an existing server named SRV2 in the main office. You need to ensure that SRV1 reflects the change immediately. 

What should you do?

A. Restart the DNS Server service on DC1.
B. Run the dnscmd command by using the /zonerefresh option on DC1.
C. Run the dnscmd command by using the /zonerefresh option on SRV1.
D. Set the refresh interval to 10 minutes on the Start Of Authority (SOA) record.

Answer: C

Question 4.
Your company has a single Active Directory domain. The company has a main office and a branch office. Both the offices have domain controllers that run Active Directory-integrated DNS zones. All client computers are configured to use the local domain controllers for DNS resolution. The domain controllers at the branch office location are configured as Read-Only Domain Controllers (RODC). You change the IP address of an existing server named SRV2 in the main office. You need the branch office DNS servers to reflect the change immediately. 

What should you do?

A. Run the dnscmd /ZoneUpdateFromDs command on the branch office servers.
B. Run the dnscmd /ZoneUpdateFromDs command on a domain controller in the main office.
C. Change the domain controllers at the branch offices from RODCs to standard domain 
    controllers.
D. Decrease the Minimum (default) TTL option to 15 minutes on the Start of Authority (SOA) 
    record for the zone.

Answer: A

Question 5.
Your company has a server named Server1 that runs Windows Server 2008. Server1 runs the DHCP Server role and the DNS Server role. You also have a server named ServerCore that runs a Server Core installation of Windows Server 2008. All computers are configured to use only Server1 for DNS resolution. The IP address of Server1 is 192.168.0.1. The network interface on all the computers is named LAN. Server1 is temporarily offline. A new DNS server named Server2 has been configured to use the IP address 192.168.0.254. You need to configure ServerCore to use Server2 as the preferred DNS server and Server1 as the alternate DNS server. 

What should you do?

A. Run the netsh interface ipv4 add dnsserver "LAN" static 192.168.0.254 index=1 command.
B. Run the netsh interface ipv4 set dnsserver "LAN" static 192.168.0.254 192.168.0.1 both 
    command.
C. Run the netsh interface ipv4 set dnsserver "LAN" static 192.168.0.254 primary command and 
    the netsh interface ipv4 set dnsserver "LAN" static 192.168.0.1 both command.
D. Run the netsh interface ipv4 set dnsserver "LAN" static 192.168.0.254 primary command and 
    the netsh interface ipv4 add dnsserver "LAN" static 192.168.0.1 index=1 command.

Answer: A

Question 6.
Your company has a domain controller named Server1 that runs Windows Server 2008 and the DNS server role. A server named Server2 runs a custom application. You need to configure DNS to include the following parameters for the custom application:
Service
Priority
Weight
Protocol
Port number
Host offering this service

Which record should you create?

A. Host Info (HINFO)
B. Service Locator (SRV)
C. Canonical Name (CNAME)
D. Well-Known Service (WKS)

Answer: B

Question 7.
Your company has a main office and two branch offices. Domain controllers in the main office host an Active Directory-integrated zone. The DNS servers in the branch offices host a secondary zone for the domain and use the main office DNS servers as the DNS Master servers for the zone. Each branch office has an application server. Users access the application server by using its fully qualified domain name. You need to ensure that users in the branch offices can access their local application server even if the WAN links are down for three days. 

What should you do?

A. Increase the Expires After setting to 4 days on the Start of Authority (SOA) record for the zone.
B. Increase the Refresh Interval setting to 4 days on the Start of Authority (SOA) record for the 
    zone.
C. Configure the Zone Aging / Scavenging Properties dialog box to enable Scavenge Stale 
    resource records, and set the Refresh setting to 4 days.
D. Configure the Zone Aging / Scavenging Properties dialog box to enable Scavenge Stale 
    resource records, and set the No-refresh interval setting to 4 days.

Answer: B

Question 8.
Your company has a single Active Directory forest that has a domain in North America named na.contoso.com and a domain in South America named sa.contoso.com. The client computers run Windows Vista. You need to configure the client computers in the North America office to improve the name resolution response time for resources in the South America office. 

What should you do?

A. Configure a new GPO that disables the Local-Link Multicast Name Resolution feature. Apply 
    the policy to all the client computers in the North America office.
B. Configure a new GPO that enables the Local-Link Multicast Name Resolution feature. Apply 
    the policy to all the client computers in the North America office.
C. Configure a new GPO that configures the DNS Suffix Search List option to sa.contoso.com, 
    na.contoso.com. Apply the policy to all the client computers in the North America office.
D. Configure the priority value for the SRV records on each of the North America domain 
    controllers to 5.

Answer: C

Question 9.
Your company has multiple DNS servers in the main office. You plan to install DNS on a member server in a branch office. You need to ensure that the DNS server in the branch office is able to query any DNS server in the main office, and you need to limit the number of DNS records that are transferred to the DNS server in the branch office. 

What should you do?

A. Configure a secondary zone on the DNS server in the branch office.
B. Configure a stub zone on the DNS server in the branch office.
C. Configure a stub zone on the DNS server in the main office.
D. Configure a primary zone on the DNS server in the branch office.

Answer: B

Question 10.
Your company has a DNS server named Server1. Your partner company has a DNS server named Server2. You create a stub zone on Server1. The master for the stub zone is Server2. Server2 fails. You discover that users are not able to resolve names for the partner company. You need to ensure that users are able to resolve names for the partner company in the event that Server2 fails. 

What should you do?

A. Change the stub zone to a secondary zone on Server1.
B. Open the SOA record for the zone on Server2. Change the Minimum (default) TTL setting to 
    12 hours.
C. Open the DNS zone for the partner company on Server2. Create a new Route Through (RT) 
    record and a new host (A) record for Server1.
D. Open the primary DNS zone on Server2. Create a new Service Locator (SRV) record and a 
    new host (A) record for Server1.

Answer: B


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for SY0-201 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "SY0-201" Exam

CompTIA Security+ (2008 Edition) Exam

 Question 1.
All of the following provide confidentiality protection as part of the underlying protocol EXCEPT:

A. SSL.
B. SSH.
C. L2TP.
D. IPSeC.

Answer: C

Question 2.
Which of the following allows an attacker to manipulate files by using the least significant bit(s) to secretly embed data?

A. Steganography
B. Worm
C. Trojan horse
D. Virus

Answer: A

Question 3.
Which of the following type of attacks would allow an attacker to capture HTTP requests and send back a spoofed page?

A. Teardrop
B. TCP/IP hijacking
C. Phishing
D. Replay

Answer: B

Question 4.
How should a company test the integrity of its backup data?

A. By conducting another backup
B. By using software to recover deleted files
C. By restoring part of the backup
D. By reviewing the written procedures

Answer: C

Question 5.
Which of following can BEST be used to determine the topology of a network and discover unknown devices?

A. Vulnerability scanner
B. NIPS
C. Protocol analyzer
D. Network mapper

Answer: D

Question 6.
When should a technician perform penetration testing?

A. When the technician suspects that weak passwords exist on the network
B. When the technician is trying to guess passwords on a network
C. When the technician has permission from the owner of the network
D. When the technician is war driving and trying to gain access

Answer: C

Question 7.
An administrator has implemented a new SMTP service on a server. A public IP address translates to the internal SMTP server. The administrator notices many sessions to the server, and gets notification that the servers public IP address is now reported in a spam real-time block list.

Which of the following is wrong with the server?

A. SMTP open relaying is enableD.
B. It does not have a spam filter.
C. The amount of sessions needs to be limiteD.
D. The public IP address is incorrect.

Answer: A

Question 8.
Which of the following is MOST efficient for encrypting large amounts of data?

A. Hashing algorithms
B. Symmetric key algorithms
C. Asymmetric key algorithms
D. ECC algorithms

Answer: B

Question 9.
Which of the following is a reason why a company should disable the SSID broadcast of the wireless access points?

A. Rogue access points
B. War driving
C. Weak encryption
D. Session hijacking

Answer: B

Question 10.
Which of the following BEST describes ARP?

A. Discovering the IP address of a device from the MAC address
B. Discovering the IP address of a device from the DNS name
C. Discovering the MAC address of a device from the IP address
D. Discovering the DNS name of a device from the IP address

Answer: C


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for HP0-311 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "HP0-311" Exam

HP OpenView TeMIP

 Question 1.
Terminate, Acknowledge, Promote, Demote are examples of directives of the class _______.

A. Operation Context
B. Record
C. Alarm Object
D. OSI Event

Answer: C

Question 2.
An event can be lost in TeMIP if _______. Select TWO.

A. no GetEvent has been issued for the managed object of this event
B. a Low Level Filter discarded this event
C. the connection with the Oracle database has been lost
D. there is no Real Time View monitoring the managed object of this event
E. a security profile has blocked the collection of this event

Answer: A, B

Question 3.
In the TeMIP MSL every dictionary ID is represented by _______.

A. a string in English and a string in the operator's native language
B. a presentation name string only
C. a numerical ID only
D. a presentation name string and a numerical ID

Answer: D

Question 4.
What is the directive that enables the reception of events corresponding to a specific entity?

A. getevent
B. notify
C. summarize
D. subscribe

Answer: A

Question 5.
The Scheduler FM is responsible for _______.

A. triggering polling operations on IP entities only
B. scheduling any kind of directive for global and child classes
C. scheduling show directives for global classes only
D. listening to scheduled reception of events

Answer: B

Question 6.
Where is the run-time data of a Management Module typically stored?

A. the TNS
B. a private Management Information Repository (MIR)
C. the TeMIP Dictionary
D. a public Management Information Repository (MIR)

Answer: B

Question 7.
Which attribute partition will NEVER be stored in a MIR?

A. counters
B. references
C. statistics
D. characteristics

Answer: B

Question 8.
A TeMIP MSL specification file can be compiled into the TeMIP Dictionary with _______.

A. msl2ilr
B. mcc_ptb
C. mcc_msl
D. msl_cpl

Answer: C

Question 9.
The Low Level Filters are child classes of the _______ global class and handled by the _______ Management Module.

A. Domain, Alarms FM
B. Operation Context, Alarm Handling FM
C. TeMIP, Framework FM
D. MCC, Event Filtering FM

Answer: D

Question 10.
The directory hierarchy for TeMIP files stores executable and template files under the _______ directory, and data and configuration files under the _______ directory.

A. /usr/temip, /var/temip
B. /usr/opt/temip, /var/opt/temip
C. /etc/opt/temip, /var/opt/temip
D. /usr/opt/temip, /etc/opt/temip

Answer: B


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for EC0-349 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "EC0-349" Exam

Computer Hacking Forensic Investigator

 Question 1.
In what way do the procedures for dealing with evidence in a criminal case differ from the procedures for dealing with evidence in a civil case?

A. evidence procedures are not important unless you work for a law enforcement agency
B. evidence must be handled in the same way regardless of the type of case
C. evidence in a civil case must be secured more tightly than in a criminal case
D. evidence in a criminal case must be secured more tightly than in a civil case

Answer: B

Question 2.
Which part of the Windows Registry contains the user's password file?

A. HKEY_LOCAL_MACHINE
B. HKEY_CURRENT_CONFIGURATION
C. HKEY_USER
D. HKEY_CURRENT_USER

Answer: C

Question 3.
If a suspect's computer is located in an area that may have toxic chemicals, you must

A. coordinate with the HAZMAT team
B. do not enter alone
C. assume the suspect machine is contaminated
D. determine a way to obtain the suspect computer

Answer: A

Question 4.
Profiling is a forensics technique for analyzing evidence with the goal of identifying the perpetrator from their pervious activity. After a computer has been compromised by a hacker, which of the following would be most important in forming a profile of the incident?

A. The vulnerability exploited in the incident
B. The manufacture of the system compromised
C. The nature of the attack
D. The logic, formatting and elegance of the code used in the attack

Answer: D

Question 5.
What information do you need to recover when searching a victims computer for a crime committed with specific e-mail message?

A. Username and password
B. Firewall log
C. E-mail header
D. Internet service provider information

Answer: C

Question 6.
The use of warning banners helps a company avoid litigation by overcoming an employees assumed ___________________ when connecting to the companys intranet, network, or virtual private network (VPN) and will allow the companys investigators to monitor, search, and retrieve information stored within the network.

A. right of privacy
B. right to Internet access
C. right to work
D. right of free speech

Answer: A

Question 7.
When examining a hard disk without a write-blocker, you should not start Windows because Windows will write data to the:

A. Case files
B. Recycle Bin
C. BIOS
D. MSDOS.SYS

Answer: B

Question 8.
How many sectors will a 125 KB file use in a FAT32 file system?

A. 16
B. 25
C. 256
D. 32

Answer: C

Question 9.
Which part of the Windows Registry contains the user's password file?

A. HKEY_CURRENT_CONFIGURATION
B. HKEY_USER
C. HKEY_CURRENT_USER
D. HKEY_LOCAL_MACHINE

Answer: B

Question 10.
You are working as an independent computer forensics investigator and receive a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer Lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a simple backup copy of the hard drive in the PC and put it on this drive and requests that you examine the drive for evidence of the suspected images. You inform him that a simple backup copy will not provide deleted files or recover file fragments. 

What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceedings?

A. incremental backup copy
B. full backup copy
C. robust copy
D. bit-stream copy

Answer: D



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for E20-522 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "E20-522" Exam

CLARiiON Solutions Specialist for Storage Administrator

 Question 1.
What are three [3] functions of the Clone Private LUN?

A. Keep track of modified extents of Source LUNs and Clones
B. Stores fracture log for synchronization or reverse synchronization
C. Enable incremental synchronization upon starting an Out-of-Sync Clone LUN
D. Allow continuance of synchronization operation of a Clone upon a failed SP.
E. Store host write data from Source when Clone is fractured from Source LUN

Answer: A, B, D

Question 2.
What are three [3] features that the PowerPath GUI provides to users?

A. Change theCLARiiON SP from active to standby.
B. Change the failover policy of a LUN.
C. Change aCLARiiON path from active to standby.
D. Change a host adapter from standby to active.

Answer: B, C, D

Question 3.
What are three [3] features of VisualSAN?

A. Monitors health of SAN
B. Integration withNavisphere CLI Correct if you mean that Visual SAN runs NaviCLI
C. Performance statistics of LUNS, and RAID groups
D. Track storage utilization of servers on the SAN
E. Visual representation of SAN zones and members

Answer: A, B, E

Question 4.
How are a production LUN and its clone(s) related?

A. Clone Private LUN.
B. Persistent fracture log.
C. Clone Group relationship.
D. Storage Group relationship.

Answer: C

Question 5.
What are three [3] features of VisualSAN?

A. Track storage utilization of servers on the SAN
B. Performance statistics of LUNS, and RAID groups
C. Integration withNavisphere CLI Correct if you mean that Visual SAN runs NaviCLI
D. Monitors health of SAN
E. Visual representation of SAN zones and members

Answer: C, D, E

Question 6.
What is the maximum number of Clone Private LUNs allowed on a CLARiiON CX Series array?

A. 50
B. 1
C. 25
D. 2
E. 100

Answer: D

Question 7.
What is a feature of the Write Intent Log (WIL)?

A. Used to minimize recovery in the event of a failure of the Primary array.
B. Tracks changes on the Primary LUN and synchronizes changes with the Secondary LUN when 
    reachable.
C. Is a volatile log which tracks changes to the Primary LUN during aFracture
D. Captureswrites to the Secondary LUN and release those changes when the Secondary is 
    promoted as Primary.

Answer: A

Question 8.
What is the default stripe element size for a five disk RAID 5 CLARiiON LUN?

A. 8 blocks
B. 32 blocks
C. 128 blocks
D. 64 blocks
E. 16 blocks

Answer: C

Question 9.
For which three [3] databases can VisualSRM provide table level detail?

A. SQLserver
B. Sybase
C. mySQL
D. Oracle
E. Informix

Answer: A, B, D

Question 10.
DRAG DROP
Click the Task button. 

What are the steps, in order, for configuring a Brocade switch for Web management?
 

Answer:
 



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 156-515 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "156-515" Exam

CIPT Cisco IP Telephony

 Question 1.
When a phone needs a conference resource, which of the following Cisco CallManager objects is queried first?

A. media resource device list
B. media resource group list
C. media resource group
D. media resource pool

Answer: B

Question 2.
Which two of these tools can be used to reestablish a Cisco CallManager cluster SQL subscription? (Choose two.)

A. DNA
B. SQL Server Service Manager
C. RTMT
D. DBLHelper
E. SQL Server Enterprise Manager

Answer: D, E

Question 3.
Which of these options will prevent a device from being able to initiate conferences?

A. Place all conference media resources in MRGs and exclude these MRGs from the MRGL.
B. Exclude the conference media resources from all MRGs.
C. Exclude the conference media resource partitions from the CSS.
D. Remove the default MRGL from the device pool.

Answer: A

Question 4.
A user reports poor quality on voice calls and is instructed to select the QRT softkey. 

How can you access the information generated by this call?

A. use the QRT plug-in on the PC of an administrator
B. use Tools\QRT Viewer under the CiscoCallManager Serviceability page
C. use the System\Real-time Monitor Tool under CiscoCallManager Administration
D. use theperfmon counter application under Administrative Tools

Answer: B

Question 5.
DRAG DROP
Drag drop
 

Answer:
 

Question 6.
How is a backup target changed to a backup server?

A. Modify the BARS service parameter from Target to Server.
B. Use BARSadministration to change from Target to Server.
C. Use BARSadministration to delete the destination target.
D. Uninstall BARS and reinstall as a backup server.

Answer: D

Question 7.
What are Cisco CallManager Locations used for?

A. Specify the bandwidth used for audio and video calls.
B. Define the time zones for devices connected to the CiscoCallManager.
C. Implement call admission control in a centralized call processing deployment.
D. Provide alternate call routing when the primary call path is unavailable.
E. Assign directory numbers to devices as they connect to the IP telephony network.

Answer: C

Question 8.
Based on the following dial-plan rules, what is the minimum number of partitions that must be defined?
All employees can call local and service numbers.
Managers can call long distance and international numbers.
Executives can call all numbers.
Only administrative assistants can call executives.
Incoming calls can only be routed to IP phones.

A. 6
B. 4
C. 5
D. 3

Answer: B

Question 9.
What will happen if Option 150 is not configured on the DHCP server?

A. CiscoCallManager will be unable to replicate its database to the subscribers.
B. IP Phones will not be able to load their configuration files.
C. CiscoCallManager will be unable to access the TFTP server.
D. IP Phones will not be able to receive VLAN information.
E. CiscoCallManager will be unable to register IP Phones.
F. The DHCP server will not be able to answer requests from IP Phones.

Answer: B

Question 10.
Which four characteristics would typically be used to define a device pool? (Choose four.)

A. geographic proximity
B. common calling search spaces for auto-registration
C. common device type
D. common use ofcodecs
E. common MOH source
F. common class of service

Answer: A, B, D, E



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for JN0-643 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "JN0-643" Exam

Enterprise Routing and Switching, Professional (JNCIP-ENT)

 Question 1.
Click the Exhibit button.
 

A user on port ge-0/0/12 fails an 802.1x authentication attempt.

What is the next action of Switch A?

A. It puts the Authenticator in the HELD status where all EAPOL packets are discarded until the 
    default hold timer expires.
B. It communicates with the RADIUS server to confirm the user's password.
C. It transmits an EAP-Identity-Request packet immediately after it sends out EAP-Failure.
D. It tries to authenticate the user using MAC radius authentication.

Answer: C

Explanation:

Question 2.
Click the Exhibit button.
 

Based on the configuration in the exhibit, why are you seeing drops in the best-effort queue on the SRX Series platform?

A. The drop-profile fill level is set too low.
B. Packets are dropped by a firewall policy.
C. The best-effort queue is being shaped.
D. The scheduler is not being applied correctly.

Answer: C

Explanation:

Question 3.
Click the Exhibit button.
 

Based on the output shown in the exhibit, why is VSTP not working for VLAN 100?

A. No interfaces are assigned to VLAN 100.
B. Your MSTI is misconfigured.
C. RSTP is configured in addition to VSTP.
D. No native VLAN is configured.

Answer: A

Explanation:

Question 4.
If your WAN-edge router is multihomed to different ISPs, which two BGP attributes would you modify to affect outbound traffic? (Choose two.)

A. MED
B. origin
C. local preference
D. community

Answer: B, C

Explanation:

Question 5.
When 802.1X, MAC-RADIUS, and Captive Portal are enabled on an interface, which authentication sequence occurs?

A. The authentication sequence is based on the order of the configuration.
B. If MAC-RADIUS is rejected, Captive Portal will start. If Captive portal is timed out, 802.1X will 
    start.
C. If 802.1X times out, then MAC-RADIUS will start. If MAC-RADIUS is timed out by the RADIUS  
    server, then Captive Portal will start.
D. If 802.1X times out, then MAC-RADIUS will start. If MAC-RADIUS is rejected by the RADIUS  
    server, then Captive Portal will start.

Answer: D

Explanation:

Question 6.
A medium-sized enterprise has some devices that are 802.1X capable and some that are not. 

Any device that fails authentication must be provided limited access through a VLAN called NONAUTH. How do you provide this access?

A. Configure NONAUTH VLAN as the guest VLAN.
B. Configure NONAUTH VLAN as the server-reject VLAN.
C. Configure NONAUTH VLAN as the guest VLAN and the server-reject VLAN
D. Configure a separate VLAN for each type of user: 802.1X and non-802.1X.

Answer: C

Explanation:

Question 7.
Click the Exhibit button.
 

Host 1, Host 2, and Host 3 are connected to Switch A on interface ge-0/0/2. Host 1 and Host 2 have been authenticated through 802.1X, however Host 3 does not have an 802.1X supplicant. 

Referring to the configuration in the exhibit, how can Host 3 be authenticated?

A. secure-authentication option of HTTP or HTTPS must be configured for Captive Portal.
B. MAC RADIUS authentication must be configured for Host 3 instead of Captive Portal.
C. A new authentication-profile must be configured because 802.1X and Captive Portal cannot  
    have the same authentication-profile.
D. The 802.1X server failback feature must be configured for Host 3 to allow non-802.1X clients  
   to authenticate.

Answer: B

Explanation:

Question 8.
A user complains about connectivity problems from their IP address (10.1.1.87) to a server (10.65.1.100).

Which Junos command can help verify connectivity in the network? (Choose two.) 

A. mroute
B. traceoptions
C. ping
D. clear bgp neighbor

Answer: B, C

Explanation:

Question 9.
Click the Exhibit button.
 

The exhibit shows the output of an OSPF router LSA.

Which interface ID represents the router's loopback address?

A. ID 10.1.1.0
B. ID 10.0.3.4
C. ID 10.0.3.3
D. ID 10.0.2.4

Answer: B

Explanation:

Question 10.
Click the Exhibit button. 
 

Referring to the output in the exhibit, why does the router prefer the path toward interface ge- 0/0/0.0 for the 20.0.0.0/8 route?

A. The origin is IGP.
B. The origin is unknown.
C. The AS path is longer.
D. Multihop is enabled.

Answer: A

Explanation:

Question 11.
Click the Exhibit button.
 

Based on the output shown in the exhibit, which protocol is configured?

A. MSTP
B. RSTP
C. STP
D. VSTP

Answer: D

Explanation:


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.