Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "350-026" Exam

itcertkeys is the best

 

Question 1.
What is the usual procedure taken if an unrecognized non-mandatory ISDN IE is received by a network?

A. Final handle the call
B. Final handle the call if 2 such IE is received
C. Ignore only if the IE received is not CS0, otherwise final handle the call
D. Send a Facility msg to the user notifying the user of sending unknown IEs but don't final
handle
E. Ignore the IEs

Answer: E

Question 2.
In ACNS 5.X Content Delivery Network what is the purpose of defining a root Content Engine for a channel?

A. This Content Engine retrieves content from other Content Engines within the CDN.
B. This Content Engine is used by the administrator to manage the Content Delivery Network.
C. This Content Engine downloads the content from the origin server and distributes the content
to all the Content Engines that belong to the Channel.
D. This Content Engine downloads the content from the Content Distribution Manager and
distributes the content to all the Content Engines that belong to the Channel.
E. None of the above

Answer: C

Question 3.
You work as a network administrator at Company.com. Study the exhibit carefully.
What effect will this configuration command have?
line vty 0 4
no password vtypassword

Question 4.
If two routers connected to the same Ethernet are configured to run HSRP (Hot Standby Router Protocol) in the same group number, which router's MAC address will be associated with the virtual IP address?

A. It depends on which router is active.
B. Neither - a virtual MAC address will be assigned based on the group number, unless the
routers are configured to use their burned in addresses (BIA).
C. The routers will negotiate and decide automatically which MAC address to use based on the
routers' IDs.
D. Both routers' MAC addresses will be associated with the virtual IP address.
E. Neither - the hosts will broadcast all traffic which needs to travel off-segment.

Answer: B

Question 5.
For the spanning tree algorithm, a bridge builds part of its forwarding table based on:

A. Destination MAC addresses
B. 802.2 headers
C. Source MAC addresses
D. The Ethernet type field
E. The SNAP field

Answer: C

Question 6.
With CGMP enabled, which are unique about the following MAC address range: 01-00-5E-00-00- 00 to 01-00-5E-00-00-FF? (multiple answer)

A. CGMP does not prune those MAC addresses.
B. They contain the CGMP Multicast addresses for the IGMP Leaves and IGMP Queries.
C. CGMP filters those MAC addresses when they arrive at the processor
D. They are the reserved IP addresses of 224.0.0.0 to 224.0.0.255 for forwarding local IP
multicast traffic in a single Layer 3 hop.

Answer: A, B, D

Question 7.
What is the default port number is used by Cisco's Content Engine Windows Media Server for streaming data via UDP?

A. 80
B. 1755
C. 8001
D. 554
E. 17

Answer: B

Question 8.
For an OC-48 signal (2.5Gb/s), what is the BER (bit error rate) if there is 1 bit error every four days?

A. 10E-12
B. 10E-13
C. 10E-14
D. 10E-15
E. 10E-16

Answer: D

Question 9.
In HTTP 1.1 there is a CONNECT method defined in the RFC.

What is the purpose of this method?

A. To allow a system administrator to manage the cache via HTTP or HTTPS
B. For a user's browser to set up an HTTPS tunnel to proxy server
C. To allow transparent ftp redirection
D. For a user's browser to set up an FTP tunnel to an origin server and tell an upstream proxy to
tunnel the response
E. For a user's browser to tell a proxy to connect to an origin server and tunnel the following
communications to and from the user

Answer: E

Question 10.
Which HTTP header attributes can CSG report for billing or accounting?

A. URL
B. Hostname
C. Can be configured to report any header value
D. Can be configured to report any header value from the client to the server
E. None of the above

Answer: D

Question 11.
Telcordia has defined national ISDN, which is basically within the construct of Q.931 protocol with some modifications. If National ISDN requires a new information element (IE), how will this need be handled?

A. No new IE can be defined by standard bodies other than ITU-T; therefore, Telcordia must pass
the information in open fields of existing IE.
B. Telcorida has to define a new code set (CS) 0 IE.
C. Telcordia should define a new CS7 IE
D. Telcordia should define a new CS5 IE
E. Use CS8 IE

Answer: D

Question 12.
Which resource records are necessary to perform sub zone delegation on a DNS server?

A. NS record and reverse record for the name server responsible for the sub zone.
B. NS record and MX record for the name server responsible for the sub zone.
C. MX record and A record for the name server responsible for the sub zone.
D. NS record and A record for the name server responsible for the sub zone.
E. NS record and SOA record for the name server responsible for the sub zone.

Answer: D



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-623 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-623" Exam

Microsoft Desktop Support Consumer

 Question 1.
You are a consumer support technician. The local router is configured to assign dynamic lPv4 addresses. A user reports that a computer is unable to access computers outside the local network. The computers TCP/IP settings are configured as shown in the exhibit. 
 
You need to ensure that the user is able to connect to computers outside the local network.

What should you do?

A. Configure two lPv4 DNS server addresses.
B. Run the ipconfig.exe /renew command from the command prompt.
C. Download and run the RootkitRevealer utility from the Microsoft Web site.
D. Configure the computer to obtain an lPv4 address and a DNS server address automatically.

Answer: D

Question 2.
You are a consumer support technician. A user accesses the Internet by using a computer that runs Windows Vista. The Local Area Connection properties for the users computer are configured as shown in the following exhibit. 
 
You need to configure the computer to allow it to connect to the Internet.

What should you do first?

A. Select the Client for Microsoft Networks service and the Internet Protocol Version 6 (TCP/IPv6) 
     protocol.
B. Select the File and Printer Sharing for Microsoft Networks service and the Internet Protocol 
     Version 6 (TCP/IPv6) protocol.
C. Select the Client for Microsoft Networks service, the Internet Protocol Version 6 (TCP/IPv6) 
    protocol, and the File and Printer Sharing for Microsoft Networks service.
D. Select the Internet Protocol Version 4 (TCP/IPv4) protocol.

Answer: D

Question 3.
You are a consumer support technician for your company. When a customer browses the Network and Sharing center, the computer does not detect any network resources.  You confirm that other computers on the same subnet are able to detect network resources. The customers computer is configured as shown in the following exhibit. 
 
You need to configure the computer so that it detects the resources that are available on the local network.

What should you do?

A. Turn on the Network discovery feature.
B. Turn on the File sharing feature.
C. Install the File and Print sharing for Microsoft Networks.
D. Configure Microsoft Windows Firewall to allow traffic on port 139.

Answer: A

Question 4.
You are a consumer support technician. A customer has a portable computer that runs Windows Vista and has a built-in WiFi adapter. The user installs a wireless broadband router by using the default settings. The customer reports inconsistency in the wireless signal strength from the portable computer. The signal varies from poor to excellent. 

You verify that the customer does not have any consumer electronics that are causing interference with the router. You need to troubleshoot and resolve the inconsistency in the signal strength.

Which two actions should you recommend? (Each correct answer presents part of the solution. Choose two.)

A. Configure the wireless network adapter to use the 802.11g wireless mode.
B. Select the Connect even if the network is not broadcasting check box.
C. Configure the wireless broadband router to use a unique Service Set Identifier (SSID).
D. Configure the Transmit Power setting of the wireless network adapter to Medium.
E. Configure the wireless network adapter to use a Service Set Identifier (SSID) that matches the 
    name of the network.

Answer: C, E

Question 5.
You are a consumer support technician. After a user installs a pop-up blocker, the user is unable to download new software from the Microsoft Windows Update Web site. The user is also denied access to the Web sites of antivirus software vendors. The user is able to access other Web sites. 

You are able to access the Windows Update Web site and the Web sites of the antivirus vendors by using an IP address in the URL. After you uninstall the pop-up blocker that was installed by the user, the user still reports inability to access these Web sites. You need to ensure that the user can access all the Web sites.

What should you do?

A. Remove all entries from the local hosts file.
B. Remove all entries from the local lmhosts file.
C. Configure the MAC address for the network adapter manually.
D. Configure the TCP/IP properties of the user's computer by using an alternate DNS server IP 
    address.

Answer: A

Question 6.
You are a consumer support technician. A user has a portable computer that runs Windows Vista. The computer has a built-in wireless network adapter. A wireless broadband router is used to provide wireless network access to the portable computer The Service Set Identifier (SSID) broadcast of the router is disabled. The portable computer fails to connect to the wireless network. You need to ensure that the portable computer can connect to the wireless network.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A. Configure the Dynamic Host Configuration Protocol (DHCP) client node type to the broadcast-
    node option.
B. Enable the Ad Hoc Power Management option on the wireless network adapter.
C. Configure the wireless network adapter to use an ad hoc network type.
D. Configure the wireless network adapter by selecting the Connect even if the network is not  
    broadcasting check box.
E. Click the Manually connect to a wireless network button, and then enter the network name 
    information for the wireless network.

Answer: D, E

Question 7.
You are a consumer support technician for your company. You install Windows Vista on your computer. You must share files in the C:\data folder with another user. 

You configure the share permissions for the user based on the following requirements: 
Create and update files in the folder.
Do not assign more permissions than necessary.
The user is unable to update any files in the C:\Data folder.
You need to ensure that the user has permissions to meet the outlined requirements.

What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

A. In the File Sharing window, add the user to the People to Share with list and assign the user 
    the Contributor - Permissions Level.
B. In the File Sharing window, add the user to the People to Share with list and assign the user 
    the Co-owner - Permissions Level.
C. In the Advanced Sharing window, assign the user the Full Control permission.
D. In the Advanced Sharing window, assign the user the Change permission.

Answer: A, D

Question 8.
You are a consumer support technician. A user has children at home who use the computer to access educational Web sites. The user identifies 20 Web sites that are safe for their children to access. You need to configure the Web restrictions for the children user account.

What should you do?
 
Answer:
 

Question 9.
You are a consumer support technician. You have installed Windows Vista on a customers computer. You need to ensure that you can establish Remote Assistance connections to the customers computer.

What should you do?

A. Modify the File Sharing setting.
B. Modify the Parental Control settings.
C. Modify the Windows Firewall settings.
D. Modify the Windows Defender settings.

Answer: C

Question 10.
You are a consumer support technician. You need to ensure that users with standard user accounts cannot change their computer settings.

What should you do?

A. Configure the Impersonate a client after authentication right for all administrators.
B. Change the password policy Passwords must meet complexity requirements setting to 
    Enabled.
C. Change the User Account Control: Admin Approval Mode for the Built-in Administrator account 
    setting to Enabled.
D. Change the User Account Control: Behavior of the elevation prompt for standard users setting 
    to Automatically deny elevation requests.

Answer: D


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.