Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "310-302" Exam

Road to Success

 

Question 1.
After connecting a new server to a network switch, you discover that the server is NOT able to communicate with other servers on the same network. You run snoop on the new server and find that it is returning traffic for a network different than the one to which you want to connect the server.

Which can be the source of the problem?

A. The ARP cache on the server is stale.
B. The Network cable is longer than allowed.
C. A switch port is configured for the wrong VLAN.
D. The server is configured with the wrong IP address.
E. The DHCP server is returning incorrect network settings.

Answer: C

Question 2.
You have been asked to reconfigure a VLAN on your network.

Which device do you need to reconfigure?

A. hub
B. bridge
C. GBIC
D. switch

Answer: D

Question 3.
You are asked to recommend a network topology for a new server network. This network will service all of your Sun servers (approximately 50 machines) and several employee workstations (approximately 20 machines).

Which network topology is suited for this environment?

A. A ring topology using intelligent hubs.
B. A bus topology segmented into multiple networks.
C. A VLAN topology with one VLAN for servers and another for workstations.
D. A star topology with one segment for servers and another for workstations.

Answer: C

Question 4.
host name IP address MAC address
host1 192.40.62.10 8:0:20:75:6e:7d

Which command removes the ARP table entry for host1?

A. rarp host1
B. arp -d host1
C. rm -a 192.40.62.10
D. rarp 8:0:20:75:6e:7d
E. rmarp -r 192.40.62.10

Answer: B

Question 5.
To more efficiently allocate and manage their network infrastructure, the Network Company is implementing Classless Inter-Domain Routing.

Which routing protocol is best suited to prepare for this implementation?

A. BGP
B. RIPv2
C. RDISC
D. RIPv1
E. ipCIDR-forwarding

Answer: B

Question 6.
Each DNS zone must have a primary server.

Which two are features of a DNS primary server? (Choose two.)

A. They maintain data about each of the top-level zones.
B. They are the system on which all changes are made to the zone.
C. They are never authoritative for any domain, except for the loopback address.
D. They provide update information and synchronize secondary servers when the secondary
servers request information.

Answer: B, D

Question 7.
A DNS server that you administer has stopped responding to client requests.

Which four commands can you use in debugging the DNS server? (Choose four.)

A. dig
B. ndc
C. pkill -HUP inetd
D. pkill -INT in.inetd
E. pkill -INT in.named
F. pkill -USR1 in.named
G. svcadm restart system/name-service-cache

Answer: A, B, E, F

Question 8.
A DHCP client is configured with the RELEASE_ON_SIGTERM=yes parameter.

Which two actions force a DHCP client to relinquish the IP address it obtained through DHCP on the hme0 interface? (Choose two.)

A. Shut down the DHCP client.
B. Run the dhcpinfo command with the r option.
C. Run the dhcpagent command with the r option.
D. Run the pkill -9 dhcpagent command.
E. Run the stop option of the ifconfig hme0 dhcp command.
F. Run the release option of the ifconfig hme0 dhcp command.

Answer: A, F

Question 9.
A new system is being installed with multiple interfaces configured and IP Forwarding enabled. One interface, ge0, connects to the primary company LAN. Another interface, ge1, connects to a LAN dedicated to administration of the company's servers.
Given:
ge0 IP Address = 10.0.0.25/32
ge1 IP Address = 192.168.1.25/32
Admin network = 192.168.1.0/24
Primary network = 10.0.0.0/24
Solaris IP Filter firewall must be configured in a way that:

1- Systems on the admin network can reach the primary network.
2- The system itself has to be reached using ssh from all systems on the admin network.
3- Systems on the primary network cannot reach any systems on the admin network.

Which three rules should be included in the Solaris IP Filter configuration? (Choose three.)

A. block in all
B. block out all
C. block out quick log on ge0 from 192.168.1.0/24 to any
D. pass out quick log from 192.168.1.0/24 to any keep state
E. pass in quick from 192.168.1.0/24 to 10.0.0.0/24 flags keep state
F. pass in quick proto tcp on ge1 from 192.168.1.0/24 to 192.168.1.25/32 port = 22 flags keep
state
G. pass out quick on ge0 from 10.0.0.25 to 10.0.0.0/24 flags keep state

Answer: A, E, F

Question 10.
In a given Telnet communication, two IP addresses, 194.168.85.51 and 192.9.9.6, are involved in peer-to-peer communication.

Data grams leave the source host 194.168.85.51 and are transmitted to destination host 192.9.9.6. Which should you expect to find in the IP header of an outbound datagram?

A. source port number
B. destination port number
C. destination IP address 192.9.9.6
D. destination IP address 194.168.85.51

Answer: C

Question 11.
Which two statements are true about the data payload section of an Ethernet frame?
(Choose two.)

A. It includes the Ethernet address of the receiving system.
B. It helps the receiving interface detect the beginning of the frame.
C. It includes the Transport, Internet, and Application layer headers.
D. Its maximum size is specific to the type of network interface on a system that receives the
frame.
E. It includes information used by both the sending and receiving hosts to determine if an error
has occurred during frame transmission.

Answer: C, D

Question 12.
What are two advantages of using a layered networking model? (Choose two.)

A. Routing tables are simplified.
B. Network performance is improved.
C. The troubleshooting process is simplified.
D. Changing one layer does NOT require changes to the other layers.
E. Networking related code does NOT need to be recompiled for other systems.

Answer: C, D

Question 13.
Which three layers of the OSI network model are included in the Application layer of the TCP/IP network model? (Choose three.)

A. Network
B. Session
C. Transport
D. Data Link
E. Application
F. Presentation

Answer: B, E, F

Question 14.
At which layer in the TCP/IP network model are decisions about routing between networks made?

A. Internet
B. Transport
C. Data Link
D. Application

Answer: A

Question 15.
A user begins to establish a Telnet session with a second system located on a different subnet. The Network Interface layer is responsible for creating a packet data unit.

What information does the header in the packet data unit contain?

A. time to live (TTL)
B. destination host address
C. address of the local subnet's router
D. UID of the user executing the telnet command

Answer: C

Question 16.
As a connectionless protocol in peer-to-peer communications, UDP interacts with which adjacent And corresponding layers of the TCP/IP model?

A. Ethernet and Hardware
B. Hardware, Network, and Internet
C. Transport, Application, and Internet
D. Application, Transport, Internet, and Network

Answer: C

Question 17.
Which statement is true about TCP and/or UDP?

A. TCP implements flow control at the Transport layer.
B. UDP implements flow control at the Transport layer.
C. TCP is a Transport layer protocol; UDP is an Internet layer protocol.
D. TCP segments are converted to UDP data grams at the Internet layer.

Answer: A

Question 18.
Protocols are used by computer networks to communicate or exchange data. A data communication protocol is a set of rules that must be followed by electronic devices to communicate with each other.

Which three describe these sets of rules? (Choose three.)

A. Syntax - Data format and coding
B. Internet - Manages data addressing
C. Timing - Speed matching and sequencing
D. Application - Handles the detail and functions
E. Semantics - Controls information and error handling
F. Transport - Manages the connections between cooperating applications

Answer: A, C, E

Question 19.
What are the four layers of the TCP/IP Model? (Choose four.)

A. Internet layer
B. Software layer
C. Data Link layer
D. Hardware layer
E. Transport layer
F. Application layer
G. Network Interface layer

Answer: A, E, F, G

Question 20.
Which is an example of a Network Interface layer protocol?

A. Transmission Control Protocol
B. Uniform Demultiplexing Protocol
C. Internet Control Message Protocol
D. EIA/TIA 568 - Unshielded Twisted Pair
E. IEEE 802.11 - Wireless Network Standard

Answer: E



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 642-533 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "642-533" Exam

Implementing Cisco Intrusion Prevention System (IPS)

 Question 1.
You think users on your corporate network are disguising the use of file-sharing applications by tunneling the traffic through port 80. 

How can you configure your Cisco IPS Sensor to identify and stop this activity?

A. Enable all signatures in the Service HTTP engine.
B. Assign the Deny Packet Inline action to all signatures in the Service HTTP engine.
C. Enable all signatures in the Service HTTP engine. Then create an event action override that 
    adds the Deny Packet Inline action to events triggered by these signatures if the traffic 
    originates from your corporate network.
D. Enable the alarm for the non-HTTP traffic signature. Then create an Event Action Override that 
    adds the Deny Packet Inline action to events triggered by the signature if the traffic originates 
    from your corporate network.
E. Enable both the HTTP application policy and the alarm on non-HTTP traffic signature.

Answer: E

Question 2.
A user with which user account role on a Cisco IPS Sensor can log into the native operating system shell for advanced troubleshooting purposes when directed to do so by Cisco TAC?

A. administrator
B. operator
C. viewer
D. service
E. root
F. super

Answer: D

Question 3.
Which character must precede a variable to indicate that you are using a variable rather than a string?

A. percent sign
B. dollar sign
C. ampersand
D. pound sign
E. asterisk

Answer: B

Question 4.
Which statement accurately describes Cisco IPS Sensor automatic signature and service pack updates?

A. The Cisco IPS Sensor can automatically download service pack and signature updates from 
    Cisco.com.
B. The Cisco IPS Sensor can download signature and service pack updates only from an FTP or 
    HTTP server.
C. You must download service pack and signature updates from Cisco.com to a locally 
    accessible server before they can be automatically applied to your Cisco IPS Sensor.
D. When you configure automatic updates, the Cisco IPS Sensor checks Cisco.com for updates 
    hourly.
E. If multiple signature or service pack updates are available when the sensor checks for an 
    update, the Cisco IPS Sensor installs the first update it detects.

Answer: C

Question 5.
How can you clear events from the event store?

A. You do not need to clear the event store; it is a circular log file, so once it reaches the 
    maximum size it will be overwritten by new events.
B. You must use the CLI clear events command.
C. If you have Administrator privileges, you can do this by selecting Monitoring > Events > Reset 
    button in Cisco IDM.
D. You should select File > Clear IDM Cache in Cisco IDM.
E. You cannot clear events from the event store; they must be moved off the system using the 
    copy command.

Answer: B

Question 6.
Refer to the exhibit.
 

Based on the partial output shown, which of these statements is true?

A. The module installed in slot 1 needs to be a type 5540 module to be compatible with the ASA 
    5540 Adaptive Security Appliance module type.
B. The module installed in slot 1 needs to be upgraded to the same software revision as module 0 
    or it will not be recognized.
C. Module 0 system services are not running.
D. There is a Cisco IPS security services module installed.

Answer: D

Question 7.
Which action does the copy /erase ftp://172.26.26.1/sensor_config01 current-config command perform?

A. erases the sensor_config01 file on the FTP server and replaces it with the current 
    configuration file from the Cisco IPS Sensor
B. copies and saves the running configuration to the FTP server and replaces it with the source 
    configuration file
C. overwrites the backup configuration and applies the source configuration file to the system 
    default configuration
D. merges the source configuration file with the current configuration

Answer: C

Question 8.
Match each evasive technique on the left to the proper description on the right.
 

Answer:
 

Question 9.
Which of the following is a valid file name for a Cisco IPS 6.0 system image?

A. IPS-K9-pkg-6.0-sys_img.sys
B. IPS-4240-K9-img-6.0-sys.sys
C. IPS-K9-cd-11-a-6.0-1-E1.img
D. IPS-4240-K9-sys-1.1-a-6.0-1-E1.img

Answer: D

Question 10.
Drag the IPS appliance software bypass mode description on the left to match the correct mode on the right.
 

Answer:
 



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.