|
Question 1.
Which two [2] configurations are valid Raid 1/0?
A. 0_0_0 to 0_0_3
B. 0_0_7 to 0_0_8
C. 1_0_2 to 1_0_6
D. 1_1_1 to 1_1_8
Answer: A, D
Explanation:
RAID 1/0 must be comprised of an even number of disks, thus A and D are the only valid configurations.
Question 2.
Why is the massage "dependency not met" displayed when trying to update a CX600?
A. There was a package missing
B. Ndu is being done over the serial port
C. The packages are in the wrong directory
D. The upgrade was not done from engineering mode
Answer: A
Question 3.
A sun Solaris administrator has installed the HBA driver and configured it property. After the reboot it failed to recognize the new devices. What step is the customer missing?
A. Reboot with "-- -y" option
B. Reboot with "-- -r" option
C. Use init 3 instead of reboot
D. Hard reset the host instead of soft reset it
Answer: B
Question 4.
After unbinding several LUNs, a user attempts to bind a 10GB LUN in a Raid Group with 11GB of Free Capacity. The bind operation fails with this message, The LUN size entered is invalid. Please enter a positive integer between 0 and 8? What is needed?
A. An additional disk drive for parity
B. The Raid Group needs to be defragmented
C. The Navisphere Domain user needs write privilege
D. All LUNs in the Raid Group need to be defragmented
Answer: B
Question 5.
Which UNIX command is used to identify the machine model in AIX. HP and Solaris?
A. env
B. uname
C. Sysdef
D. Pkg_info
Answer: B
Question 6.
What are two (2) functions of the SNiiFFER?
A. Anti-virus checking
B. Corrects and sectors from defects found
C. Scan all sectors from every disk in each RAID group
D. Background process that checks environmental anomalies
Answer: B, C
|
Question 1. Examine the following options, which access list will permit HTTP traffic sourced from host 10.1.129.100 port 3030 destined to host 192.168.1.10? A. access-list 101 permittcp host 192.168.1.10 eq 80 10.1.0.0 0.0.255.255 eq 3030 B. access-list 101permit tcp any eq 3030 C. access-list 101permit tcp 10.1.129.0 0.0.0.255 eq www 192.168.1.10 0.0.0.0 eq www D. access-list 101permit tcp 10.1.128.0 0.0.1.255 eq 3030 192.168.1.0 0.0.0.15 eq www Answer: D Question 2. DRAG DROP Drag three proper statements about the IPsec protocol on the above to the list on the below. Answer: Question 3. In a brute-force attack, what percentage of the keyspace must an attacker generally search through until he or she finds the key that decrypts the data? A. Roughly 50 percent B. Roughly 66 percent C. Roughly 75 percent D. Roughly 10 percent Answer: A Question 4. The information of Cisco Router and Security Device Manager(SDM) is shown below: Within the "sdm-permit" policy map, what is the action assigned to the traffic class "class default"? A. inspect B. drop C. police D. pass Answer: B Question 5. DRAG DROP On the basis of the description of SSL-based VPN, place the correct descriptions in the proper locations. Answer: Question 6. Which description is correct based on the exhibit and partial configuration? A. All traffic destined for network 172.16.150.0 will be denied due to the implicitdeny all. B. All traffic from network 10.0.0.0 will be permitted. C. Access-list 101 will prevent address spoofing from interface E0. D. This ACL will prevent any host on the Internet from spoofing the inside network address as the source address for packets coming into the router from the Internet. Answer: C Question 7. For the following items ,which one can be used to authenticate the IPsec peers during IKE Phase 1? A. pre-shared key B. integrity check value C. XAUTH D. Diffie-Hellman Nonce Answer: A Question 8. Which description about asymmetric encryption algorithms is correct? A. They use the same key for encryption and decryption of data. B. They use different keys for decryption but the same key for encryption of data. C. They use different keys for encryption and decryption of data. D. They use the same key for decryption but different keys for encryption of data. Answer: C Question 9. For the following items, which management topology keeps management traffic isolated from production traffic? A. OTP B. OOB C. SAFE D. MARS Answer: B Question 10. You work as a network engineer, do you know an IPsec tunnel is negotiated within the protection of which type of tunnel? A. L2F tunnel B. L2TP tunnel C. GRE tunnel D. ISAKMP tunnel Answer: D
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.