|
Question 1. Which CLI command displays a list of non-compressible traffic types? A. traffic flow B. compression show C. class compression show D. compression show services Answer: D Question 2. Network performance is show. You suspect a denial-of-service attack. Which command allows you to check the number of connections a device is generating? A. hostdbshow B. hostdbinfo C. traffic active D. host dbtopusers E. host accounting retrivednsall Answer: B Question 3. Why is the Round trip Time (RTT) significant when reviewing Network Delay? A. The RTT indicates the amount of the time it tasks for one packet to make the full round trip between two hosts. If this value increases, it is indicative of congestion on the network. B. The RTT indicates the amount of the time it tasks for one packet to make the full round trip between two hosts. If this value increases, it is in indicative network card issues on the server. C. The RTT indicates the amount of the time it tasks for one packet to make the full round trip between two hosts. If this value increases, it is indicative of an increase in the size of the transaction, not necessarily indicative of congestion on the network. D. The RTT indicates the amount of the time it tasks for one packet to make the full round trip between two hosts. If this value increases, it is indicative of an increase in the size of the transaction, not necessarily indicative of congestion on the network Answer: A Question 4. Exhibit: You work as a network engineer at ITCertKeys.com. The top level Report screen shows that Network Efficiency is currently below 90%. What is the quickest way to determine whether this is a general link problem, associated with all traffic for a particular site, or associated with a particular class at a particular site? A. view the Top Ten - Network Efficiency B. enable the RTM "Worst Client & Server Analysis" feature for Site A and for Site B C. look at the Class specific graphs of Network Efficiency for Side A and then for B D. re order the Monitor Screen table by clicking on the Guaranteed Rate Failure column title Answer: A Question 5. Exhibit: If the Class Hits for both classes are increasing, how can the table content be explained? A. There are no inbound/FTP class hits. B. The inbound/FTP flows are being classified in another class. C. RTM data is only shown in the direction of the client to server. D. RTM data is only shown in the direction of the server to client. Answer: C Question 6. You want to guarantee an amount of bandwidth for each session for a particular business critical application. Which two graphs are important to review? (Choose two) A. TCP Health B. Class Utilization C. Network Efficiency D. Packet Size Distribution Answer: A, B Question 7. ITCertKeys.com has a Packet Shaper deployed on its WAN with the Outside interface directly connected to the WAN router. Remote locations access a PeopleSoft application server located on the inside of the Packet Shaper. Recently, users have complained about performance for this application. You decide to run some Response Time Monitoring (RTM) reports on Outbound/PeopleSoft traffic class for the previous day. However, when you try to run the reports, you get a message that Response Time statistics have been cleared and no new transactions have occurred. What is a possible cause for this? A. You have not enabled RTM on your Packet Shaper. B. Packet Shaper only holds on to RTM data for 1 hour. C. Packet Shaper only reports RTM statistics in the client-to-server direction. D. You have not configured a delay threshold, therefore, no RTM statistics are being kept. Answer: C Question 8. Exhibit: Inbound and Out bound peak rates are shown in the exhibit. What are the highest inbound and outbound rates? A. Inbound 4 Mbps, Outbound 4 Mbps B. Inbound 4 Mbps, Outbound 2 Mbps C. Inbound 2 Mbps, Outbound 2 Mbps D. Inbound 2 Mbps, Outbound 4 Mbps Answer: C Question 9. What are two ignore Policy characteristics? (Choose two.) A. The CLI must be used to review RTM. B. It exempts a class from bandwidth allocation. C. Only class and policy hits are recorded on the monitor page. D. Traffic will be ignored but still counted as part of the link traffic under management. Answer: B, C Question 10. Which policy and/or partition will get bandwidth allocated first, based on initial connection? A. Priority (7) B. Priority (6) with partition size (0) burs table to the full link C. Rate (5) 10 Kbps minimum guaranteed rate with partition size (0)burs table to the full link D. Rate (3) 10 Kbps minimum guaranteed rate with partition size 10 kbps burs table to 50 Kbps. Answer: D Question 11. A university wants each dormitory student to receive a minimumof150Kbps to be used in any way. Which control mechanism would be most effective in effective in ensuring this? A. Rate Policy B. Fixed Partition C. Burs table Partition D. Dynamic Sub partition Answer: D Question 12. Which policy option can be used to determine what happens when there is not enough bandwidth to satisfy guaranteed rate allocation? A. Failover B. Rate Scaling C. Admission Control D. Guaranteed Partition Minimum Answer: C Question 13. What are two default non-compressible services in Packet Shaper X press? (Choose two.) A. RTP-1 B. Oracle C. SMTP-Clear D. PPPoE-Data E. Telnet-Secure Answer: A, E Question 14. Which command limits the number of flows allowed simultaneously in a given class? A. class licenses B. policy licenses C. policy flow limit D. traffic licenses Answer: A Question 15. Packet Shaper is controlling traffic on a 10 Mbps link. The following policies and partitions are applied Inbound uncommitted-none !Local host Pri (6) JDEdwardsRate(3)15K DNSPri(6) HTTPRate(4)0 DefaultPri(3) Place the traffic classes in the order they receive bandwidth. Inbound Traffic Classes Steps, Place here Steps Answer: pending, send your comments or suggestion to feedback@itcertkeys.comn Question 16. Which two services are compressible using the X press feature? (Choose two.) A. HTTP B. Citrix applications C. UDP- Video Frame D. Peer-to-Peer file sharing Answer: A, B Question 17. Given the following: Inbound Customer 1 (minimum partition size = 1 Mbps) Customer 2 (minimum partition size = 512 Mbps) FTP (minimum partition size = 384 Mbps) HTTP (minimum partition size = 384 Mbps) Default Based on the above traffic tree, which two statements are true? (choose two.) A. The FTP and HTTP classes are guaranteed a minimum of 384 Kbps each. B. The FTP and HTTP classes are guaranteed a minimum of 256 Kbps each. C. The FTP and HTTP classes are guaranteed a minimum of up to 1 Kbps each. D. The FTP and HTTP classes have oversubscribed the Customer2 parent partition. Answer: B, D Question 18. How many concurrent Citrix flower can there be without a guaranteed rate failure? A. 5 B.8 C.10 D.12 Answer: B Question 19. You have created a class for Subnet_Cusing the subnet and mask of Subnet and mask of Subnet_C. What must you do next to guarantee 100 kbps of bandwidth per IP host for Subnet_C (class C subnet)? A. add a partition of 100k fixed to Subnet_C class B. add a Rate Policy of 100k fixed to Subnet_C class C. go to Subnet_C class, add a Partition, add a Dynamic Sub partition for Single Address, inside (sub partition size 100k) D. go to Subnet_C class, add a Partition, add a Dynamic Sub partition for Subnet, 8 CIDR bits, inside (sub partition size 100k) Answer: C Question 20. Exhibit: A flow start that hits the class Outbound/Subnet_A/HTTP. Which policy is applied to the flow? A. Outbound/HTTP B. Outbound/Default C. Outbound/Subnet_A/HTTP D. Outbound/Subnet_A/Default Answer: A
|
Question 1. Which two of these activities comprise the problem management service component in the operate phase? (choose two.) A. send a replacement module B. schedule a maintenance window C. manage the problem D. identify the problem E. confirm roles and responsibilities Answer: C, D Question 2. Identify a customer support model for the solution is an activity thet is part of which service component in the plan phase? A. operations readiness assessment B. planning project kickoff (deployment project management) C. operations plan development D. system requirements validation Answer: A Question 3. Which three of these service components are included in the optimize phase? (choose three.) A. change management B. security administration C. technology assessment D. operations assessment E. operations readiness assessment F. security assessment Answer: C, D, F Question 4. Utilizing a trouble ticketing system to track problems is a part of which service component in the operate phase? A. operations setup B. change management C. problem management D. systems monitoring Answer: C Question 5. Execute the systems acceptance test plan is an activity that is part of which service component in the implement phase? A. phased implementation B. acceptance testing C. staff training D. full system migration Answer: B Question 6. Which of these best describes the actions you would take during the technology strategy development service component? A. analyze the customer`s business requirements and recommend the appropriate technologies to meet those business requirements. B. identify the customer`s business requirements for the proposed solution. C. address the customer`s physical site requirements. D. determine the appropriate end user training needed for the technology solution. Answer: A Question 7. During which implement phase service component would you perform a re-cap of the solution implementation in order to elicit customer feedback? A. select fault management tools and products B. operations setup C. project closeout D. change management Answer: C Question 8. Review both the business and technical requirements is an activity that is part of which service component in the prepare phase? A. business case development B. customer edication C. high level design development D. account planning Answer: A Question 9. Which service component would you typically perform prior to the handover to the customer`s operations organization and involves running tests to ensure that the solution is ready for production? A. skill assessment B. systems integration C. project close out D. acceptance testing E. security check Answer: D Question 10. In which service component of the optimize phase would you assess the routing and switching system and recommend activities such as optimizing device configurations, capacity planning, or traffic analysis? A. change management B. technology assessment C. security assessment D. security administration E. operations assessment F. operations readiness assessment Answer: B
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.