Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "UM0-100" Exam

My dump

 Question 1.
What is true about a <> dependency?

A. signifies granting of access rights from the client model element to the supplier model element
B. defines communication between two model elements
C. requires another element for its full implementation or operation
D. specifies how one element implements another element
E. signifies granting of access rights from the supplier model element to the client model element

Answer: E

Question 2.
What are meta classes?

A. classes whose instances are classes
B. classes that are instances of classes
C. classes that are abstract
D. classes that have no super types
E. classes whose instances are objects

Answer: A

Question 3.
What receives output values of a behavior on a decision node?

A. guards
B. input pins
C. actions
D. input parameter nodes
E. entry states

Answer: A

Question 4.
When a message corresponds to an operation call, what is true about the arguments in UML 2.0?

A. All the parameters of the operation must be matched by message arguments.
B. A message argument should be of exactly the same type as the parameters of the 
    corresponding operation.
C. Message arguments must always be constants or attributes of the sender.
D. The message arguments must the same type as the parameters of the corresponding 
     operation or a subset of the parameters of the corresponding operation.

Answer: D

Question 5.
In a sequence diagram, what does a stop symbol express?

A. The behavior of a lifeline halts within this diagram.
B. The object represented by a lifeline terminates.
C. A message is stopped short of its reception.
D. The interaction is no longer valid.

Answer: B

Question 6.
In the exhibit, what is an interaction?

 

A. A
B. B
C. C
D. D

Answer: A

Question 7.
How many of the three incoming arrows to the diamond shape (as depicted in the exhibit) must provide values for the diamond to have an effect?

 

A. none
B. three
C. two
D. one

Answer: D

Question 8.
What is the meaning of the import example in the exhibit?

 

A. Types package is imported by the Program package.
B. Program package is imported to the Time data type.
C. Time and Integer data types are imported by the Program package.
D. Time data type is imported by the Program package.
E. Program package is imported by the Types package.

Answer: D

Question 9.
Which element in the exhibit denote a lifeline?

 

A. b:C2
B. C1
C. q
D. p
E. M

Answer: A

Question 10.
How many of the arrows in the exhibit must provide values before the round-cornered rectangle can start?

 

A. one
B. two
C. three
D. none

Answer: C

Question 11.
Ten employees in a department can submit an expense form to have their expenses repaid. The manager is required to approve the expense forms. 

How many actors have we described?

A. 2 actors
B. 10 actors
C. 0 actors
D. 12 actors
E. 1 actor
F. 11 actors

Answer: A

Question 12.
What is a selector of a lifeline?

A. a specific lifeline that selects a resource from a resource pool
B. a scheduler that chooses the next lifeline on which to run
C. an expression selecting one of the set; a general indexing mechanism
D. a construct to select one lifeline out of all the lifelines in the diagram

Answer: C

Question 13.
What does the symbol in the exhibit represent inside UML 2.0 activity diagrams?

 

A. behavior
B. state
C. action
D. activity
E. object node

Answer: C

Question 14.
What is true about every named element that is a member of a namespace?

A. It can be distinguished from other members in the namespace.
B. It is identified by its name within the namespace.
C. It is owned by the namespace.
D. It has one unique name within the namespace.

Answer: A

Question 15.
What are some of the important semantics of packages? (Choose three)

A. The public contents of a package are accessible outside the package.
B. If a package is removed from a model, the owned contents are removed.
C. If a package is removed from a model, the owned contents are reassigned.
D. An element may be owned by at most one package.
E. The public contents of a package are not accessible outside the package.
F. A class may be owned by multiple packages.

Answer: A, B, D

Question 16.
What is true about constraints in UML 2.0? (Choose two)

A. can be applied to themselves
B. cannot be named
C. must be true to be satisfied
D. can result in any number of possibilities
E. can be named

Answer: C,E

Question 17.
What about event order is true for simple interactions? (Choose two)

A. Events are ordered from top to bottom of a lifeline in a simple sequence diagram.
B. Events are ordered from top to bottom in a sequence diagram.
C. The start event of an execution occurrence will coincide in time with the event representing the 
    call of that operation.
D. The send event of a complete message comes before the receive event of the same message.
E. When messages represent operation calls, their sending and receiving events coincide in time.

Answer: A, D

Question 18.
There is an element identified as r in the exhibit. 

What does this element describe in a UML 2.0 interaction diagram?

 

A. found message, found by b
B. lost message originating from b
C. timing signal from b
D. synchronous message to the environment of R
E. asynchronous message to the environment of R

Answer: E

Question 19.
What shapes normally represent a use case? (Choose three)

 

A. A
B. B
C. C
D. D
E. E
F. F

Answer: A, D, E

Question 20.
What statements are true about interfaces? (Choose two)

A. A classifier may realize only one interface, but an interface may be realized by multiple 
     classifiers.
B.  A classifier may realize more than one interface, but an interface may be realized by only one 
     classifier.
C. Interfaces are not directly instantiable.
D. A classifier may realize more than one interface, and an interface may be realized by different 
     classifiers.
E. Interfaces are directly instantiable.

Answer: C, D


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 2B0-018 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "2B0-018" Exam

ES Dragon IDS

 Question 1.
Which of the following is NOT a typical function of an Intrusion Detection System?

A. Monitors segment traffic to detect suspicious activity
B. Monitors network traffic and corrects attacks
C. Monitors traffic patterns to report on malicious events
D. Monitors individual hosts (HIDS) or network segments (NIDS)

Answer:  B

Question 2.
Which best describes a SYN Flood attack?

A. Attacker redirects unusually large number of SYN/ACK packets
B. Attacker sends relatively large number of altered SYN packets
C. Attacker floods a host with a relatively large number of unaltered SYN packets
D. Attacker floods a host with an unusually large number of legitimate ACK packets

Answer:  B

Question 3.
Which best describes a type of attack that aims to prevent the use of a service or host?

A. Reconnaissance
B. Denial of Service
C. IP Spoofing
D. Exploit

Answer:  B

Question 4.
Which of the following is NOT a valid detection method used by Dragon Network Sensor?

A. Signature detection
B. Protocol detection
C. Policy detection
D. Anomaly detection

Answer:  C

Question 5.
Which of the following is NOT a function of Dragon Forensics Console?

A. Allows for central configuration of Active Response mechanisms to deter network attacks
B. Centrally analyzes activity as it is occurring or has occurred over time
C. Correlates events together across Network Sensor, Host Sensor, and any other infrastructure 
     system (e.g., firewall, router) for which messages have been received (via Host Sensor log  
     forwarding)
D. Provides the tools for performing a forensics level analysis and reconstructing an attackers 
     session

Answer:  A

Question 6.
Which of the following does NOT describe Dragon Host Sensors Multi-Detection methods?

A. Monitors output to a hosts system and audit logs
B. Monitors a hosts files via MD5 integrity-checking
C. Monitors a hosts specified network interlace promiscuously for anomalous activity
D. Monitors a hosts specific file attributes for changes to owner, group, permissions and file size
E. Monitors a Windows hosts Registry for attributes that should not be accessed and/or modified

Answer:  C

Question 7.
What is the method that Dragon uses to secure the communication between the remote management host and Dragon Policy Manager?

A. SSH
B. SSL
C. IPSec
D. MD5

Answer:  B

Question 8.
What is the primary and default source of event data tor Dragon RealTime Console?

A. dragon.log.xxxx
B. dragon.db
C. Ring Buffer
D. Dragon Workbench

Answer:  C

Question 9.
For what purpose can Dragon Workbench be used?

A. Read data from TCPDUMP trace/capture file and write to dragon .db for later analysis
B. Read data from dragon.db file and write to a TCPDUMP trace/capture file for later analysis
C. Read data from RealTime Console and write to a TCPDUMP trace/capture file for later 
     analysis
D. This functionality is ONLY available on Dragon Appliances

Answer:  A

Question 10.
What is one benefit of Dragon Network Sensors dual network interface capability as deployed on a non-Dragon Appliance system?

A. Secure management and reporting on one interface; Network Sensor invisible on other 
    interface
B. Allows for collection of event data from both interfaces simultaneously
C. Allows for protocol detection from one interface, and anomaly detection from the other 
    interface
D. This functionality is ONLY available on Dragon Appliances

Answer:  A



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.