Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "SC0-501" Exam

Great Collection in ITCertkeys

 Question 1.
Which of the following is not a category of Intellectual Property?

A. Patents
B. Trademarks
C. Copyrights
D. Manufacturing Standards
E. Trade Secrets

Answer: D

Question 2.
Which of the following can be protected by a patent?

A. A new invention
B. A new product
C. A new process
D. A new name
E. An old product made in a new way

Answer: A, B, C, E

Question 3.
If a private key becomes compromised before its certificate’s normal expiration, X.509 defines a method requiring each CA (Certificate Authority) to periodically issue a signed data structure called a certificate:

A. Enrollment list
B. Expiration list
C. Revocation list
D. Validation list

Answer: C



Question 4.
What is the name of the option in Windows to hide, or append, a second file to a main file?

A. The Hidden Bit
B. Dynamic Link Libraries
C. NTFS Streams
D. File Associations
E. Hidden Server Management

Answer: C

Question 5.
If you capture an 802.11 frame, and the To DS bit is set to zero and the From DS bit is set to zero, what type of WLAN is this frame a part of?

A. Mesh
B. Broadcast
C. Infrastructure
D. Hierarchical
E. Ad Hoc

Answer: E

Question 6.
What transmission system uses short bursts combined together as a channel?

A. Frequency Hopping Spread Spectrum (FHSS)
B. Direct Sequence Spread Spectrum (DSSS)
C. Lamar Anthell Transmission (LAT)
D. Digital Band Hopping (DBH)
E. Digital Channel Hopping (DCH)

Answer: A

Question 7.
When you install and use PGP on your local computer, where is the key pair stored, by default?

A. secret.ring
B. public.ring
C. /usr/bin/pgp
D. pubring.pkr
E. secring.pkr

Answer: D, E

Question 8.
When a biometric system performs a one-to-one mapping, what is the systems doing?

A. Identification
B. Authentication
C. Classification
D. Detection
E. Recognition

Answer: B

Question 9.
If you are going to build a PKI you will need many different components. 

What is an industry standard that you can build your PKI upon?

A. Contiguous distinguished name spaces
B. X.509v3 Certificates
C. A defined hierarchy of authorities
D. 128-bit SHA1
E. 128-bit MD5

Answer: B

Question 10.
You are in the process of designing your PKI. You are working on the individual systems and servers that you will need. 

Which machine that you install is designed simply to enroll new users into the PKI?

A. Certification Authority
B. Archive Server
C. Security Server
D. Registration Authority
E. Certification Repository

Answer: D

Question 11.
As the Security Analyst for your companies network, you want to implement AES. 
What algorithm will it use?

A. Rijndael
B. Nagle
C. Spanning Tree
D. PKI

Answer: A

Question 12.
If your goal is to make your CA issue certificates that have specific key usage, what can you use to achieve this goal?

A. This can be done by using unique DNs for each key use that you want.
B. This can be done by using OIDs for each key use that you want.
C. This can be done by using unique CNs for each key use that you want.
D. This can only be done by selecting the key use options during the setup of the CA.
E. This can be done by installing the identifier file for each key use.

Answer: B

Question 13.
If you receive an X.509 digital certificate that has a unique identifier, but has no extensions, what version is the certificate?

A. It is a Version 2 certificate
B. It is a Version 3 certificate
C. It is a Version 1 certificate
D. All X.509 digital certificates have unique identifiers
E. The unique identifier is determined by implementation, not version number

Answer: A

Question 14.
When using the 3DES encryption ( C = EK1[DK2[EK1[P]]] ) , what is the function of D?

A. D is the text before encryption
B. D is the first encryption key
C. D is the second encryption key
D. D is the decryption key
E. D is the text after encryption

Answer: D

Question 15.
Which of the following numbers are Non-Prime Numbers?

A. 23
B. 2
C. 24
D. 39
E. 17

Answer: C, D

Question 16.
What are the two primary types of token system?

A. Time-based
B. Passive
C. Challenge/Response
D. Active
E. Seeded

Answer: A, C

Question 17.
If you wish to make your Windows user account use smart cards, where must you go to check this option?

A. Active Directory Users and Computers
B. Computer Management, Local Users and Groups
C. Active Directory Sites and Services
D. Active Directory Security Services
E. On the Enterprise Certificate Server

Answer: A

Question 18.
Incidents are generally categorized as falling into attacks on the CIA triad. 

Which of the following three attacks are the general categories?

A. Attacks against Integrity
B. Attacks against Confidentiality
C. Attacks against Availability
D. Attacks against Accuracy
E. Attacks against Collisions

Answer: A, B, C

Question 19.
A document written by the CEO that outlines PKI use, management and deployment is a...

A. PKI policy
B. PKI procedure
C. PKI practice
D. best practices guideline

Answer: A

Question 20.
What type of information can be learned from a user's COOKIES/index.dat file?

A. Their MAC address
B. Their IP address
C. Their email address
D. The websites they have visited
E. The user logon name

Answer: D, E



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 2B0-020 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "2B0-020" Exam

ES NetSight Atlas

 
Question 1.
Which of the following device communication methods is used by MIB Tools?

A. SNMPv1
B. SNMPv3 Credential
C. SNMPv3 Profile
D. Max Access/Super User
E. All of the above
F. A and C only

Answer:  E

Question 2.
Which of the following definition(s) best describes the difference between managers and agents in SNMPv1 and SNMPv3?

A. In SNMPv1, the manager and agent were distinctly different but performed overlapping 
    functions. Managers resided on workstations; agents on remote devices.
B. In SNMPv3, a distributed interacting collection of SNMP entities can reside on both 
    management workstations and remote devices. Because each entity implements a portion of 
    SNMP capability, an entity can act as an agent, a manager, or a combination of the two.
C. In SNMPv1, the manager and agent were distinctly different and performed discrete functions:   
    the manager ran applications; the agent provided functionality. Managers resided on 
    workstations; agents on remote devices.
D. A and B
E. B and C
F. All of the above

Answer:  E

Question 3.
A MIB not supported on all devices should be assigned to which SNMP Request Group, when defining a FlexView?

A. Group 1
B. Group 2
C. Group 3
D. Group 4
E. All of the above
F. B or C only

Answer:  F

Question 4.
What are the three predefined groups in Inventory Manager Network Elements?

A. Chassis, Device Type and IP
B. Chassis, Matrix and X-Pedition
C. Matrix, SmartSwitch and X-Pedition
D. Matrix, X-Pedition and IP

Answer:  A

Question 5.
How can network masks be displayed in CIDR notation in Router Services Manager?

A. By selecting CIDR in the Network Mask option of Tools > Options
B. By selecting CIDR in the device properties window
C. By selecting Dot Delimited in the Display option of Tools > Options
D. It is not possible to have network masks displayed in CIDR notation

Answer:  A

Question 6.
The MIB Tools Utility allows you to do all of the following, EXCEPT

A. View object definitions
B. Set object values
C. Change IP addresses on devices
D. Search for objects
E. Browse the MIB database

Answer:  C

Question 7.
Which of the following statements are true about FlexViews?

A. You can use the FlexView editor to define as many FlexViews as you want.
B. You can create custom tabs to display desired MIB information.
C. The FlexView Wizard is not available with Atlas Lite.
D. All of the above
E. A and C only

Answer:  D

Question 8.
What is the name of the file that defines the absolute path to your NetSight Plug-In applications?

A. PlugIn.details
B. common
C. NetSight.properties
D. Atlas.config

Answer:  C

Question 9.
The relationship among remote devices in each map is automatically generated by Console when you click the Retrieve button.

A. True
B. False

Answer:  B

Question 10.
What are the three tabs in the left panel of Inventory Manager?

A. Devices, Traps, Archives
B. Network Elements, Firmware Management, Configuration Management
C. Details View, Archives, Chassis
D. Properties, VLAN, Compass

Answer:  B



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.