Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "SC0-501" Exam

Enterprise Security Implementation (ESI)

 Question 1.
Which of the following is not a category of Intellectual Property?

A. Patents
B. Trademarks
C. Copyrights
D. Manufacturing Standards
E. Trade Secrets

Answer: D

Question 2.
Which of the following can be protected by a patent?

A. A new invention
B. A new product
C. A new process
D. A new name
E. An old product made in a new way

Answer: A, B, C, E

Question 3.
If a private key becomes compromised before its certificate’s normal expiration, X.509 defines a method requiring each CA (Certificate Authority) to periodically issue a signed data structure called a certificate:

A. Enrollment list
B. Expiration list
C. Revocation list
D. Validation list

Answer: C



Question 4.
What is the name of the option in Windows to hide, or append, a second file to a main file?

A. The Hidden Bit
B. Dynamic Link Libraries
C. NTFS Streams
D. File Associations
E. Hidden Server Management

Answer: C

Question 5.
If you capture an 802.11 frame, and the To DS bit is set to zero and the From DS bit is set to zero, what type of WLAN is this frame a part of?

A. Mesh
B. Broadcast
C. Infrastructure
D. Hierarchical
E. Ad Hoc

Answer: E

Question 6.
What transmission system uses short bursts combined together as a channel?

A. Frequency Hopping Spread Spectrum (FHSS)
B. Direct Sequence Spread Spectrum (DSSS)
C. Lamar Anthell Transmission (LAT)
D. Digital Band Hopping (DBH)
E. Digital Channel Hopping (DCH)

Answer: A

Question 7.
When you install and use PGP on your local computer, where is the key pair stored, by default?

A. secret.ring
B. public.ring
C. /usr/bin/pgp
D. pubring.pkr
E. secring.pkr

Answer: D, E

Question 8.
When a biometric system performs a one-to-one mapping, what is the systems doing?

A. Identification
B. Authentication
C. Classification
D. Detection
E. Recognition

Answer: B

Question 9.
If you are going to build a PKI you will need many different components. 

What is an industry standard that you can build your PKI upon?

A. Contiguous distinguished name spaces
B. X.509v3 Certificates
C. A defined hierarchy of authorities
D. 128-bit SHA1
E. 128-bit MD5

Answer: B

Question 10.
You are in the process of designing your PKI. You are working on the individual systems and servers that you will need. 

Which machine that you install is designed simply to enroll new users into the PKI?

A. Certification Authority
B. Archive Server
C. Security Server
D. Registration Authority
E. Certification Repository

Answer: D

Question 11.
As the Security Analyst for your companies network, you want to implement AES. 
What algorithm will it use?

A. Rijndael
B. Nagle
C. Spanning Tree
D. PKI

Answer: A

Question 12.
If your goal is to make your CA issue certificates that have specific key usage, what can you use to achieve this goal?

A. This can be done by using unique DNs for each key use that you want.
B. This can be done by using OIDs for each key use that you want.
C. This can be done by using unique CNs for each key use that you want.
D. This can only be done by selecting the key use options during the setup of the CA.
E. This can be done by installing the identifier file for each key use.

Answer: B

Question 13.
If you receive an X.509 digital certificate that has a unique identifier, but has no extensions, what version is the certificate?

A. It is a Version 2 certificate
B. It is a Version 3 certificate
C. It is a Version 1 certificate
D. All X.509 digital certificates have unique identifiers
E. The unique identifier is determined by implementation, not version number

Answer: A

Question 14.
When using the 3DES encryption ( C = EK1[DK2[EK1[P]]] ) , what is the function of D?

A. D is the text before encryption
B. D is the first encryption key
C. D is the second encryption key
D. D is the decryption key
E. D is the text after encryption

Answer: D

Question 15.
Which of the following numbers are Non-Prime Numbers?

A. 23
B. 2
C. 24
D. 39
E. 17

Answer: C, D

Question 16.
What are the two primary types of token system?

A. Time-based
B. Passive
C. Challenge/Response
D. Active
E. Seeded

Answer: A, C

Question 17.
If you wish to make your Windows user account use smart cards, where must you go to check this option?

A. Active Directory Users and Computers
B. Computer Management, Local Users and Groups
C. Active Directory Sites and Services
D. Active Directory Security Services
E. On the Enterprise Certificate Server

Answer: A

Question 18.
Incidents are generally categorized as falling into attacks on the CIA triad. 

Which of the following three attacks are the general categories?

A. Attacks against Integrity
B. Attacks against Confidentiality
C. Attacks against Availability
D. Attacks against Accuracy
E. Attacks against Collisions

Answer: A, B, C

Question 19.
A document written by the CEO that outlines PKI use, management and deployment is a...

A. PKI policy
B. PKI procedure
C. PKI practice
D. best practices guideline

Answer: A

Question 20.
What type of information can be learned from a user's COOKIES/index.dat file?

A. Their MAC address
B. Their IP address
C. Their email address
D. The websites they have visited
E. The user logon name

Answer: D, E


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 000-018 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "000-018" Exam

IBM Tivoli Service Request Manager V7.1 Implementation

 Question 1.
Which system property is used for supporting text file types for attachment searches?

A. LWDICT
B. ATTEXT
C. ATTCREATE
D. LUCENEOBJINDEX

Answer: B

Question 2.
In the deployment of IBM Tivoli Service Request Manager V7.1, a consultant needs to create a new escalation for the following conditions: Send notification to all the persons in the E-Mail Group, if Tickets classification is assigned to email related Issues. The consultant also needs to store the Ticket ID and Ticket status in a table when escalation is executed after successful condition and notification is being sent to an E-Mail user groups. 

Using the Escalation application, how can this be done?

A. Use the Notification class.
B. Use Set Value-Type Action.
C. Use Escalation Condition Query.
D. Use a custom class-Type Action and write Java class.

Answer: D

Question 3.
A customer wants to trigger three actions when any Service Request is not handled within 8 working hours: 
1. Send an email notification to the shift manager.
2. Change the Request priority to high.
3. Assign the request to the URGTEAM group.

How can this be done?

A. By defining a new Action
B. By defining a newCron Task
C. By defining a new Escalation
D. By defining a new E-Mail Listener

Answer: C

Question 4.
Which two statements are true? (Choose two.)

A. A price can be specified for an offering.
B. An attribute can be specified for an offering.
C. A list of Assets can be included for an offering.
D. A list of Configuration Items can be included for an offering.
E. Service fulfillment needs to be specified in order to create the offering.

Answer: A, E

Question 5.
When creating a service offering using the Offerings application, which statement is correct?

A. An offering is unique to a catalog.
B. An offering is unique to an organization.
C. An offering contains information not found in the referenced service fulfillment.
D. An offering contains a list of specifications for the type of user that can be associated with it.

Answer: C

Question 6.
An organization wants to advertise an existing, non-automated service that requires a request path that is not integrated into the Service Catalog. 

Which service type is used to achieve this?

A. Action service
B. Advertise service
C. Descriptive service
D. Supply Chain service

Answer: C

Question 7.
Where is the content of an Attribute Presentation for Service Catalog Offerings stored?

A. in the MENU.XML System XML
B. in the LIBRARY.XML System XML
C. in the Attribute dialog of the PMSCSRVOFF (Offerings) application
D. in the PRESENTATIONXML Attribute of the PMSCSRVOFF Object

Answer: B

Question 8.
When can a user classify a Fulfillment Option?

A. It can always be classified
B. When modality is of type Service Request
C. When Fulfillment Option is set to Complex
D. When there is a Job Plan attached to the Fulfillment Option

Answer: B

Question 9.
In which application is Instant Messaging integration available?

A. Person application
B. Problem application
C. Work Order application
D. Any application that contains information about user who created the record

Answer: B

Question 10.
Tivoli Directory Integrator architecture is divided into two parts, the core system and the components. 

In addition to Parsers and Connectors, what other component is available?

A. XML/Flat files
B. EventHandlers
C. AssemblyLines
D. Database interface tables

Answer: B


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.