|
Question 1. You need to ensure the Client dimension is able to support new orders and new client records. Which setting should you configure? A. ROLAP storage B. Lazy aggregations C. Write Enabled property D. Unknown Member functionality Answer: A Question 2. You need to meet the requirements of the accounts team. What should you do? A. Set the Dimension type to Currency. B. Set the Currency member name as a unique attribute. C. Hide non-leaf data within the Currency dimension key attribute. D. Disable the All member of the Currency dimension key attribute. Answer: D Question 3. You need to make structural changes to the cube. You also need to ensure that appropriate aggregations are created after the changes are made. What should you do? A. Record a weeks user activity by using SQL Profiler. Apply structural changes. Replay the activity and then run the Usage Based Optimization Wizard. B. Apply structural changes. Run the Database Engine Tuning Advisor. C. Apply structural changes. Run the Usage Based Optimization Wizard. D. Record a weeks user activity by using SQL Profiler. Apply structural changes. Run the Database Engine Tuning Advisor. Answer: A Question 4. You need to select appropriate processing methods for the EmployeeAssignment measure group and the Employee dimension. Which method should you choose? A. Run a Process Update against the Employee dimension. Run a Process Full against the EmployeeAssignment measure group. B. Run a Process Full against the EmployeeAssignment measure group. Run a Process Update against the Employee dimension. C. Run a Process Full against the Employee dimension. Run a Process Incremental against the EmployeeAssignment measure group. D. Run a Process Incremental against the EmployeeAssignment measure group. Run a Process Full against the Employee dimension. Answer: A Question 5. You need to ensure that the new sales manager is able to view clients within only the North and South regions. What should you do? A. Add a Denied member set for the West clients to NorthRole. B. Add an Allowed member set for the South clients to NorthRole. C. Create a new role for the sales manager and add a Denied member set for the South clients. D. Create a new role for the sales manager and add an Allowed member set for the South clients. Remove the sales manager from SouthAndWestRole. Answer: D Question 6. You need to meet the business requirements of the packaging department. What should you do? A. Add the ProductSize data table and the ProductSizeDescriptor column to the Product dimension. Set the order of the ProductSKU attribute to the ProductSizeDescriptor column. B. Add the ProductSize data table as a dimension and then add this dimension to the cube as a Referenced dimension. Set the order of the key attribute of the ProductSize dimension to the ProductSizeDescriptor column. C. Add the ProductSize data table and the ProductSizeDescriptor column to the Product dimension. Create a user-defined hierarchy that has ProductSKU as the top-level attribute and ProductSizeDescriptor as the bottom-level attribute. D. Add the ProductSize data table as a dimension and then add this dimension to the cube as a Referenced dimension. Create a user-defined hierarchy within the ProductSize dimension. Set the ProductSizeDescriptor attribute as the top-level attribute. Answer: A Question 7. You need to ensure the Order Control team is able to track the number of orders that reach the production department. What should you do? A. Create a new Time dimension based on the Holiday table. Use derived columns for the month and the year. B. Create a Server Time dimension. Within this dimension, enable the time periods year, month, and date. Select the Additional Manufacturing calendar option. C. Create a new Time dimension based on the date values within the ProductOrderStatus table. Flag those days on which no orders were received as Holiday. D. Create a new Time dimension based on a data source view named query. Derive the data for this data source view from unique dates within the ProductOrderStatus table. Use a subquery to identify the holidays and derived columns for the month and the year. Answer: D Question 8. You need to design a storage mode for the ProductOrderStatus measure group. What should you do? A. Use ROLAP for the Historical partition and MOLAP for the CurrentDay partition. B. Use MOLAP for the Historical partition and ROLAP for the CurrentDay partition. C. Use ROLAP for the Historical partition and Automatic MOLAP for the CurrentDay partition. D. Use HOLAP for the Historical partition and Low-latency MOLAP for the CurrentDay partition. Answer: B Question 9. You need to maintain the partitions on the ProductOrderStatus measure group. What should you do? A. Create a Microsoft SQL Server 2005 Integration Services (SSIS) package that alters the partition queries and processes aggregated partitions every evening. B. Enable proactive caching on the partitions. Set the cache to update periodically with a latency of 24 hours. C. Set the rebuild interval of the partitions to 36 hours. Create a Microsoft SQL Server 2005 Integration Services (SSIS) package that processes aggregated partitions every evening. D. Enable proactive caching on the ProductOrderStatus measure group. Set scheduled polling that re-processes the measure group whenever the system dates change. Answer: A Question 10. You need to reduce the duration of the daily full database backup process. What should you do? A. Perform transaction log backups every 30 minutes throughout the day. B. Partition the Transaction table by a range based on the TransactionID. Daily, back up only the file groups that have changed. C. Place the Transaction table in its own file group. Back up the Transaction table and the remaining file groups each evening. D. Partition the Transaction table by a range based on the MortgageID. Daily, back up only the file groups that have changed. Answer: B Question 11. You need to identify the data mining algorithm that meets the requirements of the credit department. Which algorithm should you use? A. Microsoft Clustering B. Microsoft Decision Tree C. Microsoft Nave Bayes D. Microsoft Association Answer: B Question 12. You need to deliver the three reports that detail the previous days transaction activity. What should you do? A. Create a new report that has three embedded subreports. Create one standard subscription. B. Create three new reports based on the same dataset. Create one data-driven subscription. C. Create three data-driven subscriptions on a single shared schedule. Ensure that the e-mail recipient list is identical across all three subscriptions. D. Create three standard subscriptions on a single shared schedule. Ensure that the mail recipient list and subject are identical across all three subscriptions. Answer: A Question 13. You need to meet the fraud detection requirements. What should you do? A. Use Percentage Sampling in SSIS. B. Use a Neural Network Data mining algorithm. C. Create an SSAS Key Performance Indicator for each account. D. Monitor transactions by using SQL Server Profiler. Answer: B Question 14. You need to record package and task outcome in the ETLAudit table. Which components of SSIS should you use? A. Custom event handlers B. Data flow error output C. SSIS log provider for SQL Server D. Execute SQL tasks with failure precedence constraints Answer: A Question 15. You need to resolve the blocking issue that is affecting the performance of the CRM system. What should you do? A. Replace the named query with an SQL view. B. Set the transaction isolation level to serializable in the named query. C. Set the source database to use snapshot isolation. D. Set the transaction isolation level to repeatable read in the named query. Answer: C
|
Question 1. Tom works as a network administrator. The primary adaptive security appliance in an active/standby failover configuration failed, so the secondary adaptive security appliance was automatically activated. Tom then fixed the problem. Now he would like to restore the primary to active status. Which one of the following commands can reactivate the primary adaptive security appliance and restore it to active status while issued on the primary adaptive security appliance? A. failover reset B. failover primary active C. failover active D. failover exec standby Answer: C Question 2. For the following commands, which one enables the DHCP server on the DMZ interface of the Cisco ASA with an address pool of 10.0.1.100-10.0.1.108 and a DNS server of 192.168.1.2? A. dhcpd address 10.0.1.100-10.0.1.108 DMZ dhcpd dns 192.168.1.2 dhcpd enable DMZ B. dhcpd address range 10.0.1.100-10.0.1.108 dhcpd dns server 192.168.1.2 dhcpd enable DMZ C. dhcpd range 10.0.1.100-10.0.1.108 DMZ dhcpd dns server 192.168.1.2 dhcpd DMZ D. dhcpd address range 10.0.1.100-10.0.1.108 dhcpd dns 192.168.1.2 dhcpd enable Answer: A Question 3. Look at the following exhibit carefully, which one of the four diagrams displays a correctly configured network for a transparent firewall? A. 1 B. 2 C. 3 D. 4 Answer: D Question 4. What is the effect of the per-user-override option when applied to the access-group command syntax? A. The log option in the per-user access list overrides existing interface log options. B. It allows for extended authentication on a per-user basis. C. Hallows downloadable user access lists to override the access list applied to the interfacE. D. It increases security by building upon the existing access list applied to the interfacE. All subsequent users are also subject to the additional access list entries. Answer: C Question 5. John works as a network administrator. According to the exhibit, the only traffic that John would like to allow through the corporate Cisco ASA adaptive security appliance is inbound HTTP to the DMZ network and all traffic from the inside network to the outside network. John also has configured the Cisco ASA adaptive security appliance, and access through it is now working as expected with one exception: contractors working on the DMZ servers have been surfing the Internet from the DMZ servers, which (unlike other Company XYZ hosts) are using public, routable IP addresses. Neither NAT statements nor access lists have been configured for the DMZ interface. What is the reason that the contractors are able to surf the Internet from the DMZ servers? (Note: The 192.168.X.XIP addresses are used to represent routable public IP addresses even though the 192.168.1.0 network is not actually a public routable network.) A. An access list on the outside interface permits this traffic. B. NAT control is not enabled. C. The DMZ servers are using the same global pool of addresses that is being used by the inside hosts. D. HTTP inspection is not enabled. Answer: B Question 6. In order to recover the Cisco ASA password, which operation mode should you enter? A. configure B. unprivileged C. privileged D. monitor Answer: D Question 7. Which three statements correctly describe protocol inspection on the Cisco ASA adaptive security appliance? (Choose three.) A. For the security appliance to inspect packets for signs of malicious application misuse, you must enable advanced (application layer) protocol inspection. B. if you want to enable inspection globally for a protocol that is not inspected by default or if you want to globally disable inspection for a protocol, you can edit the default global policy. C. The protocol inspection feature of the security appliance securely opens and closes negotiated ports and IP addresses for legitimate client-server connections through the security appliance. D. if inspection for a protocol is not enabled, traffic for that protocol may be blocked. Answer: B, C, D Question 8. Observe the following commands, which one verifies that NAT is working normally and displays active NAT translations? A. showip nat all B. show running-configuration nat C. showxlate D. show nat translation Answer: C Question 9. Multimedia applications transmit requests on TCP, get responses on UDP or TCP, use dynamic ports, and use the same port for source and destination, so they can pose challenges to a firewall. Which three items are true about how the Cisco ASA adaptive security appliance handles multimedia applications? (Choose threE.) A. it dynamically opens and closes UDP ports for secure multimedia connections, so you do not need to open a large range of ports. B. It supports SIP with NAT but not with PAT. C. it supports multimedia with or without NAT. D. It supports RTSP, H.323, Skinny, and CTIQBE. Answer: A, C, D Question 10. What is the result if the WebVPN url-entry parameter is disabled? A. The end user is unable to access pre-defined URLs. B. The end user is unable to access any CIFS shares or URLs. C. The end user is able to access CIFS shares but not URLs. D. The end user is able to access pre-defined URLs. Answer: D Question 11. You work as a network engineer, you are asked to examine the current Modular Policy Framework configurations on the LA-ASA Adaptive Security Appliances using the Cisco Adaptive Security Device Manager (ASDM) utility. You need to answer the multiple-choice questions in this simulation by use of the appropriate Cisco ASDM configuration screens. A host on the partnernet network attempts to use FTP to download a file from InsideHost, which resides on the inside interface of the security appliance. What does the security appliance do with the traffic from the partnernet host? A. Sends it to the Cisco ASA Advanced Inspection and Prevention(AIP)-Security Services Module(SSM)for inspection before forwarding it to its destination B. Sends it to the Cisco ASA 5500 Series Content Security and Control(CSC)SSM for inspection before forwarding it to its destination C. Forwards it directly to its destination D. Forwards it directly to its destination unless the connection limit is already met Answer: D
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.