|
Question 1. Which information is included in a ticket-granting ticket (TGT) from the key distribution center (KDC)? A. the public key for the KDC B. the time the TGT was issued C. the user account's crypt password D. the service key for all supported kerberized services Answer: B Question 2. Which three are Mac OS X Open Directory plug-ins that can request data from a directory service? A. SMB B. LDAPv3 C. Bonjour D. AppleTalk E. Active Directory F. BSD Flat File and NIS Answer: B, E, F Question 3. Which is a valid concern when using the Archive feature in Open Directory services on Mac OS X Server v10.4? A. The archive does not include the local Net Info database or configuration file B. The archive contains all of the account passwords and should not be left unsecured C. You cannot archive a copy of the Open Directory data while the Open Directory master is in service D. Kerberos must be reconfigured after restoring from an archive, because the archive does not include Kerberos data. Answer: B Question 4. You are promoting Open Directory services on a computer running Mac OS X Server v10.4 from Standalone Server to Open Directory Master. Which statement about the administrator account is true? A. The primary administrator account in the local Net Info database is copied to the LDAP database and used as the primary administrator account for the LDAP database. B. A new administrator account with the name "dir admin" is created in the LDAP database and assigned the password from the root account in the local Net Info database. C. The root account in the local Net Info database is copied to the LDAP database and used as the primary administrator account for the LDAP database. D. A new administrator account is created in the LDAP database, and you assign it a name and password Answer: C Question 5. Which of the following tasks can be performed in Directory Access? A. Configuring your computer to use AppleTalk to discover FTP services. B. Configuring your computer to be a member of more than one Windows workgroup. C. Configuring your computer to use a specific WINS server for SMB service discovery. D. Configuring your computer to deny access to FTP server through the Connect to Server feature in the Finder. Answer: C Explanation: Directory Access lists different kinds of services that Mac OS X can access. The list includes directory services, which give Mac OS X access to user information and other administrative data stored in directory domains. Question 6. Review the following command then complete the statement below: Id apsearch -LLL -x -H Idap://oneserver.example.com -b dc=example, dc=com "(object Class=apple-group)" cn object Class The last two options in this command, cn and object Class, specify the _____ A. LDAP entries to exclude from the results B. Attributes to return in the results C. Search filter D. Search base Answer: B Question 7. What file on a Mac OS X computer is used to specify the location of the key distribution center (KDC) and the Kerberos realm? A. /Library/Preferences/edu.mit Kerberos B. ~/Library/Preferences/Kerberos.plist C. /etc/Kerberos/Kerberos.cof D. /etc/krb.conf Answer: A Question 8. You are troubleshooting an Open Directory LDAP server. Which step will allow you to gather troubleshooting information from the server? A. Start a lapd with the flag -d 99. B. Turn on verbose logging in Server Admin C. Start directory Services with the flag - debug D: Edit/etc/hostconsig. To contain LDAPARGS=;d; Answer: A Question 9. In an Open Directory user record, what value should the NFS Home Directory attribute contain? A. the local file system path to the user's home folder B. the IP address of the NFS server providing network home folder C. the URL used to mount the share point containing the user's home folder D. the ID for the mount record that mounts the share point providing the user's home folder Answer: A Question 10. When you set up Mac OS X Server to work with a Kerberos key distribution center (KDC), which file is highly sensitive and should be readable only by root? A. edu.mit.Kerberos.plist B. Kerberos.conf C. Krb5.keytab D. Key.pem Answer: C Question 11. What authentication token does a client present when accessing a kerberized service? A. the user's password B. a client-generated service ticket C. a service ticket obtained from the key distribution center (KDC) D. a ticket-generating ticket (TGT) obtained from the key distribution center (KDC) Answer: C Question 12. Which statement is NOT true Password Server replication in Mac OS X Server v10.4? A. Password Server engages in a multi master replication scheme. B. Confilicts in the Password Server database replicas are resolved using slapd.access C. The replication process is entirely encrypted between each Password Server process. D. Password Server refers to /var/db/authserver/authserverreplicas to determine if the last synchronization was successful. Answer: B Question 13. You need to configure several Mac OS X computers to bind to an LDAP server that is not running on a Mac OS X computer. This is the first time that you have used this LDAP server. What should be your FIRST step? A. In the LDAP plug-in in Directory Access, create mappings to supplement required user account attributes that are not on the LDAP database. B. Use an LDAP browsing tool to verify the connection settings and identify the structure and format of the data stored on the server. C. Create a new LDAP configuration in Directory Access and determine the connection settings through experimentation D. Have the server system administrator modify the schema to support missing attributes that are required by Mac OS X Answer: B Question 14. Review the following partial mount record, then answer the question below: Record Name: fileserver.pretendoc.com:/Users VFS Link Dir: /Network/Servers/ VFS opts: net url==afp:// :AUTH=Nos20USERX20AUTHENT@fileserver.pretendco.com/Users VSF Type: url| You use dsc 1 to view a mount record provided by an LDAP server. How is the share point mounted? A. statically, using NFS B. statically, using AFP C. dynamically, using AFP D. dynamically, using NFS Answer: C Explanation: In the book "Apple Training Series: Mac OS X System Administration Reference, Volume 1" ISBN: 032136984X. it says: * vfstype: Set to nfs for NFS mounts and url for AFP or SMB mounts. * dir: The local folder where clients will mount the share point. Dynamically mounted share points always have a value of/Network/Servers/. * opts: Mount options. There may be both, one, or neither of the options net and url. * net indicates that the share point is to be dynamically mounted. * url is the URL path to an AFP share point; for example; url=afp://;NO%20USER%20AUTHENT@mainserver.pretendco.com:/Users. Question 15. You work as a network administrator at ITCertKeys.com. You need to configure a Mac OS X computer to get authentication information from an LDAP server. What could you do? (Choose Two) A. Enter the IP address of an LDAP server in the LDAP pane of Network preferences. B. Use Directory Access to configure Mac OS X to get LDAP information from a DNS server. C. Use the default configuration, which allows Mac OS X to use a DHCP-supplied LDAP server. D. Use Sharing preferences to configure Mac OS X to use an Active Directory server as an LDAP server. E. Use Directory Access to configure Mac OS X with the IP address, type and search base of a specific LDAP server. Answer: C, E
|
Question 1. ITCertKeys.com uses a centralized call processing model to connect their saw mills in Albany and Columbus. Each mill is configured as a separate Location in Cisco Unified CallManager at HQ. Each Location has been configured with 256 Kbps of voice bandwidth. How many G.729 calls can be placed between Locations simultaneously? A. 23 B. 5 C. 16 D. 10 E. 8 Answer: D Question 2. Exhibit: You work as a network administrator ITCertKeys.com. A manager at HQ is holding a conference call with three of his staff members that are located at BR. The HQ region uses the G.711 codec, the BR region uses the G.711 codec, and the IP WAN region uses the G.729 codec. The MRGL associated with the manager has only the software conference bridge listed. What will happen when the three staff members join the conference? A. The staff members will not be able to join the conference until all the software conferencing resources are consumed and the conference uses the hardware conferencing resources at BR. B. The staff members will join only after the manager has set the conference call up using the hardware conferencing resources. C. The staff members will all join the conference normally. D. The staff members will be prevented from joining because the software conference bridge only supports the G.711 codec and the staff members will be using the G.729 codec. Answer: D Question 3. Exhibit: You work as a network administrator ITCertKeys.com. ITCertKeys.com needs to have the receptionist at extension 5000 handle all callers who exit their auto attendant by pressing "0". After changing the Operator parameter from 5500 to 5000, callers are still sent to extension 5500 when they press "0" in the auto attendant. What needs to be done to correct this issue? A. Dial peer 1 needs to be restarted using the shutdown and no shutdown commands. B. The application needs to be edited to point to the correct operator. C. The aa application needs to be reloaded in order to recognize the parameter changes. D. The gateway needs to be reloaded for application changes to take effect. E. The Operator parameter should be configured under dial peer 1 using the param command. Answer: C Question 4. DRAG DROP You work as a network administrator ITCertKeys.com. A branch site with an H.323 gateway has lost connectivity to the main site. You want to initiate SRST and get back the operation to normal. Select the appropriate steps in the correct order. Use only steps that apply. Answer: Question 5. Exhibit: You work as a network administrator ITCertKeys.com. You have configured transcoder resources in both an IOS router and a Cisco Unified Communications Manager. When you review the configurations in both devices the IP addresses and transcoder names are correct, but the transcoder is failing to register with the Cisco Unified Communications Manager. Which command needs to be edited to allow the transcoder to register properly? A. The associate ccm 2 priority 1 command needs to be changed so the ccm value matches identifier 1 in the sccp ccm 10.1.1.1 command. B. The maximum sessions command must match the number of codecs configured under the dsp farm profile. C. The sccp ccm group number must match the voice-card number. D. The sccp ccm group number needs to match the associate ccm 2 command. E. The associate profile and dsp farm profile numbers need to match associate ccm 2 command. Answer: A Question 6. Exhibit: You work as a network administrator ITCertKeys.com. A user in RTP calls a phone in San Jose during congestion with Call Forward No Bandwidth (CFNB) configured to reach cell phone 4085550150. The user in RTP sees the message "Not Enough Bandwidth" on their phone and hears a fast busy tone. Which two conditions can correct this issue? (Choose two.) A. The calling phone (RTP) needs to have AAR Group value of AAR under the AAR Settings. B. The calling phone (RTP) needs to have the AAR destination mask of 4085550150 configured under the AAR Settings. C. The calling phone (RTP) needs to have the AAR destination mask of 914085550150 configured under the AAR Settings. D. The called phone (San Jose) needs to have AAR Group value of AAR under the AAR Settings. E. The called phone (San Jose) needs to have the AAR destination mask of 4085550150 configured under the AAR Settings. F. The called phone (San Jose) needs to have the AAR destination mask of 914085550150 configured under the AAR Settings. Answer: D, E Question 7. How is recovery from SRST mode back to Cisco Unified Communications Manager call processing accomplished? A. The SRST gateway receives Keepalives from Cisco Unified Communications Manager. The SRST gateway then rejects the IP phone registrations with instructions to register with Cisco Unified Communications Manager. B. The IP phones receive Keepalives from Cisco Unified Communications Manager. They then register with Cisco Unified Communications Manager and cancel their registration with the SRST gateway. C. The IP phones receive a response to Keepalives sent to Cisco Unified Communications Manager. They then register with Cisco Unified Communications Manager and cancel their registration with the SRST gateway. D. The SRST gateway receives a response to Keepalives sent to Cisco Unified Communications Manager. The SRST gateway then rejects the IP phone registrations with instructions to register with Cisco Unified Communications Manager. Answer: C Question 8. Exhibit: You work as a network administrator ITCertKeys.com. When a Cisco IP Communicator Phone roams from the San Jose site to the RTP site, the Physical Location for the Cisco IP Communicator Phone changes and the Device Mobility Group remains the same. After roaming to RTP, the user called a colleague in RTP and conferenced in a phone in his home location (San Jose). Which statement about the MRGL for the Cisco IP Communicator Phone is true? A. The Cisco IP Communicator Phone will use the Home MRGL (SJ_MRGL) since his Device Mobility Group (DMG) remained the same. B. The Cisco IP Communicator Phone will use the RTP_MRGL since his Device Mobility Group remained the same. C. The Cisco IP Communicator Phone will use the RTP_ MRGL regardless of Device Mobility Group. D. The Cisco IP Communicator Phone will use the Home MRGL (SJ_MRGL) since he is conferencing a user at his home location. Answer: C Question 9. As the Administrator for an IT company that's using a Centralized Cisco Unified Communications Manager topology, you've been tasked to implement Device Mobility feature for users that roam between their home country (US) and Europe. Due to frequent travels to different countries, your goal is to implement Device Mobility without requiring users to learn each country's numbering plan. Which scenario will accomplish your goal? A. Place each roaming user in a country specific User Device Profile. B. Place each site in a different device pool but use the same Device Mobility Group. C. Place each site and user in the appropriate Device Calling Search Space so they always use the local PSTN gateway for each country. D. Implement Mobile Connect. E. Place each site in a different Device Mobility Group. Answer: E Question 10. A remote site MGCP gateway will be used to provide redundancy when connectivity to the central Cisco Unified Communications Manager cluster is lost. Which three steps are required to enable IP phones to establish calls to the PSTN when they have registered with the gateway? (Choose three.) A. POTS dial peers must be added to the gateway to route calls from the IP phones to the PSTN. B. COR needs to be configured to allow outbound calls. C. The default service must be enabled globally. D. The command ccm-manager mgcp-fallback must be configured. E. The default service must be configured on an inbound POTS dial peer. F. VoIP dial peers must be added to the gateway to route calls from the PSTN to the IP phones. Answer: A, C, D
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.