|
Question 76. Which settings are used for connecting a PC serial port to the M-Series products? A. 57600 bits per second, 8 Data bits, Even parity, 2 Stop bit, Xon/Xoff Flow Control B. 57600 bits per second, 7 Data bits, non of parity, 1 Stop bit, Non for Flow Control C. 57600 bits per second, 8 Data bits, None for parity, 1 Stop bit, Non for Flow Control D. 57600 bits per second, 7 Data bits, None for parity, 2 Stop bit, Hardware Flow Control Answer: C Question 77. Which database service needs to be verified if EMC VisualSAN 4.0 displays error on program start? A. Oracle 8i B. Informix 9 C. Sybase 11 D. SQL Server 2000 Answer: D Question 78. Which command is used to backup the configuration of a Brocade switch? A. backupconfig B. configupload C. configdownload D. firmwareDownload Answer: B Question 79. How many ISLs are required to implement an extended distance IP solution in a MDS-9509 Director? A. 0 B. 2 C. 4 D. 6 Answer: A Question 80. Which is an EMC recommended best practice when doing fabric zoning? A. Single FA zoning B. Multiple FA zoning C. Single HBA zoning D. Multiple HBA zoning Answer: C Question 81. Which three (3) are valid types of persistent bindings? A. S_ID B. D_ID C. WWNN D. WWPN Answer: B, C, D Question 82. How many bits does a WWN contain? A. 16 B. 24 C. 32 D. 64 Answer: D Question 83. Which view of Workload Analyzer will provide the aggregate utilization of all FA ports in the Symmetrix? A. Performance view B. Link utilization view C. Data collection view D. Performance traffic view Answer: A Question 84. Which two [2] statements apply to the MDS IP Storage Services Module? A. Supports VSAN zoning B. Requires ISLs to access storage ports C. Supports host I/O traffic to both CLARiiON and Symmetrix D. Supports both CLARiiON and Symmetrix remote replication technologies Answer: A, D Question 85. Where are available zone stored when using Connectrix Manager to add a zone to an existing fabric? A. Zone Library B. Zone in Zoneset C. Hardware Fabric List D. Active Switch Memory Answer: A Question 86. Which CLI command is used for Device Masking? A. fzone B. symcfg C. symmask D. symconfig Answer: C Question 87. Exhibit *** MISSING *** What is represented by data flow in the picture? A. FCIP representation of remote DR B. ISCSI representation of remote DR C. FCIP representation of remote backup D. ISCSI representation of remote backup Answer: A Question 88. In either a UNIX or Windows environment, which command is used for Power Path monitoring and management? A. powermt B. powermon C. pp_select D. powerdisplay Answer: A
|
Question 1. Which two are technologies that secure the control plane of the Cisco router? (Choose two.) A. Cisco IOS Flexible Packet Matching B. URPF C. routing protocol authentication D. CPPr E. BPDU protection F. role-based access control Answer: C, D Question 2. HOTSPOT This item contains three questions that you must answer. In order to answer the question, you need to examine the SDM screens by clicking on the SDM button to the left. View the question by clicking on the Questions button to the left. Then, choose the correct answer from among the options. Note: Not all SDM screen functions are implemented in this simulation. If a certain method to access the desired SDM is not available, please try to use an alternate method to access the required SDM screen to answer the question. Hotspot question. Click on the correct location or locations in the exhibit. Answer: Question 3. What are the two category types associated with 5.x signature use in Cisco IOS IPS? (Choose two.) A. basic B. advanced C. 128MB.sdf D. 256MB.sdf E. attack-drop F. built-in Answer: A, B Question 4. Refer to the exhibit. Which optional AAA or RADIUS configuration command is used to support 802.1X guest VLAN functionality? A. aaa authentication dot1x default group radius B. aaa authorization network default group radius C. aaa accounting dotlx default start-stop group radius D. aaa accounting system default start-stop group radius E. radius-server host 10.1.1.1 auth-port 1812 acct-port 1813 Answer: B Question 5. Which is an advantage of implementing the Cisco IOS Firewall feature? A. provides self-contained end-user authentication capabilities B. integrates multiprotocol routing with security policy enforcement C. acts primarily as a dedicated firewall device D. is easily deployed and managed by the Cisco Adaptive Security Device Manager E. provides data leakage protection capabilities Answer: B Question 6. Which three statements correctly describe the GET VPN policy management? (Choose three.) A. A central policy is defined at the ACS (AAA) server. B. A local policy is defined on each group member. C. A global policy is defined on the key server, and it is distributed to the group members. D. The key server and group member policy must match. E. The group member appends the global policy to its local policy. Answer: B, C, E Question 7. HOTSPOT This Item contains three questions that you must answer. You can view the question by clicking on the Questions button to the left. In order to answer the question, you need to examine the SDM screens by clicking on the SDM button to the left. View the question by clicking on the Questions button to the left. Then, choose the correct answer from among the options. Note: Not all the SDM screen functions are implemented in this simulation. If a certain method to access the desired SDM screen is not available, please try to use an alternate method to access the required SDM screen to answer the question. Hotspot question. Click on the correct location or locations in the exhibit. Answer: Question 8. DRAG DROP Drop Match the Cisco IOS IPS SEAP feature on the left to its description on the right. Not all the features on the left are used. Drag and drop question. Drag the items to the proper locations. Answer: Question 9. The CPU and Memory Threshold Notifications of the Network Foundation Protection feature protect which router plane? A. control plane B. management plane C. data plane D. network plane Answer: B Question 10. DRAG DROP Drop Match the Network Foundation Protection (NFP) feature on the left to where it is applied on the right. Drag and drop question. Drag the items to the proper locations. Answer:
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.