Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "HP0-678" Exam

Implementing HP Enterprise Virtual Array Solutions

 Question 100.
What does the EMU do? Select TWO.

A. powers off HSV controllers
B. monitors disk enclosure temperatures
C. monitors disk enclosure and controller temperature sensors
D. reports disk enclosure events through the Enclosure Address Bus (EAB)

Answer: B, D

Question 101.
How is the drive enclosure address assigned?

A. by the loop switches
B. by the enclosure address bus
C. by the HSV controllers at power up
D. by the order that the drive enclosures are powered up

Answer: B

Question 102.
What is connected using a Y-cable in an EVA storage system?

A. two controllers to the enclosure address bus (EAB)
B. main cabinet to an adjacent expansion cabinet using the EAB
C. two drive shelves to the EAB
D. controller mirror ports to the EAB

Answer: A

Question 103.
You connect a 0C6D expansion rack to a fully equipped 2C12D rack. 

What is the maximum number of disk drives that can be added to achieve a supported configuration?

A. 56
B. 60
C. 72
D. 84

Answer: C

Question 104
What topology and speed does the disk enclosure Fibre Channel connection support?

A. 1Gb FC-AL
B. 2Gb FC-AL
C. 1Gb FC-SW
D. 2Gb FC-SW

Answer: B

Question 105.
In a 2C18D EVA8000 configuration, how many disk enclosures are configured on each loop pair?

A. 4
B. 6
C. 8
D. 9
E. 18

Answer: D

Question 106.
On the EVA4000, what is the maximum number of disk drives per FC-AL loop?

A. 14
B. 56
C. 28
D. 120

Answer: B

Question 107.
Which statement is true regarding loop switches? Select TWO.

A. Loop switches are required on an EVA8000.
B. Two loop switches are required on an EVA4000.
C. Loop switches are required on an EVA6000.
D. Loop switches are optional on an EVA6000 with four or less disk enclosures.

Answer: A, C

Question 108.
Which URL do you enter to access Command View EVA from a remote management server web browser?

A. https://hostname 
B. http://localhost 
C. https://hostname:2381 
D. http://hostname:5314 

Answer: C

Question 109.
What is the default user/password to access the web agent of the management server?

A. admin/admin
B. admin/password
C. superuser/passwd
D. administrator/administrator

Answer: D

Question 110.
Command View EVA is supported on which system?

A. any HP ProLiant Cache Server
B. any HP ProLiant Storage Server SAN model
C. any HP ProLiant Server running Windows
D. any Intel based HP server with minimum 512MB RAM

Answer: B

Question 111.
Which features does HP Storage Works Command View EVA provide? Select TWO.

A. allows you to create snapshots for backup purposes
B. allows customers to align the priorities of their business
C. dynamically balances across the host port for optimized performance
D. allows you to manage and monitor HSV storage systems
E. maximizes resource utilization through consolidation of stranded capacity

Answer: A, D

Question 112.
How does the management server communicate with the HSV controller?

A. using Storage Cell Management Interface (SCMI) commands
B. using Fibre Channel Arbitrated Loop (FCAL) commands
C. using SCSI tagged command queuing commands
D. using Storage Management Appliance (SMA) commands

Answer: A

Question 113.
Which software components need to be installed on the client displaying the Command View GUI? Select TWO.

A. a supported internet browser
B. Microsoft MSDE database engine
C. Microsoft Visual Basic Library module
D. Java Runtime Environment (JRE) module

Answer: A, D

Question 114.
Command View EVA utilizes which method to secure access to a LUN?

A. 128-bit WEP
B. switch zoning
C. password protection per host
D. Selective Storage Presentation

Answer: D

Question 115.
For EVAPerf to run correctly, where must its configuration files be placed?

A. any local host
B. the top level directory
C. any management server
D. the installation directory

Answer: D

Question 116.
A Vraid5 virtual disk has been created in a 12 member disk group. 

What is the result of the loss of one disk?

A. addition of a new Redundant Storage Set (RSS)
B. reduction in the number of RSSs
C. reordering of disks in each RSS
D. no change in the number of RSSs

Answer: B


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for JN0-632 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "JN0-632" Exam

Security Professional (JNCIP-SEC)

 Question 1.
You are concerned about the latency introduced in processing packets through the IPS signature database and want to configure the SRX Series device to minimize latency. You decide to configure inline tap mode.

Which two statements are true? (Choose two)

A. When packets pass through for firewall inspection, they are not copied to the IPS module.
B. Packets passing through the firewall module are copied to the IPS module for processing as  
    the packets continue through the forwarding process.
C. Traffic that exceeds the processing capacity of the IPS module will be dropped.
D. Traffic that exceeds the processing capacity of the IPS module will be forwarded without being  
    inspected by the IPS module.

Answer: B, D

Explanation: 
Inline Tap mode is supported in 10.2. It will have a positive impact on performance and will only be supported in dedicated mode. The processing will essentially be the same as it is in dedicated inline mode, however instead of flowd simply placing the packet in the IDPD queue to be processed, it will make a copy of the packet, put that in the queue, and forward on the original packet without waiting for IDPD to perform the inspection. This will mean that the IDP will not be a bottleneck in performance. The one limitation around this feature is that some attacks may be able to pass through the SRX without being blocked such as single packet attacks. However, even though the single packet attacks may not be blocked, most attacks will be blocked, and even in the case that an attack is let through the SRX can still close down the session and even send TCP resets if it is a TCP protocol and the Close Connection option is set.

Question 2.
You create a custom attack signature with the following criteria:
-- HTTP Request:
-- Pattern: *\x<404040...40
-- Direction Client to Server

Which client request would be identified as an attack?

A. FTP GET.,\x404040...40
B. HTTP GET *\404040..40
C. HTPPOST.*\x404040...40
D. HTTP GET *\x4040401.40

Answer: D

Explanation:
Signature-based attack objects will be the most common form of attack object to configure. This is where you use regular expression matching to define what attack objects should be matched by the detector engine. The provided regular expression matches HTTP GET request containing *\x4040401..40. Here \x – hex based numbers, . - any symbol.

Reference: http://www.juniper.net/techpubs/en_US/idp5.1/topics/example/simple/intrusiondetection- prevention-custom-attack-object-compound-signature.html

Question 3.
Click the Exhibit button. 
 

In the exhibit, what does the configured screen do?

A. It blocks TCP connection from a host when more than 1000 successive TCP connections are 
    received
B. It blocks TCP connections for a host when more than 1000 connections are received within  
    3600 seconds.
C. It blocks TCP connection attempts from a host when more than 10 connection attempts are  
    made within 1000 microseconds.
D. It blocks TCP connections from the host for 1000 seconds when a host is identified as a TCP  
    scan source

Answer: C

Explanation:
The command prevents port scan attacks. A port scan attack occurs when an attacker sends packets with different port numbers to scan available services. The attack succeeds if a port responds. To prevent this attack, the device internally logs the number of different ports scanned from a single remote source. For example, if a remote host scans 10 ports in 0.005 seconds (equivalent to 5000 microseconds, the default threshold setting), the device flags this behavior as a port scan attack, and rejects further packets from the remote source.

Reference: 
http://www.juniper.net/techpubs/software/junos-es/junos-es93/junos-es-swcmdref/portscan.html

Question 4.
Click the Exhibit button
 

In the exhibit, Customer A and Customer B connect to the same SRX Series device. ISP1 and ISP2 are also directly connected to the SRX device. Customer A's traffic must use ISP1, and Customer B's traffic must use ISP2.

Which configuration will create the required routing tables?

A. set routing-options rib-groups fbf import-rib [ custA.inet.0 custB.inet.0 ]
B. set routing-options rib-groups fbf export-rib [ custA.inet.0 custB.inet.0 ]
C. set routing-options rib-groups fbf import-rib [ custA.inet.0 custB.inet.0 inet.0 ]
D. set routing-options rib-groups fbf export-rib [ custA.inet.0 custB.inet.0 inet.0 ]

Answer: C

Explanation:

Question 5.
You must configure a site-to-site VPN connection between your company and a business partner. The security policy of your organization states that the source of incoming traffic must be authenticated by a neutral party to prevent spoofing of an unauthorized source gateway. 

What accomplishes this goal?

A. Use a manual key exchange to encrypt/decrypt traffic.
B. Generate internal Diffie-Hellman public/private key pairs on each VPN device and exchange  
    public keys with the business partner.
C. Use a third-party certificate authority and exchange public keys with the business partner.
D. Use a private X.509 PKI certificate and verify it against a third-party certificate revocation list  
    (CRL).

Answer: C

Explanation:

Question 6.
Company A and Company B are using the same IP address space. You are using static NAT to provide dual translation between the two networks.

Which two additional requirements are needed to fully allow end-to-end communication? (Choose two.)

A. route information for each remote device
B. persistent-nat
C. required security policies
D. no-nat-traversal

Answer: A, C

Explanation:

Reference: 
http://www.juniper.fr/techpubs/en_US/junos10.4/topics/example/nat-twice-configuring.html
http://kb.juniper.net/library/CUSTOMERSERVICE/technotes/Junos_NAT_Examples.pdf

Question 7.
Your company is deploying a new WAN that uses transport over a private network infrastructure to provide an any-to-any topology. Your manager is concerned about the confidentiality of data as it crosses the WAN. Scalability of the SRX Series device's ability to perform IKE key exchanges is a key consideration.

Which VPN design satisfies your manager's concerns?

A. a transparent IPSec VPN
B. a hub-and-spoke VPN
C. a point-to-multipoint VPN
D. a group VPN

Answer: D

Explanation:

Reference: 
http://juniper.fr/techpubs/software/junos-security/junos-security10.2/junos-securityswconfig-security/topic-45780.html

Question 8.
Click the Exhibit button
 

Senior management reports that your company's network is being attacked by hackers exploiting a recently announced vulnerability. The attack is not being detected by the DP on your SRX Series device. You suspect that your attack database is out of date. You check the version of the attack database and discover it is several weeks old. You configured your device to download updates automatically as shown in the exhibit.

What must you do for the automatic update to function properly?

A. Change the interval to daily by adding set automatic interval 1 to the configuration and commit  
    the change.
B. Enable the automatic updates by adding set automatic enable to the configuration and commit  
    the change.
C. Set the time zone on your device.
D. Change the URL of the update site to use https:// instead of http://.

Answer: B

Explanation:

Question 9.
You obtained a license tile from Juniper Networks for the SRX Series Services Gateway IPS feature set. You want to install the license onto the SRX Series device.

Which statement is accurate?

A. The license file is automatically downloaded from the online license server, you need not do  
    anything.
B. Transfer the file to the SRX Series device using FTP or SCP and install the license with the  
    request system license add  command.
C. The license file must be decrypted with the openssl utility before being installed on the SRX  
    Series device.
D. Transfer the file to the SRX firewall using FTP or SCP and install the license with the request  
    system license install-permanent command.

Answer: B

Explanation:

Reference: http://www.juniper.net/techpubs/en_US/junos11.1/topics/reference/commandsummary/ 
request-system-license-add.html

Question 10.
You have been asked to configure a signature to block an attack released by a security vulnerability reporting agency. 

Which two characteristics of the attack must you understand to configure the attack object? (Choose two)

A. the source port of the attacker
B. a string or regular expression that occurs within the attack
C. the context where the attack pattern is found within the packet
D. the IPv4 routing header

Answer: B, C

Explanation:

Reference: http://www.juniper.net/techpubs/en_US/nsm2011.1/topics/task/configuration/attacksignature-
attack-object-creating-nsm.html



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.