|
Question 1. Which information is included in a ticket-granting ticket (TGT) from the key distribution center (KDC)? A. the public key for the KDC B. the time the TGT was issued C. the user account's crypt password D. the service key for all supported kerberized services Answer: B Question 2. Which three are Mac OS X Open Directory plug-ins that can request data from a directory service? A. SMB B. LDAPv3 C. Bonjour D. AppleTalk E. Active Directory F. BSD Flat File and NIS Answer: B, E, F Question 3. Which is a valid concern when using the Archive feature in Open Directory services on Mac OS X Server v10.4? A. The archive does not include the local Net Info database or configuration file B. The archive contains all of the account passwords and should not be left unsecured C. You cannot archive a copy of the Open Directory data while the Open Directory master is in service D. Kerberos must be reconfigured after restoring from an archive, because the archive does not include Kerberos data. Answer: B Question 4. You are promoting Open Directory services on a computer running Mac OS X Server v10.4 from Standalone Server to Open Directory Master. Which statement about the administrator account is true? A. The primary administrator account in the local Net Info database is copied to the LDAP database and used as the primary administrator account for the LDAP database. B. A new administrator account with the name "dir admin" is created in the LDAP database and assigned the password from the root account in the local Net Info database. C. The root account in the local Net Info database is copied to the LDAP database and used as the primary administrator account for the LDAP database. D. A new administrator account is created in the LDAP database, and you assign it a name and password Answer: C Question 5. Which of the following tasks can be performed in Directory Access? A. Configuring your computer to use AppleTalk to discover FTP services. B. Configuring your computer to be a member of more than one Windows workgroup. C. Configuring your computer to use a specific WINS server for SMB service discovery. D. Configuring your computer to deny access to FTP server through the Connect to Server feature in the Finder. Answer: C Explanation: Directory Access lists different kinds of services that Mac OS X can access. The list includes directory services, which give Mac OS X access to user information and other administrative data stored in directory domains. Question 6. Review the following command then complete the statement below: Id apsearch -LLL -x -H Idap://oneserver.example.com -b dc=example, dc=com "(object Class=apple-group)" cn object Class The last two options in this command, cn and object Class, specify the _____ A. LDAP entries to exclude from the results B. Attributes to return in the results C. Search filter D. Search base Answer: B Question 7. What file on a Mac OS X computer is used to specify the location of the key distribution center (KDC) and the Kerberos realm? A. /Library/Preferences/edu.mit Kerberos B. ~/Library/Preferences/Kerberos.plist C. /etc/Kerberos/Kerberos.cof D. /etc/krb.conf Answer: A Question 8. You are troubleshooting an Open Directory LDAP server. Which step will allow you to gather troubleshooting information from the server? A. Start a lapd with the flag -d 99. B. Turn on verbose logging in Server Admin C. Start directory Services with the flag - debug D: Edit/etc/hostconsig. To contain LDAPARGS=;d; Answer: A Question 9. In an Open Directory user record, what value should the NFS Home Directory attribute contain? A. the local file system path to the user's home folder B. the IP address of the NFS server providing network home folder C. the URL used to mount the share point containing the user's home folder D. the ID for the mount record that mounts the share point providing the user's home folder Answer: A Question 10. When you set up Mac OS X Server to work with a Kerberos key distribution center (KDC), which file is highly sensitive and should be readable only by root? A. edu.mit.Kerberos.plist B. Kerberos.conf C. Krb5.keytab D. Key.pem Answer: C Question 11. What authentication token does a client present when accessing a kerberized service? A. the user's password B. a client-generated service ticket C. a service ticket obtained from the key distribution center (KDC) D. a ticket-generating ticket (TGT) obtained from the key distribution center (KDC) Answer: C Question 12. Which statement is NOT true Password Server replication in Mac OS X Server v10.4? A. Password Server engages in a multi master replication scheme. B. Confilicts in the Password Server database replicas are resolved using slapd.access C. The replication process is entirely encrypted between each Password Server process. D. Password Server refers to /var/db/authserver/authserverreplicas to determine if the last synchronization was successful. Answer: B Question 13. You need to configure several Mac OS X computers to bind to an LDAP server that is not running on a Mac OS X computer. This is the first time that you have used this LDAP server. What should be your FIRST step? A. In the LDAP plug-in in Directory Access, create mappings to supplement required user account attributes that are not on the LDAP database. B. Use an LDAP browsing tool to verify the connection settings and identify the structure and format of the data stored on the server. C. Create a new LDAP configuration in Directory Access and determine the connection settings through experimentation D. Have the server system administrator modify the schema to support missing attributes that are required by Mac OS X Answer: B Question 14. Review the following partial mount record, then answer the question below: Record Name: fileserver.pretendoc.com:/Users VFS Link Dir: /Network/Servers/ VFS opts: net url==afp:// :AUTH=Nos20USERX20AUTHENT@fileserver.pretendco.com/Users VSF Type: url| You use dsc 1 to view a mount record provided by an LDAP server. How is the share point mounted? A. statically, using NFS B. statically, using AFP C. dynamically, using AFP D. dynamically, using NFS Answer: C Explanation: In the book "Apple Training Series: Mac OS X System Administration Reference, Volume 1" ISBN: 032136984X. it says: * vfstype: Set to nfs for NFS mounts and url for AFP or SMB mounts. * dir: The local folder where clients will mount the share point. Dynamically mounted share points always have a value of/Network/Servers/. * opts: Mount options. There may be both, one, or neither of the options net and url. * net indicates that the share point is to be dynamically mounted. * url is the URL path to an AFP share point; for example; url=afp://;NO%20USER%20AUTHENT@mainserver.pretendco.com:/Users. Question 15. You work as a network administrator at ITCertKeys.com. You need to configure a Mac OS X computer to get authentication information from an LDAP server. What could you do? (Choose Two) A. Enter the IP address of an LDAP server in the LDAP pane of Network preferences. B. Use Directory Access to configure Mac OS X to get LDAP information from a DNS server. C. Use the default configuration, which allows Mac OS X to use a DHCP-supplied LDAP server. D. Use Sharing preferences to configure Mac OS X to use an Active Directory server as an LDAP server. E. Use Directory Access to configure Mac OS X with the IP address, type and search base of a specific LDAP server. Answer: C, E
|
Question 1. LSC validation is failing on a new SCCP IP phone that you have just added to the Cisco Unified CallManager 5.0 cluster. No other IP phones are experiencing any problems with LSC validation. What can you do to help pinpoint the problem? A. Check for security alarms B. Verify that the authentication string is correct in the Cisco Unified CallManager device configuration screen C. View the SDI trace output D. Use the Security configuration menu on the IP phone to verify that an LSC has been downloaded to the IP phone Answer: D Question 2. Which three capabilities can't be configured if the default dial peer is matched? (Choose three.) A. Set preference to 1 B. Invoke a Tcl application C. Enable dtmf-relay D. Set codec to G.711 E. Disable DID F. Disable VAD Answer: B, C, F Question 3. When using trace output to troubleshooting a Cisco Unified CallManager 5.0 problem, how can you collect and view the trace files? A. Configure the proper trace settings on the Cisco Unified CallManager Serviceability page and then use the embedded RTMT tool to view the trace files B. Configure the proper trace settings on the Cisco Unified CallManager Serviceability page and download the RTMT plug-in from the CallManager Administration page to view the trace output C. Download the RTMT plug-in from the Cisco Unified CallManager Serviceability page to view the preconfigured trace files D. Configure the proper alarms and traces on the Cisco Unified CallManager Administration page and view the output with the RTMT plug-in Answer: B Question 4. You are troubleshooting why a user can't make calls to the PSTN. You are reviewing trace files and you found where the user's IP phone initiates the call but you never see the call go out the gateway. What is the next step in troubleshooting this issue? A. Look in the SDL trace file to see if there is a signal to another Cisco Unified CallManager node with the same time-stamp B. Look in the MGCP trace file to determine which MGCP gateway the call was sent to C. Look in the IP Voice Media Streaming APP trace file to see if an MTP was invoked D. Look in the SDL trace file to see if there is a signal to anther Cisco Unified CallManager node with the same TCP handle Answer: A Question 5. Exhibit: Your work as a network engineer at ITCertKeys.com. Please study the exhibit carefully. Voice bearer traffic is mapped to which queue in FastEthernet0/2? A. Queue 2 B. Queue 3 C. Queue 1 D. Queue 4 Answer: A Question 6. Exhibit: Your work as a network engineer at ITCertKeys.com. Please study the exhibit carefully. You have received a trouble ticket stating that calls to international numbers are failing. To place an international call, users dial the access code, "9," followed by "011", the country code and the destination number. After entering the debug isdn 1931 command on the MGCP gateway, you have the user attempt the call again. Base on the debug output, what is the most likely cause of this problem? A. The TON in incorrect B. The circuit is not configured correctly or has a physical layer issue C. Cisco Unified CallManaager is not stripping the access code before sending the call to the gateway D. The gateway dial peer needs to prefix "011" to the called number so the PSTN knows this is an internation call E. The user's CSS does not permit international calls Answer: A Question 7. You have developed a dial plan for Cisco Unified CallManager 5.0 solution. All the route patterns, partitions, calling search spaces and translation rules have been configured. Before starting up the system you wish to test the dial plan for errors. Which Cisco Unified CallManager tool will simplify this testing? A. Route Plan Report B. Dial Plan Installer C. Dialed Number Analyzer D. RTMT Traces and Alarms Answer: C Question 8. You have just obtained a list of the following options: all patterns unassigned DN Call Park Conference Directory Number Translation Pattern Call pickup group Route pattern Message waiting Voice mail Attendant console What have you selected in order to produce this list? A. Route Plan > External Route Plan Wizard B. Control Center > Feature Services C. Route Plan > Route Plan Report D. Dialed Number Analyzer Answer: C Question 9. You have configured the Enable Keep Alive check under Trace Filter settings. How does this change the trace output? A. It adds the IP address of the endpoint in hex B. It maps the unique TCP handle for the endpoint to the MAC address of the endpoint in the trace output C. It adds the SCCP messages and all fields sent as part of that message D. It adds TCP socket numbers between the endpoint and Cisco Unified CallManager for the session Answer: B Question 10. When using trace output to troubleshooting a Cisco Unified CallManager 5.0 problem, how can you collect and view the trace files? A. Configure the proper trace settings on the Cisco Unified CallManager Serviceability page and download the RTMT plug-in from the CallManager Administration page to view the trace output B. Configure the proper alarms and traces on the Cisco Unified CallManager Administration page and view the output with the RTMT plug-in C. Download the RTMT plug-in from the Cisco Unified CallManager Serviceability page to view the preconfigured trace files D. Configure the proper trace settings on the Cisco Unified CallManager Serviceability page and then use the embedded RTMT tool to view the trace files Answer: A
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.