Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "E20-593" Exam

Backup & Recovery Implementation Exam

 Question 1.
Which network should be sized to accommodate backup data in an NDMP environment?

A. Public LAN
B. SAN
C. Private LAN
D. WAN

Answer: B

Question 2.
Your customer has accidentally removed a Client File Index(CFI). 

Which NetWorker command can you use to recover the CFI?

A. nsrd
B. nsrck
C. recover
D. mminfo

Answer: B

Question 3.
When configuring a remote tape library in NetWorker, what must you do before running jbconfig?

A. Verify the user running jbconfig is in the Administrator list
B. Configure a storage node resource for the remote storage node
C. Perform an inventory of the volumes in the tape library
D. Run inquire to create the device path names

Answer: A

Question 4.
The customer has a DL710 system, and wants to use the Auto Archive feature. The physical tape library has been connected to the disk library engine. 

What is the next step?

A. Perform a Rescan on the back-end ports
B. Run the Physical Library Wizard
C. Create a new SAN Client for the physical library
D. Run the Configuration Wizard

Answer: A

Question 5.
If a NetWorker client is backed up at an incremental level, at which level is its Client File Index (CFI) backed up?

A. 1
B. Incremental
C. 9
D. Full

Answer: C

Question 6.
You are setting up EMC Replication Storage group on a CLARiiON array for the RM use. 

What should be attached to this storage group?

A. RM Server
B. Source LUNs
C. RM Mount Host
D. Clone LUNs

Answer: D

Question 7.
What happens when a NetWorker advanced file type device fills up?

A. Specified save sets on the volume are immediately staged
B. An email is sent to the NetWorker administrator recommending that another volume be 
    mounted
C. Save streams going to the device hang until another volume becomes available
D. A NetWorker notification is performed

Answer: D

Question 8.
What is the major difference between a CLARiiON backup-to-disk and a CLARiiON Disk Library?

A. ATA disk
B. Scalable
C. Number of service processors
D. Disk-to-Disk replication

Answer: D

Question 9.
You have restored your customer's Replication Manager Solid database but the database remains corrupted. 

Which action should you take?

A. Rerun the restore script with the "/logdelete" switch
B. Restore the backup from tape and rerun the restore script with the "/logdelete" switch
C. Restore the backup from tape and rerun the restore script with the "/nologs" switch
D. Rerun the restore script with the "/nologs" switch

Answer: C

Question 10.
Which command do you use to change the browse and the retention times of a save set?

A. nsrmm
B. nsrls
C. nsrjb
D. mminfo

Answer: A

Question 11.
Which backup strategy is used to backup data to an offsite location?

A. SnapView
B. Vault Backup
C. Remote Backup
D. Remote Copy

Answer: C

Question 12.
Which tool is used to align the data to track boundaries on a LUN presented to Windows 2003 Enterprise Server?

A. Disk Management
B. Diskpart
C. Navisphere
D. Diskpar

Answer: D

Question 13.
The customer asks you to make a clone of a save set in NetWorker. There is one appendable clone volume available. However, the clone operation does not use this volume and is asking for a new volume to be mounted. 

What may be the cause?

A. Source volume is being used for another clone operation
B. Clone volume has an earlier clone of the save set
C. Source volume has an earlier clone of the save set
D. Entire cloned save set must fit on the clone volume and there is not enough room

Answer: B

Question 14.
Your customer wants to automatically create a copy of critical save sets using NetWorker. 

How do you implement this?

A. Configure client to run two simultaneous backups
B. Execute the nsrclone command
C. Enable cloning on the group resource
D. Configure automatic staging of save sets from disk to tape

Answer: C

Question 15.
The table shows a possible combination for creating virtual tapes when using CLARiiON Disk Library.

When would this combination be used?
Exhibit:
 

A. User wants to specify the LUN(s) on which to create virtual tapes and the DL has an attached 
    physical tape library
B. User does NOT want to specify the LUN(s) on which to create virtual tapes and the DL does 
    NOT have an attached physical tape library
C. User wants to specify the LUN(s) on which to create virtual tapes and the DL does NOT have 
    an attached physical tape library
D. User does NOT want to specify the LUN(s) on which to create virtual tapes and the DL has an 
    attached physical tape library

Answer: C


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 2B0-018 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "2B0-018" Exam

ES Dragon IDS

 Question 1.
Which of the following is NOT a typical function of an Intrusion Detection System?

A. Monitors segment traffic to detect suspicious activity
B. Monitors network traffic and corrects attacks
C. Monitors traffic patterns to report on malicious events
D. Monitors individual hosts (HIDS) or network segments (NIDS)

Answer:  B

Question 2.
Which best describes a SYN Flood attack?

A. Attacker redirects unusually large number of SYN/ACK packets
B. Attacker sends relatively large number of altered SYN packets
C. Attacker floods a host with a relatively large number of unaltered SYN packets
D. Attacker floods a host with an unusually large number of legitimate ACK packets

Answer:  B

Question 3.
Which best describes a type of attack that aims to prevent the use of a service or host?

A. Reconnaissance
B. Denial of Service
C. IP Spoofing
D. Exploit

Answer:  B

Question 4.
Which of the following is NOT a valid detection method used by Dragon Network Sensor?

A. Signature detection
B. Protocol detection
C. Policy detection
D. Anomaly detection

Answer:  C

Question 5.
Which of the following is NOT a function of Dragon Forensics Console?

A. Allows for central configuration of Active Response mechanisms to deter network attacks
B. Centrally analyzes activity as it is occurring or has occurred over time
C. Correlates events together across Network Sensor, Host Sensor, and any other infrastructure 
     system (e.g., firewall, router) for which messages have been received (via Host Sensor log  
     forwarding)
D. Provides the tools for performing a forensics level analysis and reconstructing an attackers 
     session

Answer:  A

Question 6.
Which of the following does NOT describe Dragon Host Sensors Multi-Detection methods?

A. Monitors output to a hosts system and audit logs
B. Monitors a hosts files via MD5 integrity-checking
C. Monitors a hosts specified network interlace promiscuously for anomalous activity
D. Monitors a hosts specific file attributes for changes to owner, group, permissions and file size
E. Monitors a Windows hosts Registry for attributes that should not be accessed and/or modified

Answer:  C

Question 7.
What is the method that Dragon uses to secure the communication between the remote management host and Dragon Policy Manager?

A. SSH
B. SSL
C. IPSec
D. MD5

Answer:  B

Question 8.
What is the primary and default source of event data tor Dragon RealTime Console?

A. dragon.log.xxxx
B. dragon.db
C. Ring Buffer
D. Dragon Workbench

Answer:  C

Question 9.
For what purpose can Dragon Workbench be used?

A. Read data from TCPDUMP trace/capture file and write to dragon .db for later analysis
B. Read data from dragon.db file and write to a TCPDUMP trace/capture file for later analysis
C. Read data from RealTime Console and write to a TCPDUMP trace/capture file for later 
     analysis
D. This functionality is ONLY available on Dragon Appliances

Answer:  A

Question 10.
What is one benefit of Dragon Network Sensors dual network interface capability as deployed on a non-Dragon Appliance system?

A. Secure management and reporting on one interface; Network Sensor invisible on other 
    interface
B. Allows for collection of event data from both interfaces simultaneously
C. Allows for protocol detection from one interface, and anomaly detection from the other 
    interface
D. This functionality is ONLY available on Dragon Appliances

Answer:  A


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.