Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "310-301" Exam

Sun Certified Security Administrator

 Question 1.
Part of a fire protection plan for a computer room should include:

A. Procedures for an emergency shutdown of equipment.
B. A sprinkler system that exceeds local code requirements.
C. The exclusive use of non-flammable materials within the room.
D. Fireproof doors that can be easily opened if an alarm is sounded.

Answer: A

Question 2.
What network mapping tool uses ICMP (Internet Control Message Protocol)?

A. Port scanner
B. Map scanner
C. Ping scanner
D. Share scanner

Answer: C

Question 3.
Which of the following would be most effective in preventing network traffic sniffing?

A. Deploy an IDS (Intrusion Detection System).
B. Disable promiscuous mode.
C. Use hubs instead of routers.
D. Use switches instead of hubs.

Answer: D

Question 4.
A user wants to send an e-mail and ensure that the message is not tampered with while in transit.

Which feature of modern cryptographic systems will facilitate this?

A. Confidentiality
B. Authentication
C. Integrity
D. Non-repudiation

Answer: C

Question 5.
Which of the following type of attack CANNOT be deterred solely through technical means?

A. Dictionary
B. Man in the middle
C. DoS (Denial of Service)
D. Social engineering

Answer: D

Question 6.
An organization is implementing Kerberos as its primary authentication protocol. 

Which of the following must be deployed for Kerberos to function?

A. Dynamic IP (Internet Protocol) routing protocols for routers and servers.
B. Separate network segments for the realms.
C. Token authentication devices.
D. Time synchronization services for clients and servers.

Answer: D

Question 7.
Which of the following is likely to be found after enabling anonymous FTP (File Transfer Protocol) read/write access?

A. An upload and download directory for each user.
B. Detailed logging information for each user.
C. Storage and distribution of unlicensed software.
D. Fewer server connections and less network bandwidth utilization.

Answer: C

Question 8.
NetBusand Back Orifice are each considered an example of a(n):

A. Virus
B. Illicit server
C. Spoofing tool
D. Allowable server

Answer: B

Question 9.
Which of the following access control models introduces user security clearance and data classification?

A. RBAC (Role Based Access Control)
B. NDAC (Non-Discretionary Access Control)
C. MAC (Mandatory Access Control)
D. DAC (Discretionary Access Control)

Answer: C

Question 10.
Why are unique user IDs critical in the review of audit trails?

A. They CANNOT be easily altered.
B. They establish individual accountability.
C. They show which files were changed.
D. They trigger corrective controls.

Answer: B

Question 11.
Which of the following would NOT be considered a method for managing the administration of accessibility?

A. DAC (Discretionary Access Control) list
B. SAC (Subjective Access Control) list
C. MAC (Mandatory Access Control) list
D. RBAC (Role Based Access Control) list

Answer: B

Question 12.
In which risk assessment stage does the security auditor map the system and resources on a network?

A. Penetration
B. Cancellation
C. Activation
D. Discovery

Answer: D

Question 13.
In a typical corporate environment, which of the following resources demands the highest level of security on the network?

A. Purchasing
B. Engineering
C. Sales
D. Accounting

Answer: D

Question 14.
What is another term for a network security manager who acts as a potential hacker (a person looking for security loopholes)?

A. An agent
B. An auditor
C. An assessor
D. An analyzer

Answer: B

Question 15.
What is the essential element in the implementation of any security plan?

A. Testing to make sure any server-side scripts are secure.
B. Testing patch levels.
C. Proper firewall configuration.
D. Auditing

Answer: D

Question 16.
A malicious user has connected to your system and learned that specifics of your operating system, including its current patch levels and the operating system name.

What is the term for this type of scanning attack?

A. SYN detection
B. TCP priming
C. Cache poisoning
D. Stack fingerprinting

Answer: D

Question 17.
What is the most important step in securing a Web server?

A. Logging all HTTP activity.
B. Enabling system-wide encryption.
C. Placing the operating system, Web server program, and server files on the same partition.
D. Placing the operating system, Web server program, and server files on separate partitions.

Answer: D

Question 18.
What is the primary security risk in SNMP?

A. Login names and passwords are not encrypted.
B. Damaging programs can be executed on the client.
C. Damaging programs can be executed on the server.
D. Passwords and data are transferred in cleartext.

Answer: D

Question 19.
Lucy is a systems administrator who wants to block all NNTP traffic between her network and the Internet.

How should she configure her firewall?

A. Configure the firewall to block all incoming and outgoing packets except for those with the 
    source and destination port of 119. Then, allow all traffic with destination ports above 1024 to 
    traverse the firewall.
B. Configure the firewall to block all incoming packets with the source port of 119, and outgoing 
    packets with a source port lower than 1024. Then, block all packets with the destination port of 
    119 and with a source port lower than 1024.
C. Configure the firewall to block all incoming packets with the destination port of 119, and to 
    block outgoing packets with the destination port of 119.
D. Configure the firewall to block all incoming packets with the source port of 119.

Answer: C

Question 20.
Which port or ports are used for SMTP?

A. 20 and 21
B. 25
C. 53
D. 161 and 162

Answer: B


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for HP2-027 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "HP2-027" Exam

Technical Essentials of HP Enterprise Products

 Question 1.
What is important to implement when providing a non-disruptive IP telephony solution (VoIP)?

A. Fabric Shortest Path First (FSPF)
B. Packet caching (Pcache)
C. Quality of Service (QoS)
D. VLAN routing (vlanR)

Answer: C

Question 2.
What is the benefit of using server virtualization technology, such as VMware, in the x86 server environment?

A. to maximize the utilization of x86 server resources
B. to enable clustering without single-point-of-failure
C. to enable failover-failback between x86 processors
D. to maximize I/O performance by sharing with multiple servers

Answer: D

Question 3.
Which advantage does fiber optic cable offer over copper cabling?

A. lower reliance on hubs and switches
B. longer distances
C. easier implementation
D. lower cost

Answer: B

Question 4.
An engineering drawing firm is planning to upgrade their tape backup systems, but they are constrained by their investment in older tapes. They need systems that will preserve their old data by reading backward two generations.

Which tape technology provides read compatibility for two prior generations? Select TWO.

A. SDLT
B. AIT
C. LTO
D. DLT
E. SLR

Answer: C, D 

Question 5.
Which application functionality benefits most from a 64-bit architecture over a 32-bit architecture?

A. Clustered DNS Server
B. Clustered Print Spooling
C. High Performance Computing
D. Clustered AutoStore Capturing

Answer: C

Question 6.
Which web-based software solution enables a corporate customer to track PC (business desktop, notebooks and workstations) assets, alerts, diagnostics and SoftPaq distribution across an enterprise environment?

A. Altiris Deployment Server
B. HP OpenView Helpdesk software
C. HP Essentials software
D. HP Client Manager tool

Answer: D

Question 7.
Which legacy server platforms have high potential to migrate to the Intel Itanium server platform? Select TWO.

A. HP 9000 servers
B. HP AlphaServers
C. HP ProLiant 300 family servers
D. HP ProLiant 900 family servers

Answer: A, B

Question 8.
Which backup method provides the lowest TCO?

A. shared SCSI backup
B. local SCSI backup
C. data replication backup
D. automated centralized backup

Answer: A

Question 9.
Which HP 9000 server supports a maximum of two hard partitions?

A. rp4440-4
B. rp4440-8
C. rp7420-6
D. rp8420-32

Answer: C

Question 10.
Which networking security option can be used to authenticate wireless LAN (802.11b/g/a) access?

A. VLAN
B. DMZ
C. RADIUS
D. BOOTP

Answer: C

Question 11.
Which disk storage method results in reduced latency and increased performance for data writing?

A. JBOD
B. RAID 0
C. RAID 1
D. RAID 5

Answer: B


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.