Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "HP0-752" Exam

ProCurve Mobility

 Question 1.
Which authentication method can be combined with any other supplemental authentication method?

A. preshared keys
B. MAC authentication
C. 802.1X authentication
D. Extensible Authentication Protocol (EAP)

Answer: B

Question 2.
Your network features a full public key infrastructure (PKI) with digital certificates for users and workstations, as well as for servers. You are now adding a wireless LAN (WLAN) that implements 802.1X authentication with Extensible Authentication Protocol (EAP). 

Which EAP method should you select for the highest security?

A. Protected EAP (PEAP)
B. EAP-Tunneled TLS (TTLS)
C. EAP-Message Digest 5 (MD5)
D. EAP-Transport Layer Security (TLS)

Answer: D

Question 3.
Your company uses Wi-Fi Protected Access (WPA) encryption. 

Where is traffic encrypted?

A. over wireless bridges only
B. over the wired network only
C. over the wireless network only
D. over the wireless and wired network

Answer: C

Question 4.
Match the encryption method to the security standard.
Drag and drop the boxes on the right to the left and match the description to the security option.

 

Answer:

 

Question 5.
Your company wants to implement the highest security authentication possible without installing certificates on each user's station. 

Which Extensible Authentication Protocol (EAP) method should you choose?

A. EAP-Message Digest 5 (MD5)
B. EAP-Transport Layer Security (TLS)
C. Protected EAP (PEAP) MS-CHAPv2
D. EAP-Subscriber Identity Module (SIM)

Answer: C

Question 6.
You are providing consulting services to a bookstore that wants to set up a wireless network to provide complimentary Internet access. 

Which security option should you choose to provide the widest support for customers who bring their own equipment?

A. Web authentication (Web-Auth)
B. MAC authentication (MAC-Auth)
C. dynamic Wired Equivalent Privacy (WEP)
D. Wi-Fi Protected Access (WPA) with preshared keys (PSK)

Answer: A

Question 7.
Which action does an 802.1X authenticator take if its Extensible Authentication Protocol (EAP) messages to the supplicant time out?

A. keeps the port closed
B. opens the port, by default
C. contacts the authentication server
D. sends a wake-up message to the supplicant

Answer: A

Question 8.
Which mechanisms are part of the 802.11h standard? (Select two.)

A. fast roaming for 802.1X
B. Transmit Power Control (TPC)
C. Inter-Access Point Protocol (IAPP)
D. fast roaming for Voice over IP (VoIP)
E. Dynamic Frequency Selection (DFS)
F. Quality of Service (QoS) for wireless stations

Answer: B, E

Question 9.
A station is configured for passive scanning. 

Which statement describes its behavior?

A. The station sends probe requests on only one channel.
B. The station sends probe requests on all supported channels.
C. The station listens for beacon frames from any access point (AP) within range.
D. The station listens only for beacon frames for previously-accessed wireless LANs (WLANs).

Answer: C

Question 10.
Which mode allows you to connect two wired networks through a wireless connection?

A. in-cell relay mode
B. internetwork mode
C. peer-to-peer mode
D. infrastructure mode

Answer: A


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 000-018 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "000-018" Exam

IBM Tivoli Service Request Manager V7.1 Implementation

 Question 1.
Which system property is used for supporting text file types for attachment searches?

A. LWDICT
B. ATTEXT
C. ATTCREATE
D. LUCENEOBJINDEX

Answer: B

Question 2.
In the deployment of IBM Tivoli Service Request Manager V7.1, a consultant needs to create a new escalation for the following conditions: Send notification to all the persons in the E-Mail Group, if Tickets classification is assigned to email related Issues. The consultant also needs to store the Ticket ID and Ticket status in a table when escalation is executed after successful condition and notification is being sent to an E-Mail user groups. 

Using the Escalation application, how can this be done?

A. Use the Notification class.
B. Use Set Value-Type Action.
C. Use Escalation Condition Query.
D. Use a custom class-Type Action and write Java class.

Answer: D

Question 3.
A customer wants to trigger three actions when any Service Request is not handled within 8 working hours: 
1. Send an email notification to the shift manager.
2. Change the Request priority to high.
3. Assign the request to the URGTEAM group.

How can this be done?

A. By defining a new Action
B. By defining a newCron Task
C. By defining a new Escalation
D. By defining a new E-Mail Listener

Answer: C

Question 4.
Which two statements are true? (Choose two.)

A. A price can be specified for an offering.
B. An attribute can be specified for an offering.
C. A list of Assets can be included for an offering.
D. A list of Configuration Items can be included for an offering.
E. Service fulfillment needs to be specified in order to create the offering.

Answer: A, E

Question 5.
When creating a service offering using the Offerings application, which statement is correct?

A. An offering is unique to a catalog.
B. An offering is unique to an organization.
C. An offering contains information not found in the referenced service fulfillment.
D. An offering contains a list of specifications for the type of user that can be associated with it.

Answer: C

Question 6.
An organization wants to advertise an existing, non-automated service that requires a request path that is not integrated into the Service Catalog. 

Which service type is used to achieve this?

A. Action service
B. Advertise service
C. Descriptive service
D. Supply Chain service

Answer: C

Question 7.
Where is the content of an Attribute Presentation for Service Catalog Offerings stored?

A. in the MENU.XML System XML
B. in the LIBRARY.XML System XML
C. in the Attribute dialog of the PMSCSRVOFF (Offerings) application
D. in the PRESENTATIONXML Attribute of the PMSCSRVOFF Object

Answer: B

Question 8.
When can a user classify a Fulfillment Option?

A. It can always be classified
B. When modality is of type Service Request
C. When Fulfillment Option is set to Complex
D. When there is a Job Plan attached to the Fulfillment Option

Answer: B

Question 9.
In which application is Instant Messaging integration available?

A. Person application
B. Problem application
C. Work Order application
D. Any application that contains information about user who created the record

Answer: B

Question 10.
Tivoli Directory Integrator architecture is divided into two parts, the core system and the components. 

In addition to Parsers and Connectors, what other component is available?

A. XML/Flat files
B. EventHandlers
C. AssemblyLines
D. Database interface tables

Answer: B


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.