|
Question 1. Which 2 mirror devices are the boot disks for SPB on a CLARiiON CX600? A. 0_0_0 B. 0_0_1 C. 0_0_2 D. 0_0_3 Answer: B, D If it is SPA, then the answers are A&C, if it is SPB, then the answers are B&D. Question 2. Over what device is write I/O being transferred to the peer SP write cache on a FC4700? A. 12C bus B. CMI bus C. LCC card D. Internal serial port Answer: B Question 3. Exhibit: *** MISSING *** What is the function of the HA cache vault setting as shown in the image? A. Write cache is disabled if an SP fails. B. Write cache is not disabled if an SP fails. C. Write cache is disabled if single vault disk fails. D. Write cache is not disabled if single vault disk fails. Answer: D Question 4. Which CLI command is used to verify the installed software versions? A. navcli-h 192.168.1.1 ndu-list B. navcli-h 192.168.1.1 ndu-install C. navcli-h 192.168.1.1 ndu-check D. navcli-h 192.168.1.1 software-list Answer: A Question 5. What is a valid frontend SP ALPA address on CLARiiON FCC4700 series? A. 0 - 124 B. 0 - 128 C. 0 - 224 D. 0 - 255 Answer: A Explanation: ALPA = Arbitrated Loop Private Address. Some addresses are reserved for the backend connections, thus the full 0-128 are not available for the front end. Question 6. Which 2 mirror drives are the boot disks for SPB on a CLARiiON CX600? A. 0_0_0 B. 0_0_1 C. 0_0_2 D. 0_0_3 Answer: B, D Explanation: SP Boot Partitions - 2826.2 MB drives 0,1,2, & 3 - Each SP will have a mirrored SP boot partition. SPA will use drive 0 & 2 (0 is the primary with 2 as the mirror) and SPB will use drives 1 & 3 (1-primary, 3-mirror). Question 7. Which user account is needed to install drivers on UNIX servers? A. sys B. root C. oracle D. Administrator Answer: B Explanation: Oracle and Administrator are not default user accounts on UNIX. Root is the master, all-powerful account in UNIX. Question 8. Why is a snapview session lost an SP failure? A. The session was not persistent B. The host agent was not running C. The snapshot was not mounted D. The snapshot was not in a storage group Answer: A Explanation: Non-persistent sessions will not "trespass" over to the other SP. Options B, C, D have nothing to do with it. Question 9. Match the supported CLARiiON configurations. Choices may be used more than once. *** MISSING *** Answer: Pending, Send your comments or suggestions at feedback@itcertkeys.com Question 10. Which command allows for the extraction of all lines containing EMC case insensitive from the file test txt? A. vi test.txt B. ed test.txt -EMC C. grep EMC test.txt D. grep -I emc test.txt Answer: D Question 11. Exhibit: *** MISSING *** How is the metalun configured in the image? A. "Lun id" 65 and 75 are concatenated, Component 0 and 1 are striped B. "Lun id" 65 and 75 are striped, Component 0 and 1 are striped concatenated C. "Lun id" 2034 and 2035 are concatenated, Component 0 and 1 are striped D. "Lun id" 2034 and 2035 are striped, Component 0 and 1 are striped concatenated Answer: D Question 12. Which two [2] are valid methods of managing CLARiiON snapshots? A. navilcli B. admsnap C. admcilone D. admhosts E. java-jar navicli.jar Answer: A, B Question 13. How does the CLARiiON preserves data in write cache during a power failure of a CX600? A. The CX600 dumps the cache into the PSM B. The CX600 dumps the cache into the vault area C. The CX600 flushes the cache into the data disks D. The CX600 dumps the cache onto the reserved space Answer: B
|
Question 1. Which of the following is NOT a typical function of an Intrusion Detection System? A. Monitors segment traffic to detect suspicious activity B. Monitors network traffic and corrects attacks C. Monitors traffic patterns to report on malicious events D. Monitors individual hosts (HIDS) or network segments (NIDS) Answer: B Question 2. Which best describes a SYN Flood attack? A. Attacker redirects unusually large number of SYN/ACK packets B. Attacker sends relatively large number of altered SYN packets C. Attacker floods a host with a relatively large number of unaltered SYN packets D. Attacker floods a host with an unusually large number of legitimate ACK packets Answer: B Question 3. Which best describes a type of attack that aims to prevent the use of a service or host? A. Reconnaissance B. Denial of Service C. IP Spoofing D. Exploit Answer: B Question 4. Which of the following is NOT a valid detection method used by Dragon Network Sensor? A. Signature detection B. Protocol detection C. Policy detection D. Anomaly detection Answer: C Question 5. Which of the following is NOT a function of Dragon Forensics Console? A. Allows for central configuration of Active Response mechanisms to deter network attacks B. Centrally analyzes activity as it is occurring or has occurred over time C. Correlates events together across Network Sensor, Host Sensor, and any other infrastructure system (e.g., firewall, router) for which messages have been received (via Host Sensor log forwarding) D. Provides the tools for performing a forensics level analysis and reconstructing an attackers session Answer: A Question 6. Which of the following does NOT describe Dragon Host Sensors Multi-Detection methods? A. Monitors output to a hosts system and audit logs B. Monitors a hosts files via MD5 integrity-checking C. Monitors a hosts specified network interlace promiscuously for anomalous activity D. Monitors a hosts specific file attributes for changes to owner, group, permissions and file size E. Monitors a Windows hosts Registry for attributes that should not be accessed and/or modified Answer: C Question 7. What is the method that Dragon uses to secure the communication between the remote management host and Dragon Policy Manager? A. SSH B. SSL C. IPSec D. MD5 Answer: B Question 8. What is the primary and default source of event data tor Dragon RealTime Console? A. dragon.log.xxxx B. dragon.db C. Ring Buffer D. Dragon Workbench Answer: C Question 9. For what purpose can Dragon Workbench be used? A. Read data from TCPDUMP trace/capture file and write to dragon .db for later analysis B. Read data from dragon.db file and write to a TCPDUMP trace/capture file for later analysis C. Read data from RealTime Console and write to a TCPDUMP trace/capture file for later analysis D. This functionality is ONLY available on Dragon Appliances Answer: A Question 10. What is one benefit of Dragon Network Sensors dual network interface capability as deployed on a non-Dragon Appliance system? A. Secure management and reporting on one interface; Network Sensor invisible on other interface B. Allows for collection of event data from both interfaces simultaneously C. Allows for protocol detection from one interface, and anomaly detection from the other interface D. This functionality is ONLY available on Dragon Appliances Answer: A
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.