|
i need 000-516 questions. please send me, urgently required. my email: faisalserver@hotmail.com
|
Question 1. You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows 2000 Server. The ITCertKeys.com network contains a SQL Server 2000 database server named ITCertKeys-DB01 that runs on Windows 2000 Server. ITCertKeys-DB01 contains a database named ITK_Sales. ITCertKeys.com intends migrating ITCertKeys-DB01 to SQL Server 2005 in the near future. To prepare for the migration, you decide to install SQL Server 2005 Express on a server named ITCertKeys-SR31. You verify that ITCertKeys-SR31 exceeds the minimum recommended hardware requirements for SQL Server 2005. What should you do next? A. Upgrade ITCertKeys-SR31 to Windows Sever 2003 and install Service Pack 1. B. Install and run the SQL Server Upgrade Advisor on ITCertKeys-SR31. C. Install SQL Server 2000 on ITCertKeys-SR31. D. Download and install the .NET Framework 2.0. Answer: D Explanation: SQL Server 2005 requires the.NET Framework 2.0. This is automatically installed when SQL Server 2005 is installed but is not automatically installed when SQL Server 2005 Express is installed. Incorrect Answers: A: You do not need to upgrade ITCertKeys-SR31 to Windows Sever 2003 Service Pack 1 as SQL Server 2005 Express can be installed on Windows 2000 Server. You will need to install Service Pack 4 for Windows 2000 Server though. B: You should run the SQL Server Upgrade Advisor when you want to upgrade an instance of a SQL Server 2000 database to SQL Server 2005. C: You do not need to install SQL Server 2000 before installing SQL Server 2005 Express. Reference: Microsoft SQL Server 2005 Books Online (2006), Index: installing SQL Server Express, before installing Question 2. You work as a database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 with the latest Service Packs and Hotfixes, while the client computers run Windows XP Professional, Windows 98 Second Edition, and Novell NetWare 6.5. You have received instruction to prepare for a new installation of SQL Server 2005 on a member server named ITCertKeys-SR21. ITCertKeys-SR21 will host a database named ITK_Sales. All ITCertKeys.com users must be able to connect to ITCertKeys-SR21 by computer name. A ITCertKeys.com network administrator named Rory Allen must ensure that the client computers will be able to connect to ITCertKeys-DB01. Which protocols can ITCertKeys.com users use to ITCertKeys-SR21? A. TCP/IP and Named Pipes B. TCP/IP and IPX/SPX C. Virtual Interface Adapter (VIA) D. Shared Memory Answer: A Explanation: By default, clients have TCP and Named Pipes as available protocols. You can manipulate the protocol ordering by using the SQL Server Client utility. The client application uses the protocols in the order specified on the client computer. If you are using SQL Server 2005, the protocol order is stored in the ProtocolOrder registry entry under the following registry subkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSSQLServer\Client\SNI9.0 Incorrect Answers: B: SQL Server 2005 does not support IPX/SPX. The newer versions of NetWare, such as NetWare 6.5, support TCP/IP which makes it the common protocol for all clients. C: The Virtual Interface Adapter (VIA) can be used only by VIA hardware. D: Shared Memory can only be used on the local computer and cannot be used as a network protocol. Reference: Microsoft SQL Server 2005 Books Online (2006), Index: client connections [SQL Server], about client network connections, choosing a network protocol Question 3. You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows 2000 Server. The ITCertKeys.com network contains a SQL Server 2000 database server named ITCertKeys-DB01 that runs on Windows 2000 Server. ITCertKeys-DB01 contains a database named ITK_Sales. ITCertKeys.com intends migrating ITCertKeys-DB01 to SQL Server 2005 in the near future. To prepare for the migration, you decide to install SQL Server 2005 Express on a server named ITCertKeys-SR23. ITCertKeys-SR31 was used for previously used by application developer and contains Microsoft Visual Studio 2003, .NET Framework 1.2 and Internet Explorer 5.5. You verify that ITCertKeys-SR23 exceeds the minimum recommended hardware requirements for SQL Server 2005. What should you do next? (Each correct answer provides part of the solution. Choose THREE.) A. Upgrade ITCertKeys-SR23 to Windows Sever 2003 and install Service Pack 1 for Windows Sever 2003. B. Install Service Pack 4 for Windows 2000 Sever on ITCertKeys-SR23. C. Upgrade the .NET Framework 1.2 to .NET Framework 2.0 on ITCertKeys-SR23. D. Uninstall the .NET Framework 1.2 and install the .NET Framework 2.0 on ITCertKeys-SR23. E. Upgrade Internet Explorer 5.5 to Internet Explorer 6.0 and install Service Pack 1 for Internet Explorer 6.0 on ITCertKeys-SR23. F. Upgrade Microsoft Visual Studio 2003 to Microsoft Visual Studio 2005 and install Service Pack 1 for Microsoft Visual Studio 2005 on ITCertKeys-SR23. Answer: B, D, E Explanation: SQL Server 2005 requires Service Pack 4 for Windows 2000 Sever, Internet Explorer 6.0 with Service Pack 1 and the .NET Framework 2.0. The .NET Framework 2.0 is automatically installed with other versions of SQL Server 2005 but is not automatically installed with SQL Server 2005 Express. You can upgrade .NET Framework 1.0 and upgrade .NET Framework 1.1 to .NET Framework 2.0 but .NET Framework 1.2 must be uninstalled first. Incorrect Answers: A: You do not need to upgrade ITCertKeys-SR31 to Windows Sever 2003 Service Pack 1 as SQL Server 2005 Express can be installed on a Windows 2000 Server once you install Service Pack 4 for Windows 2000 Server. C: You can upgrade .NET Framework 1.0 and upgrade .NET Framework 1.1 to .NET Framework 2.0 but .NET Framework 1.2 must be uninstalled first. F: SQL Server 2005 Express does not require any version of Microsoft Visual Studio. Reference: Microsoft SQL Server 2005 Books Online (2006), Index: installing SQL Server Express, before installing Question 4. You are employed as a database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. You have received instruction from the CIO to prepare a new installation of SQL Server 2005. The new SQL Server 2005 database server is named ITCertKeys-DB01. A ITCertKeys.com user named Mia Hamm is a member of the Marketing department. You instruct her to identify the protocols that the client computers might use to connect to the server. Mia Hamm needs to identify the protocols that are needed to accomplish this goal. What should she identify? (Choose all that apply) A. She should use the Multiprotocol. B. Mia Hamm should use the Named Pipes. C. She should use the Shared Memory. D. She should use the TCP/IP E. Mia Hamm should use the Virtual Interface Adapter (VIA). Answer: B, D Explanation: The clients have by default TCP and Named Pipes as available protocols. You can make use of the SQL Server Client utility to manipulate the protocol ordering. The client application uses the protocols in the order specified on the client computer. When you make use of the SQL Server 2005, the protocol order is stored in the ProtocolOrder registry entry under the following registry subkey: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSSQLServer\Client\SNI9.0 Incorrect Answers: C: Shared Memory can only be used on the local computer and cannot be used as a network protocol. E: The Virtual Interface Adapter (VIA) can be used only by VIA hardware. Reference: Microsoft SQL Server 2005 Books Online (2006), Index: client connections [SQL Server], about client network connections, choosing a network protocol Question 5. You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows 2000 Server. The ITCertKeys.com network contains a SQL Server 2000 database server named ITCertKeys-DB01 that runs on Windows 2000 Server Service Pack 4. ITCertKeys-DB01 contains a database named ITK_Trading. ITCertKeys.com wants to migrate ITCertKeys-DB01 to SQL Server 2005 but wants to retain the ITK_Trading database with the same instance name. You decide to perform an in-place upgrade to SQL Server 2005. You verify that ITCertKeys-DB01 exceeds the minimum recommended hardware requirements for SQL Server 2005. What should you do next? A. Upgrade ITCertKeys-DB01 to Windows Sever 2003 Service Pack 1. B. Run the SQL Server Upgrade Advisor on ITCertKeys-DB01. C. Detach the ITK_Trading database on ITCertKeys-DB01. D. Run the SQL Server 2005 Setup utility. Answer: B Explanation: Before you perform an in-place upgrade of an existing database, you should run the SQL Server Upgrade Advisor. The SQL Server Upgrade Advisor produces a list of items that must be addressed before and after performing the upgrade. This list of items is specific to the existing installation. Incorrect Answers: A: You do not need to upgrade ITCertKeys-DB01 to Windows Sever 2003 Service Pack 1 as SQL Server 2005 can be installed on Windows 2000 Server with Service Pack 4. C: You need to detach a database when you need to move the database to another database instance or another database server. You do not need to detach the database before performing an in-place upgrade. D: You should run the SQL Server Upgrade Advisor before you run the SQL Server 2005 Setup utility. The SQL Server Upgrade Advisor produces a list of items that must be addressed before and after performing the upgrade. This list of items is specific to the existing installation. Reference: Microsoft SQL Server 2005 Books Online (2006), Index: updating databases, detaching and attaching databases Question 6. You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows 2000 Server. The ITCertKeys.com network contains a SQL Server 7.0 database server named ITCertKeys-DB01 that runs on Windows 2000 Server. Service Pack 4 for Windows 2000 Server id installed on ITCertKeys-DB01. ITCertKeys.com wants to migrate ITCertKeys-DB01 to SQL Server 2005. You decide to perform an in-place upgrade to SQL Server 2005. You verify that ITCertKeys-DB01 exceeds the recommended hardware requirements for SQL Server 2005. What should you do next? A. Upgrade ITCertKeys-DB01 to Windows Sever 2003. B. Install Service Pack 4 for SQL Server 7.0 on ITCertKeys-DB01. C. Upgrade SQL Server 7.0 on ITCertKeys-DB01 to SQL Server 2000. D. Run the SQL Server 2005 Setup utility on ITCertKeys-DB01 and upgrade directly to SQL Server 2005. Answer: B Explanation: You can upgrade from SQL Server 7.0 with Service Pack 4 directly to SQL Server 2005. Thus you need only install Service Pack 4 for SQL Server 7.0. Incorrect Answers: A: You do not need to upgrade ITCertKeys-DB01 to Windows Sever 2003 as SQL Server 2005 can be installed on Windows 2000 Server with Service Pack 4. C: You do not need to upgrade ITCertKeys-DB01 to SQL Server 200 as SQL Server 7.0 with Service Pack 4 can be upgraded directly to SQL Server 2005. Besides, you will need to install Service Pack 3 for SQL Server 2000 before you can upgrade it to SQL Server 2005. D: You need to install Service Pack 4 for SQL Server 7.0 before you can upgrade it directly to SQL Server 2005. Reference: Microsoft SQL Server 2005 Books Online (2006), Index: upgrading SQL Server, upgrading to SQL Server 2005 Question 7. You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains two SQL Server 2000 database servers named ITCertKeys-DB01 and ITCertKeys-DB02 that are configured fro log shipping. ITCertKeys-DB01 is the primary server and hosts a database named ITK_Trading. Both ITCertKeys-DB01 and ITCertKeys-DB02 have Service Pack 3 for SQL Server 2000 installed. ITCertKeys.com wants to upgrade ITCertKeys-DB01 and ITCertKeys-DB02 to SQL Server 2005 Enterprise Edition but the ITK_Trading database must remain available during the upgrade process. You verify that both ITCertKeys-DB01 and ITCertKeys-DB02 exceed the recommended hardware requirements for SQL Server 2005 Enterprise Edition. You then install Service Pack 1 for Windows Server 2003 on ITCertKeys-DB01 and ITCertKeys-DB02. What should you do next? A. Install Service Pack 4 for SQL Server 2000 on both database servers. B. Enable failover in the SQL Server 2000 log shipping configuration and upgrade ITCertKeys- DB02 to SQL Server 2005. C. Run the Database Maintenance Plan Wizard on ITCertKeys-DB01 to upgrade it to SQL Server 2005. D. Upgrade ITCertKeys-DB02 to SQL Server 2005 and then upgrade ITCertKeys-DB01 to SQL Server 2005. Answer: B Explanation: SQL Server 2005 does not support the Database Maintenance Plan Wizard which was integral to log shipping in SQL Server 2000. Hence, log shipping stops functioning when you upgrade a SQL Server 2000 log shipping configuration directly to SQL Server 2005. To upgrade log shipping to SQL Server 2005, you must migrate the database servers to SQL Server 2005. If you want the database to remain available during the migration process, you must migrate with failover. To migrate with failover you must enable failover and upgrade ITCertKeys-DB02. Then you need to failover to ITCertKeys-DB02 and upgrade ITCertKeys-DB01. Then configure log shipping with the ITCertKeys-DB02 becoming the primary server and ITCertKeys-DB01 becoming the secondary server. Incorrect Answers: A: You do not need to install Service Pack 4 for SQL Server 2000 on the database servers as SQL Server 2000 with Service Pack 3 can be upgraded to SQL Server 2005. However, SQL Server 2005 does not support the Database Maintenance Plan Wizard which was integral to log shipping in SQL Server 2000. Hence, log shipping stops functioning when you upgrade a SQL Server 2000 log shipping configuration directly to SQL Server 2005. C: SQL Server 2005 does not support the Database Maintenance Plan Wizard which was integral to log shipping in SQL Server 2000. Hence, log shipping stops functioning when you upgrade a SQL Server 2000 log shipping configuration directly to SQL Server 2005. D: Removing log shipping from ITCertKeys-DB02 and upgrading ITCertKeys-DB01 to SQL Server 2005 will not ensure that the ITK_Trading database remains available. Reference: Microsoft SQL Server 2005 Books Online (2006), Index: log shipping [SQL Server], upgrading Question 8. You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003. The ITCertKeys.com network contains a Domain Controller named ITCertKeys-DC01 and a member server named ITCertKeys-SR21. ITCertKeys.com wants to implement a SQL Server 2005 database that will store sales data. All ITCertKeys.com users will require access to the Sales_DB database. You have been instructed to install SQL Server 2005 on ITCertKeys-SR21 and to create a database named Sales_DB. You need to ensure that ITCertKeys.com users and applications can connect to the database instance by using only the computer name. What should you do during the installation of SQL Server 2005 on ITCERTKEYS-SR21? A. Select the Named Instance and use MSSQLSERVER as the instance name. B. Select the Named Instance and use ITCertKeys-DC01 as the instance name. C. Select the Default Instance and accept the default instance name. D. Select the Named Instance and use ITCertKeys-SR21 as the instance name. Answer: C Explanation: To ensure that users and applications can connect to the instance using the computer name, you should select the Default Instance and accept the default instance name, MSSQLSERVER. Incorrect Answers: A, B, D: You cannot use a Named Instance as users and applications will need to specify the server name and the instance name when connection to the database. Question 9. You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run on Windows Server2003 while the client computers run Windows XP Professional, Windows 98 Second Edition, and Novell NetWare 6.5. All computers are members of the ITCertKeys.com Active Directory domain. The ITCertKeys.com network contains a SQL Server 2005 database server named ITCertKeys-DB01 that hosts a database instance named MSSQLSERVR. ITCertKeys.com wants to implement another SQL Server 2005 instance for a database named Sales_DB. Sales_DB will store sales data for the company. All ITCertKeys.com users will require access to the Sales_DB database. You have been instructed to create the SQL Server 2005 instance for the Sales_DB database. You need to ensure that all users will be able to connect to the Sales_DB database. You cannot make configuration changes to the client computers. Your solution must optimize network traffic. What should you do? A. Install the instance as a Named Instance and configure it to support Mixed Mode Authentication. The enable TCP/IP for the instance. B. Install the instance as a Default Instance and configure it to support Windows Authentication. The enable TCP/IP for the instance. C. Install the instance as a Named Instance and configure it to support SQL Authentication. The enable IPX/SPX for the instance. D. Install the instance as a Default Instance and configure it to support Windows Authentication. The enable IPX/SPX for the instance. Answer: A Explanation: The default instance is named MSSQLSERVER. This instance name is already in use; therefore you should use a Named Instance. You should use Mixed Mode Authentication to support NetWare users. Incorrect Answers: B: You cannot use the Default Instance as the default instance is named MSSQLSERVER and is already in use. Furthermore, you need to use Mixed Mode Authentication as Windows Authentication does not support NetWare users. C: You can use SQL Authentication, but this will require that you create SQL Logins for all users and groups. It would be easier to use Windows Authentication for clients that user Windows XP Professional and Windows 98 SE, and create SQL Logins for the NetWare 6.5 users. Also, SQL Server 2005 does not support IPX/SPX. The newer versions of NetWare, such as NetWare 6.5, support TCP/IP which makes it the common protocol for all clients. D: You cannot use the Default Instance as the default instance is named MSSQLSERVER and is already in use. Furthermore, you need to use Mixed Mode Authentication as Windows Authentication does not support NetWare users. Also, SQL Server 2005 does not support IPX/SPX. The newer versions of NetWare, such as NetWare 6.5, support TCP/IP which makes it the common protocol for all clients. Question 10. You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run on Windows Server2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains two SQL Server 2005 database servers that are configured in a cluster with two nodes named NodeA and NodeB. NodeA hosts a default database instance named MSSQLSERVR. ITCertKeys.com wants to implement another SQL Server 2005 instance for a database named Sales_DB. Sales_DB will store sales data for the company. All ITCertKeys.com users will require access to the Sales_DB database. You have been instructed to create the SQL Server 2005 instance for the Sales_DB database on Node A. You need to ensure that all users will be able to connect to the Sales_DB database. What should you do? A. Run the SQL Server 2005 Setup utility on NodeA and select a Named Instance for the Sales_DB database. B. Run the SQL Server 2005 Setup utility on NodeA and select the Default Instance for the Sales_DB database. C. Move the existing instance from NodeA to NodeB. Run the SQL Server 2005 Setup utility on Node A. Select the Default Instance and accept the default instance name D. Run the SQL Server 2005 Setup utility on NodeB and select a Named Instance for the Sales_DB database. Answer: A Explanation: The default instance is named MSSQLSERVER. This instance name is already in use on NodeA; therefore you should use a Named Instance. Incorrect Answers: B: You cannot use the Default Instance as the default instance is named MSSQLSERVER and is already in use. C: You do not need to move the existing instance as you can install up to 50 instances on a SQL Server 2005 database server. D: You need to install the instance on NodeA not NodeB. You can install a new instance on NodeA if you use a Named Instance.
|
Question 1. What four modules exist within AssetCenter? Select FOUR. A. Portfolio Module B. Request Module C. Identity Module D. Discovery Module E. Procurement Module F. Financials Module G. Contract Module Answer: A, E, F, G Question 2. What two tests must be completed before deployment of the AssetCenter application into a production environment? Select TWO. A. Performance tests B. Consistency tests C. No tests are required D. Functional tests Answer: A, D Question 3. Which three technologies are used within AssetCenter? Select THREE. A. RDBMS B. JavaScript C. AQL D. Cypress Basic E. XML F. C++ Answer: A, C, D Question 4. What three IT Asset Management best practices are incorporated within AssetCenter? Select THREE. A. Network Management B. Service Management C. Contract Management D. Identity Management E. Asset Tracking F. Procurement Management Answer: C, E, F Question 5. What four common data tables exist within the Portfolio module? Select FOUR. A. Locations B. Employees and departments C. Contracts D. Expense lines E. Models F. Natures Answer: A, B, E, F Question 6. Which report software provides out-of-the-box AssetCenter reports? A. Actuate B. Crystal Decisions C. Crystal Reports D. Cognos Answer: C Question 7. Which activities or utilities are provided to help control costs within the enterprise? A. Ability to manage ITSM activities within the enterprise B. Ability to manage the database C. Ability to manage software license compliance and entitlement D. Ability to manage an enterprise IT topology Answer: C Question 8. AssetCenter enables your organization to _______. Select THREE. A. Define, optimize, and track specific business processes of an organization B. Effectively manage documents within the enterprise C. Secure and protect your employee identitiesSecure and protect your employee? identities D. Manage an enterprise portfolio, which includes assets, contracts, inventory, and business data important for achieving the business objective of an organization E. Empower employees to make educated business decisions Answer: A, D, E Question 9. What are three types of filters that AssetCenter offers to enable the user to display their selected data? Select THREE. A. Query filter B. High-pass filter C. Universal filter D. Standard filter E. Linear filter F. Simple filter Answer: A, D, F Question 10. When can the Archival function of AssetCenter be enabled? A. Only before creating the database B. Only after creating the database C. Both before and after creating the database D. There is no Archival function Answer: C
|
Question 1. Which EAP methods support authentication of an 802.1X supplicant based on a user's name and password? (Select two.) A. SIM B. TLS C. TTLS D. SPAP E. PEAP F. CHAP Answer: C, E Question 2. Which statements describing Web authentication support on ProCurve switches are correct? (Select two.) A. An SSL-based login is required. B. It can be configured on ports that also have MAC authentication assigned. C. A successfully authenticated user can be redirected to a configurable URL. D. The switch's built-in DHCP, ARP, and DNS services assist with Web authentication while a port is in the authenticating state. E. When a client connects to a Web authenticator port and a Web browser is opened, the Web browser is automatically redirected to the switch's Web-Auth home page. Answer: C, D Question 3. Which EAP method is considered the least secure solution for implementing 802.1X user authentication on a wireless LAN? A. SIM B. MD5 C. TTLS D. FAST E. LEAP F. PEAP Answer: B Question 4. What is a capability of the Secure Access Wizard supported by ProCurve Identity Driven Manager? A. It configures 802.1X authenticator ports and RADIUS server settings on a switch. B. It verifies the integrity of the ProCurve Identity Driven Manager database using Active Directory. C. It conceals all security-related credentials stored in the switch configuration before backing up the file. D. It checks a switch configuration file's 802.1X, Web, or MAC authentication settings for consistency and reports any errors. Answer: A Question 5. You want to use 802.1X port-access authentication to assign Microsoft Active Directory users to a particular VLAN based on user credentials. Which condition must exist? A. The VLAN ID must exist on the switch. B. The VLAN ID must be defined in a GVRP configuration. C. The port through which the user is authenticating must be defined as a member of the VLAN. D. The user must be a member of an Active Directory Group that has an associated RADIUS remote- access policy. Answer: A Question 6. The RADIUS server and switch are correctly configured. The switch has the VLAN assignments and port-access commands configured, as shown in the diagram. What happens to port 10 after the user connects to the network? A. remains in an unauthorized state B. becomes a member of VLAN 20 C. becomes a member of VLAN 25 D. becomes a member of VLAN 200 Answer: D Question 7. Which statements describing the 802.1X user authentication process are correct? (Select two.) A. The supplicant and authentication server must support the same EAP method for the authentication process to proceed. B. A switch passes EAP messages between the supplicant and authentication switch without modification or translation. C. After a RADIUS server confirms a user is authenticated, the switch sends an EAP-Success message and sets the port state to authorized. D. Different RADIUS servers must be configured on the switch if authentication of both switch management users and 802.1X supplicants will be performed. E. If a supplicant receives an EAP-Request message specifying a particular EAP method to be supported, the authentication session is closed if the supplicant does not support that EAP method. Answer: A, C Question 8. Which statement describing Web authentication support on the ProCurve Switch 5400zl series is correct? A. User credentials or a digital certificate can authenticate the client. B. It is mutually exclusive of other authentication methods on the same port. C. After successful user authentication, a port is assigned to a VLAN based on an order of priority. D. If a port is configured to support multiple users, different static untagged VLANs can be assigned concurrently. Answer: C Question 9. What is an operational difference between the TLS and MD5 EAP methods? A. TLS uses a challenge/handshake mechanism for authentication; MD5 uses certificates for authentication. B. TLS uses a challenge/handshake mechanism for authentication and encryption; MD5 uses certificates for authentication and encryption. C. TLS uses digital certificates for mutual authentication; MD5 uses a challenge/handshake mechanism to authenticate the client to the server. D. TLS uses a name and password along with digital certificates to produce a session key; MD5 uses a name and password to produce a session key. Answer: C Question 10. Which statements describing MAC authentication on ProCurve switches are correct? (Select two.) A. It can be configured on the same port with Web authentication and 802.1X authentication. B. The device's MAC address is sent to the RADIUS server as the user name and password. C. The switch's built-in DHCP server initially assigns an IP address in the 192.168.0.0 private subnet. D. The switch automatically initiates user authentication of a device when the device communicates on a MAC authenticator port. E. Configuration involves defining ports as MAC authenticators, the RADIUS authentication protocol to use, and then activating the ports for MAC authentication operation. Answer: B, D
|
Question 1. Which multicast address does RIPv2 use for route updates by default? A. 224.0.0.2 B. 224.0.0.5 C. 224.0.0.9 D. 255.255.255.255 Answer: C Question 2. What are three methods for managing a Juniper Enterprise Router? (Choose three.) A. CLI B. SDX C. SAP D. J-Web E. J-Config Answer: A, B, D Question 3. Which IGP should you use to achieve scalability in a large enterprise network using Juniper enterprise routers? A. RIP B. BGP C. OSPF D. EIGRP Answer: C Question 4. Which configuration statement allows local non-root users access to the router only when the RADIUS server is unreachable? A. [edit] system { authentication-order radius; } B. [edit] system { authentication-order [ radius password ]; } C. [edit] system { authentication-order [ radius if-authenticated ]; } D. [edit] system { authentication-order [ radius local ]; } Answer: A Question 5. Which two statements about the Adaptive Services PIC are true? (Choose two.) A. The Adaptive Services PIC supports the Layer 3 service package by default. B. The Adaptive Services PIC is required when using the secure shell to access an M-series router. C. The Adaptive Services PIC can be configured for the Layer 2 and Layer 3 service packages simultaneously. D. The Adaptive Services PIC can be configured for either the Layer 2 or the Layer 3 service package but not both at the same time. Answer: A, D Question 6. What are two benefits of MLPPP? (Choose two.) A. Cost-efficient solution when incrementing bandwidth. B. Provides for fail over when the primary link goes down. C. Evenly distributes traffic over participating member links. D. Guarantees that the link will remain up during failure scenarios. Answer: A, C Question 7. Which major J-Web menu should you use to upgrade the JUNOS software on the router? A. Monitor B. Manage C. Diagnose D. Configuration Answer: B Question 8. How are multiple policies evaluated within the JUNOS software? A. alphabetically B. as an ordered list C. in a round robin manner D. numerically from lowest to highest Answer: B Question 9. Which statement is true about accessing a Juniper enterprise router using a Web browser? A. J-series routers are accessible by default. B. M7i and M10i routers are accessible by default. C. You need to install a license before accessing a J-series router. D. You need to enable the HTTP service on M7i, M10i, and J-series routers before accessing them. Answer: A Question 10. What are two ways to create a rescue configuration on a J-series router? (Choose two.) A. Use the J-Web System > Rescue menu. B. Use the J-Web Configuration > Rescue menu. C. Issue the configure rescue save command. D. Issue the request system configuration rescue save command. Answer: B, D
|
Please post the latest dumps thanks
|
Passed Today. No new questions thanks for itcertkeys.com
|
Latest dump needed plz update thanks
|
I am new here please Help thanks
|
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.