|
|
Question 1. Which statements are true about a cascaded FICON topology? Select three. A. It requires Fabric binding to be configured in all the switches. B. Only one hope (ie:traversing 2 switchs) is supported. C. Separate ISLs must be used dedicated to FICON traffic. D. Two byte link addressing as defined in FC-SB2, is mandatory. Answer: A, B, D Question 2. MDS3 _ 9509# install all system bootflash:m9500-sf1 ek9-mz.1.3.4.bin kickstart bootflash:m9500-sfek9-kickstart-mz.1.3.4.bin Verifying image bootflash:/m9500-sf1ek9kickstart-mz.1.3.4.bin [####################] 100% -- SUCCESS Verifying image bootflash:/m9500-sf1ek9kickstart-mz.1.3.4.bin [####################] 100% -- SUCCESS Extracting "sic"version from image bootflash:/m9500-sf1ek9kickstart-mz.1.3.4.bin [####################] 100% -- SUCCESS Extracting "ips" version from image bootflash:/m9500-sf1ek9kickstart-mz.1.3.4.bin [####################] 100% -- SUCCESS Extracting "system" version from image bootflash:/m9500-sf1ek9kickstart-mz.1.3.4.bin [####################] 100% -- SUCCESS Extracting "kickstart"version from image bootflash:/m9500-sf1ek9kickstart-mz.1.3.4.bin [####################] 100% -- SUCCESS Extracting "loader" version from image bootflash:/m9500-sf1ek9kickstart-mz.1.3.4.bin [####################] 100% -- SUCCESS Compatibility check is done: Module bootable impact install-type reason --------- --------- ---------- ------- ----- --------- 2 yes non-disruptive rolling 3 yes disruptive rolling Hitless upgrade is not supported 5 yes non-disruptive reset 6 yes non-disruptive reset Images will be upgraded according to following table: Module Image Running-Version Net-Version Upg-Required --------- ------- ---------- ----------- ------ ---------- 2 slc 1.3(4b) 1.3(4) yes 2 bios v1.1.0(10/24.03) v10.8(08/07/03) no 3 slc 1.3(4b) 1.3(4) yes 3 bios v1.1.0(10/24.03) v10.8(08/07/03) no 5 system 1.3(4b) 1.3(4) yes 5 kickstart 1.3(4b) 1.3(4) yes 5 bios v1.1.0(10/24.03) v10.8(08/07/03) no 5 loader 1.2(2) 1.2(2) no 6 system 1.3(4b) 1.3(4) yes 6 kickstart 1.3(4b) 1.3(4) yes 6 bios v1.1.0(10/24.03) v10.8(08/07/03) no 6 loader 1.2(2) 1.2(2) no Do you want to continue with the installation (y/n)? [n] What is the reason the upgrade would not be hit-less for the entire switch, above? A. The supervisor module requires a BIOS upgrade, which is disruptive. B. The "rolling-upgrade" for module 2 requires a second "slc" to be hit-less. C. Module 3 is an IPS-8 card, which does not support non-disruptive downgrades. D. Nodule 3 is an IPS-8 and the switch does not have a second IPS-8 card for route diversity which could provide a "stable" upgrade. E. No reason - the upgrade is non-disruptive and hit-less. Answer: C Question 3. Which methods can be used to control Iscsi INITIATOR ACCESS TO VIRTUAL TARGETS? Select three. A. Zoning B. Specifying on which Gigabitethernet port the virtual target is advertised. C. Setting up Iscsi PROXY MODE FOR THE INITIATORS D. Specifying which IP subnet virtual target can be accessed E. Enabling role-based access control. Answer: A, B, C Question 4. In a scenario with three lSLs between two switches, a single host in VSAN 5 on switch A, and a single storage device on switch B in the same VSAN. What would be the effect on the lSLs if Flow based load balancing option was enabled in VSAN 5? A. Each subsequent frame will use the least utilized link, based on FCC. B. Each subsequent frame will use a different link. C. All frames between source and destination would follow same link for given flow. D. Flow based load balancing is not enabled for an individual VSAN. Answer: C Flow based load balancing : all frames between source and destination would follow same link for given flow. Question 5. Which organization produce standards related to SCSI, Fiber Channel or Fiber Channel protocol? Select two. A. SNIA B. T11 Committee C. Cisco Systems D. T10 Committee E. T12 Committee Answer: B, D => T11 for fiber channel, T10 for SCSI Question 6. What is the User-specified VSAN Ids range? A. 1-4093 B. 2-4093 C. 2-4094 D. 2-4092 Answer: B => user-specific VSAN 2-4093 Question 7. What can be configured on a FCIP Profile? A. Max and Min bandwidth, peer-info, compression ratio B. Passive mode, peer-info, compression ratio C. TCP port number, sack-enable, Max and Min bandwidth D. Sack-enable, TCP port number peer-info E. TCP port number, write accelerator compression ratio Answer: C => FCIP profile for TCP port, sack-enable, Max and Min bandwidth Question 8. A Brocade 12000 in its native corePID mode (1) is connected to VSAN 1009 on an MDS. What is the correct output of the "show vsan 1009" command? A. vsan 1009 information: name: VSAN 1009 state:active interoperability mode:default loadbalancing:src-id/dst-id/oxid operational state:up. B. vsan 1009 information: name: VSAN 1009 state:active interoperability mode:1 loadbalancing:src-id/dst-id/oxid operational state:up. C. vsan 1009 information: name: VSAN 1009 state:active interoperability mode:2 loadbalancing:src-id/dst-id/oxid operational state:up. D. vsan 1009 information: name: VSAN 1009 state:active interoperability mode:3 loadbalancing:src-id/dst-id/oxid operational state:up. E. vsan 1009 information: name: VSAN 1009 state:active interoperability mode:Brocade Native loadbalancing:src-id/dst-id/oxid operational state:up. Answer: D => interop mode 3 for Brocade 12000 Question 9. What TCP feature reduces the chances of an oversized IP packets from being fragmented? A. SACK B. Extended ping C. PMTU D. Retransmit timeout E. Send buffer size Answer: C Question 10. In Raid 0+1 the loss of a single drive: A. Does not affect the redundancy of the array B. Reduces the array redundancy to that of a Raid level 0 C. Same level of redundancy to that of a Raid level 1+0 D. Reduces the performance of the array E. Has no affect what so ever on the array Answer: B
|
Nice collection with answers visit itcertkeys.com thanks
|
Urgent Requred dumps thanks
|
plz update thanks
|
plz keep it update yourself with the help of Itcertkeys.com thanks
|
Question 1. You are working as an application developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com uses Visual Studio 2005 as an application platform. ITCertKeys.com consists of a Development department. You as the developer of ITCertKeys.com use a client computer named ITCertKeys -WS035 as developing collateral. You are busy developing a Microsoft Windows Forms application. The applications that you are developing are using shared assemblies that must be installed into the Global Assembly Cache (GAC). What should you do to develop a deployment strategy? A. You should create a CAB project that contains the application. B. You should use the XCOPY to deploy the application. C. You should use the ClickOnce to deploy the application. D. You should create a Window Forms Setup application Answer: D Explanation: The Window Forms Setup application can accomplish this by creating and configuring a Setup project to deploy a Microsoft Windows Installer package. Incorrect Answers: A: The CAB Project is used to package components. B: The XCOPY cannot install assemblies into the GAC by using XCOPY. C: The ClickOnce cannot be used to install shared assemblies into the GAC. Question 2. You are working as an application developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com uses Visual Studio 2005 as an application platform. ITCertKeys.com consists of a Development department. You as the developer of ITCertKeys.com use a client computer named ITCertKeys -WS205 as developing collateral. You are busy developing a Microsoft Windows Forms application. You want the users to download or run a Microsoft Windows Installer package from ITCertKeys.com's Web site to install the application. Which of the following deployment project should you create? A. Setup Project B. CAB Project C. Merge Module Project D. Web Setup Project Answer: A Explanation: The Setup Project allows you to install Window-based applications. Incorrect Answers: B: The CAB Project is used to package components. C: The Merge Module Project allows you to install shared components. D: The Web Setup Project allows you to install Web applications. Question 3. You are working as an application developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com uses Visual Studio 2005 as an application platform. ITCertKeys.com consists of a Development department. You as the developer of ITCertKeys.com use a client computer named ITCertKeys -WS009 as developing collateral. You are busy developing a Microsoft Windows Forms application. You then change the default configuration to package files as loose uncompressed files. You also need to make sure that the .NET Framework 2.0 redistributable component exits after you build the Setup project. Which of the following components should look for in the Setup project's output directory? A. RegSvcs.exe B. Dotnetfx.exe C. InstallUtil.exe D. RegAsm.exe Answer: B Explanation: The Dotnetfx.exe needs to exits in the output directory, which uses the .NET Framework 2.0 redistributable package. Incorrect Answers: A: The RegSvcs.exe is the .NET Services Installation tool. It allows you to register an assembly for use with COM+. C: The InstallUtil.exe allows you to execute custom installers that are associated with an assembly. . D: The RegAsm.exe allows you to register an assembly for use with COM+. Question 4. You are working as an application developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com uses Visual Studio 2005 as an application platform. ITCertKeys.com consists of a Development department. You as the developer of ITCertKeys.com use a client computer named ITCertKeys -WS209 as developing collateral. You are busy creating a class that derives from Installer. The class that you created is used by Microsoft Windows Forms application to install a custom component which uses an existing Microsoft Access database. Which exception type should you use if the database does not exist at installation time and you need to throw an exception and have the installation rolled back? A. You should install InstallException B. You should install ApplicationException C. You should install SqlException D. You should install FileNtFoundException Answer: A Explanation: The InstallException passes information to the Microsoft Windows Installer and causes the installation to be rolled back. Incorrect Answers: B: The ApplicationException will not cause the installation to roll back. C: The SqlException will not cause the installation to roll back. D: The FileNtFoundException will not cause the installation to roll back. Question 5. You are working as an application developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com uses Visual Studio 2005 as an application platform. You as the developer of ITCertKeys.com use a client computer named ITCertKeys -WS209 as developing collateral. You are busy creating a class that derives from Installer. The class that you created is used by Microsoft Windows Forms setup application to install a custom component which uses an existing Microsoft SQL Server 2005 database. The component throws a SqlException instance when it cannot connect to the database during installation. What should you do to automatically rollback the installation is the component throws a SqlException instance? A. You should catch the SqlException instance and create an instance of InstallException and pass the SqlException instance as the inner exception and then throw the InstallException instance. B. You should catch the SqlException instance and create an instance of ApplicationException and pass the SqlException instance as the inner exception and then throw the ApplicationException instance. C. You should catch the SqlException instance and re-throw it. D. You do not nee to catch the SqlException instance as it will propagate up the call stack. Answer: A Explanation: This action will pass information to the Microsoft Windows Installer and causes the installation to be rolled back. Incorrect Answers: B: The ApplicationException will not cause the installation to roll back. C: The SqlException will not cause the installation to roll back. D: The FileNtFoundException will not cause the installation to roll back. Question 6. You are working as an application developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com uses Visual Studio 2005 as an application platform. ITCertKeys.com consists of a Development department. You as the developer of ITCertKeys.com use a client computer named ITCertKeys -WS020 as developing collateral. You are busy to develop a Microsoft Windows Forms exam delivery application. This is going to be used to access the content of the exam via the Internet. A WebBrowser named testbrowser is added to the control to a form named ITCertKeys Form, which is define as follows: [PermissionSet[SecurityAction.Demand, Name="FullTrust"]] [System.Runtime.InteropServices.ComVisible[true]] public ITCertKeys Form : Form { public ITCertKeys Form[] { InitializeComponent[]; } public void Expire[] { } } The JavaScript-based timer that is used by the Web site for the exam has a function to inform the exam delivery application when the time has expired for the exam, which is the following: window.external.Expire[]; What should you do to make sure that the Expire method of ITCertKeys Form is called when the JavaScrip function is carry out? A. You should set the Document.DomDocument property of the browser instance to the current instance of the ITCertKeys Form class. B. You should set the ObjectForScripting property of the browser instance to the current instance of the ITCertKeys Form class. C. You should call the AttachEventHandler of the Document property of the browser instance. D. You should call the ExecCommand method of the Document property of the browser instance. Answer: B Explanation: You must set the Object For Scripting for the browser instance to the current instance of the ITCertKeys Form class. Incorrect Answers: A: The property of the Document.Dom Document represents the true DOM object of an HTML document. C: The AttachEventHandler allows you to attach a HTML Document Object Model event to an event handler. D: The ExecCommand method allows you to execute commands against DOM documents. Question 7. You are working as an application developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com uses Visual Studio 2005 as an application platform. ITCertKeys.com consists of a Development department. You as the developer of ITCertKeys.com use a client computer named ITCertKeys -WS003 as developing collateral. You have received instructions to make sure that the PictureBox will display dynamically loaded images. Which property will display a static image if any dynamic image fails to load? A. BackgroundImage B. Image C. ErrorImage D. InitailImage Answer: C Explanation: The Error Image property specifies the image that should be displayed. This will happened only if the image that you are trying to load dynamically fails. Incorrect Answers: A: The Background Image property specifies a background image which is used by the control. B: The Image property specifies the image you want the PictureBox control to display. D: The InitailImage specifies the image you want the PictureBox control to display while the other one is loading. Question 8. You are working as an application developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com uses Visual Studio 2005 as an application platform. ITCertKeys.com consists of a Development department. You as the developer of ITCertKeys.com use a client computer named ITCertKeys -WS020 as developing collateral. You are developing a Web service for new updates to query automatically, by use of a Microsoft Windows Forms application. You then add a Notify Icon component named ITCertKeys notify to the application's main form. Whenever a new update is available you want the following balloon tip to display as seen in the exhibit for 5 seconds. Which segment should you use to write a code to download the updates if the users click the balloon tip? A. ITCertKeys notify.BallonTipClick +=delegate { // Download the updates } ITCertKeys notify.ShowBallonTip[5000, "New Update Available"; "Click here to download" , ToolTipIcon.Info]; B. ITCertKeys notify.ShowBallonTip[5]; ITCertKeys notify.BalloonTipIcon = ToolTipIcon.Info; ITCertKeys .Balloon TipTitle = "New Update Available"; ITCertKeys .BalloonTipText = "Click here to download"; ITCertKeys .Click += delegate { // Download the updates } C. ITCertKeys notify.BalloonTipIcon = ToolTipIcon.Info; ITCertKeys .Balloon TipTitle = "New Update Available"; ITCertKeys .BalloonTipText = "Click here to download"; ITCertKeys .Click += delegate { // Download the updates } ITCertKeys notify.ShowBallonTip[5000]; D. ITCertKeys notify.ShowBallonTip[5, New Update Available", "Click here to download", ToolTipIcon.Info]; ITCertKeys .BalloonTipClick += delegate { // Download the updates } Answer: A Explanation: You should use an event handler, attach the BalloonTipClicked to the event and call the Show Balloon Tip method of the NotifyIcon class. When a user clicks a balloon tip, a BalloonTipClicked event is raised. Incorrect Answers: B, C, D: You should not attach the BalloonTipClicked even to an event handler after you have called the ShowBalloonTip method. Also note that the event is raised when the icon is clicked and not the balloon tip. Question 9. You are working as an application developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com uses Visual Studio 2005 as an application platform. ITCertKeys.com consists of a Development department. You as the developer of ITCertKeys.com use a client computer named ITCertKeys -WS020 as developing collateral. You are busy adding a MenuStrip control, which has an instance of a Tool Strip Menu item named testjobItem, to a form in a Microsoft Windows Forms application. This item's display text is Job. You have received instructions to add two menu items to the Job menu item. The first item's display text should be Create New Job, and the second one is Run Job. Which code segment should you use to programmatically add the two menu items? A. ToolStripMenuItem createNewJobItem = new ToolStripMenuItem["Create New Job"]; ToolStripMenuItem runJobItem = new ToolStripMenuItem["Run Job"]; jobItem.Container.Add[createNewJobItem]; jobItem.Container.Add[runJobItem]; B. ToolStripMenuItem createNewJobItem = new ToolStripMenuItem["Create New Job"]; ToolStripMenuItem runJobItem = new ToolStripMenuItem["Run Job"]; jobItem.Owner.Items.Add[createNewJobItem]; jobItem.Owner.Items.Add[runJobItem]; C. ToolStripMenuItem createNewJobItem = new ToolStripMenuItem["Create New Job"]; ToolStripMenuItem runJobItem = new ToolStripMenuItem["Run Job"]; ToolStripMenuItem[] items = new ToolStripMenuItem[]{create NewJobItem, runJobItem} jobItem.DropDownItems.AddRange[items]; D. ToolStripMenuItem createNewJobItem = new ToolStripMenuItem["Create New Job"]; ToolStripMenuItem runJobItem = new ToolStripMenuItem["Run Job"]; ToolStripMenuItem[] items = new ToolStripMenuItem[]{create NewJobItem, runJobItem} jobItem.Owner.Items.AddRange[items]; Answer: C Explanation: For the jobItem instance you should call the AddRange. The property of the DropDownItems represents a collection of child items of the jobItem instance, which allows you to add the two items to the job menu item. Incorrect Answers: A: This property returns an instance of IContainer, which represents a logical container for other components. B: The Owner property returns the Menu script instance that owns the ToolStripMenuItem instance. D: This action will add the two new menu at the same level as the Job menu item. Question 10. You are working as an application developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com uses Visual Studio 2005 as an application platform. ITCertKeys.com consists of a Development department. You as the developer of ITCertKeys.com use a client computer named ITCertKeys -WS050 as developing collateral. You were busy with a task to add a Context Menu Strip control to a form. What should you do to display a custom control as a menu item of the ContextMenuStrip control? A. Add a ToolstripContainer control to the form and add the custom control to the Controls collection residing on the toolStripContainer control. You should then add the ContextMeniStrip control to the controls of the ToolStripContainer control. B. Of ToolStripControlHost, create an instance and specify your custom control instance as a parameter to the conductor. You should then the ToolStripControlHost instance to the Items collection of the ContextMeniStrip control. C. Add a ToolstripContainer control to the form and add the custom control to the Controls collection residing on the toolStripContainer control. You should then add the ToolstripContainer control to the controls of the ContextMeniStrip controls. D. Of ToolStripControlHost, create an instance and specify your custom control instance as a parameter to the conductor. You should then the ContextMeniStrip controls to the collection of the ToolStripControlHost instance. Answer: B Explanation: The ToolStripControlHost class to host a custom control as a menu item in the ContextMeniStrip. You should also the custom control instance as the parameter to the constructor. Incorrect Answers: A, C, D: The ToolstripContainer should not be used to reach your goal. Furthermore, you cannot host a ToolstripContainer control as the menu item in a ContextMeniStrip controls.
|
Question 1. All of the following help solve multiple interrogator environment issues EXCEPT: A. separate transmit and receive channels. B. single side band modulation. C. using multi-protocol interrogators. D. using absorptive material. Answer: C Question 2. Which of the following would be the BEST reason to use a hand-held rather than stationary interrogator? A. User abilities B. Aesthetic appeal C. System support D. Functional capabilities Answer: D Question 3. Recent protocols have been written to support the reading of 1,700 tags per second with passive ultra high frequency (UHF) systems. To read this many tags in such a brief period of time, the interrogator should use: A. tag isolation. B. anti-collision. C. passive backscatter. D. a tag magnifier. Answer: B Question 4. Anti-collision protocols in passive RFID systems allow: A. antennas to operate without interfering with one another. B. polite interactions between many interrogators in a single read zone. C. random tags to collide into each other. D. multiple tags to be read in a single pass through an interrogation zone. Answer: D Question 5. Which of the following would be the reason for enabling Simple Network Management Protocol (SNMP) traps on installed interrogators? A. Provide health status monitoring of the interrogator in question. B. Encrypt data as it is released by the interrogator. C. Catch intruders attempting to hack your interrogators. D. Perform behavioral analysis of your operations workforce. Answer: A Question 6. Desktop industrial RFID-enabled bar code printers handle an inoperative tag by. A. sending an error to the host. B. printing 'void' or some other marking on the label. C. ejecting the label. D. ignoring it and continuing. Answer: B Question 7. When troubleshooting an interrogation zone, an operator observes that the interrogator is not responding to external input or reading tags. The lights are on indicating it has power and network connectivity. Which of the following would be the next step for the operator to take? A. Replace the antenna cable. B. Replace the interrogator. C. Reboot the interrogator. D. Reboot the antenna. Answer: C Question 8. Loss of connection between an interrogator and the edgeware/middleware would result in which of the following? A. Only active RFID tag data would be processed. B. No tag data would be processed. C. Tag data would be sent directly to the Warehouse Management System (WMS), D. Only interrogator status would be tracked. Answer: B Question 9. Which of the following conditions would be MOST likely to cause a ghost tag read? A. The interrogator did not pass electronic product code (EPC) compliance testing. B. There is a broken strap between the chip and the antenna on the tag. C. There are too many tags within an interrogator zone. D. There is RF interference in an interrogator zone. Answer: D Question 10. Which of the following materials have absorptive properties in relation to ultra high frequency (UHF)? (Select TWO). A. Damp cardboard B. Glass C. Conductive liquids D. Metal Answer: A, C
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.