|
Please can any one upload the latest dump of 000-285 . thnx.
|
Question 1. Your new customer will be monitoring 4 DMX800s, 1 DMX1000, 2 DMX2000P direct attached arrays with ControlCenter. What are the minimum total gatekeepers recommended if configurations are changed by EMC during outage windows only? A. 14 B. 20 C. 24 D. 28 Answer: A Question 2. Your customer is using ControlCenter to manage multiple data centers in multiple time zones. What might happen if data collection policies are scheduled incorrectly? A. SAN performance degrades B. Information is missing from StorageScope reports C. Agents cannot be installed D. Storage performance degrades Answer: B Question 3. Exhibit: A customer has the environment shown in the graphic. The customer has a very tight security policy for its networks and has installed separate firewall zones for all of its sites. The customer has reported that network latency is within the supported limits for ControlCenter. A large, distributed two-Store ControlCenter infrastructure has been purchased and installed at Site 1. What must you check before you begin deploying agents to the remote sites? A. Firewalls are NAT based and all the required ports have been opened B. Firewall rules have been created to allow the agents to send information to ControlCenter only C. Firewalls are all Static Rule-based and the required ports have been opened D. Firewalls are all PAT-based and all the required ports have been opened Answer: C Question 4. After the merger of BigBank and LittleBank, several storage administrators continued to use their own ControlCenter accounts. Several months later, it was determined that none of the current administrators knew the "eccadmin" password. What can be done? A. Reinstall just the server component B. Force a zone transfer C. Delete the "eccadmin" account from the domain D. Change the local user's password Answer: D Question 5. A customer wants all switch hardware faults to be forwarded to a SNMP management framework that has been set up for SNMP version 3 only. What must be configured? A. Switch to forward SNMP informs to a third-party framework application B. Switch to forward SNMPv1 traps to a third-party framework application C. Switch to forward SNMP informs to ControlCenter D. ControlCenter to forward SNMP traps to a third-party framework application Answer: A Question 6. Exhibit: Host A has access to RAID-1 protected STD device. An unprotected R1/BCV is used to replicate this STD device. The R2 is RAID-1 protected. In StorageScope terminology, what is the allocated raw capacity for Host A? A. 12GB B. 4GB C. 8GB D. 20GB Answer: D Question 7. To upgrade VisualSAN when space is limited, select three [3] files that should be considered to determine the size of VisualSAN database? A. VSAN.MDF B. NM.MDF C. PM.MDF D. PDMA.MDF E. CM.MDF Answer: B, C, E Question 8. After a lightning strike, a Connectrix M series switch was replaced with an identical spare. The new switch was configured using Telnet. Now, Storage Provisioning Services (SPS) reports errors during attempts to allocate certain volumes. Why? A. SNMP community is wrong B. Switch password was changed C. An active zoneset is obsolete D. Telnet is no longer supported Answer: C Question 9. You are installing ControlCenter 5.2 on a single infrastructure Server with Windows 2003 and 4GB of memory. Which concern must be addressed? A. memquery.exe file must be replaced prior to beginning the installation B. memquery.exe file must be replaced prior to installing the Repository C. There are no issues if the Server is running Windows 2003 D. memquery.exe file must be replaced prior to installing the Server Answer: B Question 10. Your customer is complaining that the ControlCenter FCC Agent is not working properly. During your troubleshooting, you have confirmed there are no firewalls. Select (2) conflicts which could be interfering with the FCC Agent. A. SDM Agent B. Dell OpenManage service C. VNC D. NAS Agent E. Windows Terminal Services Answer: B, D
|
Question 1. You work as the enterprise exchange administrator at ABC.com. ABC.com is utilizing a firewall to keep the perimeter network and the corporate network apart. ABC.com contains an Edge Transport server named ABC-EX01 in the perimeter network that is running Exchange Server 2010. You are preparing to implement an Exchange Server 2010 environment that provides for EdgeSync synchronization and encryption of outgoing e-mail. What must you do to implement Exchange Server 2010 without compromising network security? A. You should use port 80 and 443 from the corporate network to the perimeter network. B. You should use port 50636 and 25 from the corporate network to the perimeter network. C. You should use port 1024 to 65535 from the corporate network to the perimeter network. D. You should use port 443 and 1024 from the corporate network to the perimeter network. Answer: B Explanation: Question 2. You are employed as the enterprise exchange administrator at ABC.com. The ABC.com network has a domain named ABC.com. You are preparing to set up an Exchange Server 2010 environment to fulfill the following criteria: • The database availability group (DAG) should be available for the Mailbox servers. • E-mail should be available in the event of a server going offline. • Load balancing should be used on the MAPI connections utilizing a hardware load balancer. What steps must you take to comply with the criteria while using the minimum amount of servers? A. You should use the Exchange Server 2010 Exchange Management Console (EMC) and install the Client Access server, Mailbox server on one server and install the Hub Transport server role on the second server. B. You should use the Exchange Control Panel (ECP) and install the Client Access server, Mailbox server and the Hub Transport server role on a server. C. You should install the Client Access server, Mailbox server and the Hub Transport server role on two separate servers that are Outlook Anywhere enabled. D. You should use the Exchange Control Panel (ECP) and install the Client Access server, Mailbox server and the Hub Transport server role on two servers. Answer: C Explanation: Question 3. You work as the exchange administrator at ABC.com. The ABC.com network runs in an Exchange Server 2010 environment with a few Hub transport servers. You are preparing to implement a messaging strategy that will stop servers from sending spam, using the least amount administration? A. You should implement a managed folder mailbox policy. B. You should change the properties of the Mailbox server object. C. You should change the default Exchange ActiveSync mailbox policy. D. You should implement IP Block list providers. E. You should make use of a restrictions-based e-mail policy. Answer: D Explanation: Question 4. You work as the exchange administrator at ABC.com. ABC.com network runs in an Exchange Server 2010 environment. ABC.com contains a few servers that host the Edge transport server and the Hub transport server role separately. The ABC.com users use the Edge transport servers to send e-mail to their customers. ABC.com contains a new policy that is as follows: • The users should use encrypted e-mail to their customers. • Encryption should be used between the Hub Transport and Edge Transport servers. What actions must you take to adhere to the New ABC.com security policy? A. You need to use Security/Multipurpose Internet Mail Extensions (S/MIME). B. You need to use SMTP over TLS. C. You need to use IMAP4 over SSL. D. You need to use Lightweight LDAP over SSL. Answer: A Explanation: Question 5. You work as the exchange administrator at ABC.com. ABC.com network runs in an Exchange Server 2010 environment. ABC.com contains two data centers, each residing in a perimeter network. You are preparing to install Exchange Server 2010 Edge Transport servers in every perimeter network that has the following criteria: • It should allocate incoming e-mail to all Edge Transport servers. • In the case of an Edge Transport server or a single data center network malfunction or unavailability, e-mails should still reached the employees incoming e-mail. What actions must you take to satisfy these criteria while keeping costs as low as possible? (Choose two) A. You should install a Hub Transport server in every perimeter network B. You should set up failover clustering. C. You should install an Edge Transport server in every perimeter network. D. You should install an Exchange Server 2010 Client Access server. E. You should create a transport rule. F. You should set up a mail exchange (MX) record for all the servers. G. You should install a Hub Transport server. H. You should set up a server cluster group. Answer: C, F Explanation: Question 6. ABC.com has employed you as their Exchange Administrator. The ABC.com network runs in an Exchange Server 2010 environment. ABC.com contains a few servers that host the Hub transport server role. One of the Hub Transport servers named ABC-EX01 is utilized by an in-house application. The retry of e-mail is done by the in-house application that is configured to send e-mail to a SMTP server. The CIO wants you to makes sure that ABC-EX01’s tabs are utilized by the in-house application to try the e-mail again. What actions must you take? A. You should on the Hub Transport servers, enable Datacenter Activation Coordination (DAC) mode. B. You should on the Hub Transport servers, use network load balancing. C. You should on the Hub Transport servers, deploy a hardware load balancer. D. You should on the Hub Transport servers, add Active Directory Federation Services (AD FS). Answer: B Explanation: Question 7. You work as the enterprise exchange administrator at ABC.com. ABC.com has its headquarters in Chicago and a branch office in Dallas, which is configured as a site that is connected to each other via a high speed WAN connection. You are planning to install Exchange Server 2010 in the environment. However, you need to install exchange server that will be available even in an event of a server going offline and What do you need to comply with the criteria using the least servers? A. You need to install six exchange servers. B. You need to install eight exchange servers. C. You need to install four exchange servers in each office. D. You need to install two exchange servers in each office. Answer: D Explanation: Question 8. ABC.com has employed you as their Exchange Administrator. The ABC.com network runs in an Exchange Server 2010 environment. ABC.com contains a server named ABC-EX01 that has the Hub transport server role installed and hosts anti-spam agents. The management of ABC.com resides in a group named KingSecurity. The ABC.com CIO wants KingSecurity to handle anti-spam configurations in the environment. What actions must you take while still applying the principle of least privilege? A. You need to grant KingSecurity the Custom Management role. B. You need to grant KingSecurity the Records Management role. C. You need to grant KingSecurity the Recipient Management role. D. You need to grant KingSecurity the View-Only Organization Management role. Answer: B Explanation: Question 9. You work as the enterprise exchange administrator at ABC.com. The ABC.com network consists of a domain named ABC.com. ABC.com is configured to run in an Exchange Server 2003 environment. ABC.com contains an Exchange Server 2003 server that receives e-mail from outside the ABC.com domain. However, ABC.com wants to use an Exchange Server 2010 Hub Transport server for the receiving of e-mail from outside the domain. What actions must you take? A. You should change the Active Directory Connector (ADC). B. You should change the Public Folder Management Console. C. You should change the accepted domains. D. You should change the Exchange Management Console (EMC). Answer: C Explanation: Question 10. You are employed as the exchange administrator at ABC.com. The ABC.com network runs in an Exchange Server 2010 environment. At present there is a Mailbox server named ABC-EX01 that contains two mailbox databases as well as a public folder database. You need to implement a failover solution for ABC-EX01 with the following criteria: • The public folders should be available even if a Mailbox server crashed. • The Mailboxes should be available even if a Mailbox server crashed. • The least amount of servers should be used in the solution. What actions must you take? (Choose all that apply) A. You should build and set up a database availability group (DAG) and add ABC-EX01 and ABCEX02 to it. B. You should configure clustered continuous replication (CCR) on ABC-EX01 and ABC-EX02. C. You should modify the replication settings for the public folders and the Mailboxes. D. You should build database copies and copy the public folders to ABC-EX02. E. You should configure standby continuous replication (SCR) on ABC-EX01 and ABC-EX02. F. You should run the Enable-StorageGroupCopy cmdlet from ABC-EX02 Answer: A, D Explanation:
|
Question 1. You work as the enterprise exchange administrator at ABC.com. The ABC.com network consists of a forest with a domain named ABC.com. The forest and domain functional levels are set at Windows Server 2003. The environment of ABC.com currently makes use of Microsoft Exchange Server 2003 Service Pack 2 (SP2) as their messaging solution. You receive instruction from ABC.com to migrate the messaging system to Exchange Server 2010. What action must you take to implement for the Microsoft Exchange Server 2010? A. You should run the adprep.exe /forestprep command. B. You should run the adprep.exe /domainprep command. C. You should run the setup.com /AnswerFile:Exchange-All.xml command. D. You should run the setup.com /PrepareAD command. Answer: D Explanation: Question 2. You work as the enterprise exchange administrator at ABC.com. The ABC.com network consists of a domain named ABC.com. ABC.com currently makes use of Exchange 2000 Server and Exchange Server 2003 Service Pack 2 (SP2) in their messaging system. You receive instruction from ABC.com to migrate the messaging system to Exchange Server 2010 with Client Access server, Mailbox server and Hub Transport servers. What actions must you take? A. You should take away the Exchange 2000 Server servers in the environment. B. You should configure EdgeSync synchronization in the environment. C. You should run the setup /NewProvisionedServer in the environment. D. You should run the Migration Preparation Tool from the other servers in the environment. Answer: A Explanation: Question 3. You work as the enterprise exchange administrator at ABC.com. The ABC.com network consists of a domain named ABC.com. The ABC.com network has a mail server named ABC-EX01 that has Windows Server 2008 installed. You receive instruction from ABC.com to deploy Exchange Server 2010 on ABC-EX01 to support the following roles: Hub Transport role Client Access role Mailbox role Unified Messaging (UM) server role What action must you take? A. You should run setup /NewProvisionedServer on ABC-EX01. B. You should run ServerManagerCmd.exe -IP Exchange-All.xml on ABC-EX01. C. You should run adprep.exe /domainprep on ABC-EX01. D. You should run Setup.com /PrepareAD on ABC-EX01. Answer: B Explanation: Question 4. You work as the enterprise exchange administrator at ABC.com. The ABC.com network consists of a domain named ABC.com. The ABC.com network has a mail server named ABC-EX02 that has Microsoft Server 2008 with Service Pack 2 installed. You receive instruction from ABC.com to deploy Exchange Server 2010 on ABC-EX02 to support the Hub Transport, Client Access, Mailbox server roles. What action must you take? (Choose all that apply.) A. You should deploy Microsoft .NET Framework 3.5 Service Pack 1. B. You should deploy the Active Directory Connector (ADC). C. You should deploy Windows Management Framework. D. You should delete all Recipient Update Service (RUS) objects. E. You should use the ServerManagerCmd.exe –IP Exchange-Typical.xml. F. You should use the ServerManagerCmd.exe -IP Exchange-CADB.xml. Answer: A, C, E Explanation: Question 5. You work as the enterprise exchange administrator at ABC.com. The ABC.com network consists of a domain named ABC.com. The ABC.com network has a client computer named ABC-WS662 that has Microsoft Windows 7 installed. How can you proceed with the deployment of management tools for Exchange 2010 on ABCEX02? A. You should run the Test-ServiceHealth cmdlet. B. You should deploy Microsoft .NET Framework 3.5.1. C. You should run the ACLDIAG and the scanforfeature command. D. You should deploy Internet Information Services (IIS) 6.0 Management console. E. You should run the wuauclt.exe /detectnow command. Answer: B, D Explanation: Question 6. You work as the enterprise exchange administrator at ABC.com. The ABC.com network consists of a domain named ABC.com. The ABC.com network has a mail server named ABC-EX01. What actions must you take to do an unattended installation of Exchange Server 2010 server on ABC-EX01? A. You should add recipient filter. B. You should add create Send connectors. C. You should run setup /ps. D. You should add setup.com in the script. Answer: D Explanation: Question 7. You work as the enterprise exchange administrator at ABC.com. The ABC.com network consists of a domain named ABC.com. ABC.com is using Microsoft Exchange Server 2010 as their messaging solution. The ABC.com network contains a server named ABC-EX10. You receive instruction from ABC.com to add the Hub Transport Server role on ABC-EX10. What command can be used for installing the Hub Transport Server role? A. You should run the setup /ps. B. You should run the Setup.com /M:Install /R:HT. C. You should run the setup.exe. D. You should run the scanforfeature. Answer: B Explanation: Question 8. You work as the enterprise exchange administrator at ABC.com. The ABC.com network consists of a domain named ABC.com. The ABC.com network has three mail servers named ABC-SR11, ABC-SR12 and ABC-SR13 that has the following implementation: •ABC-SR11 has the Front-end role installed and is running Exchange Server 2003 SP2. •ABC-SR12 has the Back-end role installed and is running Exchange Server 2003 SP2. •ABC-SR13 has the Client Access role and the Mailbox role installed and is running Exchange Server 2010. How can you perform the migration of the mailboxes from ABC-SR12 to ABC-SR13 and to assure the availability of the mailboxes? A. You should implement recipient filtering. B. You should configure EdgeSync synchronization. C. You should implement Transport Protection Rules. D. You should deploy the Exchange Server 2010 Hub Transport server role. Answer: D Explanation: Question 9. You work as the enterprise exchange administrator at ABC.com. The ABC.com network consists of a domain named ABC.com. ABC.com has three Exchange Server 2007 mail servers named ABC-EX01, ABC-EX02 and ABCEX03 that has the following implementation: •ABC-EX01 has the Client Access role installed. •ABC-EX02 has the Hub transports server role installed. •ABC-EX03 has the Mailbox role installed. •ABC-EX04 Exchange Server 2010 Client Access server running updated DNS records. What action must you take to make sure of the availability of the mailboxes on ABC-EX03 if the employees utilize the Exchange ActiveSync after the instrallation of ABC-EX04? A. You should use Basic authentication on Exchange ActiveSync and set up only Basic authentication on the RPC virtual directory. B. You should use NTLM authentication on the RPC virtual directory. C. You should use Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP v2) on ABC-EX01. D. You should use the anonymous setting in the authentication type for the Microsoft-Server- ActiveSync virtual directory on ABC-EX01. Answer: D Explanation: Question 10. You work as the enterprise exchange administrator at ABC.com. The ABC.com network consists of a domain named ABC.com. ABC.com is using Microsoft Exchange Server 2010. The ABC.com network contains a server named ABC-EX10 configured with the following roles. Client Access Role Hub Transport Role Mailbox Server Roles What action must you take to guarantee e-mail availability to ABC.com users who are utilizing regular mail clients like Microsoft Outlook Express or Windows Live Mail? A. You should use Security/Multipurpose Internet Mail Extensions (S/MIME). B. You should use the Windows Management Instrumentation Command-line (WMIC). C. You should use the Automatic setting of the Microsoft Exchange POP3 service. D. You should use the setup /NewProvisionedServer. Answer: C Explanation:
|
Question 1. You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network has a Windows Server 2008 application server named ABC-SR01. ABC.com has entered into partnership with Weyland Industries. Weyland Industries has recently developed an application for their network users, which will be run from ABC-SR01. During the course of the day you receive complaints from the Weyland Industries network users that the application as result of heap corruption. After a brief analysis, you instruct the Weyland Industries network users to enable the full page heap dump when creating a user dump file for troubleshooting. You would like to verify whether the Weyland Industries network users had indeed enabled the full page heap dump when they created the user dump. Which of the following actions should you take? A. You should consider making use of the WinDbg !Locks command. B. You should consider making use of the WinDbg !runaway command. C. You should consider making use of the WinDbg !gflag command. D. You should consider making use of the Debub: D (dump file) command. Answer: C Explanation: Question 2. You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network has a Windows Server 2008 application server named ABC-SR01. ABC.com has recently developed an application that uses a service for their network users which will be run from ABC-SR01. While performing daily system maintenance on ABC-SR01 you notice that the CPU is operating at maximum capacity. You have been tasked with determining which service results in the CPU utilization being heavy by performing a process dump of the service. Which of the following actions should you take? A. You should consider making use of the System Monitor utility after running the dump. B. You should consider making use of the Adplus.vbs utility after running the dump. C. You should consider making use of a Process Viewer utility after running the dump. D. You should consider making use of the Task Manager utility after running the dump. Answer: B Explanation: Question 3. You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server 2008. The ABC.com network contains an application server named ABC-SR01. ABC.com has recently developed an application that makes use of an I/O dispatch routine, which supports buffered I/O. The CIO from ABC.com has asked you to modify the application to make use of a 5-KB I/O request packet (IRP). The CIO from Weyland Industries has also asked you to obtain the kernel address of the 5-KB buffer. Which of the following statements are true with regard to the kernel address of the 5-KB buffer? A. The Irp->Overlay.Driver[1] field of the IRP would contain the kernel address of the 5-KB buffer. B. The Irp->UserBufferContext field of the IRP would contain the kernel address of the 5-KB buffer. C. The Irp->AssociatedIrp.SystemBuffer field of the IRP would contain the kernel address of the 5-KB buffer. D. The Irp->Overlay.Context field of the IRP would contain the kernel address of the 5-KB buffer. Answer: C Explanation: Question 4. You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server 2008. The ABC.com network contains an application server named ABC-SR01. ABC.com has recently developed a multithreaded application for their network users, which will be run from ABC-SR01. A current ABC.com written security policy states that all applications should be tested for heap leaks. You have been given the task of enforcing this policy. Which of the following actions should you take? A. You should consider making use of the Process\Handle Count counter of Performance Monitor. B. You should consider making use of the Process %Privilege Time counter of Performance Monitor. C. You should consider making use of the Process\Private Byte counter of Performance Monitor. D. You should consider making use of the Process %Elapsed Time counter of Performance Monitor. Answer: C Explanation: Question 5. You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server 2008. The ABC.com network contains an application server named ABC-SR01. ABC.com has recently developed a driver for newly developed hardware. A current ABC.com written security policy states that verification on the process interrupts and processor time is used by new drivers. You have been instructed to enforce this security policy. Which of the following actions should you take? A. You should consider making use of the Windows Event Viewer utility. B. You should consider making use of the Performance Monitor utility. C. You should consider making use of the System MonitorTaskmgr.exe utility. D. You should consider making use of a Process Viewer utility. Answer: B Explanation: Question 6. You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network contains an application server named ABC-SR01. ABC.com has recently developed an application for their network users, which will be run from ABC-SR01. A new ABC.com written security policy states that all network users should be required to use Active Directory user accounts with passwords when accessing applications hosted on ABC-SR01. The CIO has instructed you to make sure that the new security policy is enforced. Which of the following actions should you take? A. You should consider making use of the CredUIPromptForCredentials() routine to ensure the network users use Active Directory user accounts and credentials. B. You should consider making use of the CredUILogonProcess() routine to ensure the network users use Active Directory user accounts and credentials. C. You should consider making use of the CredWriteLocalCredentials() routine to ensure the network users use Active Directory user accounts and credentials. D. You should consider making use of the CredWriteDomainUserName() routine to ensure the network users use Active Directory user accounts and credentials. Answer: A Explanation: Question 7. You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the network run Microsoft Windows Server 2008 and all client computers run Microsoft Windows XP Professional or Microsoft Windows Vista. The ABC.com network contains an application server named ABC-SR01. ABC.com has developed an audio driver for an application that will be run from ABC-SR01. You receive instruction from ABC.com to make sure that the new audio driver is checked for memory used after it has been released. It must also be checked for Memory underruns and overruns. Which of the following actions should you take? A. You should consider making use of Windows File Protection to check the driver. B. You should consider using the Special pool option of the Driver Verifier tool. C. You should consider making using of the System File Checker (SFC) tool. D. You should consider making use of the File Signature Verification tool. Answer: B Explanation: Question 8. You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server 2008 and all workstations run either Windows XP Professional or Microsoft Windows Vista. The ABC.com network contains an application server named ABC-SR01. ABC.com has recently developed an application, which is programmed to write to a local transaction log. You have been instructed to make sure that the application is able to have write operations committed to the hard disk in sequential order, in the event of a server operating system failure. Which of the following actions should you take? A. You should consider having the application configured with its own memory space using the Memory mapped I/O method. B. You should consider making use of the Asynchronous I/O method for the application. C. You should consider making use of the Write-through I/O method for the application. D. You should consider making use of the Synchronous I/O method for the application. Answer: C Explanation: Question 9. You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server 2008 and all workstations run either Windows XP Professional or Microsoft Windows Vista. The ABC.com network contains an application server named ABC-SR01. ABC.com has recently developed an application, which will be run from ABC-SR01. During the course of the day, you receive complaints from network users stating that the application fails as a result of a missing Dynamic Link Library (DLL). The CIO has requested that you determine which DLL file is missing from the application. Which of the following actions should you take? A. You should consider making use of the Depends.exe utility. B. You should consider making use of the Windows Task Manager utility. C. You should consider making use of a Process Viewer utility. D. You should consider making use of auditing to audit the files that the application calls. Answer: A Explanation: Question 10. You work as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server 2008 and all workstations run either Windows XP Professional or Microsoft Windows Vista. The ABC.com network contains an application server named ABC-SR66. ABC.com has recently developed a device driver for newly acquired hardware. A new ABC.com written security policy states that all driver routines that utilize half the CPU should be identified. You have been instructed by the CIO to make sure that the new policy is adhered to. Which of the following actions should you take? A. You should consider making use of the Performance Monitor utility. B. You should consider making use of the Kernrate.exe utility. C. You should consider making use of the Task Manager utility. D. You should consider making use of a Process Viewer utility. Answer: B Explanation:
|
Question 1. You work as a Network Administrator at ABC.com. The network consists of a single Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2 and all client computers Windows 7 Professional. The company network consists of an internal LAN and a perimeter network. The two networks are separated by an internal corporate firewall. An external corporate firewall connects the perimeter network to the Internet. The network includes virtual machines (VMs) running on host servers contained in both the internal network and the perimeter network. You have recently installed a server named ABC-VMM1 on the internal network. ABC-VMM1 runs Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 and will be used to manage the virtual environment. You are now in the process of deploying VMM agents on the host servers. You have configured the port number for the VMM agents and configured the internal corporate firewall to allow communications on the appropriate port number. What else do you need to configure to ensure that the VMM agents can communicate with ABCVMM1? A. You need to configure the name of the VMM server (ABC-VMM1). B. You need to configure the Fully Qualified Domain Name (FQDN) of a domain controller. C. You need to configure the name of a SQL Server. D. You need to configure an encryption key. Answer: D Explanation: Question 2. You work as a Network Administrator at ABC.com. The network consists of a single Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2 and all client computers Windows 7 Professional. The company network consists of two subnets. The Development subnet is used by the Development department. The Production subnet is used by all other company departments. You install a Windows Server 2008 R2 Hyper-V server named ABC-VMHost1 in the Production subnet. ABC-VMHost1 contains two network interface cards named NIC1 and NIC2. You have configured NIC1 as a management interface. You want to configure ABC-VMHost1 to host virtual machines on both the Production subnet and the Development subnet. How should you configure ABC-VMHost1? A. You should use VLAN tags for the VMs and configure NIC2 to use Trunk Mode. B. You should assign NIC2 as an additional management interface. C. You should configure both adapters to support jumbo frames. D. You should configure NIC1 with an IP address in the Production subnet and configure NIC2 with an IP address in the Development subnet. Answer: A Explanation: Question 3. You work as a Network Administrator at ABC.com. The network consists of a single Active Directory Domain Services (AD DS) domain. All servers in the network run Windows Server 2008 R2. A server named ABC-VMM1 runs Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 and is used to manage the company’s virtual environment. The company includes a Development department. Users in the Development department use their computers to develop and test software applications for use by other company departments and customers. You install a Windows Server 2008 R2 Hyper-V server named ABC-VMTest1 in the Development department. ABC-VMTest1 will host virtual machines (VMs) for the Development department users to use to test their applications. You need to ensure that the VMs are completely isolated from production servers. How can you ensure that the test VMs can communicate with each other while being isolated from the host server and the rest of the network? A. By configuring the VMs to connect to a Dedicated virtual network. B. By configuring the VMs to connect to an Internal virtual network. C. By configuring the VMs to connect to a Local virtual network. D. By configuring the VMs to connect to a Private virtual network. Answer: D Explanation: Question 4. You work as a Network Administrator at ABC.com. The network consists of a single Active Directory Domain Services (AD DS) domain. You are configuring a virtual environment for the company. You have an iSCSI storage disk array that will be used to store virtual machines (VMs). You install a server named ABC-Host1 that runs a Server Core Installation of Windows Server 2008 R2. You need to configure ABC-Host1 to store to VMs on the iSCSI disk array. Which two of the following tools could you use? A. You could use Disk Management. B. You could use Diskpart.exe. C. You could use iSCSICLI.exe. D. You could use iSCSICPL.exe. Answer: C, D Explanation: Question 5. You work as a Network Administrator at ABC.com. The network consists of a single Active Directory Domain Services (AD DS) domain named ABC.com. The company network consists of an internal LAN and a perimeter network. To comply with company security policy, servers located in the perimeter network are not members of the ABC.com domain. A Microsoft Hyper-V Server 2008 R2 server named ABC-VMHost1 is located in the perimeter network. You relocate ABC-VMHost1 into the internal network. You now need to join ABC-VMHost1 to the ABC.com AD DS domain. How should you join ABC-VMHost1 to the ABC.com domain? A. You should use the System Properties control panel applet. B. You should use the Netsh command line utility. C. You should use the Hyper-V configuration utility (hvconfig). D. You should use the dcpromo utility. Answer: D Explanation: Question 6. You work as a Network Administrator at ABC.com. The network consists of a single Active Directory Domain Services (AD DS) domain named ABC.com. You have installed a Server Core Installation of Windows Server 2008 R2 on a server named ABC-SRV1. You use a Windows 7 Professional client computer named ABC-Admin1. You want to be able to manage the storage on ABC-SRV1 using the Disk Management tool on ABC-Admin1. You need to configure the firewall on ABC-SRV1 by creating a rule group using the Netsh advfirewall command. Which rule group should you create to enable you to remotely manage the storage on ABCSRV1? A. You should create a “Remote Administration” rule group. B. You should create a “Remote Desktop” rule group. C. You should create a “Remote Volume Management” rule group. D. You should create a “Remote Access” rule group. Answer: C Explanation: Question 7. You work as a Network Administrator at ABC.com. The network consists of a single Active Directory Domain Services (AD DS) domain named ABC.com. You are installing a new virtual environment based on Microsoft Hyper-V. You have installed a Server Core Installation of Windows Server 2008 R2 on a server named ABC-VMHost1. How would you add the Hyper-V role to ABC-VMHost1? A. By running the Add Roles Wizard in Server Manager. B. By running the start /w hvconfig command. C. By running the start /w ocsetup Microsoft-Hyper-V. D. By running the start-service Hyper-V command. Answer: C Explanation: Question 8. You work as a Network Administrator at ABC.com. The network consists of a single Active Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server 2008 R2 and all client computers Windows 7 Professional. You are installing a large virtual environment for the company. A server named ABC-VMM1 runs Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 and will be used to manage the entire virtual environment. You have installed a Server Core Installation of Windows Server 2008 R2 Datacenter edition on 50 new servers. What is the easiest way to install the Hyper-V role on the 50 new servers? A. By running the Add Hosts Wizard on ABC-VMM1 and selecting a new server to add to VMM. Repeat the process for each new server. B. By running the start /w ocsetup Microsoft-Hyper-V command on each new server. C. By running the Add Hosts Wizard on ABC-VMM1 and selecting all 50 servers to add to VMM. D. By running the ocsetup MultiPathIo command on ABC-VMM1. Answer: C Explanation: Question 9. You work as a Network Administrator at ABC.com. The network consists of a single Active Directory Domain Services (AD DS) domain. You are configuring a virtual environment for the company. You have an iSCSI storage disk array that will be used to store virtual machines (VMs). You install a server named ABC-Host1 that runs a Server Core Installation of Windows Server 2008 R2 then install PowerShell 2.0 and the Hyper-V role. You need to start the Microsoft iSCSI Initiator Service on ABC-Host1 to enable the server to connect to the iSCSI storage disk array. How should you start the Microsoft iSCSI Initiator Service on ABC-Host1? A. You should run the start /w ocsetup msiscsi command. B. You should launch PowerShell and run the start-service msiscsi cmdlet. C. You should launch PowerShell and run the set-service msiscsi CstartupType auto cmdlet. D. You should run the net start msiscsi command. Answer: B Explanation: Question 10. You work as a Network Administrator at ABC.com. The network consists of a single Active Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server 2008 R2 and all client computers Windows 7 Professional. The network includes virtual machines (VMs) running on VMware host servers and Hyper-V host servers. A server named ABC-VMM1 runs Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 and is used to manage the entire virtual environment. Which virtual disk file system is supported by VMM when performing virtual-to-virtual (V2V) conversions of VMware virtual machines? A. VHDVVI B. VMFS C. NFS D. vmfsRawOutput Answer: B Explanation:
|
Question 1. Which command is used to assign root privileges to an existing user? A. /nas/sbin/enableRootToUser B. /nas/sbin/addRootIdToUser C. /nas/sbin/switchToRoot D. /nas/sbin/enableRootID Answer: B Explanation: Question 2. Which Unisphere storage domain role will limit a user to the administration of file system checkpoints, LUN mirrors, and Replication Manager tasks? A. Data recovery B. Data protection C. Administrator D. NAS administrator Answer: A Explanation: Question 3. In a VNX system, which feature manages access to specific management clients? A. IP address filtering B. Auditing C. Public key infrastructure D. User privileges Answer: A Explanation: Question 4. Which LDAP username format is correct for CLI authentication on a VNX system? A.\ B. .FQDN C. @FQDN D. Answer: C Explanation: Question 5. What is the maximum number of LDAP service connections available when configuring LDAP for VNX Block storage systems? A. 1 B. 2 C. 4 D. 8 Answer: B Explanation: Question 6. What is the default port used for secure LDAP (LDAPS) communications on a VNX system? A. 389 B. 443 C. 563 D. 636 Answer: D Explanation: Question 7. In which file are the default audit events defined? A. /etc/auditd.conf B. /nas/audit/audit.rules C. /nas/etc/audit.rules D. /etc/audit/audit.rules Answer: D Explanation: Question 8. In which directory are VNX audit logs located? A. /celerra/audit B. /nas/var/log C. /nas/log D. /var/log Answer: A Explanation: Question 9. What is the length of RSA keys used to encrypt and decrypt network traffic in a VNX environment? A. 2048 bits B. 1024 bits C. 2048 bytes D. 1024 bytes Answer: A Explanation: Question 10. Which authority (ies) signs certificates generated for Data Movers? A. Data Movers B. External CA, Control Station C. Management server D. Data Movers, management server Answer: B Explanation:
|
Question 1. Which of the following WLAN service components all occur in the prepare phase? A. High-level Design, Proof of Concept, Technology Strategy Development B. System Requirements Validation,WLAN wired Network Integration Assessment, Operations Readiness Assessment C. Proposal Development, Customer Education, Service Assurance D. Security Assessment, Security Administration, Staging Plan Development Answer: A Question 2. Which service component within the prepare phase provides a technology-focused and/or business-focused demonstration of the wireless technology solution to highlight the features and benefits? Select exactly 1 answer(s) from the following. A. High-Level Design Development B. Customer Education C. Technology Strategy Development D. Proposal Delivery E. Proof of Concept Answer: B Question 3. The activity of identifying the customer's support model for WLAN is part of which service component in the plan phase? Select exactly 1 answer(s) from the following: A. Operations Readiness Assessment B. Site Readiness assessment C. Proposal Delivery D. Account Planning Answer: A Question 4. In the wireless design phase, which service component provides a comprehensive, implementation-ready design for the customer's wireless solution?" Select exactly 1 answer(s) from the following: A. Business Plan B. Staging Plan C. Detailed Design Development D. Systems Acceptance Test Plan Development Answer: C Question 5. Which two service components are performed during the wireless implement phase? (Choose two.) Select exactly 21 answer(s) from the following: A. Wireless Readiness Assessment B. Project Planning C. Site Readiness Specification D. Systems Acceptance Testing E. Configuration Management Answer: B, D Question 6. Which service component within the prepare phase recommends the appropriate wireless technology to address a business requirement of the customer? Select exactly 1 answer(s) from the following: A. Account Qualification and Planning B. Business Case Development C. Technology Strategy Development D. Proof of Concept Answer: C Question 7. Analyzing the customer's WLAN design including interference and signal strength, and recommending design changes to accommodate a voice over WLAN system, are activities associated with which service component in the plan phase?" Select exactly 1 answer(s) from the following. A. WLAN Wired Network Integration Assessment B. Voice over WLAN Assessment C. Operations Readiness Assessment D. Security Architecture Assessment E. Service Assurance Answer: B Question 8. Which wireless service component addressees issues related to originating, evaluating, and scheduling change? Select exactly 1 answer(s) from the following: A. Incident Management B. Change Management C. Configuration Management D. Acceptance Test Plan Answer: C Question 9. Which activity is associated with the wireless technology assessment service component? Select exactly 1 answer(s) from the following: A. Perform Infrastructure Audit B. Execute Test Cases C. Develop Escalation Plan D. Develop Project Management Answer: A Question 10. Which WLAN service component within the prepare phase assesses the customer's business and technical requirements and includes a solution value assessment? Select exactly 1 answer(s) from the following: A. Business Case Development B. Business Requirements Development C. High-Level Design Development D. Technology Strategy Development Answer: A
|
Question 1. Order the following resolutions, by pixel count, from lowest to highest. A. D1, HD, QCIF, CIF B. D1, CIF, 4CIF, HD C. QCIF, CIF, D1, HD D. QCIF, D1, CIF, HD Answer: C Explanation: Question 2. What are the two differences between interlaced and progressive scan video? (Choose two.) A. Progressive scan video is generally better with fast-moving objects B. Interlaced video is generally better with fast-moving objects C. Interlaced video is constructed out of alternating odd and even lines D. Progressive scan video is constructed out of alternating odd and even lines Answer: A, C Explanation: Question 3. Where should outdoor surveillance cameras be mounted when nearby sources of light are present? A. The camera should be mounted lower than the light source. B. The camera should be mounted in parallel with the nearest light source. C. The camera should be mounted above the light source. D. Location does not matter, as long as the camera is day/night capable. Answer: A Explanation: Question 4. What is the correct camera and lens setup for the use of IR lighting? A. Color camera with IR corrected lens B. A camera with day/night mode and IR corrected lens C. A camera with day/night mode and varifocal lens D. Color camera with varifocal lens Answer: B Explanation: Question 5. Which switch port capability is recommended for an MSP server? A. Server switch ports should have 10/100 Mb capability B. Server switch ports should have 1000 Mb capability C. Server switch ports should have 10 Gb capability D. Servers should be connected to PoE-capable switches Answer: B Explanation: Question 6. On a converged network infrastructure, which Layer 2 technology can be easily enabled and configured to ensure separation of video surveillance traffic on the network from other sources (such as voice, email, and web browsing)? A. IP routing B. Firewall C. QoS D. VLAN Answer: D Explanation: Question 7. In addition to bandwidth, which factors should be considered when designing an IP network capable of delivering high-quality surveillance video in real time? A. Minimize jitter and maximize latency B. Minimize latency and maximize jitter C. Minimize both jitter and latency D. Maximize both jitter and latency Answer: C Explanation: Question 8. The Cisco Physical Security CPS-MSP-1RU-K9 platform can support which configuration of option cards? A. 1 x CIVS-FC-1P B. 2 x CIVS-ENC-8P C. 2 x CIVS-ENC-16P D. 1 x CIVS-FC-1P and 1 x CIVS-ENC-8P Answer: A Explanation: Question 9. Which two of the following Cisco Physical Security MSP servers support an optional secondary power supply? (Choose two.) A. CPS-MSP-1RU-K9 B. CPS-MSP-2RU-K9 C. CPS-MSP-4RU D. CPS-SS-4RU E. CIAC-PAME-1125-K9 Answer: B, C Explanation: Question 10. What is the maximum number of internal encoder ports supported by the CPS-MSP-2RU-K9? A. 16 B. 24 C. 32 D. 48 Answer: D Explanation:
|
Question 1. Where does an IP phone obtain the extension number and speed-dial settings from? A. the settings that are configured on the physical phone B. the registration file that the phone receives from the Cisco Unified Communications Manager C. the device and line configuration in Cisco Unified Communications Manager, during the registration process D. the default device profile that is configured in Cisco Unified Communications, Manager Answer: C Explanation: Explanation When we configure IP phone profile in CUCM that time we also configure extension number and speed dial as per requirement. When IP reachability gets establish between IP phone and CUCM then phone will download config file from CUCM during initial registration process. Link: http://www.cisco.com/en/US/docs/voice_ip_comm/cucm/admin/3_1_2/ccmcfg/b06phone.html Question 2. Which web-based application that is accessed via the Cisco Unified Communications Manager Administration GUI generates reports for troubleshooting or inspecting cluster data? A. Cisco Unified Serviceability alarms B. Cisco Unified RTMT Trace and Log Central C. Cisco Unified RTMT Monitor D. Cisco Unified Reporting tool Answer: D Explanation: Link:http://www.cisco.com/en/US/docs/voice_ip_comm/cucm/service/5_1_3/report/curptg.html Question 3. Which statement about device mobility is true? A. When local route groups are used, there is no need to configure device mobility groups orphone device CSSs as long as phone line CSSs are used. B. When local route groups are used, you must configure device mobility groups and phone device CSSs. C. When the device mobility group at the home device pool and roaming device pool are not the same, the Phone will keep the home region. D. When device mobility groups at the home device pool and roaming device pool are the same, the phone will keep the home MRGL setting. Answer: A Explanation: Question 4. Refer to the SDI trace in the exhibit A PSTN call arrived at the MGCP gateway that is shown in the SDI trace. If the caller ID that is displayed on the IP phone is 087071 222 and the HQ_clng__pty_CSS contains the HQ_cing_pty_Pt partition, which exhibit shows the correct gateway digit manipulation"? A. Exhibit A B. Exhibit B C. Exhibit C D. Exhibit D Answer: D Explanation: Explanation-Actual incoming number is 14-087071 222 but next to this information in trace we can see two digits are stripped which is international code hence D is valid answer. Question 5. When a database replication issue is suspected, which three tools can be used to check the database replication status? (Choose three.) A. Cisco Unified Communications Manager RTMT tool B. Cisco Unified Communications Manager Serviceability interface C. Cisco Unified Reporting D. Cisco Unified Communications Manager CLI interface E. Cisco IP Phone Device Stats from the Settings button F. Cisco Unified OS Administration interface Answer: A, C, D Reference: http://www.cisco.com/en/US/products/sw/voicesw/ps556/products_tech_note09186a00809643e8. shtml Question 6. Which of these reasons can cause intrasite calls within a Cisco Unified Communications Manager cluster to fail? A. The route partition that is configured in the CCD requesting service is not listed in the calling phone CSS B. The trunk CSS does not include the partition for the called directory number. C. The MGCP gateway is not registered D. The calling phone does not have the correct CSS configured E. The calling phone does not have the correct partition configured. Answer: D Explanation: Explanation-To make a successful call within CUCM cluster following condition should satisfy. Link http://www.cisco.com/en/US/products/sw/voicesw/ps556/products_tech_note09186a0080094b53.shtml Question 7. Refer to the exhibit. When a Cisco IP Communicator phone roams from San Jose (SJ) to RTP, the Cisco IP Communicator physical location and the device mobility group change from SJ to RTP All route patterns are assigned a route list that points to the local route group All device pools are configured to use the local route group Which statement is true when the roaming phone places an AAR call? A. Since globalized call routing is not configured, then the SJ gateway will be used in this case B. The phone will use the AAR CSS that contains the SJ_PSTN partition. The call will egress at the SJ gateway C. The phone will use the AAR CSS that contains the RTP_PSTN partition. The call will egress at the SJ gateway D. The phone will use the AAR CSS that contains the SJ_PSTN partition. The call will egress at the RTP gateway. E. The phone will use the AAR CSS that contains the RTP_PSTN partition The call will egress at the RTP gateway Answer: D Explanation: Cisco Unified Communications Manager Version 7.0 introduced the Local Route Group feature.When using local route groups, gateway selection is totally independent of the matched route pattern and referenced route list and routegroup. The use of the Local Route Group feature makes no changes regarding roaming-sensitive settings. The application of these settings always makes sense when roaming between sites. The settings have no influence to the gateway selection and the dial rules that a user must follow. However, the dial planrelated part of Device Mobility changes substantially withthe new dial plan concept, This concept allows a roaming user to follow the home dial rules for external calls but use the local gateway of the roaming site In this case, When the device mobility group is not the same for San Jose and RTP, the Device Mobility related settings are not applied. The phone device keeps its San Jose-specific configuration Despite the San Jose-specific configuration on the phone, the PSTN calls that originate from the roaming phone are routed via the local PSTN gateway (RTP GW) and are based on the route list and device pool local route group settings. The San Jose-specific dial plan is used. Also, AAR remains configured with the San Jose-specific configuration, but if the San Jose dial plan and San Jose AAR CSS permit and if the AAR group contains the prefix that can be applied in RTP, then AAR can work Question 8. Refer to the exhibits. Low latency queuing has been implemented on the HO and BR1 routers to allow five G.729 calls. Callers are still experiencing poor audio, in particular choppy and delayed audio during traffic congestion. This problem occurs even with just one active call. Which two actions will solve the issue? A. Change the codec type to G 711. J B. Configure RSVP call admission control C. Configure L ink Fragmentation and Interleave on the WAN links D. Configure RTP header compression on the WAN links E. Increase the priority queue bandwidth to 80 Kb/s F. Configure location settings in Cisco Unified Communications Manager to 1 20 Kb/s Answer: C, D Explanation: Explanation-below link is very good to understand this concept. Link-http://www.cisco.com/en/US/docs/ios/12_2/qos/configuration/guide/qcflem.html Question 9. Refer to the exhibit. When calling 911, which gateway/route list is defined in the route pattern in Cisco Unified Communications Manager and used to route matched digits to the PSTN? A. SEP002290BA361B B. standardLocalRG C. RouteListCdrc D. LRG_RL E. nodeld = 1 F. BRANCH Answer: D Explanation: Explanation-logs clearly showing route list name. Question 10. Which Cisco Unified Communications Manager troubleshooting tool can be used to look at detailed specific events, such as dial plan digit analysis, as they die happening? A. traceroutes B. RTMT real-time trace C. Cisco Unified Communications Manager alerts D. Cisco Unified Dialed Number Analyzer E. RTMT performance log viewer F. syslog output Answer: B Explanation:
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.