Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "3x0-101" Exam

Nice Questions from ITCertKeys

 

Question 1.
Which of the following is NOT a GUI-based method for getting help?

A. xinfo
B. xman
C. xdoc
D. tkman

Answer: C

Question 2.
While installing Linux via an FTP download , Lucy gets the error: "Tar: read error" or "gzip: not in gzip format. " Identify the problem and the most appropriate solutions. (Choose two.)

A. The files are corrupt , so go to another site and try again.
B. The files are corrupt , so replace your network interface card.
C. There is a necessary , library that has not yet been installed , so skip the file and come back to
it when the system has installed all other components.
D. The files are corrupt , so e-mail the system administrator of the FTP site and ask him to correct
the problem.
E. The FTP program is corrupt , so re-install the FTP package from your CD-ROM.

Answer: A, B

Question 3.
At boot time , Maya's computer reports that there are problems with inodes , blocks , etc.

What is the problem , and how should it be corrected?

A. The problem is that file system has become corrupt and needs to be repaired (i.e., using fsck
or equivalent).
B The problem is that the partition table has become corrupt and needs to be repaired (i.e., using
fdisk or equivalent).
C. The problem is that the partition table has become corrupt and needs to be repaired (i.e., using
FIPS or equivalent).
D. The problem is that the drive is configured using an improper file system.

Answer: A

Question 4.
You installed a new experimental kernel and found that one of your ext2 partitions no longer functions. You tried unsuccessfully to repair it.

What program can you use to interactively debug the file system?

A. e2fsck
B. tune2fs
C. debugfs
D. tine2fs
E. dumpe2fs

Answer: C

Question 5.
The command for most applications to install compiled source via the Makefile is:

A. make
B. install
C. configure
D. make depend
E. make install

Answer: E

Question 6.
After installing and configuring Xfree86, you notice that when you start X, the display is not centered.
What program can you run to find a better mode line setting?

A. XF86Setup
B. xf86config
C. xvidtune
D. xvideoagent

Answer: C



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for JN0-332 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "JN0-332" Exam

Networks Certified Internet Specialist, SEC (JNCIS-SEC)

 Question 1.
Which configuration keyword ensures that all in-progress sessions are re-evaluated upon committing a security policy change?

A. policy-rematch
B. policy-evaluate
C. rematch-policy
D. evaluate-policy

Answer: A

Explanation:

Question 2.
Click the Exhibit button.
 
You need to alter the security policy shown in the exhibit to send matching traffic to an IPsec VPN tunnel. 

Which command causes traffic to be sent through an IPsec VPN named remote-vpn?

A. [edit security policies from-zone trust to-zone untrust]
    user@host# set policy tunnel-traffic then tunnel remote-vpn
B. [edit security policies from-zone trust to-zone untrust]
    user@host# set policy tunnel-traffic then tunnel ipsec-vpn remote-vpn
C. [edit security policies from-zone trust to-zone untrust]
    user@host# set policy tunnel-traffic then permit ipsec-vpn remote-vpn
D. [edit security policies from-zone trust to-zone untrust]
    user@host# set policy tunnel-traffic then permit tunnel ipsec-vpn remote-vpn

Answer: D

Explanation:

Question 3.
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH? (Choose three.)

A. data integrity
B. data confidentiality
C. data authentication
D. outer IP header confidentiality
E. outer IP header authentication

Answer: A, C, E

Explanation:

Question 4.
You must configure a SCREEN option that would protect your router from a session table flood.

Which configuration meets this requirement?

A. [edit security screen]
    user@host# show
    ids-option protectFromFlood {
    icmp {
    ip-sweep threshold 5000;
    flood threshold 2000;
    }
    }
B. [edit security screen]
    user@host# show
    ids-option protectFromFlood {
    tcp {
    syn-flood {
    attack-threshold 2000;
    destination-threshold 2000;
   }
   }
   }
C. [edit security screen]
   user@host# show
   ids-option protectFromFlood {
   udp {
   flood threshold 5000;
   }
   }
D. [edit security screen]
   user@host# show
   ids-option protectFromFlood {
   limit-session {
   source-ip-based 1200;
   destination-ip-based 1200;
   }
   }

Answer: D

Explanation:

Question 5.
Which type of Web filtering by default builds a cache of server actions associated with each URL it has checked?

A. Websense Redirect Web filtering
B. integrated Web filtering
C. local Web filtering
D. enhanced Web filtering

Answer: B

Explanation:

Question 6.
Which security or functional zone name has special significance to the Junos OS?

A. self
B. trust
C. untrust
D. junos-global

Answer: D

Explanation:

Question 7.
Which command do you use to display the status of an antivirus database update?

A. show security utm anti-virus status
B. show security anti-virus database status
C. show security utm anti-virus database
D. show security utm anti-virus update

Answer: A

Explanation:

Question 8.
Which statement contains the correct parameters for a route-based IPsec VPN?

A. [edit security ipsec]
   user@host# show
proposal ike1-proposal {
protocol esp;
authentication-algorithm hmac-md5-96;
encryption-algorithm 3des-cbc;
lifetime-seconds 3200;
}
policy ipsec1-policy {
perfect-forward-secrecy {
keys group2;
}
proposals ike1-proposal;
}
vpn VpnTunnel {
interface ge-0/0/1.0;
ike {
gateway ike1-gateway;
ipsec-policy ipsec1-policy;
}
establish-tunnels immediately;
}
B. [edit security ipsec]
user@host# show
proposal ike1-proposal {
protocol esp;
authentication-algorithm hmac-md5-96;
encryption-algorithm 3des-cbc;
lifetime-seconds 3200;
}
policy ipsec1-policy {
perfect-forward-secrecy {
keys group2;
}
proposals ike1-proposal;
}
vpn VpnTunnel {
interface st0.0;
ike {
gateway ike1-gateway;
ipsec-policy ipsec1-policy;
}
establish-tunnels immediately;
}
C. [edit security ipsec]
user@host# show
proposal ike1-proposal {
protocol esp;
authentication-algorithm hmac-md5-96;
encryption-algorithm 3des-cbc;
lifetime-seconds 3200;
}
policy ipsec1-policy {
perfect-forward-secrecy {
keys group2;
}
proposals ike1-proposal;
}
vpn VpnTunnel {
bind-interface ge-0/0/1.0;
ike {
gateway ike1-gateway;
ipsec-policy ipsec1-policy;
}
establish-tunnels immediately;
}
D. [edit security ipsec]
   user@host# show
proposal ike1-proposal {
protocol esp;
authentication-algorithm hmac-md5-96;
encryption-algorithm 3des-cbc;
lifetime-seconds 3200;
}policy ipsec1-policy {
perfect-forward-secrecy {
keys group2;
}
proposals ike1-proposal;
}
vpn VpnTunnel {
bind-interface st0.0;
ike {
gateway ike1-gateway;
ipsec-policy ipsec1-policy;
}
establish-tunnels immediately;
}

Answer: D

Explanation:

Question 9.
Which zone is system-defined?

A. security
B. functional
C. junos-global
D. management

Answer: C

Explanation:

Question 10.
You want to allow your device to establish OSPF adjacencies with a neighboring device connected to interface ge-0/0/3.0. Interface ge-0/0/3.0 is a member of the HR zone.

Under which configuration hierarchy must you permit OSPF traffic?

A. [edit security policies from-zone HR to-zone HR]
B. [edit security zones functional-zone management protocols]
C. [edit security zones protocol-zone HR host-inbound-traffic]
D. [edit security zones security-zone HR host-inbound-traffic protocols]

Answer: D

Explanation:


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.