|
Question 1.
After you install NetWare 6.5, which utility can you use to install License Service Provider (LSP) software on a server and create an LSP object in the eDirectory tree?
A. Console One
B. NWCONFIG.NLM
C. Server Manager
D. iManager
E. iMonitor
Answer: D
Question 2.
When should an SLP DA be configured? (Choose 2)
A. When SLPv2 is being used
B. When a DEFAULT scope exists
C. When backward compatibility is needed with SLPv1
D. When environments need to keep SLP network traffic to a minimum
E. When SLP is running on a large network
Answer: D, E
Question 3.
Which time server type adjusts its clock 100% per polling interval?
A. Single reference
B. Secondary
C. Primary
D. Reference
E. Secondary reference
F. Master
Answer: B
Question 4.
You need to manually start the Apache Manager service on your NetWare 6.5 server.
Which command is used from the server console to do this?
A. ADMINWEB
B. APMANUP
C. APACHEADM
D. AP2WEBMANUP
E. WEBMANUP
F. NVXADUP
G. WEBMAN
H. AP2WEBMAN
I. AP2MANUP
Answer: H
Question 5.
What is another name for the server certificate?
A. WEP key
B. Key material object
C. Certificate signing request
D. Certificate authority
Answer: B
Question 6.
Deployment Manager fails when run from the NetWare 6.5 Operating System CD on your Windows 2000 Professional workstation with Novell Client 4.83 installed.
What is the cause?
A. You must upgrade to Internet Explorer 6.0 or later on the workstation.
B. The version of Deployment Manager on the Operating System CD only runs on Windows
95/98 workstations.
C. Deployment Manager is not compatible with Novell Client 4.83.
D. Deployment Manager requires Windows XP Home edition.
E. Deployment Manager is not compatible with Windows 2000 Professional.
F. Deployment Manager must be installed on the workstation before running the program.
Answer: C
Question 7.
When preparing a server for an upgrade to NetWare 6.5, which tasks should you perform? (Choose 3)
A. Make a backup of the eDirectory tree and the server file system.
B. Ensure all applications hosted by the server are up and running during the upgrade so they will
be detected by the upgrade utility.
C. Disconnect all users and disable user login.
D. Remove (uninstall) all Support Packs and patches.
E. If running ZENworks for Servers 2, install ZENworks for Servers 3 prior to the upgrade.
F. Use a partition management tool to shrink the server's DOS partition to the minimum size
required by NetWare 6.5.
Answer: A, C, E
Question 8.
Which utilities can you use to configure SET parameters on your NetWare 6.5 server?
(Choose 2.)
A. CONFIG
B. Remote Manager
C. INETCFG
D. iMonitor
E. iManager
F. MONITOR.NLM
Answer: B, F
Question 9.
In which container are the SSL Certificate DNS, SSL Certificate IP, and SAS Service objects found in your eDirectory tree?
A. NMAS
B. The same container where the server has been installed.
C. KAP
D. [ROOT]
E. Security
Answer: B
Question 10.
Which statement is true regarding the server your License Service Provider (LSP) service is installed on?
A. It must be installed on a server that holds a master replica of the [Root] partition.
B. It must be installed on a server that holds a master or read/write replica of every partition in the
tree.
C. It must be installed on a server that holds a master or read/write replica of the [Root] partition.
D. It must be installed on a server that holds a master or read/write replica of each partition that
contains license certificate objects.
E. It must be installed on a server that holds a master or read/write replica of the partition that
contains the security container.
Answer: D
Question 11.
During a server , you first install a generic NetWare 6.5 server. You then move the eDirectory tree and the file system from your existing server to the newly installed NetWare 6.5 server.
Answer: MIGRATION
Question 12.
You want to upgrade a NetWare 6 server that is currently running in your test lab to NetWare 6.5. You also want to deploy it as a production server in a high-utilization environment. The server hardware uses dual Pentium IV 2.5 GHz CPUs, 512 MB RAM, a 300 GB RAID 5 drive array, and a USB mouse.
Does this server hardware meet the recommended requirements for a production server?
A. No, you should use 3.0 GHz (or faster) CPUs in a NetWare 6.5 production server.
B. No, NetWare 6.5 doesn't support USB mice.
C. No, the server should have at least 1 GB of RAM.
D. No, the server should have at least 8 CPUs to run in a production environment.
E. No, NetWare 6.5 isn't compatible with RAID arrays.
F. No, NetWare 6.5 isn't compatible with Pentium IV processors.
G. Yes, the server meets all recommended requirements.
Answer: C
Question 13.
Which command performs a read-only assessment of the NSS pool named APPSPOOL?
A. NSS /CHECKPOOL APPSPOOL
B. NSS /REBUILD APPSPOOL
C. NSS /POOLVERIFY=APPSPOOL
D. NSS /CHECK /POOL=APPSPOOL
E. NSS /VERIFY APPSPOOL
Answer: C
Question 14.
Which utility lets you change a server from being a secondary time server to a single reference time server?
A. TIMESYNC.NLM
B. MONITOR.NLM
C. NDS Manager
D. NetWare Administrator
Answer: B
Question 15.
What happens if you select the View and Update NDS option in Deployment Manager?
A. Copies a new version of DS.NLM and SGUID.NLM to NetWare 4 servers in the tree.
B. Locates servers that are running incompatible versions of Directory Services and removes
them from the tree.
C. Runs SDIDIAG.NLM to check your tree's SDI key for consistency.
D. Upgrades older versions of NDS in the tree to eDirectory 8.7.3.
E. Places a Read/Write replica of the root partition on all existing servers in the tree.
F. Patches existing servers in the tree to a revision level compatible with the version of eDirectory
used by NetWare 6.5.
Answer: F
Question 16.
Which file is used to specify the context where CIFS users reside in the tree?
A. Sys:\Etc\Ctxs.cfg
B. Sys:\System\Ctxs.cfg
C. Sys:\Public\Ctxs.cfg
D. Sys:\Etc\Cifsctxs.cfg
E. Sys:\System\Cifsctxs.cfg
F. Sys:\Public\Cifsctxs.cfg
Answer: D
Question 17.
When using Novell Certificate Server, where is the public key component of public key cryptography created?
A. On the eDirectory server with the master of the tree root
B. On the workstation or server preparing an encrypted message
C. On the workstation or server owning the key
D. On the Certificate Authority server
Answer: D
Question 18.
Your eDirectory tree currently has a NetWare 4.2 server residing in it. You plan to upgrade a NetWare 5.1 server in your tree to NetWare 6.5.
What must you do to accomplish this?
A. Remove the NetWare 4.2 server from the tree.
B. Implement Universal Password before upgrading to NetWare 6.5.
C. Run the Compatibility Mode Driver on the NetWare 5.1 server.
D. Run Deployment Manager and select the Update Certificate Authority Objects option.
E. Run Deployment Manager and select the Prepare for CIFS/AFP option.
F. Run Deployment Manager and select the Generate GUIDEs on NetWare 4 Servers option.
Answer: F
Question 19.
Which is an example of the single reference time synchronization method for a network that has 15 NetWare 6 servers?
A. 2 single reference time servers and 13 secondary time servers
B. 1 reference time server, 2 primary time servers, and 12 secondary time servers
C. 1 primary time server and 14 secondary time servers
D. 1 single reference time server, 1 primary time server, and 13 secondary time servers
E. 2 primary time servers and 13 secondary time servers
F. 1 single reference time server and 14 secondary time servers
Answer: F
Question 20.
In Public Key Cryptography, the key is used to decrypt an encrypted transmission.
Answer: PRIVATE
Question 21.
Which SLP URL represents a NetWare server's file system?
A. bindery.novell
B. portal.novell
C. nls.meter.novell
D. smdr.novell
E. ndap.novell
Answer: A
|
Question 1. DRAG DROP Answer: Question 2. Why are thresholds defined based on baseline documents? A. to ensure that QoS parameters are defined appropriately B. to help identify current network problems and predict future bottlenecks C. to suppress duplicate alarms and allow for event correlation D. to reduce polling traffic on the network E. to verify that interfaces are in the correct state Answer: B Explanation: Question 3. According to ITIL® v3 framework, which type of tools is best suited to ensure management of a predefined workflow stream containing a set of tasks which can be managed around resource availability, timelines, status, and if needed escalation paths? A. process control engine B. configuration management system C. discovery audit D. business service management Answer: A Explanation: Question 4. According to ITIL® v3 framework, which type of warranty assurance provides a customer with a measured confidence that services are supporting defined level of demand and quality? A. security B. availability C. capacity D. continuity E. fulfillment Answer: E Explanation: Question 5. A rollout plan from engineering has been sent to the NOC for deployment. Part of the plan involves a complex software upgrade to a network element. The method of procedure provided by engineering is nearly 100 individual steps long. Where do you expect to find backout procedures to be specified? A. after each step that causes a change to the network B. after every 20 (+/- 5) steps C. after the midway point D. after the method of procedure is completed E. both after the midway point and after the method of procedure is completed Answer: A Explanation: source: http://www.freeopenbook.com/upgrading-repairingnetworks/ ch04lev1sec4.html Question 6. You are working in a service provider voice NOC supporting a national VoIP network. The network underwent a capacity expansion that added voice bearer trunks to a newly deployed media gateway. After the new trunks were configured and placed into live service, the service desk began to receive complaints from end customers that their VoIP service is not working for certain calls. The service desk is unable to resolve the problem and due to increasing troubles coming in, they escalate to you. Assuming that all physical layer option settings are verified to match carrier-provided specifications, which action should you take to isolate the problem before escalating to the PSTN PTT carrier? A. Verify IP connectivity between the media gateway controller and the media gateway. B. Fail over the media gateway to its backup. C. Identify which trunks are not functioning. D. Verify that SIP versions are compatible between the media gateway controller and the media gateway Answer: C Explanation: reason: The question is saying that the service is not working for certain calls which means that ip connectivity might be fine and the fail over is also working.. Similarly, if sip version are not compatible there would be a problem with all calls. So trunks problem might be the answer Question 7. Which protocol should be configured on networking devices to assist operational staff in event correlation to resolve service issues? A. NTP B. TACACS C. HSRP D. TFTP E. RCMD Answer: A Explanation: Question 8. What is the main difference between an SNMP trap and a syslog message? A. SNMP traps are secure, whereas syslog messages are not. B. SNMP traps are triggered during network outages, whereas syslog messages are Informational only. C. SNMP traps are forwarded to EMS systems, whereas syslog messages are forwarded to any NMS system. D. SNMP traps are formally defined in a MIB, whereas syslog body contents are not formally defined. E. SNMP traps are user-definable and vary based on vendor, whereas syslog messages are standards-based Answer: D Explanation: source: https://supportforums.cisco.com/message/3184632 Question 9. While evaluating a new hardware rollout plan before deployment, which standards should you review to ensure that the hardware met certain environmental design guidelines? A. NAS B. COBIT C. ITIL® D. NEBS E. eTOM Answer: D Explanation: Question 10. Which three of the following metrics are used to troubleshoot an incident of poor voice quality in a service provider next-generation network? It can be assumed that adequate bandwidth is available. (Choose three.) A. UDP jitter B. latency C. TCP Connect D. packet loss E. round-trip time Answer: A, B, D Explanation:
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.