|
Question 1.
By default, if a NetWare server is synchronization on the network, how frequently does it check for time?
A. Every 3 minutes
B. Every 5 minutes
C. Every 10 minutes
D. Every 15 minutes
E. Every 20 minutes
Answer: C
Question 2.
What needs to be done to allow servers to find any time server regardless of the tree it's in?
A. Set Directory tree mode to off
B. Set timesync restart flag to on
C. Set Service Advertising Protocol to off
D. Set the default time server type to reference
Answer: A
Question 3.
You have installed the first NetWare 5 server for your company and accepted all default settings. What type of time server is the server?
A. Primary
B. Reference
C. Secondary
D. Single reference
E. Secondary reference
Answer: D
Question 4.
By default, when is a server *************not being synchronized to the network?
A. When it's more than one seconds different than the network time.
B. When it's more than two seconds different than the network time.
C. When it's more than three seconds different than the network time.
D. When it's more than four seconds different than the network time.
E. When it's more than five seconds different than the network time.
Answer: B
Question 5.
In an IPX environment, which methods do servers use to find each other to synchronization? (Choose two.)
A. TCP/IP
B. NTP.NLM
C. Configured lists
D. Service Advertising Protocol (SAP)
E. NetWare Link Services Protocol (NLSP)
Answer: C, D
Question 6.
Which time servers participate in voting for the correct time? (Choose two.)
A. Master
B. Primary
C. Reference
D. Single reference
E. Secondary reference
Answer: B, C
Question 7.
Which statement about the BorderManager 3.5 installation process is true?
A. NETBASIC.NLM must be loaded on the server prior to installation.
B. You must configure your servers and clients to use TCP/IP prior to installation.
C. Installation can be done remotely using RCONSOLE with the CD mounted on your local
machine.
D. You can install on a remote server If you copy the contents of the CD to a mounted volume on
that server.
Answer: D
Question 8.
What system is used to adjust different time zones to get an equivalent time for time synchronization?
A. Time stamps
B. Standard time
C. Greenwich Mean Time (GMT)
D. Daylight saving time offset
E. Universal Time Coordinated (UTC)
Answer: E
Question 9.
Which time server types advertise that they are a time provider? (Choose 3.)
A. Master
B. Primary
C. Reference
D. Secondary
E. Single reference
F. Secondary reference
Answer: B, C, E
Question 10.
Which file can you view to identify the default filter exceptions to the BorderManager filters?
A. FILE.TXT
B. ALLFILT.TXT
C. FILTEXCP.TXT
D. The file specified by the user when filters are saved to a text file.
Answer: D
Question 11.
Which statement about time synchronization is true?
A. Time synchronization is a service that records time changes at the server console.
B. Time synchronization is a service that maintains consistent time throughout the network.
C. Time synchronization is a service that determines the correct time throughout the network.
D. Time synchronization is a service that records changes in time security events throughout the
network.
Answer: B
Question 12.
Which statement is true about a single reference time server?
A. It gets its time from a reference time server.
B. It does not advertise itself as a time provider.
C. It cannot coexist with primary or other reference servers.
D. It must have another reference or primary server to negotiate time with.
Answer: C
Question 13.
What is the message content of a type 31CMP packet?
A. Echo Reply
B. Time Exceeded
C. Parameter Problem
D. Address Mask Reply
E. Destination Unreachable
Answer: E
Question 14.
You have been asked to troubleshoot your client's issue of timeout synchronized throughout the network. Your client has five servers in the tree located at their headquarters. The time configuration for each server is as follows.
Time server type Configured lists
Serv1 Single reference off
Serv2 Primary off
Serv3 Secondary off
Serv4 Secondary off
Serv5 Secondary off
What is preventing time from being synchronized?
A. There needs to be more than one primary time ******
B. Configured Lists needs to be turned on ********
C. Configured Lists needs to be turned on ***** secondary servers.
D. A single reference time server cannot co-exist on the primary time server.
E. Configured Lists needs to be turned ********** primary and single reference server.
Answer: D
Question 15.
Which statement is true regarding reference time server?
A. It does not advertise itself ******** provider.
B. It cannot coexist with other primary time servers.
C. It gets its time from a single ****** time server.
D. It negotiates time with primary time server, but does not adjust its internal clock.
Answer: D
Question 16.
You are trying to determine if NAT is working. Which server console command to be used to determine if filters are configured to deny outgoing IP packets?
A. PING
B. TCPCON
C. INETCFG
D. FILTCFG
E. NIASCFG
Answer: D
|
Question 1. You are the network consultant from Your company. Please point out two requirements call for the deployment of 802.1X. A. Authenticate users on switch or wireless ports B. Grant or Deny network access at the port level, based on configured authorization policies C. Allow network access during the queit period D. Verify security posture using TACAS+ Answer: A, B Question 2. Open Shortest Path First (OSPF) is a dynamic routing protocol for use in Internet Protocol (IP) networks. An OSPF router on the network is running at an abnormally high CPU rate. By use of different OSPF debug commands on Router, the network administrator determines that router is receiving many OSPF link state packets from an unknown OSPF neighbor, thus forcing many OSPF path recalculations and affecting router's CPU usage. Which OSPF configuration should the administrator enable to preent this kind of attack on the Router? A. Multi-Area OSPF B. OSPF stub Area C. OSPF MD5 Authentication D. OSPF not-so-stubby Area Answer: C Question 3. Which one of the following Cisco Security Management products is able to perform (syslog) events normalization? A. Cisco IME B. Cisco Security Manager C. Cisco ASDM D. Cisco Security MARS Answer: D Question 4. Can you tell me which one of the following platforms has the highest IPSec throughput and can support the highest number of tunnels? A. Cisco 6500/7600 + VPN SPA B. Cisco ASR 1000-5G C. Cisco 7200 NPE-GE+VSA D. Cisco 7200 NPE-GE+VAM2+ Answer: A Question 5. Which two methods can be used to perform IPSec peer authentication? (Choose two.) A. One-time Password B. AAA C. Pre-shared key D. Digital Certificate Answer: C, D Question 6. Cisco Security Agent is the first endpoint security solution that combines zero-update attack protection, data loss prevention and signature-based antivirus in a single agent. This unique blend of capabilities defends servers and desktops against sophisticated day-zero attacks and enforces acceptable-use and compliance policies within a simple management infrastructure. What are three functions of CSA in helping to secure customer environments? A. Control of executable content B. Identification of vulnerabilities C. Application Control D. System hardening Answer: A, C, D Question 7. Cisco Secure Access Control Server (ACS) is an access policy control platform that helps you comply with growing regulatory and corporate requirements. Which three of these items are features of the Cisco Secure Access Control Server? A. NDS B. RSA Certificates C. LDAP D. Kerberos Answer: A, B, C Question 8. Observe the following protocols carefully, which one is used to allow the utilization of Cisco Wide Area Application Engines or Cisco IronPort S-Series web security appliances to localize web traffic patterns I the network and to enable the local fulfillment of content requests? A. TLS B. DTLS C. WCCP D. HTTPS Answer: C Question 9. Which one is not the factor can affect the risk rating of an IPS alert? A. Relevance B. Attacker location C. Event severity D. Signature fidelity Answer: B Question 10. For the following items, which two are differences between symmetric and asymmetric encryption algorithms? (Choose two.) A. Asymmetric encryption is slower than symmetric encryption B. Asymmetric encryption is more suitable than symmetric encryption for real-time bulk encryption C. Symmetric encryption is used in digital signatures and asymmetric encryption is used in HMACs D. Asymmetric encryption requires a much larger key size to achieve the same level of protection as asymmetric encryption Answer: A, D
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.