Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "1Y0-258" Exam

Dump got it from ITCertkeys

 Question 1.
By default, which of the following ports can be used by Citrix Presentation Server to communicate with a Citrix license server? (Choose all that apply)

A. 26000
B. 26001
C  26008
C. 27000
D. 27001
E. 27008

Answer:  C, D, E

Question 2.
Scenario: You are the administrator of an eight-server Citrix Presentation Server farm. The primary applications accessed in the environment are Microsoft Outlook and Internet Explorer.

Management is skeptical about the Speed Screen capabilities, but has given you the permission to implement one Speed Screen option. 

Which Speed Screen option should you choose in order to optimize this environment?

A. Speed Screen Flash Acceleration
B. Speed Screen Latency Reduction
C. Speed Screen Browser Acceleration
D. Speed Screen Multimedia Acceleration

Answer: C

Question 3.
Which two steps should be taken when a Network Administrator is unable to import session printers from other domains because the Network Print Servers reside in a workgroup or the printers are in a different domain than the Presentation Server farm? (Choose two.)

A. Add one of the Presentation Servers to the same workgroup as the Network Print Server
B. Add the Network Print Servers to the same domain as the Presentation Servers
C. Specify the credentials for the print server domain
D. Import the network printers using their IP addresses instead of DNS names

Answer: B, C

Question 4.
Scenario: a license file allocated from mycitrix.com with host name was installed on the server named server b. every time the network administrator tries to connect to the presentation server, an error appears stating that the license server cannot be contacted. 

What could be the cause of this issue?

A. The license needs to be deployed through the License Management Console.
B. The license server is not in the same domain as the Presentation Server.
C. The host name used to allocate the license is different from the license server name.
D. The license allocated is an invalid license.
E. The account used to allocate the license is not a member of the domain administrators group.

Answer: C

Question 5.
Scenario: Users are complaining that they experience slow and excessively long waiting periods when accessing data from their Presentation Servers. 

How can a Network Administrator determine if this issue is related to the fact that the farm load has reached its maximum capacity?

A. Run QFARM /LOAD to verify if the load value is 5000
B. Run QFARM /LOAD to verify if the load value is 10000
C. Run QFARM /LOAD to verify if the load value is 20000
D. Run QFARM /LOAD to verify if the load value is 1000

Answer: B

Question 6.
Scenario: A Network Administrator configures the Web Interface and the Secure Gateway on the same server and places a Web Server Load Balancer between the client and the server running the Secure Gateway. 

What happens when Secure Gateway is placed behind a Web Server Load Balancer?

A. ICA traffic slows down.
B. Double authentication is required.
C. Double hop is required.
D. ICA/SSL traffic is refused.

Answer: D

Question 7.
Which of the following components enables complete, singlepoint management of the entire server farm through a comprehensive interface?

A. Management Console for MetaFrame Presentation Server
B. Installation Manager
C. Installer Service
D. Packager.

Answer: A

Question 8.
Scenario: John Dravid was authorized by his company's CIO to change the default 
CTX_SmaUser permissions, rights and settings for their environment. 

Which three issues could occur as a result of those changes? (Choose three.)

A. XML Service may not start.
B. Printer Spooler Service may not start.
C. SMA Service may not start.
D. Citrix Print Manager Service may not start.
E. Printers may not be auto-created.

Answer: C, D, E

Question 9.
Scenario: Your network administrator has informed you that QoS (prioritization) will be implemented to ensure that ICA traffic is prioritized appropriately. Session Reliability using the default port has already been enabled. 

Which two tests should you perform to identify that the ICA traffic is appropriately prioritized? (Choose two.)

A. Check if TCP 2598 is being used for traffic inbound to the server.
B. Check if TCP 2598 is being used for traffic outbound from the server.
C. Check if a dynamically allocated port is being used for traffic inbound to the server.
D. Check if TCP 1494 is being used for traffic outbound from the server.
E. Check if a dynamically allocated port is being used for traffic outbound from the server.
F. Check if TCP 1494 is being used for traffic inbound to the server.

Answer: A, E

Question 10.
Scenario: An administrator using the Presentation Server Console wants to check the logon status of a particular server that has been denying logon access to users. Through several trobleshooting steps, the administrator has already established that a TCP/IP issue is not linked to this problem. 

Which server property can the administrator use to troubleshoot the logon status?

A. XML Service
B. Connection Access Control
C. Meta Frame Settings
D. ICA Settings

Answer: C

Question 11.
Scenario: Every time the Network Engineers at Company.com try to start the IMA Service, an error message pops up stating that the IMA Service could not be started. Their environment is currently using a direct connection to the data store. 

What should be done to troubleshoot this issue?

A. Verify ODBC connectivity
B. Change the default timeout value for the Service Control Manager
C. Verify IMA Service connectivity
D. Restart the Presentation Server

Answer: A

Question 12.
Scenario: A Network Administrator connects to a Presentation Server desktop from the client device. The administrator tries to select a printer from the Printers and Faxes screen and sees the message: "You do not have access to this printer. Only the security tab will be displayed".

What can the administrator do to solve this issue?

A. Restart the Print Spooler Service.
B. Logon to the server and manually add the printer.
C. Select a printer from the user's session.
D. Restart the Citrix Print Manager Service.

Answer: C

Question 13.
An administrator noticed a message indicating that the IMA service on a particular Presentation Server failed to start when the service actually started. 

Which two methods should the administrator use to troubleshoot this issue? (Choose two.)

A. Collect the CDF Trace with the proper IMA sub-systems.
B. Run DRWTSN32 - I to set Dr. Watson as the default debugger.
C. Verify the current loading plug-ins using REGEDIT.
D. Run NETMON to get the network trace.

Answer: A, C

Question 14.
Scenario: The Network Administrator has modified the value of Max Threads to tune the Presentation Server implementation, as Session Reliability is enabled for 150 user client connections on a server that is powerful enough to accept more. After making this modification, which two options could be used by the administrator to cause the changes to take effect?
(Choose two.)

A. Reboot the server
B. Restart the XTE Service
C. Log off all users
D. Restart IMA Service

Answer: A, B

Question 15.
Scenario: A Network Administrator noticed that client logon performance is very poor and thinks that it might be due to client drive mapping. 

Which drive is most likely being queried in order to cause this issue?
(Drive A = Floppy Drive, Drive C = Local Drive, D = CDROM, Z = Network Drive)

A. Drive Z
B. Drive D
C. Drive C
D. Drive A

Answer: D

Question 16.
Choose the option that correctly describes the function of the given Presentation Server component.

A. Farm Metric Server interprets Resource Manager metrics that apply to the entire farm.
B. Data Collector stores the Resource Manager configuration data.
C. Farm Metric Server sends farm wide data to other servers using IMA (Independent 
    Management Architecture) communication.
D. Data Collector determines the farm wide data distribution system.

Answer: A

Question 17.
What happens when the Connect client printers at logon checkbox is not selected in the ica-tcp Connection client settings?

A. Client printers will be prohibited from being added automatically.
B. Printing speed is reduced.
C. Presentation Server universal printer driver will automatically create printers for connecting 
     clients when they launch their ICA connections.
D. Client to server printer redirection will be disabled.

Answer: A

Question 18.
Which component gathers historical metrics from all Presentation Servers on a daily basis and forwards the data to the Summary Database?

A. Data Collector
B. Summary Database Collector
C. Database Connection Server
D. Farm Metric Server

Answer: C

Question 19.
What happens when a collision occurs and the DLLs for the application are relocated to an available base memory address?

A. The DLL can no longer be shared with other applications.
B. The registry key of the DLL changes to 0.
C. The registry key of the DLL changes to 1.
D. The DLL is deleted from the application.

Answer: A

Question 20.
What are two reasons why you would receive an error message from the Service Control Manager stating that the IMA Service could not be started when the service actually started?
(Choose two.)

A. The Service Control Manager timeout value expired.
B. The Citrix XML HTTP socket timeout value expired.
C. The Service Control Manager is currently set to use the default time-out value.
D. The IMA Service startup account expired.
E. The Citrix XML Service could not connect to the database.

Answer: A, C


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for BR0-001 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "BR0-001" Exam

Bridge Exam - Security+

 Question 1.
Which method is LEAST intrusive to check the environment for known software flaws?

A. Port scanner
B. Vulnerability scanner
C. Penetration test
D. Protocol analyzer

Answer: B

Question 2.
On a remote machine, which action will you usually take to determine the operating system?

A. MAC flooding
B. System fingerprinting
C. DNS spoofing
D. Privilege escalation

Answer: B

Question 3.
For the following sites, which one has the means (e.g. equipment, software, and communications) to facilitate a full recovery within minutes?

A. Cold site
B. Hot site
C. Warm site
D. Reciprocal site

Answer: B

Question 4.
Which description is true about the process of securely removing information from media (e.g. hard drive) for future use?

A. Deleting
B. Reformatting
C. Sanitization
D. Destruction

Answer: C

Question 5.
Choose the access control method which provides the most granular access to protected objects?

A. Capabilities
B. Access control lists
C. Permission bits
D. Profiles

Answer: B

Question 6.
Why malware that uses virtualization techniques is difficult to detect?

A. The malware may be implementing a proxy server for command and control.
B. A portion of the malware may have been removed by the IDS.
C. The malware may be using a Trojan to infect the system.
D. The malware may be running at a more privileged level than the antivirus software.

Answer: D

Question 7.
Which one of the following options is an attack launched from multiple zombie machines in attempt to bring down a service?

A. TCP/IP hijacking
B. DoS
C. DDoS
D. Man-in-the-middle

Answer: C

Question 8.
You work as the network administrator at ITCertKeys.com. The ITCertKeys.com network uses the RBAC (Role Based Access Control) model. You must plan the security strategy for users to access resources on the ITCertKeys.com network. The types of resources you must control access to are mailboxes, and files and printers. Certways.com is divided into distinct departments and functions named Finance, Sales, Research and Development, and Production respectively. Each user has its own workstation, and accesses resources based on the department wherein he/she works. You must determine which roles to create to support the RBAC (Role Based Access Control) model. 

Which of the following roles should you create?

A. Create mailbox, and file and printer roles.
B. Create Finance, Sales, Research and Development, and Production roles.
C. Create user and workstation roles.
D. Create allow access and deny access roles.

Answer: B

Question 9.
What technology is able to isolate a host OS from some types of security threats?

A. Kiting
B. Virtualization
C. Cloning
D. Intrusion detection

Answer: B

Question 10.
Which method could identify when unauthorized access has occurred?

A. Implement session termination mechanism.
B. Implement previous logon notification.
C. Implement session lock mechanism.
D. Implement two-factor authentication.

Answer: B


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.