Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "JN0-561" Exam

it is the great dump site itcertkeys

 Question 1.
You are using Cache Cleaner.

What are two methods you can use to remove residual data left on a user's machine after an IVE session? (Choose two.)

A. clearing cached NTLM credentials
B. clearing client side Digital Certificates
C. clearing based on source host/domain/file/folder
D. clearing all cache that has been downloaded through the IVE Content Intermediation Engine

Answer: C, D

Question 2.
What are two functions performed by the Content Intermediation Engine? (Choose two.)

A. Parser: This function processes data streams into chunks that can be manipulated by the 
     transformers.
B. Authorization: This function verifies the identity of users trying to access the IVE then forwards  
    requests to the inside server using those credentials.
C. Authentication: This function verifies the identity of users trying to access the IVE and then 
     intermediates requests to the inside server using those credentials.
D. Transformer: This function modifies the "chunked" data stream before it passes the data to the  
    request handlers. Transformers modify internal URLs, HTML markup and scripts to refer to  
    "virtual" URLs/markup/scripts sourced from the IVE appliance.

Answer: A, D

Question 3.
You want to set up W-SAM for a role, but you can only access the J-SAM configuration screen.

What is the cause of this problem?

A. The system only supports one type of SAM support per role at a time.
B. Nothing is wrong. The configurations for J-SAM and W-SAM applications are identical.
C. You are running under the Basic License and you do not have access to the SAM  
    Configuration screen. You need to ask the IVE administrator to give you access.
D. You cannot configure Windows SAM access here. You must go to Resource Policies->SAM to 
    access the Windows version of SAM Application Configuration screen.

Answer: A

Question 4.
Which resource file format should you use to define resource access to a UNIX file share? (Brackets] indicate data are optional)

A. server[/path] 
B. \\server[\share[\path]] 
C. [protocol://]host[:ports] 
D. [protocol://]host[:ports][/path]

Answer: A

Question 5.
Which three types of Authentication Servers are supported by a Baseline License?
(Choose three.)

A. SAML
B. RADIUS
C. Integrity
D. Certificate
E. Anonymous

Answer: B, D, E

Question 6.
You are using LDAP as an Authentication Server. When configuring Role Mapping, you select Group Membership from your "Rule based on" dropdown box, but the screen has no group selection options.

What is cause of this problem?

A. You did not populate the IVE Server Catalog.
B. You did not save the rule first. When you come back you will be able to see the group.
C. You cannot match to Group Membership when using LDAP as an Authentication Server.
D. You did not use the Update button after you selected Group Membership as your "Rule based  
    on" option in the dropdown box.

Answer: D

Question 7.
When configuring a J-SAM custom application, why might you specify the Client Loop back IP address instead of letting the system assign one?

A. Users are running Windows XP-SP2.
B. The user's PC is running a personal firewall.
C. Users do not have permission to modify their local host.
D. J-SAM is being deployed in a heterogeneous environment.

Answer: C

Question 8.
When specifying resources as part of a Network Connect resource policy, which three formats are valid? (Choose three.)

A. tcp://*:1-1024
B. 10.10.10.10/24
C. \\server\share\*
D. udp://10.10.10.10/24.*
E. 10.10.10.10/

Answer: A, B, D

Question 9.
When should Network Connect be used? (Choose two.)

A. when the ability to disable split tunneling is required
B. when the clients will need to redirect traffic based on process name
C. when the clients will use applications with server-initiated connections
D. when the clients will not have administrator privileges on their machines

Answer: A, C

Question 10.
What is the function of Web Options when defined as part of a User Role?

A.  Web Options restrict access to specific Web sites.
B.  Web Options control the general browsing experience of the user.
C. Web Options define the colors and logos used on the IVE gateway home page where 
     bookmarks are displayed.
D.  Web Options are used to specify whether or not IP matching will be done if a user types in an 
     IP address rather than a URL.

Answer: B

Question 11.
Two resource policies cover the same resource. The first policy resource definition is not as specific as the second policy.

Which resource policy takes precedence and why?

A. The first policy takes precedence because it is the first match in the rule list and first match 
     stops processing.
B. The second policy takes precedence because it is most specific and the system works on 
     longest match.
C. The second policy takes precedence because all rules are always evaluated and the last 
     match it finds controls the action.
D. The second policy takes precedence. Unless you specify that the first rule is marked to stop  
    processing, the system continues to check for matches until it reaches the last match and it  
    takes that rule's action.

Answer: A

Question 12.
What makes RADIUS unique from the other Authentication Servers that the IVE can utilize?

A. It can be used to obtain User attributes.
B. It can be used to obtain Group information.
C. It can be used to do Accounting as well as Authentication.
D. It can be used as both a Directory Server and an Authentication Server.

Answer: C

Question 13.
Cache Cleaner is enabled in the default configuration.

What will it clear from the users system when the IVE session is over?

A. nothing
B. all temporary Internet files
C. all content downloaded through the IVE's rewriter engine
D. all cached usernames and passwords from the browser

Answer: C

Question 14.
You are configuring J-SAM for customer access to a client/server application. The user has administrative access to his workstation. You have properly configured the SAM access control policy.

Which additional option must be turned on under User > Roles> [ROLE] > for J-SAM to work properly?

A. Session Start Script
B. Automatic Host-mapping
C. User Can Add Applications
D. Prompt for Username and Password for Intranet Sites

Answer: B

Question 15.
You are using LDAP as your Directory Server.

Which two options are available for creating role mapping rules? (Choose two.)

A. User Attribute
B. LDAP Attributes
C. Group Membership
D. CA Certificate Attributes

Answer: A, C

Question 16.
What is the function of the Sign-in Policy?

A. It controls whether or not a user can sign-in, based on role membership.
B. It controls which options are available on the login screen, based on the user's permissions.
C. It controls who can access the login page, based on IP address, certificate information, Host 
    Checker and other criteria.
D. It defines the URLs that users and administrators can use to access the IVE and what Sign-in  
    Page is associated with those URLs.

Answer: D

Question 17.
Auto Allow is a feature that can be activated when creating which component in the IVE?

A. roles
B. realms
C. bookmarks
D. Authentication Servers

Answer: C


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for JN0-643 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "JN0-643" Exam

Enterprise Routing and Switching, Professional (JNCIP-ENT)

 Question 1.
Click the Exhibit button.
 

A user on port ge-0/0/12 fails an 802.1x authentication attempt.

What is the next action of Switch A?

A. It puts the Authenticator in the HELD status where all EAPOL packets are discarded until the 
    default hold timer expires.
B. It communicates with the RADIUS server to confirm the user's password.
C. It transmits an EAP-Identity-Request packet immediately after it sends out EAP-Failure.
D. It tries to authenticate the user using MAC radius authentication.

Answer: C

Explanation:

Question 2.
Click the Exhibit button.
 

Based on the configuration in the exhibit, why are you seeing drops in the best-effort queue on the SRX Series platform?

A. The drop-profile fill level is set too low.
B. Packets are dropped by a firewall policy.
C. The best-effort queue is being shaped.
D. The scheduler is not being applied correctly.

Answer: C

Explanation:

Question 3.
Click the Exhibit button.
 

Based on the output shown in the exhibit, why is VSTP not working for VLAN 100?

A. No interfaces are assigned to VLAN 100.
B. Your MSTI is misconfigured.
C. RSTP is configured in addition to VSTP.
D. No native VLAN is configured.

Answer: A

Explanation:

Question 4.
If your WAN-edge router is multihomed to different ISPs, which two BGP attributes would you modify to affect outbound traffic? (Choose two.)

A. MED
B. origin
C. local preference
D. community

Answer: B, C

Explanation:

Question 5.
When 802.1X, MAC-RADIUS, and Captive Portal are enabled on an interface, which authentication sequence occurs?

A. The authentication sequence is based on the order of the configuration.
B. If MAC-RADIUS is rejected, Captive Portal will start. If Captive portal is timed out, 802.1X will 
    start.
C. If 802.1X times out, then MAC-RADIUS will start. If MAC-RADIUS is timed out by the RADIUS  
    server, then Captive Portal will start.
D. If 802.1X times out, then MAC-RADIUS will start. If MAC-RADIUS is rejected by the RADIUS  
    server, then Captive Portal will start.

Answer: D

Explanation:

Question 6.
A medium-sized enterprise has some devices that are 802.1X capable and some that are not. 

Any device that fails authentication must be provided limited access through a VLAN called NONAUTH. How do you provide this access?

A. Configure NONAUTH VLAN as the guest VLAN.
B. Configure NONAUTH VLAN as the server-reject VLAN.
C. Configure NONAUTH VLAN as the guest VLAN and the server-reject VLAN
D. Configure a separate VLAN for each type of user: 802.1X and non-802.1X.

Answer: C

Explanation:

Question 7.
Click the Exhibit button.
 

Host 1, Host 2, and Host 3 are connected to Switch A on interface ge-0/0/2. Host 1 and Host 2 have been authenticated through 802.1X, however Host 3 does not have an 802.1X supplicant. 

Referring to the configuration in the exhibit, how can Host 3 be authenticated?

A. secure-authentication option of HTTP or HTTPS must be configured for Captive Portal.
B. MAC RADIUS authentication must be configured for Host 3 instead of Captive Portal.
C. A new authentication-profile must be configured because 802.1X and Captive Portal cannot  
    have the same authentication-profile.
D. The 802.1X server failback feature must be configured for Host 3 to allow non-802.1X clients  
   to authenticate.

Answer: B

Explanation:

Question 8.
A user complains about connectivity problems from their IP address (10.1.1.87) to a server (10.65.1.100).

Which Junos command can help verify connectivity in the network? (Choose two.) 

A. mroute
B. traceoptions
C. ping
D. clear bgp neighbor

Answer: B, C

Explanation:

Question 9.
Click the Exhibit button.
 

The exhibit shows the output of an OSPF router LSA.

Which interface ID represents the router's loopback address?

A. ID 10.1.1.0
B. ID 10.0.3.4
C. ID 10.0.3.3
D. ID 10.0.2.4

Answer: B

Explanation:

Question 10.
Click the Exhibit button. 
 

Referring to the output in the exhibit, why does the router prefer the path toward interface ge- 0/0/0.0 for the 20.0.0.0/8 route?

A. The origin is IGP.
B. The origin is unknown.
C. The AS path is longer.
D. Multihop is enabled.

Answer: A

Explanation:


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.