|
Question 1. The SAN Router's system address must be configured on ________________ , before any of the mSNS's can communicate with each other. A. the same Inband network B. a different Inband network C. the same Out-of-band network D. a different Out-of-band network Answer: A Question 2. Name the two which are characteristics of synchronous data replication. (Choose two.) A. Acknowledgement of data B. Supports longer distances C. Increased data protection D. More cost effective Answer: A, C Question 3. Name the two pieces of information which are needed to login to Element Manager using SNMP. (Choose two.) A. SNMP management application B. IP address for the management station C. Eclipse SAN Router Inband address D. Eclipse SAN Router management IP address E. community string Answer: D, E Question 4. Ports 1 and 2 on the McDATA Eclipse 1620 SAN Routers can be used to connect to three connection types. (Choose three.) A. LAN networks B. hosts / initiators C. FC switches D. MAN / WAN networks E. targets / storage Answer: B, C, E Question 5. Name the two network variables (where either one or both are present) should you use Fast Write on an iFCP port. (Choose two.) A. 100 km of distance between iFCP peer ports B. 200 km of distance between iFCP peer ports C. 1 ms of latency on iFCP network D. 2 ms of latency on iFCP network Answer: B, D Question 6. Name the device which operates at Layer 2 of the OSI Model. A. router B. server C. switch D. hub Answer: C Question 7. At ITCertKeys.com, you work as a network administrator. 100 servers are deemed ineligible for HBA's and direct attachment to the Fibre Channel fabric, in a data center. iSCSI drivers have been placed on each server. Through an Ethernet switch, the servers have 100BaseT cards and are aggregated. A single iSCSI gateway (Eclipse 1620) has been attached to a dedicated Ethernet switch via both Gigabit Ethernet (GE) ports. Name the statement which is true. A. If packets are dropped, flow control is handled by the Data Link Layer (Layer 2) between the Eclipse and the Ethernet switch. B. LUN mapping on the Eclipse should be configured to provide a LUN of 1 to all the servers. C. Compression between the iSCSI initiator and the iSCSI gateway should be set to auto and last LZO with History D. In this case, Eclipse iSCSI ports support a fan-in of 50 to 1 without oversubscription. The ports on this iSCSI gateway are oversubscribed by 2:1. Answer: D Question 8. Name the default baud rate setting of the serial port on a McDATA Eclipse SAN Router. A. 9600 B. 115200 C. 2400 D. 57600 Answer: A Question 9. What is returned to the server from the Fibre Channel Switch, when a server initiates a FLOGI? A. a register state change notification B. the name of the switch C. the server's Fibre Channel address D. the switch's Fibre Channel address Answer: C Question 10. The increments defined are in __________ Kbps, when using a number to configure the Ethernet port speed. A. 3000 B. 1.5 C. 1500 D. 10 E. 100 Answer: C Question 11. How must they be configured, when configuring mFCP ports? A. Individually B. Even number ports C. In pairs D. Odd number ports Answer: C Question 12. Between connecting with Telnet or using the Maintenance Port, what is the functional management difference? A. None B. Firmware upgrade C. Performance statistics D. Internal addressing Answer: A Question 13. Name the default mSAN ID? A. 0 B. 10 C. 1 D. 30 E. 31 Answer: A Question 14. Name the three which are part of a standard iSCSI name in IQN format. (Choose three.) A. type designator B. alias C. unique identifier assigned by the naming authority D. IP address E. naming authority Answer: A, C, E Question 15. There is an outline around each FC and Ethernet port in Element Manager, on the McDATA Eclipse 1620 SAN Router. Explain what a red outline indicates about each port. A. Fibre Channel B. down C. power fault D. disabled Answer: B Question 16. Name the two methods which can be used to configure iSCSI Access Control in a McDATA Eclipse SAN Router. (Choose two.) A. externally by a third-party TACACS+ server B. internally by a different McDATA Eclipse SAN Router C. externally by a third-party RADIUS server D. internally by the same McDATA Eclipse SAN Router Answer: C, D Question 17. State how many intelligent ports are on an Eclipse 2640 SAN Router. A. 2 B. 16 C. 12 D. 4 Answer: D Question 18. Name the firmware which contains all features for an Eclipse 2640 SAN Router. A. 2640 SB Firmware B. 2640 FR Firmware C. 2640 FF Firmware D. 2640 EF Firmware Answer: C Question 19. A management IP address of 192.168.111.110 for an Eclipse 1620 SAN Router, ITCertKeys.com has provided. Name the addresses which must be changed. A. mFCP addresses B. Intelligent port IP addresses C. External router addresses D. Inband addresses Answer: D Question 20. Name the advanced TCP parameter which should be used on a given iFCP port when there is a higher frequency of out of order or retransmitted packets on the network. A. Compression Method = Fast LZO with History B. MTU Size = Auto C. Selective Acknowledgement D. Fast Write Answer: C
|
Question 1. On which three back-end authentication servers can you use the "userAttr" attribute? (Choose three.) A. certificate server B. NIS server C. RADIUS D. SiteMinder E. LDAP Answer: C, D, E Question 2. You have just finished creating an IVS on your device. You can log in to your IVS but you cannot access any backend resources. What should you troubleshoot first? A. Verify that you have associated your IVS to the correct VLAN. B. Verify that you have allocated enough users for your IVS. C. Verify that you are not blocked because of an untrusted certificate on the IVS. D. Verify that you have associated your IVS to the correct virtual IP. Answer: A Question 3. Which two network settings are accessible only through the root administrator and cannot be accessed by the VS administrator? (Choose two.) A. internal port IP address B. Network Connect filters C. DNS options D. hosts file Answer: A, B Question 4. Which operation would you use to extract the configuration in a format that can be read by a script? A. XML export B. Syslog capture C. Config export D. SNMPv3 trap Answer: A Question 5. When using Secure Virtual Workspace, where is the protected workspace created? A. in the IVE memory B. on the IVE hard drive C. on a trusted server D. on the client desktop Answer: D Question 6. In which format is the client-side log stored on the client? A. XML B. binary C. ASCII D. base64 Answer: C Question 7. You have just created a secure Web portal that will be accessed through the IVE device. Which two steps must you complete before creating the bookmark for accessing this portal? (Choose two.) A. Generate a trusted certificate for your IVE device. B. Verify that the IVE device has a trusted relationship with your Certificate Authority. C. Verify that "Allow browsing untrusted SSL websites" is selected in the "Web Options" role. D. Generate a certificate for the secure Web portal from your trusted Certificate Authority. Answer: B, D Question 8. You have correctly enabled meeting email notifications by defining the appropriate SMTP options on the IVE device's Secure Meeting configuration page. However, when new meetings are created, invitees do not receive the emails. What might be causing this problem? A. You have not specified the IVE device's fully qualified hostname on the Network configuration page. B. The time is not synchronized between the IVE device and the SMTP server. C. You have chosen to "Hide attendee names" when specifying meeting options. D. You have invited attendees with email addresses in a domain that is not registered on the Secure Meeting configuration page. Answer: A Question 9. Which three client endpoint agents can produce and auto-upload logs when configured to do so? (Choose three.) A. Meetings B. Installer Service C. Terminal Services D. Advanced Endpoint Defense E. Host Checker Answer: A, C, E Question 10. A company does not want to allow users to remotely download content through the IVE rewriter because of concerns that the content will be left behind on user PCs. Which three options should be investigated and used to help mitigate this risk? (Choose three.) A. Disable caching for all Web content. B. Use Secure Virtual Workspace. C. Use Cache Cleaner. D. Enable caching for all Web content. E. Enable caching in the Web browser. Answer: A, B, C
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.