Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "HP0-081" Exam

OpenVMS System Administration

 Question 1.
What is the lexical function used to return accounting, status, and identification information for a process?

A. F$USER
B. F$GETJP
C. F$GETJOB
D. F$PROCESS

Answer:  B

Question 2.
Which command deletes a logical name TROLL from the GROUP logical name table?

A. DELETE/LOGICAL TROLL
B. DEASSIGN/GROUP TROLL
C. DELETE/TABLE=GROUP TROLL
D. DEASSIGN/TABLE=GROUP TROLL

Answer:  B

Question 3.
After execution of the command: $ DEFINE/JOB LOGNAME SYS$LOGIN:MYFILE:DAT 

What happens to the logical name LOGNAME?

A. It is visible to all processes in the same UIC group.
B. It is designed automatically on the next image exit.
C. It is placed into the process logical name table.
D. It is visible to all processes in this process tree.

Answer:  D

Question 4.
Based on the message format, "%facility-s-identification, text", where "s"represents the severity, what would a severity level of "E" represent?

A. The command may have performed some, but the system may attempt to continue execution.
B. The output or program result is incorrect, but the system may attempt to continue execution.
C. The output or program result is incorrect. The system cannot continue to execute the request.
D. The system has performed your request. The message provides information about the 
    process.

Answer:  B

Question 5.
Which statements are true regarding the default behavior of batch job log files? Select TWO.

A. created in the job Owners'SYS$LOGIN directory
B. printed on queue SYS$PRINT and retained
C. printed on queue SYS$PRINT and deleted
D. given the same protection as the batch queue.
E created in the same directory as the command procedure.
F. given the same protection as the batch procedure.

Answer:  A, C

Question 6.
What is the command to specify that DEC windows client programs use node XARA as the DEC windows server, running over DEC net protocol?

A. DEFINE DECW$DISPLAY XARA:
B. SET DISPLAY/CREATE/NODE=XARA
C. CREATE/DISPLAY/NODE=XARA/PROTOCOL=DECNET
D. SET DECWINDOWS/NODE=XARA/TRANSPORT=DECNET

Answer:  B

Question 7.
Which command or qualifier is used to display each line of a command procedure while it is executing?

A. SET NOON
B. SET VERIFY
C. @procedure/VERIFY
D. @procedure/OUTPUT=file

Answer:  B

Question 8.
Which statements about the swap file are true? Select TWO.

A. The swapfile will be used by the modified page writer when the pagefile is full.
B. When a process is swapped out of memory, it is written to the swapfile.
C. The swapfile must exist on the boot device, and be at least the size of WSMAX.
D. The swapfile is optional, and may be installed on a disk other than the boot device.
E. The swapper process writes page from the modified page list to the swapfile.

Answer:  B, D 

Question 9.
What are benefits of VMS clustering? Select THREE.

A. non-stop processing
B. massively parallel computing
C. single security domain
D. transparent access to storage between HP-UX, OpenVMS, and Linux systems.
E. shared storage across multiple systems
F. cross-node automatic process failover
G. high availability

Answer:  C, E, G 

Question 10.
What is the difference between a buffered I/O (BIO) and a direct I/O (DIO)?

A. The user must provide a buffer to perform a BIO, but not for a DIO.
B. BIOS are substantially faster than DIOs, but consume more memory.
C. BIO data is copied to/form a system buffer before/after performing the I/O
D. Most I/Os to terminals are DIOs; all I/Os to disks are BIOs.

Answer:  C

Question 11.
VMS cluster interconnects sever which purposes? Select TWO.

A. host systems accessing all physical devices and mailboxes.
B. host systems accessing storage devices through the MSCP server.
C. communication to the master node maintaining the Dedicated CPU Lock Manager.
D. direct access to the master node's memory for the shared lock database.
E. host systems in the cluster communicating with each other.

Answer:  B, E

Question 12.
To what does the term "Working set"refer?

A. processes that are currently residing in the system's balance set.
B. virtual pages that are mapped by a process that in the CUR state.
C. virtual pages that are currently valid in the global page table.
D. virtual pages that a process can access without generating a page fault.

Answer:  D

Question 13.
By default, which file stores the system audit records?

A. SYS$MANAGER:OPERATOR.LOG
B. SYS$MANAGER:AUDIT_SERVER AUDIT$JOURNAL
C. SYS$MANAGER:ACCOUNTING.DAT
D. SYS$MANAGER:SECURITY AUDIT$JOURNAL

Answer:  D

Question 14.
To review all the audit events for a specific user, which command is used?

A. ANALYZE/AUDIT/FULL/SINCE=TODAY/USER=ADAMS 
    SYS$MANAGER:SECURITY AUDIT$JOURNAL
B. ANALYZE/AUDIT/FULL/ACCOUNT=PAYROLL SYS$MANAGER:SECURITY 
    AUDIT$JOURNAL
C. ANALYZE/AUDIT/FULL/SELECT=PROCESS=NAME=ADAMS
    SYS$MANAGER:SECURITY AUDIT$JOURNAL
D. ANALYZE/AUDIT/FULL/SELECT=USERNAME=ADAMS
    SYS$MANAGER:SECURITY AUDIT$JOURNAL

Answer:  D

Question 15.
Which command correctly terminates the AUDIT_SERVER process?

A. STOP AUDIT_SERVER
B. SET AUDIT/SERVER=FINAL_ACTION=CRASH
C. SET AUDIT/SERVER=EXIT
D. SHUTDOWN AUDIT_SERVER

Answer:  C

Question 16.
Which command clears this intrusion record?
Exhibit:
Intrusion Type count Expiration source
TERM_USER SUSPECT 4 2-Jan-1999 13:20:30:89 XARA/0003440121:SMITH

A. DELETE/INTRUDER/RECORD=XARA/0003440121:SMITH
B. DELETE/INTRUSION_RECORD "XARA/0003440121 SMITH"
C. DELETE/INTRUSION_RECORD /SOURCE="XARA/0003440121:SMITH"
D. SET AUDIT/DELETE/INTRUSION_RECORD "XARA/0003440121:SMITH"

Answer:  B

Question 17.
What is the purpose of security auditing?

A. prevent hackers from penetrating the system.
B. analyze system usage and project future growth trends.
C. analyze and record system use to detect attempts to compromise system security.
D. gather system user statistics to enable system managers to charge for resource consumption.

Answer:  C

Question 18.
Which command displays the LURT (License Unit Requirement Table) entry for an OpenVMS node? There is more than one correct answer.

A. SHOW LICENSE/LURT
B. LICENSE LIST/TABLE
C. SHOW LICENSE/CHARGE_TABLE
D. LICENSE LIST/MINIMUM_UNITS
E. SHOW CPU/UNIT_REQUIREMENT
F. SHOW LICENSE/UNIT_REQUIREMENT

Answer:  A, B, C, D, E, F

Question 19
Assuming patch kit DEC-AXPVMS732_SYS-V0600-4.PCSI is the latest patch installed.

Which statements are true? Select TWO.

A. PRODUCT ERASE *will remove all existing patches
B. PRODUCT UNDO will remove the patch if it was installed with the /SAVE_RECOVERY_DATA 
    option.
C. @SYS$UPDATE:VMSINSTAL REMOVE will remove the patch if it was installed with the 
    SAVE_RECOVERY_DATA option.
D. PRODUCT DELETE RECOVERY_DATA/ALL will erase any existing undo data.
E. PRODUCT REMOVE_UPDATE will remove the patch if it was installed with the 
     /SAVE_RECOVERY_DATA option.

Answer:  B, D

Question 20.
Which installation option performs a new installation on a disk?

A. CURRENT
B. OVERWRITE
C. INTIALIZE
D. PRESERVE

Answer:  C


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-401 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-401" Exam

Microsoft System Center Configuration Manager 2007, Configuring

 Question 1.
You work as an administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. ABC.com makes use of System Center Configuration Manager 2007 on their network. ABC.com has recently opened a new satellite office in Miami. You have been tasked with making sure that users in the Miami office are able to install operating systems on their workstations using boot images. You decide to modify the settings of the site system in the Configuration Manager to answer requests for boot images from workstations in the Miami office.

Which of the following actions should you take?

A. You should consider creating a new site system, and installing the PXE Boot Service on a 
    DHCP server in ABC.com’s environment.
B. You should consider creating a new site system, and granting it the Fallback status point role.
C. You should consider creating a new site system, and installing the State Migration Service on 
    a DHCP server in ABC.com’s environment.
D. You should consider creating a new site system, and granting it the PXE Service Point role.

Answer: D

Explanation:

Question 2.
You work as a Configuration Manager 2007 administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. You have received instruction from the CIO to prepare for the deployment of new OS to all workstations on the ABC.com network office. You are then informed that for the boot images to perform adequately, it needs added network drivers. You navigate to the properties of the boot image, and choose the Select a Driver option. When you try to add the required drivers, you notice that there aren’t any drivers available.

Which two of the following actions should you take?

A. You should consider importing the relevant drivers into the Drivers node of the Configuration  
    Manager console.
B. You should consider importing the relevant drivers into the Driver Packages node of the 
    Configuration Manager console.
C. You should also consider choosing the relevant drivers and adding it in the boot image 
    properties.
D. You should also consider choosing the relevant package and adding it in the boot image 
    properties.

Answer: A, C

Explanation:

Question 3.
You work as a Configuration Manager 2007 administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. After configuring Network Access Protection (NAP) on ABC.com’s network, you are instructed to make sure that users on ABC.com’ network are able to access options for remediation in the event of remediation failing. You create a Web site in the restricted network

Which of the following actions should you take?

A. You should consider having a Web site created in the restricted network.
B. You should consider having a Web site created in the public network.
C. You should consider having the Troubleshooting URL setting configured on the network policy 
    for computers that are not compliant.
D. You should consider having the Troubleshooting URL setting configured on the network policy 
    for computers that are unidentified.

Answer: A, C

Explanation:

Question 4.
You work as a Configuration Manager 2007 administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. You have been tasked with making sure that all workstations on the ABC.com network can be located by which office they reside in. To achieve this, you plan to insert a custom element in the hardware inventory data.

Which of the following actions should you take?

A. You should insert a NOIDMIF file, which hosts the office location data, on each workstation. 
    You should then set up the Configuration Manager 2007 to gather NOIDMIF files from 
    workstations.
B. You should modify the Configuration.mof file. You should then insert a NOIDMIF file, which 
    hosts the office location data, on each workstation.
C. You should modify the Configuration.mof file. You should then set up the sms_def.mof file.
D. You should set up the sms_def.mof file. You should then set up the Configuration Manager 
    2007 to gather NOIDMIF files from workstations.

Answer: A

Explanation:

Question 5.
You work as an administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. ABC.com makes use of System Center Configuration Manager 2007 on their network. You have recently deployed a custom application to all workstations on the ABC.com network. You are instructed to view the registry values for the new application for all ABC.com workstations. To achieve this, you have to send a query to Configuration Manager 2007 for the relevant information.

Which of the following actions should you take?

A. You should consider configuring hardware inventory, and setting the SMS_Def.MOF file on 
    every site to query for the registry values.
B. You should insert a NOIDMIF file on each workstation, and set up the Configuration Manager  
    2007 to gather NOIDMIF files from workstations.
C. You should consider amending the sitectrl.cto file at the primary site.
D. You should consider amending the sitectrl.cto file at the secondary site.

Answer: A

Explanation:

Question 6.
You work as an administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. ABC.com makes use of System Center Configuration Manager 2007 on their network. All workstations on the ABC.com network have a custom application, named ABCApp, installed. You have been instructed to monitor the amount of software used by ABCApp. Furthermore, you have to make sure that you are able to achieve this even if the name of the ABCApp executable is changed. You need to achieve this with as little administrative effort as possible.

Which of the following actions should you take?

A. You should consider configuring a software metering rule, and specify the new file name every  
    time that it is changed.
B. You should consider configuring a software metering rule, and specifying the Original file name  
    for ABCApp.
C. You should consider having a customized report configured on the Reports node.
D. You should add all workstations that run ABCApp to a collection, and then configure a  
   configuration baseline that is applied to the collection.

Answer: B

Explanation:

Question 7.
You work as an administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. ABC.com makes use of System Center Configuration Manager 2007 on their network. You have been instructed to make sure that a range of inventoried names for an application named TestApp can be viewed as a single display name in a Resource Explorer. To do this, you have to consolidate the different inventoried names for TestApp. You have verified that the Software Inventory client agent has been enabled.

Which of the following actions should you take?

A. You should consider having the SMSCIient.mof file modified.
B. You should consider configuring the properties of the Software Inventory client agent to  
    assemble several products into one product name.
C. You should consider having the CollectionSettings.mof file modified.
D. You should consider configuring the properties of the Software Inventory client agent to have a 
    product name for each and every product.

Answer: B

Explanation:

Question 8.
You work as an administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. ABC.com makes use of System Center Configuration Manager 2007 on their network. System Center Configuration Manager 2007 has been configured to run in mixed mode. The site server, named ABC-SS01, in ABC.com’s central site is configured as a device management point. You have recently configured a compulsory task to distribute a software package to portable devices. While performing routine monitoring, you notice the failure of software distribution to portable devices on the LAN. You have to make sure that software can be deployed to portable computers via Configuration Manager 2007. You have confirmed that Internet Information Services (IIS) is running, and that Web Distributed Authoring and Versioning (WebDAV) extensions for IIS has been enabled.

Which combination of the following options would allow you to achieve this? (Choose all that apply.)

A. You should choose the Allow clients to transfer content from this distribution point using BITS,  
    HTTP, and HTTPS option on the General tab of the ConfigMgr distribution point Properties 
    Dialog box.
B. You should deselect the Allow clients to transfer content from this distribution point using BITS, 
     HTTP, and HTTPS option on the General tab of the ConfigMgr distribution point Properties 
    Dialog box.
C. You should deselect the Allow clients to connect anonymously (Required for mobile device 
    clients) option on the General tab of the ConfigMgr distribution point Properties dialog box.
D. You should choose the Allow clients to connect anonymously (Required for mobile device  
    clients) option on the General tab of the ConfigMgr distribution point Properties dialog box.

Answer: A, D

Explanation:

Question 9.
You work as an administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. ABC.com recently introduced System Center Configuration Manager 2007 on their network. You have been asked to make sure that all computers in the ABC.com environment are linked to System Center Configuration Manager 2007. You are at present preparing for the installation of the Configuration Manager client software. 

Which of the following actions should you take?

A. You should create a deadline for the installation.
B. You should have the logon script configured to execute the ccmsetup.exe command.
C. You should have the logon script configured to execute the Capinst.exe command.
D. You should have the system health validator (SHV) point enabled.

Answer: A

Explanation:

Question 10.
You work as an administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. ABC.com makes use of System Center Configuration Manager 2007 on their network. The ABC.com network also contains a server, named ABC-SR15, which runs Windows Server Update Services (WSUS) 3.0. ABC.com’s workstations receive software updates from ABC-SR15. You have been instructed to make sure that software update point client installation is adequately configured.

Which of the following actions should you take?

A. You should consider configuring the WSUS server to make use of a proxy server via the 
    Configuration Manager console. You should also consider importing a Group Policy object 
    (GPO), configuring it to identify command lines for the installation, and then assign it.
B. You should consider importing a Group Policy object (GPO), configuring it to identify command 
    lines for the installation, and then assign it. You should also consider configuring the WSUS  
    server as a ConfigMgr software update point.
C. You should consider specifying the fully qualified domain name (FQDN) for the WSUS server  
    on a public DNS server. You should also consider configuring the WSUS server as a  
    ConfigMgr software update point.
D. You should consider configuring the WSUS server to make use of a proxy server via the  
    Configuration Manager console. You should also consider configuring the WSUS server as a  
    ConfigMgr software update point.

Answer: B

Explanation:



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.