|
Question 1. Which of the following is the Net Batch-Plus command interpreter? A. NETBATCH B. BATCHCOM C. BATCHCAL D. NBEXEC Answer: B Question 2. You are upgrading a mirrored disk volume to one that has a larger capacity. Which of the following applies? A. The disk drive must not have opened SQL tables. B. The data on that named disk volume remains continually available. C. The opened files on the disk drive must be TMF protected. D. All files on the disk must be closed. Answer: B Question 3. Which approved method is used to remove old Guided Replacement Toolkit (GRT) log files? A. ZSWEEP B. PURGE C. FUP D. DELETE Answer: A Question 4. Which NonStop TM/MP component contains records of online dumps, audit dumps, and the media on which they reside? A. MASTER AUDIT TRAIL B. TMF CATALOG C. ZTMFCONF D. DSM Tape Catalog Answer: B Question 5. Which of the following is NOT a benefit of file partitioning? A. providing for processor and disk volume load balancing B. increasing the total number of alternate keys C. increasing the total file capacity D. providing distributed, multi node file placement Answer: B Question 6. What is the purpose of the Remote Database Facility (RDF)? A. maintains a copy of a database on one or more remote systems for recovery purposes B. accesses database images on one or more remote systems transparently for homogeneous applications C. archives database configuration information for remote systems on a centralized node D. synchronizes versions of archived data for registered application domains Answer: A Question 7. OSS disk files can be of what type? A. relative B. unstructured C. key-sequenced D. entry-sequenced Answer: B Question 8. When a failed processor is reloaded, a standard Pathway system (without extended management capability) will typically A. create the NUMSTATIC server processes that have been configured to run in the reloaded processor B. wait for operator confirmation before making the new processor available for server creation C. recreate all the server processors that were running in this processor prior to processor failure D. create server processes in the new processor as demand requires Answer: D Question 9. You are upgrading a mirrored disk volume to one that has a larger capacity. Which of the following applies? A. The disk drive must not have opened SQL tables. B. The data on that named disk volume remains continually available. C. The opened files on the disk drive must be TMF protected. D. All files on the disk must be closed. Answer: B Question 10. You are adding new physical disk volumes while the system is running. Which of the following statements applies? A. Applications need to be quiesced. B. Reloading processors might be required. C. Applications can keep running. D. The COUP utility is used to configure the drive. Answer: C Question 9. Issuing the INSPECT command ____* gives you a list of OPEN files. (Enter ONLY the command name WITHOUT ANY OPTIONS. Answer: FILES Question 12. Performance management of a system is meant to ensure that A. processor loads are balanced to within 5% of the mean processor utilization B. upgrades to system hardware happen on a regularly scheduled basis C. systems meet business needs as defined by service level agreements D. all disk drives on the system are fully utilized to minimize hardware inventory Answer: C Question 13. After installing an IPM, you discover that the incorrect version has been installed and must be removed. What is the best way to do this? A. Use the BACKOUT function from DSM/SCM. B. Use the FUP PURGEcommand. C. Use DSM/SCM to re-install the operating system. D. Use the REPSUBSYS phase of Install. Answer: A Question 14. An object file owned by super ID is secured "CGNO". Which one of the following statements is possible? A. Local super.operator can rename the file. B. Remote super.operator can duplicate the file. C. Remote super.operator can run the object with a different library. D. Remote account.manager can NOT execute the object file. Answer: B Question 15. A Tetra 8 Server Net topology A. incorporates 8 system enclosures B. has all processors directly connected C. does not allow I/O enclosures D. can support no more than 16 processors with limited I/O Answer: B Question 16. Which SCF command should be used to find the amount of free space on a specific volume? A. STATUS DISK , FREESPACE B. INFO DISK , FREE C. STATUS DISK , DETAIL D. INFO DISK , DETAIL Answer: C Question 17. Which of the following is NOT a benefit of multiple data paths? A. load balancing for enhanced performance B. fail-over connectivity for reliability of access C. continued availability during system maintenance D. direct data transfer between devices Answer: D Question 18. Where would you change the default IP address of a service processor (SP)? A. Network dialog box on the workstation B. Network dialog box on the server C. TSM Low-Level Link Application D. TSM Service Application Answer: C Question 19. Which command string would you use to stop a Non Stop TS/MP Pathway application named $PATH? A. PATHCOM $PATH; SHUTDOWN2 B. TSMPCOM $PATH; SHUTDOWN, WAIT C. TSMPCOM $PATH; STOP PATHWAY ! D. PATHCOM $PATH; STOP PATHWAY * Answer: A Question 20. An existing Pathway application designed for 6530 devices is to be deployed worldwide. What is one advantage of Web enabling this application? A. It can be accessed from any workstation with a Web browser. B. It will perform much faster as a Web application. C. It will add an extra layer of security to the application. D. It will increase application availability. Answer: A
|
Question 1. ITCertKeys.com has an IPv6 network which has 25 segments. As an administrator, you deploy a server on IPv6 network. What should you do to make sure that the server can communicate with systems on all segments of the IPv6 network? A. Configure the IPv6 address on the server as 0000::2c0:d11f:fec8:3124/64 B. Configure the IPv6 address on the server as ff80::2c0:d11f:fec8:3124/64 C. Configure the IPv6 address on the server as fe80::2c0:d11f:fec8:3124/64 D. Configure the IPv6 address on the server as fd00:: 2c0:d11f:fec8:3124/8. Answer: D Question 2. You are a network administrator at ITCertKeys.com. You have upgraded all servers in the company to Windows Server 2008. ITCertKeys.com wants you to configure IPv6 addresses on all computers in the network. A global address prefix is assigned to you. The prefix is 3FFA:FF2B:4D:B000::/41. ITCertKeys.com has four departments. You have to assign a subnet to each department. In this way, which subnetted address prefix will you assign to the fourth department? A. 3FFA:FF2B:4D:C800::/43 B. 3FFA:FF2B:4D:B400::/43 C. 3FFA:FF2B:4D:C000::/43 D. 3FFA:FF2B:4D:F000::/45 E. None of the above Answer: A Explanation The option 3FFA:FF2B:4D: C800::/43 is correct. The subnetting in IPv6 is performed by determining the number of bits used for subnetting and the itemization of the new subnetted address prefixes. Usually the number of bits for subnetting is s, where 2^s = number of subnets to be created. In this scenario 2^s = 4 and therefore s=2. Then the itemizations of the new subnetted address prefixes are done. In this scenario, the correct subnetted address prefix is 3FFA:FF2B:4D:C800::/43. So option A is the correct answer. Question 3. Exhibit: ITCertKeys has decided to re-design its public network. The network will employ an IPv4 addressing. The range would be 129.108.10.0/21. The network must be configured in segments as shown in the exhibit. You have to configure the subnets for each segment in the network. You need to ensure that your solution must support all computers in each segment. Which network addresses should you assign to achieve this task? A. Segment A: 129.108.10.109/22, Segment B: 129.108.10.0/23, Segment C: 129.108.10.0/24, Segment D: 129.108.10.109/25 B. Segment A: 129.108.10.0/22, Segment B: 129.108.10.0/23, Segment C: 129.108.10.0/24, Segment D: 129.108.10.128/26 C. Segment A: 129.108.10.0/22, Segment B: 129.108.10.128/23, Segment C: 129.108.10.0/192, Segment D: 129.108.10.224/25 D. Segment A: 129.108.10.128/22, Segment B: 129.108.10.192/23, Segment C: 129.108.10.224/24, Segment D: 129.108.10.0/26 E. None of the above Answer: B Question 4. ITCertKeys network is configured to use Internet Protocol version (Ipv6). You installed a Dynamic Host Configuration Protocol (DHCP) server on a server named ITCertKeysDHCP1 running Windows 2008 server. You want to ensure that neither IP address nor other configuration settings are automatically allocated to DHCP clients on a subnet that does not use DHCPv6 from ITCertKeysDHCP1. How should you configure the Managed Address Configuration flag, and the other Stateful Configuration flag in the route advertisements? A. Set both Managed Address Configuration and Other Stateful Configuration flag to 0 B. Set both Managed Address Configuration and Other Stateful Configuration flag to 1 C. Set both Managed Address Configuration to 0 and Other Stateful Configuration flag to 1 D. Set both Managed Address Configuration to 1 and Other Stateful Configuration flag to Answer: A Explanation: This setting will ensure host will receive neither an IP address nor additional configuration information. Question 5. You have upgraded hardware of DNS servers in your network. You also added two new domain controllers to the domain. All client computers use DHCP. Users are not able to logon to domain after the upgrade of DNS servers. What should you do to ensure that users are able to log on to the domain? A. Restart the Netlogon service on the new DNS servers B. Run ipconfig/registerdns at the command prompt of new DNS servers C. Reconfigure the DHCP scope option 006 DNS name Servers with the new DNS servers IP addresses D. Configure the network settings for workstations to Disable NetBIOS over TCP/IP E. None of the above Answer: C Explanation: To ensure that the users are able to log on to the domain, you should reconfigure the DHCP scope option 006 DNS name Server with the new DNS servers IP addresses. Question 6. Exhibit: ITCertKeys company network consists of Windows 2008 server computers and Windows Vista client computers. You have the following eight Internet Protocol version 6 (Ipv6) sub netted address prefixes. Please refer to the exhibit. What would be the original prefix length for the global address prefix 3FFE:FFFF:0:C000:: ? A. 51 B. 52 C. 53 D. 54 E. None of the above Answer: A Explanation: The original prefix length for the globe address prefix 3FFE:FFFF:0:C000:: is 51. The eight Ipv6 subnetted address prefixes are the result of 3 bit subnetting of the global address prefix 3FFE:FFFF:0:C000::/51. To perform 3-bit subnetting of the global address prefix 3FFE:FFFF:0:C000::/51 we use the following calculations: Hexadecimal value of the subnet ID being subnetted, F = oxC000 Subnetting bits, s = 3 Question 7. ITCertKeys Company has IPV6 network. The IPV6 network has 25 segments. You deployed a new Windows 2008 server on the IPV6 network. What should you do to ensure that the server could communicate with systems on all segments of the IPV6 network? A. Configure the IPV6 address as fd00::2b0:d0ff:fee9:4143/8 B. Configure the IPV6 address as fe80::2b0: d0ff:fee9:4143/64 C. Configure the IPV6 address as ff80::2b0: d0ff:fee9:4143/64 D. Configure the IPV6 address as 0000::2b0: d0ff:fee9:4143/64 E. None of the above Answer: A Explanation: To ensure that the server communicates with systems on all segments of the IPV6 network, you need to configure the IPV6 address as fd00::2b0:d0ff:fee9:4143 /8 because this address is the local unicast address type and is not routed on the Internet. It is generally filtered inbound. Reference: IPv6 Unicast Address Information http://www.netcraftsmen.net/welcher/papers/ipv6part02.html Question 8. You are an administrator at ITCertKeys.com. ITCertKeys.com has opened a new Branch office at a new location. Windows Server 2008 is implemented on the servers. The initial network has 20 computers. You are asked to configure an appropriate IP addressing scheme in the network. Which network address should you use to accomplish this task? A. 192.10.100.0/26 B. 192.10.100.0/30 C. 192.10.100.0/29 D. 192.10.100.0./31 E. None of the above Answer: A Explanation To configure an appropriate IP addressing scheme in the network, you should use 192.10.100.0/57. In this scenario, 50 computers have to be configured in a network. Network address is calculated as follows: 1. Class A networks has a default subnet mask of 255.0.0.0 and use 0-127 as their first octet 2. Class B networks has a default subnet mask of 255.255.0.0 and it can use 128-191 as their first octet 3. Class C networks has a default subnet mask of 255.255.255.0 and it can 192-223 as their first octet You need to configure the network address to accommodate at least 50 hosts per subnet. To calculate the number of host bits, use the formula: 2^n-2 where n=32 bits. To configure 50 hosts, you need 192.10.100/26 network address which has maximum 62 hosts per subnet. The formula to calculate the hosts per subnet is: 32-26= 6 2^6-2= 62 So according to this calculation, network address 192.10.100/26 will be able to accommodate 50 hosts per subnet. We have deducted 6 bits from the total of 32 bits. Question 9. You are an enterprise administrator for ITCertKeys. The corporate network of the company consists of servers that run Windows Server 2008 and client computers that run Windows XP Service Pack 2 (SP2), Windows 2000 Professional, or Windows Vista. The company has decided to use IPv6 protocol on its network. Which of the following options would you choose to ensure that all client computers can use the IPv6 protocol? A. Run the IPv6.exe tool on all the client computers. B. Upgrade the Windows 2000 Professional computers to Windows XP SP2. C. Upgrade all Windows 2000 Professional computers with Service Pack 4. D. Install the Active Directory Client extension (DSClient.exe) on all the client computers. Answer: B Explanation: To ensure that all computers can use the IPv6 protocol, you need to upgrade the Windows 2000 Professional computers to Windows XP SP2. IPv6 protocol is far superior to IPv4 protocol in terms of security, complexity, and quality of service (QoS). Therefore, all the new operating systems started using IPv6 protocol. The older operating systems such as Windows 2000 professional does not support Ipv6 therefore this needs to be upgraded to either Windows XP or Windows Vista. You can now get versions of Windows that fully support most aspects of IPv6 (namely Windows XP and Windows Server 2003) and you will soon be able to get versions of Windows that not only fully support IPv6 but also provide enhanced performance for IPv6 networking. Reference: IPv6 Support in Microsoft Windows/ Windows 2000 http://www.windowsnetworking.com/articles_tutorials/IPv6-Support-Microsoft-Windows.html Question 10. You are an enterprise administrator for ITCertKeys. The company consists of a head office and two Branch offices. The corporate network of ITCertKeys consists of a single Active Directory domain called ITCertKeys.com. The computers in the Branch office locations use IPv4 and IPv6 protocols. Each Branch office is protected by a firewall that performs symmetric NAT. Which of the following options would you choose to allow peer-to-peer communication between all Branch offices? A. Configure the use of Teredo in the firewall. B. Configure the external interface of the firewall with a global IPv6 address. C. Configure the internal interface of the firewall with a link local IPv6 address. D. Configure dynamic NAT on the firewall. Answer: A Explanation: To allow peer-to-peer communication between all Branch offices where each location is protected by a firewall that performs symmetric NAT, you need to configure the firewall to allow the use of Teredo. Teredo is an IPv6 transition technology that provides address assignment and host-to-host automatic tunneling for unicast IPv6 traffic when IPv6/IPv4 hosts are located behind one or multiple IPv4 network address translators (NATs). Teredo in Windows Vista and Windows Server "Longhorn" will work if one of the peers is behind a symmetric NAT and the other is behind a cone or restricted NAT. Reference: Teredo Overview http://technet.microsoft.com/en-us/liBRary/bb457011(TechNet.10).aspx
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.