Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "250-501" Exam

Intrusion Protection Solutions

 Question 1.
When triggered by an event within the cage, what describes the actions taken by Symantec Decoy Server?

A. Event trigger
B. Script response
C. Response policy
D. Frequency-based policy

Answer: C

Question 2.
What features does Symantec Decoy Server use to automatically discard insignificant events?

A. Threat filters
B. Policy filters
C. Report filters
D. Advanced filters

Answer: B

Question 3.
How many physical interfaces are required on a Symantec Decoy Server Host configured with four cages?

A. 1
B. 2
C. 4
D. 5

Answer: D

Question 4.
Which two management functions does the Symantec Decoy Server provide?

A. Live Update
B. Data rollover
C. Data structuring
D. Automated backup/restore

Answer: B, D

Question 5.
Which type of intrusion detection does Symantec Decoy server provide?

A. Only host-based
B. Behavioral-based
C. Only network-based
D. Host-based and network-based

Answer: D

Question 6.
Symantec Decoy Server offers a unique advantage in detecting which type of intrusion?

A. a slow scan
B. a remote buffer overflow
C. a distributed denial of service
D. an attack with known signatures

Answer: A

Question 7.
Which two functions does the Symantec Decoy Server console provide? (Choose two)

A. User tracking
B. Reverse lookup
C. Single point upgrades
D. Data maintenance and compression

Answer: B, D

Question 8.
Which authentication service certifies that attack data are not altered on Symantec Decoy Server?

A. RSA
B. Entrust
C. iButton
D. Verisign

Answer: C

Question 9.
Your organization has decided to create a new cage on a Symantec Decoy Server. In order to make the environment as convincing as possible, the content should be randomly generated. 

How can you accomplish this?

A. Use Content Generation Module
B. Use random generation console
C. Import content from existing servers
D. Automatically done by Symantec Decoy Server

Answer: A

Question 10.
Which three organizations actively monitor the release of patches and upgrades from vendors?
(Choose three)

A. CERT
B. Microsoft
C. Symantec
D. Security focus
E. Sun Microsystems

Answer: A, C, D

Question 11.
Which type of attacks are anomaly-based intrusion detection systems primarily designed to detect?

A. Novel
B. Known
C. Host-based
D. Network-based

Answer: A

Question 12.
Which two management functions does the Symantec Decoy Server provide? (Choose two.)

A. Roster file backup
B. Resource pool tracking
C. Report generation scheduling
D. Centralized software updates

Answer: C, D

Question 13.
In which format is all Symantec Decoy Server intrusion analysis data compiled?

A. XML log format
B. HTML-formatted templates
C. Time-stamped logs that are stored in uneditable files
D. Time-stamped logs that are stored in a relational database

Answer: C

Question 14.
What does the Symantec Decoy Server virtual environment appear as to an attacker?

A. ALX operating system with associated applications and services
B. Linux operating system with associated applications and services
C. Solaris operating system with associated applications and services
D. Windows operating system with associated applications and services

Answer: C

Question 15.
Which two are Symantec Decoy Server response types? (Choose two.)

A. SNMP
B. Track back
C. Traffic record
D. Shutdown cage

Answer: A, D


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 0B0-105 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "0B0-105" Exam

IBM System z System Programmer Mastery

 Question 1.
Exhibit:
 

What is this and how can it be executed?

A. It's a JCL procedure and cannot be executed.
B. It's a job and may be submitted with a SUBMIT command.
C. It's a JCL procedure and can be executed with a submit command.
D. It's a JCL procedure and must be invoked in a job with an EXEC statement.

Answer: D

Question 2.
In the ISPF Edit panel, there are fields named PROJECT, GROUP, TYPE, and MEMBER. 

What information do these fields specify?

A. DSNAME
B. DDNAME
C. PARM field
D. DD Statement

Answer: A

Question 3.
Which of the following describes relative access speed for z9 major storage types?

A. Tape is faster than DASD
B. DASD is faster than cache
C. Real memory is faster than DASD
D. Optical storage is faster than cache

Answer: C

Question 4.
Which of the following are the types of EDIT commands?

A. Menu and Line
B. Line and Data
C. Primary and Line
D. Primary and Secondary

Answer: C

Question 5.
Which of the following z/OS data set organization is most like a UNIX directory?

A. VSAM RRDS
B. Sequential data set
C. Partitioned data set
D. VSAM Indexed data set

Answer: C

Question 6.
If a userid is ZTEST1, then what is entered in the Data Set List Utility (generally option 3.4) for "Dsname Level" to list all data sets with the high level qualifier of the userid?

A. ZTEST1
B. "ZTEST1"
C. *.ZTEST1*
D. 'ZTEST1*'

Answer: A

Question 7.
PC keyboards do not have a "PA1" key, 3270 emulators map some keys to "PA1". 

What is the "PA1" key used for in TSO and ISPF?

A. Terminate the program currently running.
B. Terminate ISPF to return to the TSO READY prompt.
C. Pause a program so that data will not continue to scroll.
D. Clear the screen to allow the next screen of data to display.

Answer: A

Question 8.
The syntax:
//INPUT DD* is used for what purpose?

A. To specify that this DDNAME refers to a null dataset
B. To specify that this DDNAME refers to the same dataset as the prior DD statement
C. To specify that the data is contained in the JCL stream immediately after this DD statement
D. To specify that the DDNAME refers to the same dataset as the DD statement with DDNAME of 
    INPUT in the prior job step

Answer: C

Question 9.
What is the relationship of the Layered Network Models of TCP/IP, OSI, and SNA?

A. SNA is an internal construction in z/OS and does not allow for end points.
B. They are the same except that the OSI model inverts the layers top to bottom.
C. They have the same layers with the exact same functions in each layer, but the names are 
    different.
D. The layers are conceptually similar but differ in name and details of what functions are in which 
    layers.

Answer: D

Question 10.
A mainframe customer wants to add a web site for customer orders. They plan to tightly couple the web site to their existing back office z/OS applications. 

Which of the following describes an effective implementation?

A. Bring in another System z machine
B. Implement a firewall on the mainframe and use WebSphere to enable the web site on a Linux 
    server.
C. Implement a firewall on a new, small Unix server and use WebSphere to enable the web site 
    on the mainframe.
D. Implement a firewall on a new Windows XP server and use WebSphere to enable the web site 
    on a new Windows XP server.

Answer: C



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.