|
Question 1. By default, if a NetWare server is synchronization on the network, how frequently does it check for time? A. Every 3 minutes B. Every 5 minutes C. Every 10 minutes D. Every 15 minutes E. Every 20 minutes Answer: C Question 2. What needs to be done to allow servers to find any time server regardless of the tree it's in? A. Set Directory tree mode to off B. Set timesync restart flag to on C. Set Service Advertising Protocol to off D. Set the default time server type to reference Answer: A Question 3. You have installed the first NetWare 5 server for your company and accepted all default settings. What type of time server is the server? A. Primary B. Reference C. Secondary D. Single reference E. Secondary reference Answer: D Question 4. By default, when is a server *************not being synchronized to the network? A. When it's more than one seconds different than the network time. B. When it's more than two seconds different than the network time. C. When it's more than three seconds different than the network time. D. When it's more than four seconds different than the network time. E. When it's more than five seconds different than the network time. Answer: B Question 5. In an IPX environment, which methods do servers use to find each other to synchronization? (Choose two.) A. TCP/IP B. NTP.NLM C. Configured lists D. Service Advertising Protocol (SAP) E. NetWare Link Services Protocol (NLSP) Answer: C, D Question 6. Which time servers participate in voting for the correct time? (Choose two.) A. Master B. Primary C. Reference D. Single reference E. Secondary reference Answer: B, C Question 7. Which statement about the BorderManager 3.5 installation process is true? A. NETBASIC.NLM must be loaded on the server prior to installation. B. You must configure your servers and clients to use TCP/IP prior to installation. C. Installation can be done remotely using RCONSOLE with the CD mounted on your local machine. D. You can install on a remote server If you copy the contents of the CD to a mounted volume on that server. Answer: D Question 8. What system is used to adjust different time zones to get an equivalent time for time synchronization? A. Time stamps B. Standard time C. Greenwich Mean Time (GMT) D. Daylight saving time offset E. Universal Time Coordinated (UTC) Answer: E Question 9. Which time server types advertise that they are a time provider? (Choose 3.) A. Master B. Primary C. Reference D. Secondary E. Single reference F. Secondary reference Answer: B, C, E Question 10. Which file can you view to identify the default filter exceptions to the BorderManager filters? A. FILE.TXT B. ALLFILT.TXT C. FILTEXCP.TXT D. The file specified by the user when filters are saved to a text file. Answer: D Question 11. Which statement about time synchronization is true? A. Time synchronization is a service that records time changes at the server console. B. Time synchronization is a service that maintains consistent time throughout the network. C. Time synchronization is a service that determines the correct time throughout the network. D. Time synchronization is a service that records changes in time security events throughout the network. Answer: B Question 12. Which statement is true about a single reference time server? A. It gets its time from a reference time server. B. It does not advertise itself as a time provider. C. It cannot coexist with primary or other reference servers. D. It must have another reference or primary server to negotiate time with. Answer: C Question 13. What is the message content of a type 31CMP packet? A. Echo Reply B. Time Exceeded C. Parameter Problem D. Address Mask Reply E. Destination Unreachable Answer: E Question 14. You have been asked to troubleshoot your client's issue of timeout synchronized throughout the network. Your client has five servers in the tree located at their headquarters. The time configuration for each server is as follows. Time server type Configured lists Serv1 Single reference off Serv2 Primary off Serv3 Secondary off Serv4 Secondary off Serv5 Secondary off What is preventing time from being synchronized? A. There needs to be more than one primary time ****** B. Configured Lists needs to be turned on ******** C. Configured Lists needs to be turned on ***** secondary servers. D. A single reference time server cannot co-exist on the primary time server. E. Configured Lists needs to be turned ********** primary and single reference server. Answer: D Question 15. Which statement is true regarding reference time server? A. It does not advertise itself ******** provider. B. It cannot coexist with other primary time servers. C. It gets its time from a single ****** time server. D. It negotiates time with primary time server, but does not adjust its internal clock. Answer: D
|
Question 1. ITCertKeys.com wants to use distinct security policies for different departments. What must be configured? A. individual security level for each department B. separate ACL group for each department C. distinct VLAN for each department D. unique firewall context for each department Answer: D Question 2. Exhibit: You work as a network administrator at ITCertKeys.com. You study the exhibit carefully. ITCertKeysA, ITCertKeysB, C, and ITCertKeys4 each represents a model for placement of a default gateway. Which model allows the maximum number of application and security services? A. model ITCertKeysB B. model C C. model ITCertKeysA D. model ITCertKeysD Answer: B Question 3. Which of the following attack types should be mitigated in the data center core layer? A. IP spoofing B. MAC address spoofing C. port scans D. DDoS attacks Answer: D Question 4. Exhibit: You work as a network administrator at ITCertKeys.com. You study the exhibit carefully. A failure occurs on one of the access layer uplinks. Which Layer 2 topology can cause a break in connectivity between the FWSMs? A. looped triangle B. loop-free inverted U C. loop-free U D. looped square Answer: C Question 5. Which type of HPC application requires low latency? A. financial analytics B. seismic and geophysical modeling C. digital image rendering D. finite element analysis Answer: D Question 6. Which statement best describes the data center core layer? A. provides a resilient Layer 2 routed fabric B. load balances traffic between the core and aggregation layers C. is typically merged with the campus core layer D. connects to the campus aggregation layer Answer: B Question 7. Which data center network-architecture change is a result of the adoption of blade and 1-RU server technologies? A. Layer 3 fault domains growing smaller B. Layer 2 fault domains growing larger C. Layer 2 fault domains growing smaller D. Layer 3 fault domains growing larger Answer: B Question 8. What advantage does InfiniBand have over Gigabit Ethernet in HPC environments? A. simpler cabling B. longer distance support C. more sophisticated traffic management D. lower latency Answer: D Question 9. Exhibit: You work as a network administrator at ITCertKeys.com. You study the exhibit carefully. Where is Layer 2 adjacency required? A. server-to-server only B. aggregation-to-access only C. aggregation-to-access and access-to-server D. access-to-server only Answer: D Question 10. According to the Cisco Network Foundation Protection model, which security feature is recommended for the data center core layer? A. prefix filtering B. Dynamic ARP Inspection C. traffic rate limiting D. control plane protection Answer: D
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.