|
Question 1. Which statement about deploying computer image files is true? A. The RDeploy switch used to preserve existing partitions is enabled by default. B. Aborting the deployment process (after imaging as started) corrupts the destination computer's hard drive. C. The maximum space required on the destination hard drive is equal to the size of the image file. D. The imaging process is non-destructive, and adds data to what is already stored on an existing hard drive partition. Answer: B Question 2. When capturing a computer's personality, the application settings used for this process are located in which file type? A. .INI B. .A2I C. .ASI D. .PBT Answer: B Question 3. A Client (on a managed computer) has been configured to use a multicast packet to locate the Deployment Server. Which statement is now true? A. moving this computer to a different Deployment System requires theAClient agent be reconfigured B. images can be sent usingunicast packets or multicast packets C. this setting configures images to be sent to the computer using multicasting technology D. the Deployment Server must be configured to obtain its IP address from a DHCP server Answer: B Question 4. Which program lets you edit image files after they have been created? A. ImgViewer B. ImageExplorer C. ImageEditor D. ImageManager E. ImgManager Answer: B Question 5. Deployment Agents (such as AClient) can be installed on remote computers using the Remote Agent Installer, but only when the remote computers are running which four operating systems? (Choose four.) A. Windows 2000 B. Windows 95 C. Windows NT D. Windows XP E. Windows 2003 F. Linux G. Windows 98 Answer: A, C, D, E Question 6. AClient has not been password protected. Which three tasks can be performed after right-clicking on the AClient icon from a managed computer? (Choose three.) A. initiate Microsoft's Sysprep Utility in preparation for imaging B. view theAClient log file when log files have been enabled C. change the name of the managed computer as it appears in the Deployment Console D. change the NetBIOS name of the managed computer E. monitor AClient's communication with the Deployment Server F. reinstall AClient G. edit the AClient template file Answer: B, C, E Question 7. Which utility removes the security ID (SID) before making an image of a computer? A. SIDgenerator B. SetupCapture C. Sysprep D. ImageExplorer E. SIDconfig Answer: C Question 8. How does a Deployment Solution job let you work with software virtualization layers? (Choose two.) A. layers can be imported to a managed computer B. layers can be created C. the state of a layer can be managed (activated, deactivated, and so forth) D. the content of a layer can be modified Answer: A, C Question 9. Which required symbol identifies the opening and closing of a Deployment token? A. % B. # C. $ D. * Answer: A Question 10. Deployment Solution's Simple Install Helper will check for and install which required third-party software? (Choose two.) A. Java B. DirectX C. ActiveX D. .NET framework E. Pre-boot automation operating systems F. SQL Answer: D, F
|
Question 1. Which of the following would be considered a Cisco Unified Computing technical design criteria? A. Increase the number of servers in the data center. B. Decrease security requirements. C. Simplify the Data Center architecture. D. Reduce power costs while maintaining or increasing compute capacity. Answer: C Explanation: Question 2. Which three business pressures are most typically faced by data centers? (Choose three.) A. language barriers B. government regulation and compliance C. SLA metrics D. global availability E. technology silos Answer: B, C, D Explanation: Question 3. Which two physical security concerns would most likely be considered first when planning a data center installation? (Choose two.) A. ventilation B. alarm systems C. raised flooring D. fire suppression systems Answer: B, D Explanation: Question 4. Which condition is prevented by the use of the "Combined" power redundancy mode in the Nexus 7000? A. one PSU failure B. lack of redundancy C. one input circuit failure D. one PSU or one input circuit failure Answer: B Explanation: Question 5. Which statement is true regarding UCS ports dedicated as external LAN device uplinks? A. Ports carry VLAN traffic only B. Ports are configured as ISL trunks C. Spanning tree must be enabled on these ports D. Ports are configured as access ports Answer: A Explanation: Question 6. Which three components are included in Cisco Business Advantage Data Center Architecture? (Choose three.) A. unified I/O B. virtualization C. Security Manager D. consolidation E. Desktop Consolidator Answer: A, B, D Explanation: Question 7. What is the purpose of the L1 and L2 ports on the Cisco UCS 6100 and 6200 Series Fabric Interconnect switches when running in a cluster with another fabric interconnect? A. support LACP B. provide high-availability services C. used for out-of-band management D. centralized management port Answer: B Explanation: Question 8. Which is a characteristic of the end-host-mode? A. It offers no redundancy. B. It participates in STP. C. It participates in network control data plan. D. UCS appears to the external LAN as an end station with many adapters. Answer: D Explanation: Question 9. What is the primary purpose of NPIV? A. It is a switch-based solution with a reduction in overhead. B. Virtual server interfaces can be created within an Cisco MDS switch. C. Virtual machines can bypass the hypervisor and access a LUN directly. D. Multiple virtual applications can share a single switch port while maintaining their identity. Answer: D Explanation: Question 10. What is the purpose of a VSAN in a Cisco Data Center network? A. to share the zoning across other configured VSANs B. to provide distributed service within the SAN fabric C. to advertise the existence of LUNs across the storage area management fabric D. to facilitate logical end-to-end separation within a single physical storage infrastructure Answer: D Explanation:
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.