Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "BCP-223" Exam

Supporting a BlackBerry Enterprise Server v5.0 in a Microsoft Exchange Environment

 Question 1.
Which one of the following is the correct registry path to the BlackBerry Configuration Database information? (Choose one.)

A. HKEY_LOCAL_MACHINE\SOFTWARE\ResearchIn Motion\BlackBerry Enterprise 
    Server\Database\
B. HKEY_LOCAL_MACHINE\SOFTWARE\ResearchIn Motion\BlackBerry Enterprise Server\
C. HKEY_LOCAL_USER\SOFTWARE\ResearchIn Motion\BlackBerry Enterprise 
    Server\Database\
D. This information is not stored in the registry

Answer: A

Question 2.
Which two methods can be used to directly access the Windows Event Log to review them for errors? (Choose two.)

A. Internet Explorer
B. Windows Control Panel
C. Windows Run command
D. BlackBerry Configuration Tool
E. BlackBerry Administration Service

Answer: B, C

Question 3.
A BlackBerry device user is trying to send an email message but is receiving the following error when trying to send: Failure at Service. The user is unable to send PIN messages as well. They are able to make phone calls from the BlackBerry device. No other user on the BlackBerry Enterprise Server is having this issue. 

What could a system administrator do to troubleshoot this issue? (Choose one.)

A. Restart the BlackBerry Controller Service to force a mailboxrescan
B. Associate the user's PIN number back into the database for the users information
C. Contact the service provider to ensure the correct data provisioning for the user
D. Wipe the BlackBerry device and complete and enterprise activation process
E. Ensure the Send As permission is set in Active Directory for this user

Answer: E

Question 4.
Which of the following ule Types?define a change in the data for an item being monitored by the BlackBerry Monitoring Service? (ChooseWhich of the following ?ule Types?define a change in the data for an item being monitored by the BlackBerry Monitoring Service? (Choose three.)

A. Value Based Rule
B. Time Based Rule
C. Trigger Based Rule
D. Action Based Rule
E. Duration Based Rule

Answer: A, B, E

Question 5.
A system administrator runs daily reports on BlackBerry device users with the BlackBerry Monitoring Service. The system administrator notices that the pending count for 2 out of 30 users is increasing. 

How can the system administrator verify the two users are able to establish a data connection for email message flow? (Choose two.)

A. Produce another daily report to verify that pending count will decrease
B. Send a PIN message to the two affected users
C. Check the application log for any errors for the two users
D. Remove and re-add the two users and start the BlackBerry Enterprise Server services
E. Verify the port 3101 is open on the firewall

Answer: B, C

Question 6.
Which BlackBerry Router Service configuration must be done before performing a wireless enterprise activation over Wi-Fi ? (Choose one.)

A. Ensure the BlackBerry Router Service is not installed remotely
B. Ensure the BlackBerry Router Service has appropriate permissions to Microsoft SQL Server
C. Ensure the BlackBerry Router Service has appropriate permissions to the mailbox
D. Ensure the BlackBerry Router Service is configured to listen on port 8080
E. Verify the setting Permit wireless activation in your WLAN environment is enabled

Answer: E

Question 7.
What happens to the activation email message after the BlackBerry Messaging Agent has retrieved it from the mailbox? (Choose one.)

A. Email message is marked as read
B. Email message is moved to the Sent folder
C. Email message remains in the Inbox unread
D. Email message is removed from the Inbox
E. Email message is filed to the BlackBerry folder in the mailbox

Answer: D

Question 8.
By default how long will the enterprise activation password last before it expires within the BlackBerry Administration Service? (Choose one.)

A. 1 hour
B. 12 hours
C. 24 hours
D. 48 hours
E. 7 days

Answer: D

Question 9.
Which BlackBerry Enterprise Server components can be installed on remote computers; separate from the BlackBerry Enterprise Server? (Choose three.)

A. BlackBerry Controller Service
B. BlackBerry Administration Service
C. BlackBerry MDS Integration Service
D. BlackBerry Dispatcher Service
E. BlackBerry Monitoring Service
F. BlackBerry Alert Service

Answer: B, C, E

Question 10.
IT policies are assigned for the BlackBerry Enterprise Server at multiple levels. When there are overlaps what level of the IT policy takes priority? (Choose one.)

A. User
B. Group
C. Server
D. Domain
E. Corporate

Answer: A


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for PW0-105 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "PW0-105" Exam

Certified Wireless Network Administrator (CWNA)

 Question 1.
Given: Your consulting firm has recently been hired to complete a site survey for ABC Company. Your engineers use predictive modeling software for surveying, but ABC Company insists on a pre-deployment site visit. 

What tasks should be performed as part of the pre-deployment visit to prepare for a predictive survey? (Choose two)

A. With a spectrum analyzer, identify the type, amplitude, and location of RF interference sources, if any are present.
B. Evaluate the building materials at ABC's facility and confirm that the floor plan documents are consistent with the actual building.
C. Validate that the AP transmit power and antenna type is identical for each AP in ABC's existing deployment.
D. Collect information about ABC Company's security requirements and the current configuration of their RADIUS and user database servers.
E. Simultaneously capture and analyze data on each 802.11 channel to establish a baseline for potential network capacity and throughput.

Answer: A, B

Explanation:

Question 2.
What 802.11n technologies require MIMO support on both the transmitter and receiver? (Choose 2)

A. Spatial multiplexing
B. Transmit beamforming
C. Maximal ratio combining
D. Space-time block coding
E. Cyclic shift diversity
F. Short guard intervals

Answer: A, D

Explanation:

Question 3.
What statement describes the authorization component of a AAA implementation?

A. Verifying that a user is who he says he is
B. Validating client device credentials against a database
C. Logging the details of user network behavior in order to review it at a later time
D. Granting access to specific network services according to a user profile
E. Implementing a WIPS as a full-time monitoring solution to enforce policies

Answer: D

Explanation:

Question 4.
What facts are true regarding controllers and APs in a Split MAC architecture? (Choose 2) 

A. An IP tunnel is established between the AP and controller for AP management and control functions.
B. Using centralized data forwarding, APs never tag Ethernet frames with VLAN identifiers or 802.1p CoS.
C. With 802.1X/EAP security, the AP acts as the supplicant and the controller acts as the authenticator.
D. Management and data frame types must be processed locally by the AP, while control frame types must be sent to the controller.
E. In a distributed (local bridging) data forwarding model, the AP handles frame encryption and decryption.

Answer: A, E

Explanation:

Question 5.
What feature(s) are most likely to be supported by 802.11 enterprise-class WLAN controllers? (Choose 4)

A. Link aggregation / port trunking
B. 802.1p and DSCP QoS
C. BGP and Frame Relay
D. Captive web portals
E. IGMP snooping

Answer: A, B, D, E

Explanation:

Question 6.
Given: You are the network administrator for ABC Company. Your manager has recently attended a wireless security seminar. The seminar speaker taught that a wireless network could be hidden from potential intruders if you disabled the broadcasting of the SSID in Beacons and configured the access points not to respond to Probe Request frames that have a null SSID field. Your manager suggests implementing these security practices. 

What response should you give to this suggestion? (Choose two)

A. Any 802.11 protocol analyzer can see the SSID in clear text in frames other than Beacons and Probe Response frames. This negates any security benefit of trying to hide the SSID in Beacons and Probe Response frames.
B. This security practice prevents manufacturers' client utilities from detecting the SSID. As a result, the SSID cannot be obtained by attackers, except through social engineering, guessing, or use of a WIPS.
C. Although it does not benefit the security posture, hiding the SSID in Beacons and Probe Response frames can be helpful for preventing some users (such as guests) from attempting To connect to the corporate network.
D. Any tenants in the same building using advanced penetration testing tools will be able to obtain the SSID by exploiting WPA EAPOL-Key exchanges. This poses an additional risk of exposing the WPA key.
E. To improve security by hiding the SSID, the AP and client stations must both be configured to remove the SSID from association request and response frames. Most WLAN products support this.

Answer: A, C

Explanation:

Question 7.
What component of the 802.11 standard allows stations to reserve access to the RF medium for a specified period of time?

A. Long slot times
B. DTIM Interval
C. Listen Interval
D. Probe Request frames
E. RTS or CTS frames

Answer: E

Explanation:

Question 8.
Given:
Network users and IT personnel at a large machinery manufacturer have been discussing the potential uses and benefits of implementing an indoor WLAN. The network administrator and network manager have requested a meeting of senior management personnel to discuss a WLAN implementation before taking any site survey or implementation steps. The first order of discussion in the meeting is corporate policy concerning implementation and use of WLAN technology.

What specific topics are appropriate in this policy meeting? (Choose two)

A. Vendor hardware recommendations
B. Business justification
C. User productivity impact
D. Antenna types
E. Obtaining permits and zoning requirements

Answer: B, C

Explanation:

Question 9.
In a long-distance RF link, what statement about Fade Margin is true?

A. Fade Margin is an additional pad of signal strength designed into the RF system to 
    compensate for unpredictable signal fading.
B. The Fade Margin of a long-distance radio link should be equivalent to the receiver's antenna gain.
C. A Fade Margin is unnecessary on a long-distance RF link if more than 80% of the first Fresnel zone is clear of obstructions.
D. The Fade Margin is a measurement of signal loss through free space, and is a function of frequency and distance.

Answer: A

Explanation:

Question 10.
What statement best describes the manual RF site survey report?

A. It is a series of notes taken during the interview with the network manager and given to the site survey project manager.
B. It is a one-page network inspection summary used to create a certificate of network compliance.
C. It contains the results from the RF coverage, capacity, and interference analysis.
D. It is an internal document used by the site surveying firm for network deployment, and is not usually shown to the client.
E. It states the customer requirements, business justification, and a detailed budget for the WLAN.

Answer: C

Explanation:


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.