Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "BCP-810" Exam

Developing Applications for the BlackBerry Solution

 Question 1.
Application X must receive push updates from a public server every morning. The application must display a notification to the BlackBerry device user when the new update is received. 

Which two of the following application approaches will support these requirements? (Choose two.)

A. Web application with BlackBerry Internet Service browsing
B. BlackBerry Widget with BlackBerry Internet Service Push APIs
C. BlackBerry Widget with BlackBerry Enterprise Server Push APIs
D. BlackBerry Java application with BlackBerry Internet Service Push APIs
E. BlackBerry Java application with BlackBerry Internet Service browsing

Answer: B, D

Question 2.
Application X must track field service agents, report their locations back to the intranet application server, and push alerts for new jobs during the day. 

Given the scenario, which three of the following components are required for application X to function properly? (Choose three.)

A. BlackBerry Enterprise Server
B. BlackBerry Internet Service
C. A GPS enabled BlackBerry device
D. BlackBerry Internet Service Push APIs
E. BlackBerry Mobile Data System Connection Service

Answer: A, C, E

Question 3.
Which three of the following debugging features are supported in BlackBerry IDEs? (Choose three.)

A. Get a variablevalueGet a variable? value
B. Change a variablevalueChange a variable? value
C. Hot code replacement
D. Arbitrary code execution
E. Creating new types

Answer: A, B, D

Question 4.
A developer wants to distribute an application OTA using the BlackBerry Browser. 

Which application file that provides information about the application needs to be placed on a web server? (Choose one.)

A. JAD
B. ALX
C. COD
D. JAR
E. JDE

Answer: A

Question 5.
What would cause a signed application to become unsigned? (Choose one.)

A. The application is re-compiled
B. The signature expires
C. The application is installed too many times
D. The evoke Key button of the Signature Tool is pressed
E. The JAD and ALX files are deleted

Answer: A

Question 6.
What are two ways to create an application UI that is consistent with the native BlackBerry UI? (Choose two.)

A. Provide context-specific action menus on each page
B. Make use of the banner to present interactive information
C. Inherit default behaviors by using or extending existing UI components
D. Use BlackBerry UI construction tool to build the new UI from an existing template
E. Specify the font for the application screens

Answer: A, C

Question 7.
A BlackBerry device application collects data and needs to merge it with data on a server before pushing out an updated summary page. 

Which of the following collection of tools would be most appropriate for testing this application? (Choose one.)

A. A BlackBerry MDS-CS Simulator and a real BlackBerry device
B. A database server, a proxy, and a real BlackBerry device
C. A BlackBerry ESS Simulator and a real BlackBerry device
D. A web server and a BlackBerry Device Simulator
E. A BlackBerry MDS-CS Simulator and a BlackBerry Device Simulator

Answer: E

Question 8.
Which two of the following simulators should be used to simulate the interaction between a web application on a BlackBerry device and a web server that is behind a corporate firewall? (Choose two.)

A. BlackBerry Firewall Simulator
B. BlackBerry Screen Simulator
C. BlackBerry Device Simulator
D. BlackBerry MDS-CS Simulator
E. BlackBerry ESS Simulator

Answer: C, D

Question 9.
Which method does RIM recommend for managing multiple screen displays within a BlackBerry device application? (Choose one.)

A. Organize the screens into a tabbed panel
B. Push full sized screens to the top of a stack
C. Generate pop-up screens as required
D. Use re-sizable screens that can be collapsed and restored
E. Use a mixture of transparent and opaque screens

Answer: B

Question 10.
Which tool should be used to facilitate application test cases by simulating BlackBerry device user interaction with the BlackBerry Device Simulator? (Choose one.)

A. BlackBerry MDS-CS Simulator
B. Javaloader
C. Controller Command
D. ESS
E. BlackBerry Desktop Manager

Answer: C


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 640-863 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "640-863" Exam

Designing for Cisco Internetwork Solutions

 Question 1.
Which statement accurately describes one difference between a small office and medium office topology?

A. Small offices commonly use Rapid PVST+ for Layer 3 deployments.
B. Medium offices use integrated 10/100/1000 interfaces as Layer 2 trunks.
C. Medium offices use external access switches to support LAN connectivity.
D. Medium offices commonly use integrated route and switching platforms.

Answer: C

Question 2.
ITCertKeys.com is planning to upgrade its current network. The chief technology officer has supplied a topology diagram and an IP addressing scheme of the current network during an interview. ITCertKeys.com has been growing at about twenty percent per year. It has been difficult to maintain customer support at a satisfactory level. Therefore, the RST board has met with and directed the chief technology officer to look into network improvements.

Which two items are most relevant in documenting ITCertKeys.com's business requirements? (Choose two.)

A. network performance requirements
B. existing network topologies
C. the IP addresses assigned by the ISP
D. improved customer support requirements
E. projected growth estimates

Answer: D, E

Question 3.
Which of these accurately describes dial backup routing?

A. once the backup link is activated it will remain active even after the primary link is restored
B. it always uses permanent static routes
C. it is supplied by the service provider as a secondary PVC at no additional charge
D. the router intiates the dial backup link when a failure is detected on the primary link
E. it always uses distance vector routing protocols

Answer: D

Explanation:
Dial backup routing is a way of using a dialup service for backup purposes. The switched circuit provides the backup service for another type of circuit, such as point-to-point or Frame Relay. The router initiates the dial backup line when it detects a failure on the primary circuit. The dial backup line provides WAN connectivity until the primary circuit is restored, at which time the dial backup connection terminates

Question 4.
DRAG DROP
You work as a network technician at ITCertKeys.com. Your boss, miss ITCertKeys, is interested in QoS features. Match the proper features with appropriate mechanism.
 
Answer:
 
Explanation:
1. LLQ is a congestion management tool, which brings strict PQ (Priority Queuing) to CBWFQ (Class-Based Weighted Fair Queuing). It is a combination of PQ and CBWFQ. Strict PQ allows delay sensitive data such as voice to be dequeued and sent first (before packets in other queues are dequeued), giving delay-sensitive data preferential treatment over other traffic.
2. Congestion-avoidance techniques monitor network traffic loads so that congestion can be anticipated and avoided before it becomes problematic. WRED (Weighted random early detection) is the Cisco implementation of the random early detection (RED) mechanism. RED randomly drops packets when the queue gets to a specified level.
3. ACL (Access Control Lists) is used to control (Permit or Deny) the traffic moving through the network. In QoS implementation, ACL helps to classify the traffic.
4. Link Efficiency techniques like LFI and compression can be applied to WAN paths. The purpose of LFI is to prevents small voice packets from being queued behind large data packets, which could lead to unacceptable delays on low-sped links.
5. CAC (Call Admission Control) is a traffic conditioners mechanisms, which extend the QoS capabilities to protect voice traffic from being negatively affected by other voice traffic by keeping excess voice traffic off the network

Question 5.
Western Associated News Agency recently acquired a large news organization with several sites, which will allow it to expand to worldwide markets. The new acquisition includes these connectivity technologies: 
Frame Relay
ATM
SONET
cable
DSL
wireless

From a Layer 1 viewpoint, which Enterprise Edge module will be most affected?

A. E-Commerce
B. Edge Distribution
C. PSTN
D. WAN/MAN
E. Internet Connectivity
F. ISP

Answer: D

Explanation:
Wide Area Network(WAN)/MAN(Metropolitan Area Network) technologies are used to connect the different branches located into different locations. Frame-Relay, ISDN, DSL, Cable, Wireless are the technologies use for WAN/MAN.

Question 6.
Which H.323 protocol controls call setup between endpoints?

A. RAS
B. RTCP
C. H.245
D. H.225

Answer: D

Explanation:
The H.225 is called Q.931 standard protocol. It describes call signaling and the Registration, Admission, and Status (RAS) signaling used for H.323 session establishment and packetization between two H.323 devices.

Question 7.
DRAG DROP
You work as a network technician at ITCertKeys.com. Your boss, miss ITCertKeys, is interested in bandwidth usage optimization techniques. Match the proper technique with appropriate defintion
 
Answer:
 
Explanation:
Queuing:
Queuing is called Congestion Management in Cisco documents and also occasionally called "scheduling" provides the ability to reorder packets when congestion occurs. 
Traffic Policing
Policing can limit bandwidth by discarding traffic that exceeds a specified rate. Policing can discard the packets based on IP Precedence and DSCP value. Class-based traffic policing can be configured to mark packets at layer 2 or layer 3. Policing can apply to either inbound or outbound traffic.
Compression reduces bandwidth utilization by making packets smaller before transmission. Two general types of compression tools exist in payload compression and header compression. Payload compression compresses the packet the portion of the data link frame between the frame header and trailer. Header compression compresses just particular headers

Question 8.
Which two routing protocols operate over NBMA point-to-multipoint networks without the use of point-to-point subinterfaces? (Choose two.)

A. OSPF
B. IS-IS
C. RIPv1
D. EIGRP
E. IGRP
F. RIPv2

Answer: A, D

Explanation:
Non-broadcast Multi-access NBMA topologies are similar to broadcast multi-access topologies (multiple devices accessing a medium), except that devices cannot hear each other's broadcasts because the medium is separated by other routers, such as with Frame Relay, ATM. OSPF and EIGRP routing protocols operate over NBMA point-to-multipoint networks without the use of point-to-point subinterface.

Question 9.
Which two capabilities of NetFlow accounting assist designers with network planning? (Choose two.)

A. the monitoring of processor time on network devices
B. the calculation of packet and byte counts of network traffic
C. the monitoring of user network utilization
D. the decoding and analyzing of packets
E. the presentation of a time-based view of application usage on the network

Answer: B, C

Explanation:
NetFlow can provide assistance with traffic engineering, network planning, accounting and billing, security monitoring, and information regarding peering arrangements. Enterprises typically use NetFlow for user and Internet access monitoring, application monitoring, charge-back billing for departments, and security monitoring. 

Question 10.
DRAG DROP
You work as a network technician at ITCertKeys.com. Your boss, miss ITCertKeys, is interested in Cisco Security solutions. Match the proper solution with appropriate function.
 
Answer:
 
Explanation:
IPS: Network-based IPS solutions protect the network by helping detect, classify, and stop threats, including worms, spyware or adware, network viruses, and application abuse on Network.
ASA Cisco ASAs consolidate all the foundation security technologies (including high performance firewall, IPS, network antivirus, and IPsec and SSL VPNs) in a single easily managed unified platform. Device consolidation reduces the overall deploymenand operations costs and complexity. ASAs can also be NAC-enabled. The Cisco Security Agent software integrates endpoint server and desktop computers into the Cisco Self-Defending Network. The Cisco Security Agent provides different services like: Spyware and adware protection, Protection against buffer overflows, Distributed firewall capabilities, Malicious mobile code protection.


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.