|
Question 1. Which one of the following is the correct registry path to the BlackBerry Configuration Database information? (Choose one.) A. HKEY_LOCAL_MACHINE\SOFTWARE\ResearchIn Motion\BlackBerry Enterprise Server\Database\ B. HKEY_LOCAL_MACHINE\SOFTWARE\ResearchIn Motion\BlackBerry Enterprise Server\ C. HKEY_LOCAL_USER\SOFTWARE\ResearchIn Motion\BlackBerry Enterprise Server\Database\ D. This information is not stored in the registry Answer: A Question 2. Which two methods can be used to directly access the Windows Event Log to review them for errors? (Choose two.) A. Internet Explorer B. Windows Control Panel C. Windows Run command D. BlackBerry Configuration Tool E. BlackBerry Administration Service Answer: B, C Question 3. A BlackBerry device user is trying to send an email message but is receiving the following error when trying to send: Failure at Service. The user is unable to send PIN messages as well. They are able to make phone calls from the BlackBerry device. No other user on the BlackBerry Enterprise Server is having this issue. What could a system administrator do to troubleshoot this issue? (Choose one.) A. Restart the BlackBerry Controller Service to force a mailboxrescan B. Associate the user's PIN number back into the database for the users information C. Contact the service provider to ensure the correct data provisioning for the user D. Wipe the BlackBerry device and complete and enterprise activation process E. Ensure the Send As permission is set in Active Directory for this user Answer: E Question 4. Which of the following ule Types?define a change in the data for an item being monitored by the BlackBerry Monitoring Service? (ChooseWhich of the following ?ule Types?define a change in the data for an item being monitored by the BlackBerry Monitoring Service? (Choose three.) A. Value Based Rule B. Time Based Rule C. Trigger Based Rule D. Action Based Rule E. Duration Based Rule Answer: A, B, E Question 5. A system administrator runs daily reports on BlackBerry device users with the BlackBerry Monitoring Service. The system administrator notices that the pending count for 2 out of 30 users is increasing. How can the system administrator verify the two users are able to establish a data connection for email message flow? (Choose two.) A. Produce another daily report to verify that pending count will decrease B. Send a PIN message to the two affected users C. Check the application log for any errors for the two users D. Remove and re-add the two users and start the BlackBerry Enterprise Server services E. Verify the port 3101 is open on the firewall Answer: B, C Question 6. Which BlackBerry Router Service configuration must be done before performing a wireless enterprise activation over Wi-Fi ? (Choose one.) A. Ensure the BlackBerry Router Service is not installed remotely B. Ensure the BlackBerry Router Service has appropriate permissions to Microsoft SQL Server C. Ensure the BlackBerry Router Service has appropriate permissions to the mailbox D. Ensure the BlackBerry Router Service is configured to listen on port 8080 E. Verify the setting Permit wireless activation in your WLAN environment is enabled Answer: E Question 7. What happens to the activation email message after the BlackBerry Messaging Agent has retrieved it from the mailbox? (Choose one.) A. Email message is marked as read B. Email message is moved to the Sent folder C. Email message remains in the Inbox unread D. Email message is removed from the Inbox E. Email message is filed to the BlackBerry folder in the mailbox Answer: D Question 8. By default how long will the enterprise activation password last before it expires within the BlackBerry Administration Service? (Choose one.) A. 1 hour B. 12 hours C. 24 hours D. 48 hours E. 7 days Answer: D Question 9. Which BlackBerry Enterprise Server components can be installed on remote computers; separate from the BlackBerry Enterprise Server? (Choose three.) A. BlackBerry Controller Service B. BlackBerry Administration Service C. BlackBerry MDS Integration Service D. BlackBerry Dispatcher Service E. BlackBerry Monitoring Service F. BlackBerry Alert Service Answer: B, C, E Question 10. IT policies are assigned for the BlackBerry Enterprise Server at multiple levels. When there are overlaps what level of the IT policy takes priority? (Choose one.) A. User B. Group C. Server D. Domain E. Corporate Answer: A
|
Question 1. You believe that there may be a problem with the fault-tolerant VLAN. As a first step, which command would you use to find out if any heartbeats have been missed? A. ace/admin# show ft stats B. ace/admin# show ft peer detail C. ace/context# show ft peer detail D. ace/context# show ft group detail Answer: A Explanation: Question 2. Which command could be used to view the configuration stored in a checkpoint? A. show checkpoint B. show checkpoint detail C. show checkpoint config D. show config checkpoint detail Answer: A Explanation: Question 3. Where are the checkpoint configuration files stored? A. Slot0 B. NVRAM C. TFTP Server D. a hidden directory in flash Answer: D Explanation: Question 4. To completely remove a real server from service, you should enter the no inservice command in which mode? A. Rserver mode B. privileged mode C. policy-map mode D. global config mode E. severfarm-Rserver mode Answer: A Explanation: Question 5. Which two of these options are configurable as part of the TCP Normalization feature set? (Choose two.) A. clearing reserved bits B. setting illegal flag combinations C. setting port numbers equal to zero D. allow Syn packets that contain data E. setting TCP header length requirements Answer: A, D Explanation: Question 6. An existing DNS name server is being replaced with a Cisco GSS. Which IOS license will be required? A. Cisco Standard license B. Cisco Extended license C. Cisco Name Server license D. Cisco Network Registrar license Answer: C Explanation: Question 7. An active Cisco ACE Module is configured as follows: active Cisco Ace Module has priority level of 150 standby Cisco Ace Module has a priority level of 120 probes are configured with host tracking Two probes fail. What must be done to relinquish the role to the standby Cisco ACE Module? A. configure the probe with a priority level of 10 B. configure the probe with a priority level of 20 C. configure the probe with a priority level of 40 D. take no action; the Cisco ACE Module automatically relinquishes the role of active on failure of a probe Answer: B Explanation: Question 8. Which three fields can be examined by an extended ACL? (Choose three.) A. TTL value B. ICMP type C. IP address D. HTTP cookie E. HTTP header F. UDP port number Answer: B, C, F Explanation: Question 9. When troubleshooting bridged interfaces, you should start with the show interface VLAN x command. Which two of these should be true of the interface? (Choose two.) A. it is up B. it shows mode : routed C. it has an IP address and mask D. it has an MTU set of 1500 bytes E. it shows Assigned from the Supervisor, up on the Supervisor Answer: A, E Explanation: Question 10. When migrating from a CSS to a Cisco ACE appliance, you should review hardware resources and identify upgrades and configuration changes required for successful migration. What is the benefit of doing this? A. reduces the risks associated with a production migration B. reduces the possibility of expensive, time-consuming rework at a later date C. strengthens the ability of your team to meet aggressive deployment schedules D. reduces the possibility of downtime or other costly disruptions during migration E. helps take advantage of Cisco planning experience and best-in-class methods and procedures Answer: A Explanation:
Copyright � 2004 CertsBraindumps.com Inc. All rights reserved.