|
Question 1. Which of the following options is NOT available in the BlackBerry Web Desktop Software? (Choose one.) A. Wired synchronization of organizer (PIM) data B. Application Loader C. Backup and Restore D. Setting enterprise activation passwords E. Configuring email message filters Answer: A Question 2. During the final stage of the wireless enterprise activation the following error is displayed on the BlackBerry device: IT requires that you connect this handheld to the device manager to continue activation. What is a possible cause of this? (Choose one.) A. The BlackBerry device does not have data services enabled B. The BlackBerry Synchronization Service is not started C. Wireless backup has been disabled for the user D. The BlackBerry device is running BlackBerry Device Software prior to 4.0 E. The Disable Wireless Bulk Loads IT policy has been enabled Answer: E Question 3. How can a BlackBerry device user assign themselves their own enterprise activation password? (Choose one.) A. Inputtheir own password in the enterprise activation screen on the BlackBerry device B. Specify an activation password in BlackBerry Desktop Manager C. Launch BlackBerry Device Manager and specify their own activation password D. When swapping BlackBerry devices the new BlackBerry device will automatically prompt the user for a new activation password E. Login to BlackBerry Web Desktop Manager and specify an activation password Answer: E Question 4. Which of the following are two pieces of information that are required when configuring a remote component for high availability? (Choose two.) A. IP addresses B. Fully Qualified Host Name C. High Availability Pool Name D. NetBios Name E. DNS Alias Answer: B, C Question 5. Which port is required to be open on the firewall in order for Wi-Fi data to pass from the BlackBerry device to the BlackBerry Enterprise Server? (Choose one.) A. 3101 B. 4101 C. 1433 D. 1533 E. 7433 Answer: B Question 6. What component is responsible for the encryption and decryption of data? (Choose one.) A. BlackBerry Dispatcher Service B. BlackBerry Administration Service C. BlackBerry Controller Service D. BlackBerry Messaging Agent Service E. BlackBerry Router Service Answer: A Question 7. A BlackBerry device user is trying to login to the local Intranet web site but is not able to authenticate. What could a system administrator do to assist the user with the authentication? (Choose one.) A. Resend the IPPP service books to the user that is experiencing the issue B. Verify the proxy server information within the Blackberry MDS Connection Service C. Restart the BlackBerry Administration Service to force resending of service books D. Activate the user with the BlackBerry MDS Integration Service E. Add the user's name to theserver.property xml file within the BlackBerry Enterprise Server Answer: B Question 8. How is the initial enterprise activation email message transmitted from the BlackBerry device? (Choose one.) A. Encrypted using AES B. Encrypted using RSA C. Plain text D. Encrypted using Triple DES E. As a hash Answer: E Question 9. The BlackBerry Monitoring Service can send notifications using which of the following methods? (Choose three.) A. Phone (VoIP) B. Email C. PIN D. Network Broadcast E. Instant Messaging Answer: B, C, D Question 10. BlackBerry device users have been calling the support desk all day reporting message delays of 5 to 25 minutes. A request has been made to isolate the issue and identify the source. Which of the following questions will assist with the process? (Choose three.) A. Do the affected users span multiple messaging servers? B. Are PIN messages delayed (sending and/or receiving)? C. Is each user enabled for email message redirection? D. Was the corporate firewall recently rebooted? E. Are the messaging servers working properly and without issues? Answer: A, B, E
|
Question 1. Referring to the topology diagram show in the exhibit, which three statements are correct regarding the BGP routing updates? (Choose three.) A. The EBGP routing updates received by R1 from R5 will be propagated to the R2, R4, and R7 routers B. The EBGP routing updates received by R3 from R6 will be propagated to the R2 and R4 routers C. The EBGP routing updates received by R1 from R5 will be propagated to the R2 and R4 routers D. The IBGP routing updates received by R3 from R2 will be propagated to the R6 router E. The IBGP routing updates received by R2 from R1 will be propagated to the R3 router F. The IBGP routing updates received by R1 from R4 will be propagated to the R5, R7, and R2 routers Answer: A, B, D Explanation: Question 2. When a BGP route reflector receives an IBGP update from a non-client IBGP peer, the route reflector will then forward the IBGP updates to which other router(s)? A. To the other clients only B. To the EBGP peers only C. To the EBGP peers and other clients only D. To the EBGP peers and other clients and non-clients Answer: C Explanation: Question 3. Which two BGP mechanisms are used to prevent routing loops when using a design with redundant route reflectors? (Choose two.) A. Cluster-list B. AS-Path C. Originator ID D. Community E. Origin Answer: A, C Explanation: Question 4. Which two statements correctly describe the BGP ttl-security feature? (Choose two.) A. This feature protects the BGP processes from CPU utilization-based attacks from EBGP neighbors which can be multiple hops away B. This feature prevents IBGP sessions with non-directly connected IBGP neighbors C. This feature will cause the EBGP updates from the router to be sent using a TTL of 1 D. This feature needs to be configured on each participating BGP router E. This feature is used together with the ebgp-multihop command Answer: A, D Explanation: Question 5. When implementing source-based remote-triggered black hole filtering, which two configurations are required on the edge routers that are not the signaling router? (Choose two.) A. A static route to a prefix that is not used in the network with a next hop set to the Null0 interface B. A static route pointing to the IP address of the attacker C. uRPF on all external facing interfaces at the edge routers D. Redistribution into BGP of the static route that points to the IP address of the attacker E. A route policy to set the redistributed static routes with the no-export BGP community Answer: A, C Explanation: Question 6. Refer to the topology diagram shown in the exhibit and the partial configurations shown below. Once the attack from 209.165.201.144/28 to 209.165.202.128/28 has been detected, which additional configurations are required on the P1 IOS-XR router to implement source-based remote-triggered black hole filtering? ! router bgp 123 address-family ipv4 unicast redistribute static route-policy test ! A. router static address-family ipv4 unicast 209.165.202.128/28 null0 tag 666 192.0.2.1/32 null0 tag 667 ! route-policy test if tag is 666 then set next-hop 192.0.2.1 endif if tag is 667 then set community (no-export) endif end-policy ! B. router static address-family ipv4 unicast 209.165.201.144/28 null0 tag 666 192.0.2.1/32 null0 tag 667 ! route-policy test if tag is 666 then set next-hop 192.0.2.1 endif if tag is 667 then set community (no-export) endif end-policy ! C. router static address-family ipv4 unicast 209.165.201.144/28 null0 tag 666 192.0.2.1/32 null0 ! route-policy test if tag is 666 then set next-hop 192.0.2.1 set community (no-export) endif end-policy D. router static address-family ipv4 unicast 209.165.202.128/28 null0 tag 666 192.0.2.1/32 null0 ! route-policy test if tag is 666 then set next-hop 192.0.2.1 set community (no-export) endif end-policy ! Answer: C Explanation: Question 7. In Cisco IOS-XR, the maximum-prefix command, to control the number of prefixes that can be installed from a BGP neighbor, is configured under which configuration mode? A. RP/0/RSP0/CPU0:P2(config-bgp)# B. RP/0/RSP0/CPU0:P2(config-bgp-af)# C. RP/0/RSP0/CPU0:P2(config-bgp-nbr)# D. RP/0/RSP0/CPU0:P2(config-bgp-nbr-af)# Answer: D Explanation: Question 8. In Cisco IOS-XR, the ttl-security command is configured under which configuration mode? A. RP/0/RSP0/CPU0:P2(config)# B. RP/0/RSP0/CPU0:P2(config-bgp)# C. RP/0/RSP0/CPU0:P2(config-bgp-nbr)# D. RP/0/RSP0/CPU0:P2(config-bgp-af)# E. RP/0/RSP0/CPU0:P2(config-bgp-nbr-af)# Answer: C Explanation: Question 9. Refer to the exhibit. Given the partial BGP configuration, which configuration correctly completes the Cisco IOS-XR route reflector configuration where both the 1.1.1.1 and 2.2.2.2 routers are the clients and the 3.3.3.3 router is a non-client IBGP peer? A. neighbor 1.1.1.1 remote-as 65123 route-reflector-client neighbor 2.2.2.2 remote-as 65123 route-reflector-client neighbor 3.3.3.3 remote-as 65123 B. neighbor 1.1.1.1 address-family ipv4 unicast remote-as 65123 route-reflector-client neighbor 2.2.2.2 address-family ipv4 unicast remote-as 65123 route-reflector-client neighbor 3.3.3.3 address-family ipv4 unicast remote-as 65123 C. neighbor 1.1.1.1 remote-as 65123 address-family ipv4 unicast route-reflector-client neighbor 2.2.2.2 remote-as 65123 address-family ipv4 unicast route-reflector-client neighbor 3.3.3.3 remote-as 65123 D. neighbor 1.1.1.1 remote-as 65123 neighbor 1.1.1.1 route-reflector-client neighbor 2.2.2.2 remote-as 65123 neighbor 2.2.2.2 route-reflector-client neighbor 3.3.3.3 remote-as 65123 Answer: C Explanation: Question 10. Which three methods can be used to reduce the full-mesh IBGP requirement in a service provider core network? (Choose three.) A. implement route reflectors B. enable multi-protocol BGP sessions between all the PE routers C. implement confederations D. implement MPLS (LDP) in the core network on all the PE and P routers E. enable BGP synchronization F. disable the IBGP split-horizon rule Answer: A, C, D Explanation:
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.