Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "BCP-223" Exam

Supporting a BlackBerry Enterprise Server v5.0 in a Microsoft Exchange Environment

 Question 1.
Which one of the following is the correct registry path to the BlackBerry Configuration Database information? (Choose one.)

A. HKEY_LOCAL_MACHINE\SOFTWARE\ResearchIn Motion\BlackBerry Enterprise 
    Server\Database\
B. HKEY_LOCAL_MACHINE\SOFTWARE\ResearchIn Motion\BlackBerry Enterprise Server\
C. HKEY_LOCAL_USER\SOFTWARE\ResearchIn Motion\BlackBerry Enterprise 
    Server\Database\
D. This information is not stored in the registry

Answer: A

Question 2.
Which two methods can be used to directly access the Windows Event Log to review them for errors? (Choose two.)

A. Internet Explorer
B. Windows Control Panel
C. Windows Run command
D. BlackBerry Configuration Tool
E. BlackBerry Administration Service

Answer: B, C

Question 3.
A BlackBerry device user is trying to send an email message but is receiving the following error when trying to send: Failure at Service. The user is unable to send PIN messages as well. They are able to make phone calls from the BlackBerry device. No other user on the BlackBerry Enterprise Server is having this issue. 

What could a system administrator do to troubleshoot this issue? (Choose one.)

A. Restart the BlackBerry Controller Service to force a mailboxrescan
B. Associate the user's PIN number back into the database for the users information
C. Contact the service provider to ensure the correct data provisioning for the user
D. Wipe the BlackBerry device and complete and enterprise activation process
E. Ensure the Send As permission is set in Active Directory for this user

Answer: E

Question 4.
Which of the following ule Types?define a change in the data for an item being monitored by the BlackBerry Monitoring Service? (ChooseWhich of the following ?ule Types?define a change in the data for an item being monitored by the BlackBerry Monitoring Service? (Choose three.)

A. Value Based Rule
B. Time Based Rule
C. Trigger Based Rule
D. Action Based Rule
E. Duration Based Rule

Answer: A, B, E

Question 5.
A system administrator runs daily reports on BlackBerry device users with the BlackBerry Monitoring Service. The system administrator notices that the pending count for 2 out of 30 users is increasing. 

How can the system administrator verify the two users are able to establish a data connection for email message flow? (Choose two.)

A. Produce another daily report to verify that pending count will decrease
B. Send a PIN message to the two affected users
C. Check the application log for any errors for the two users
D. Remove and re-add the two users and start the BlackBerry Enterprise Server services
E. Verify the port 3101 is open on the firewall

Answer: B, C

Question 6.
Which BlackBerry Router Service configuration must be done before performing a wireless enterprise activation over Wi-Fi ? (Choose one.)

A. Ensure the BlackBerry Router Service is not installed remotely
B. Ensure the BlackBerry Router Service has appropriate permissions to Microsoft SQL Server
C. Ensure the BlackBerry Router Service has appropriate permissions to the mailbox
D. Ensure the BlackBerry Router Service is configured to listen on port 8080
E. Verify the setting Permit wireless activation in your WLAN environment is enabled

Answer: E

Question 7.
What happens to the activation email message after the BlackBerry Messaging Agent has retrieved it from the mailbox? (Choose one.)

A. Email message is marked as read
B. Email message is moved to the Sent folder
C. Email message remains in the Inbox unread
D. Email message is removed from the Inbox
E. Email message is filed to the BlackBerry folder in the mailbox

Answer: D

Question 8.
By default how long will the enterprise activation password last before it expires within the BlackBerry Administration Service? (Choose one.)

A. 1 hour
B. 12 hours
C. 24 hours
D. 48 hours
E. 7 days

Answer: D

Question 9.
Which BlackBerry Enterprise Server components can be installed on remote computers; separate from the BlackBerry Enterprise Server? (Choose three.)

A. BlackBerry Controller Service
B. BlackBerry Administration Service
C. BlackBerry MDS Integration Service
D. BlackBerry Dispatcher Service
E. BlackBerry Monitoring Service
F. BlackBerry Alert Service

Answer: B, C, E

Question 10.
IT policies are assigned for the BlackBerry Enterprise Server at multiple levels. When there are overlaps what level of the IT policy takes priority? (Choose one.)

A. User
B. Group
C. Server
D. Domain
E. Corporate

Answer: A


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for SY0-301 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "SY0-301" Exam

Security+ Certification 2011

 Question 1.
Which of the following is an example of a false negative?

A. The IDS does not identify a buffer overflow
B. Anti-virus identifies a benign application as malware.
C. Anti-virus protection interferes with the normal operation of an application.
D. A user account is locked out after the user mistypes the password too many times.

Answer: A

Explanation:

Question 2.
Sara and Jane, users, are reporting an increase in the amount of unwanted email that they are receiving each day. 

Which of the following would be the BEST way to respond to this issue without creating a lot of administrative overhead?

A. Deploy an anti-spam device to protect the network.
B. Update the anti-virus definitions and make sure that it is set to scan all received email
C. Set up spam filtering rules in each user's mail client.
D. Change the firewall settings to block SMTP relays so that the spam cannot get in.

Answer: A

Explanation:

Question 3.
Which of the following encrypts the body of a packet, rather than just the password, while sending information?

A. LDAP
B. TACACS+
C. ACLs
D. RADIUS

Answer: B

Explanation:

Question 4.
Which of the following is similar to a smurf attack, but uses UDP instead to ICMP?

A. X-Mas attack
B. Fraggle attack
C. Vishing
D. Man-in-the-middle attack

Answer: B

Explanation:

Question 5.
Pete, a security administrator, wants to secure remote telnet services and decides to use the services over SSH. 

Which of the following ports should Pete allow on the firewall by default?

A. 21
B. 22
C. 23
D. 25

Answer: B

Explanation:

Question 6.
Which of the following accurately describes the STRONGEST multifactor authentication?

A. Something you are, something you have
B. Something you have, something you know
C. Something you are near to, something you have
D. Something you have, someone you know

Answer: A

Explanation:

Question 7.
Which of the following is a valid server-role in a Kerberos authentication system?

A. Token issuing system
B. Security assertion server
C. Authentication agent
D. Ticket granting server

Answer: D

Explanation:

Question 8.
A company is performing internal security audits after a recent exploitation on one of their proprietary applications. Sara, the security auditor, is given the workstation with limited documentation regarding the application installed for the audit. 

Which of the following types of testing methods is this?

A. Sandbox
B. White box
C. Black box
D. Gray box

Answer: D

Explanation:

Question 9.
Sara, a security analyst, discovers which operating systems the client devices on the network are running by only monitoring a mirror port on the router. 

Which of the following techniques did Sara use?

A. Active fingerprinting
B. Passive finger printing
C. Protocol analyzing
D. Network enumerating

Answer: B

Explanation:

Question 10.
Which of the following is the BEST solution to securely administer remote servers?

A. SCP
B. SSH
C. Telnet
D. SFTP

Answer: B

Explanation:


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.