QUESTION 1 Scenario: An administrator is implementing a two-factor authentication solution with an RSA SecureID product. The administrator already has the server name and port number of the RSA server. Which additional information does the administrator need to configure RSA SecureID? A. LDAP password B. Firewall access rule C. Authentication policy D. RADIUS shared secret […]
QUESTION 1 View the Exhibit and examine the structure of the EMP table. Which stages are performed when the above block is executed? (Choose all that apply) A. Bind B. Parse C. Fetch D. Execute Answer: BCD QUESTION 2 Which system events can be used to create triggers that fire both at database and […]
QUESTION 1 View the Exhibit and examine the structure of the ORDERS table. You have to display ORDER_ID, ORDER_DATE, and CUSTOMER_ID for all those orders that were placed after the last order placed by the customer whose CUSTOMER_ID is 101. Which query would give you the desired output? A. SELECT order_id, order_date FROM orders […]
QUESTION 1 You have assigned rights profiles directly to the uses frank and now you want to add another profile. Which command enables you to list profiles directly assigned to frank? A. userattr profiles frank B. profiles – p frank C. useratter -p frank D. profiles frank Answer: B Explanation: http://docs.oracle.com/cd/E26502_01/html/E36219/rights-1.html (see the example 9-1)
QUESTION 1 What determines which bits in an IP address represent the subnet, and which represent the host? A. Subnet B. unicast C. netmask D. multicast E. broadcast Answer: C QUESTION 2 Which two accurately identify features of a Solaris 10 branded zone? A. executes in a Solaris 10 global zone B. is created by […]
QUESTION 1 You need to generate a report on all of the Exchange Server 2007 computers in your Exchange organization. The report must include: – Operating system versionNumber of processors – Total physical memory – Number of storage groups – Number of mailbox databases What should you do? A. Run the Get-ExchangeServer | Format-List cmdlet. […]
QUESTION 1 When attempting to send a file to another user securely with GPG, which of the following actions must be done? A. Encrypt the file using your public key. B. Encrypt the file using their public key. C. Encrypt the file using your private key. D. Encrypt the file using their private key. E. […]
QUESTION 1 An administrator is attempting to recover corrupted data from a four disk RAID group. However, the administrator does not know which RAID level was used. When investigating the volumes, the administrator notes that there is a duplicate of all data on two of the disks. Which of the following RAID levels was in […]
QUESTION 1 Which command prevents Layer 2 loops if the switch stops receiving spanning-tree keepalives on port ge-1/0/1? A. [edit protocols rstp] user@switch# show interface ge-1/0/1 { bpdu-block; } B. [edit protocols layer2-control] user@switch# show interface ge-1/0/1 { bpdu-time-out-action { block; alarm; } } C. [edit protocols layer2-control] user@switch# show […]
QUESTION 1 Your ScreenOS device does not have a static IP address. You want to be able to access it using its FQDN. How would you implement this task? A. Configure a domain in DNS. B. Configure syslog. C. Configure SNMP. D. Configure DDNS. Answer: D QUESTION 2 You have just installed a new ScreenOS […]
QUESTION 1 Which OSPF LSA type is sent from the ABR to describe an ASBR that is in an area to which it is connected? A. Type 7 B. Type 5 C. Type 4 D. Type 3 Answer: C QUESTION 2 Click the Exhibit button. You are asked to configure a new external BGP peering. […]
QUESTION 1 What does Junos Pulse Collaboration provide? A. group instant messaging services B. Web-based meeting services C. corporate file sharing services D. conference call services Answer: C QUESTION 2 What does Secure Virtual Workspace (SVW) provide? A. a virtual desktop on a client desktop B. protected file storage on a remote server C. a […]
QUESTION 1 Click the Exhibit button. Referring to the exhibit, R1, R2, and R3 boot at the same time. Several minutes later, R4 boots. After R4 has been online for 40 seconds, which router will be the OSPF designated router? A. R1 B. R2 C. R3 D. R4 Answer: B QUESTION 2 Click the […]
QUESTION 1 Which network mask is the equivalent of 255.255.248.0? A. /20 B. /21 C. /22 D. /23 Answer: B QUESTION 2 Which login class permission will allow a user to use the telnet utility? A. Network permission B. Maintenance permission C. Supervisor permission D. Shell permission Answer: A QUESTION 3 Which command do you […]
QUESTION 1 What is a specific feature of Network Attached Storage (NAS)? A. NAS presents data to the user as if it is stored on a file server B. NAS uses the file system of the client computers. C. The NAS operating system does not provide security features. D. With NAS the file system is […]

