-
You are designing an authentication solution to meet the security needs of the network administrators. You install an enterprise certification authority (CA). Which three additional actions should you take?()
A . Enroll each administrative account for a smart card authentication certificate.
B . Configure autoenrollment for computer authentication certificates.
C . Install a smart card reader on each server computer.
D . Install a smart card reader on each network administrator’s computer.
E . Configure each administrative account to require a smart card for interactive logon.
F . Configure the Default Domain Policy GPO to require smart cards for interactive login.
-
You are creating a Windows Forms Application by using the .NET Framework 3.5.Your applciation will be used by a government depertment.You need to ensure that the application meets "accessibilty" requirements.Which three actions should you perform?()
A . Expose keyboard focus visually and programmatically.
B . Use the NeutralResourceLanguageAttribute attribute in the assembly.
C . Provide documented keyboard access to all application features.
D . Set all the colors to primary colors when the high contrast mode is on.
E . Display all user interface elements by using the system color scheme when high contrast mode is off.
F . Either display all visual cues or create sound effects for any information.
-
What are three actions performed by the mysql_secure_installation tool?()
A . It prompts you to set the root user account password
B . It checks whether file permissions are appropriate within datadir
C . It asks to remove the test database, which is generated at installation time
D . It can delete any anonymous accounts
E . It verifies that all users are configuration with the longer password hash
-
Which three are advantages of SONET?()
A . Allows the transportation of all forms of traffic
B . Multiplexing is easy
C . Clocks do not need to be synchronized
D . Reduces network complexity and cost
E . Padding is not necessary and not permitted
-
Which of the following statements represents the correct action to take when three crew members discover a fire?()
A . One man report the fire, and the other two men fight the fire
B . One man report the fire, one man fight the fire, and one man evacuate and secure the area
C . One man report the fire, one man fight the fire, and one man act as a safety observer
D . All three men fight the fire and report it immediately after it is extinguished
-
Which three actions are required to access the network statistics on a remote Cisco Unified Wireless IP Phone 7921G via a web browser?()
A . Browse to the phone using the MAC address of the phone.
B . Use HTTPS:// preceding the address of the phone.
C . Change web access to read/write for the MAC address of the phone on Cisco Unified Communications Manager.
D . Enter the username and password of the phone.
E . Ensure that the host is on the same subnet as the remote phone.
-
You are designing a strategy for migrating the UNIX user accounts to Active Directory. Which three actions should you perform?()
A . Import the user accounts as inetOrgPerson objects.
B . Import the user accounts into Active Directory by using the Ldifde command-line tool.
C . Export all user accounts from the UNIX servers to a text file.
D . Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.
E . Assign random passwords to each user object, and securely distribute the password to the users.
F . Create the same strong password for each user object, and require users to change their passwords at first logon.
G . Instruct users to use the same name and password as they used on the UNIX servers.
-
You need to ensure that users who enter three successive invalid passwords within 5 minutes are locked out for 5 minutes. Which three actions should you perform()
A . Set the Minimum password age setting to one day.
B . Set the Maximum password age setting to one day.
C . Set the Account lockout duration setting to 5 minutes.
D . Set the Reset account lockout counter after setting to 5 minutes.
E . Set the Account lockout threshold setting to 3 invalid logon attempts.
F . Set the Enforce password history setting to 3 passwords remembered.
-
You are designing an authentication solution to meet the security needs of the network administrators. You install an enterprise certification authority (CA). Which three additional actions should you take?()
A . Enroll each administrative account for a smart card authentication certificate.
B . Configure autoenrollment for computer authentication certificates.
C . Install a smart card reader on each server computer.
D . Install a smart card reader on each network administrator’s computer.
E . Configure each administrative account to require a smart card for interactive logon.
F . Configure the Default Domain Policy GPO to require smart cards for interactive login.
-
Which three statements are true?()
A . A final method in class X can be abstract if and only if X is abstract.
B . A protected method in class X can be overridden by any subclass of X.
C . A private static method can be called only within other static methods in class X.
D . A non-static public final method in class X can be overridden in any subclass of X.
E . A public static method in class X can be called by a subclass of X without explicitly referencing the class X.
F . A method with the same signature as a private final method in class X can be implemented in a subclass of X.
G . A protected method in class X can be overridden by a subclass of X only if the subclass is in the same package as X.
-
Which three are Cisco architectures?()
A . cloud computing
B . consumerization
C . collaboration
D . virtualization
E . digital media
F . borderless network
-
An integrated, converged network enables customers to accomplish which three actions?()
A . simplify communications
B . eliminate network security threats
C . reduce total cost of ownership
D . reduce headcount
E . enable collaboration
F . increase bandwidth
-
You need to design the restrictions on the Bank.Customers table. Which three actions should you perform?()
A . Design a trigger that verifies that the first names and surnames are not empty strings.
B . Design a check constraint that verifies that the first names and surnames are not empty strings.
C . Design a check constraint that uses a CLR user-defined function to verify that either the phone number is a null value or the format of the phone number is valid.
D . Design a trigger that uses a CLR user-defined function to verify that either the phone number is a null value or the format of the phone number is valid.
E . Design a check constraint that ensures that the phone number cannot be changed from a valid format to a null value or to an invalid format.
F . Design a trigger that ensures that the phone number cannot be changed from a valid format to a null value.
-
Which three statements are true about persistent configuration?() (Choose three.)
A . A user cannot set privileges on the persistent lightweight jobs
B . Persistent lightweight jobs generate a large amount of metadata
C . It is possible to create fully self-contained persistent lightweight jobs
D . The use of a template is mandatory to create persistent lightweight jobs
E . Persistent lightweight jobs are useful when users need to create a large number of jobs in a short time
-
Which three statements are true?()
A . The default constructor initializes method variables.
B . The default constructor has the same access as its class.
C . The default constructor invoked the no-arg constructor of the superclass.
D . If a class lacks a no-arg constructor, the compiler always creates a default constructor.
E . The compiler creates a default constructor only when there are no other constructors for the class.
-
You are designing a name resolution strategy for the retail outlets to ensure that the existing bandwidth is used efficiently. Which three actions should you perform?()
A . Configure the DNS server service on the terminal servers as caching-only servers.
B . Configure multiple sites to have site links and set up a specific replication schedule.
C . Configure the default site to have the subnets of Atlanta and the branch offices.
D . Create a new DNS zone and configure zone transfers to name servers only.
E . Create an application partition to be used for DNS.
F . Specify the scope of replication to be used for DNS.
-
Which three are true? ()
A . A MERGE statement is used to merge the data of one table with data from another.
B . A MERGE statement replaces the data of one table with that of another.
C . A MERGE statement can be used to insert new rows into a table.
D . A MERGE statement can be used to update existing rows in a table.
-
You are designing a name resolution strategy for the retail outlets to ensure that the existing bandwidth is used efficiently. Which three actions should you perform?()
A . Configure the DNS server service on the terminal servers as caching-only servers.
B . Configure multiple sites to have site links and set up a specific replication schedule.
C . Configure the default site to have the subnets of Atlanta and the branch offices.
D . Create a new DNS zone and configure zone transfers to name servers only.
E . Create an application partition to be used for DNS
F . Specify the scope of replication to be used for DNS
-
You are designing a strategy for migrating the UNIX user accounts to Active Directory. Which three actions should you perform?()
A . Import the user accounts as inetOrgPerson objects.
B . Import the user accounts into Active Directory by using the Ldifde command-line tool.
C . Export all user accounts from the UNIX servers to a text file.
D . Export all user accounts and their passwords from the UNIX servers to a text file. Encrypt this file to achieve extra security.
E . Assign random passwords to each user object, and securely distribute the password to the users.
F . Create the same strong password for each user object, and require users to change their passwords at first logon.&e
-
You need to ensure that SMTP e-mail messages can be delivered when the messages are sent to addresses that end with @fourthcoffee.com and are intended for the Exchange Server 5.5 environment. Which three courses of action should you perform?()
A . Create mail-enabled contacts in the fourthcoffee.com domain for each Exchange Server 5.5 recipient. Establish the e-mail address to have an address that ends with @oldmail.fourthcoffee.com
B . Create mail-enabled contacts in the fourthcoffee.com domain for each Exchange Server 5.5 recipient. Establish the e-mail address to have an address that ends with @fourthcoffee.com
C . Configure each Exchange Server 5.5 recipient to have an address e-mail address that ends with @oldmail.fourthcoffee.com. Set the @oldmail.fourthcoffee.com address to be the default reply address
D . Configure each Exchange Server 5.5 recipient to have an additional e-mail address that ends with @oldmail.fourthcoffee.com. Set the @fourthcoffee.com address to be the default reply address
E . Configure each Exchange Server 5.5 recipient to use a single SMTP address that ends with @oldmail.fourthcoffee.com
F . Configure an SMTP connector between the Exchange Server 2003 routing group at the Sydney office and the Exchange Server 5.5 site at the Sydney office. Configure the connector namespace to be oldmail.fourthcoffee.com
G . Configure an SMTP connector between the Exchange Server 2003 routing group at the Sydney office and the Exchange Server 5.5 site at the Sydney office. Configure the connector namespace to be fourthcofee.com
-
Which three WLAN statements are true? (Choose three.) ()
A . A lightweight AP receives control and configuration from a WLAN controller to which it is associated.
B . A WLAN client that is operating in half-duplex mode will delay all clients in that WLAN
C . A dhoc mode allows mobile clients to connect directly without an intermediate AP
D . Another term for infrastructure mode is independent service set (IBSS)
E . The Aironet 1230 access point is an example of an access point that operates solely as a lightweight access point.
F . WLANs are designed to share the medium and can easily handle an increased demand of channel contention.
-
Which three actions are required to configure the Flashback Database?()
A . set Flash Recovery Area
B . enable Flashback logging
C . create FLASHBACK tablespace
D . start the database in the ARCHIVELOG mode
E . start the database in the NOARCHIVELOG mode
-
Which three MPLS statements are true?()
A . Cisco Express Forwarding (CEF) must be enabled as a prerequisite to running MPLS on a Cisco router.
B . Frame-mode MPLS inserts a 32-bit label between the Layer 3 and Layer 4 headers.
C . MPLS is designed for use with frame-based Layer 2 encapsulation protocols such as Frame Relay, but is not supported by ATM because of ATM fixed-length cells.
D . OSPF, EIGRP, IS-IS, RIP, and BGP can be used in the control plane.
E . The control plane is responsible for forwarding packets.
F . The two major components of MPLS include the control plane and the data plane.