Welcome to Leader of IT Certifications. Best Practice, Certify for Sure!

Index

Content published at Leader of IT Certifications. Best Practice, Certify for Sure!More then 370 posts found
3Com Certification

3Com 3M0-600 Exam Practice PDF, Pass the 3Com 3M0-600 Exam Guide On Our Store

GOOD NEWS: All the new 3Com 3M0-600 exam questions and answers can get in VCE and PDF format for free on Flydumps.com With Flydumps 3Com 3M0-600 practice tests, you will pass the exam easily! Free download 3Com 3M0-600 exam questions vce player all the time.

QUESTION 42
Which three are standards/limitations when you are creating a mobility domain on the 3Com Wireless LAN Switch/Controller (WX)? (Choose three.)
A. Each WX must have a system IP address
B. Can define only one seed WX per mobility domain
C. Each VLAN must be locally configured on at least one WX
D. Mobility domains are limited to a single IP subnet or network
E. Each IP address on the WX must belong to the same subnet

Correct Answer: ABC QUESTION 43
Click the Task button.
Match each 3Com wireless component with its description.
A.
B.
C.
D.

Correct Answer:
QUESTION 44
Click the Task button.
Match each Wireless LAN Mobility term with its description.

A.
B.
C.
D.

Correct Answer: QUESTION 45
Every mobility domain should have a minimum of two seed switches assigned one main and one backup.
A. True
B. False

Correct Answer: B QUESTION 46
Click the Task button.
Match each 3Com Wireless Switch (WX) IP service with its description.

A.
B.
C.
D.

Correct Answer: QUESTION 47
Click the Task button.
Match each 3Com Wireless Switch (WX) term with its description.
A.
B.
C.
D.

Correct Answer:
QUESTION 48
Why should you use PortFast on the Wireless LAN Switch/Controller?
A. It enables Jumbo Frames on the port, providing higher data throughput on the link
B. It configures all the ports for 1,000 Mbps full duplex, providing maximum throughput
C. It immediately puts a port into the STP forwarding state, preventing an application from possibly timing out
D. Like Rapid Spanning Tree Protocol (RSTP), PortFast provides faster convergence for wireless devices when a bridge port goes up or downon the network

Correct Answer: C
QUESTION 49
Which IP route service can be configured on 3Com Wireless Switch/Controller (WXs)?
A. Static routes to forward traffic generated by the WX to a specific IP router, if the traffic is on a local VLAN or subnet
B. Static routes to forward traffic generated by the WX to a specific IP router, if the traffic is not on a local VLAN or subnet
C. Static routes to forward traffic passing through the WX to a specific IP router, if the traffic is on a local VLAN or subnet
D. Static routes to forward traffic passing through the WX to a specific IP router, if the traffic is not on a local VLAN or subnet
Correct Answer: B
QUESTION 50
Click the Task button.
Arrange the steps to connect to a Wireless Network in Windows XP.

A.
B.
C.
D.

Correct Answer: QUESTION 51
Wireless LAN (WLAN) IEEE 802.11a Turbo Mode bonds two channels together for up to 108 Mbps data rates.
A. True
B. False

Correct Answer: A

CCNA Exam Certification Guide is a best-of-breed 3Com 3M0-600 exam study guide that has been completely updated to focus specifically on the objectives.Senior instructor and best-selling author Wendell Odom shares preparation hints and 3Com 3M0-600 tips to help you identify areas of weakness and improve both your conceptual and hands-on knowledge.3Com 3M0-600 Material is presented in a concise manner,focusing on increasing your understanding and retention of exam topics.

3Com Certification

3Com 3M0-701 Brain Dump, Latest 3Com 3M0-701 Test On Store

100% Valid:How to choose the right 3Com 3M0-701 exam dumps? Just try the Flydumps newest 3Com 3M0-701 exam dumps with more new added quesitons and answers,also now you can free download 3Com 3M0-701 VCE player and PDF files for training.

QUESTION 42
Which of the following best defines the acronym VPIM? (Choose one)
A. Voice Protocol for Internet Messages
B. Vector Profile for Internet Messaging
C. Voice Profile for Internet Messaging
D. Vector Protocol for Internet Messages

Correct Answer: C QUESTION 43
What are the two main components of NBX Media Driver? (Choose two)
A. TAPI
B. IMAP4
C. WAV
D. QSIG
E. LEC

Correct Answer: AC QUESTION 44
IMAP4 capability and SMTP capability are included with NBX at no charge and no license is required.
A. True
B. False

Correct Answer: A QUESTION 45
Which of the following best describes Compliment Attendant Software? (Choose one)
A. Soft-phone application that enables a user’s computer to have the same features and functions as a NBX Business Telephone.
B. Provides NBX users (generally a receptionist) with PC-based desktop call control designed for centralized rapid call handling in multi-site environments.
C. Designed to leverage the back-up and restore capabilities of a 3Com NBX system and provide a central portal to manage all sites in a multi-site configuration.
D. A user-friendly application for easily creating and maintaining dial plans for multiple NBX platforms deployed across an enterprise.

Correct Answer: B QUESTION 46
Which of the following are accurate statements concerning Call Detail Reporting (CDR)? (Choose three)
A. Requires a CDR license
B. Does not require a license
C. Telephone system usage tracked on a per user/ per call basis
D. Telephone system usage tracked on a per telephone group/ per call basis
E. Tracks only completed calls
F. Tracks completed calls and all attempted and/or abandoned calls

Correct Answer: BCF QUESTION 47
A NBX system running in SIP mode can interoperate with any other SIP endpoint, including gateways, devices, and SIP-enabled applications.
A. True
B. False

Correct Answer: A QUESTION 48
The Admin Log (Adminlog) tracks all activities performed in NetSet utility under the administrator login. It is never renamed or deleted. It continues to grow over time, but it is unlikely that the size of the file will ever grow to be a problem.
A. True
B. False

Correct Answer: A QUESTION 49
The Periodic Time-stamp on Console (PTOC) feature lets the NBX send a timestamp to a remote management console at an interval specified by the administrator.
A. True
B. False

Correct Answer: B QUESTION 50
One way audio or no audio on a Layer 3 Call is one of the most common issues which can easily be resolved by checking a few simple items. Which of the following are items that should be checked? (Choose three)
A. Verify IP Address, Subnet Mask, Gateway and NCP IP Address for remote device
B. Verify no NAT or correct configuration of a 3Com recommended device supporting virtual server redirect
C. Verify Remote Phone License has been installed.
D. Verify NBX 3102 Phones are being used at all remote sites as these are the only NBX phones that support remote connectivity.
E. Verify local NBX devices have been assigned an IP Address, Subnet Mask, Gateway
Correct Answer: ABE

We provide 3Com 3M0-701 help and information on a wide range of issues. 3Com 3M0-701 is professional and confidential and your issues will be replied within 12 hous. 3Com 3M0-701 free to send us any questions and we always try our best to keeping our Customers Satisfied.

Apple

Apple 9L0-612 Questions And Answers, Prepare for the Apple 9L0-612 Vce Dumps On Our Store

Flydumps Apple 9L0-612 exam questions which contain almost 100% correct answers are tested and approved by senior Apple lecturers and experts. They have been devoting themselves to providing candidates with the best study materials to make sure what they get are valuable.

QUESTION 21
In a WPA Enterprise infrastructure, the RADIUS server manages ________.
A. the TKIP process
B. user names and passwords
C. MAC addresses of authorized clients
D. user Access Control Lists (user ACLs)

Correct Answer: B QUESTION 22
WEP authentication ________; 802.1X does not.
A. requires a RADIUS server to support encryption
B. provides a secure connection between any two points
C. supports per-user passwords without a RADIUS server
D. uses a shared encryption key for all devices on the network

Correct Answer: D QUESTION 23
What two (2) command-line tools can help identify suspicious activity that could indicate malicious software on a computer?
(Choose TWO.)
A. ps
B. secutil
C. hdiutil
D. scanps
E. netstat

Correct Answer: AE QUESTION 24
A shadow password is stored ________.
A. in the local LDAP database
B. in the local NetInfo database
C. in a file in /var/db/shadow/hash/
D. when you use the crypt() command

Correct Answer: C QUESTION 25
You have configured your AirPort Base Station for 128-bit WEP authentication, and have assigned a network passphrase. Why would you need to distribute the 26-digit hex key to your users?
A. WEP with 802.1x requires a hex key for asymmetric encryption
B. The hex key allows for compatibility with older machines and different platforms
C. WEP requires users to enter a hex key to connect to the network using 128-bit encryption.
D. You want the strongest possible WEP key: a hex key is stronger than a passphrase, because it is not susceptible to dictionary attacks.

Correct Answer: B QUESTION 26
Which statement is true of secure authentication for POP clients using Mac OS X Server mail services?
A. Mac OS X Server mail services support LAN Manager password hashes.
B. When using APOP authentication, the Mail server stores passwords in a recoverable form.
C. When using Kerberos for authentication, the client should disable Open Directory authentication
D. When using Kerberos for authentication, the Mail server must reside on the same host as the KDC

Correct Answer: B
QUESTION 27
You want to use Directory Access Control Lists (DACLs) in LDAP. Which step must you complete?
A. Turn on Access Control in Server Admin.
B. Edit the rules to allow “read” by anonymous.
C. Add the line disallow bind_anon to slapd.conf.
D. Edit the AccessControlEntry attribute in Inspector in Workgroup Manager.

Correct Answer: D
QUESTION 28
In your web browser you type a URL that starts with https://. To what port will your browser connect, by default?
A. 80
B. 443
C. 5410
D. 8080

Correct Answer: B
QUESTION 29
Which command will create an encrypted disk image?
A. hdiutil create SecretImage.sparseimage -size 2g -encryption -fs HFS+ -volname SecretImage.sparseimage
B. mkdisk /mnt/SecretImage.sparseimage mount -encryption -fs HFS+ /dev/ram /mnt/SecretImage.sparseimage
C. mkdisk create SecretImage.sparseimage -size 2g -encryption -fs HFS+ -volname SecretImage.sparseimage
D. hdiutil /mnt/SecretImage.sparseimage mount -encryption -fs HFS+ /dev/ram /mnt/SecretImage.sparseimage
Correct Answer: A
QUESTION 30
How do you interact with the Authorization framework when you want to add or remove user rights?
A. Edit the /etc/authorization file.
B. Edit the /var/authorization file.
C. Edit the /etc/rc/rc.common file.
D. Use Workgroup Manager to modify user policies.
E. Use dscl to add policy information to the local NetInfo database.
Correct Answer: A
QUESTION 31
Which security technology protects email passwords from network snooping?
A. SAPL
B. Kerberos
C. Shadow Hash
D. Digital Signatures

Correct Answer: B QUESTION 32
Why should you avoid logging in as an administrator to perform routine tasks?
A. If you log in as an administrator, malicious programs can listen on privileged ports (ports below 1024) without requiring further authentication.
B. If you log in as an administrator, untrusted programs can write to sensitive areas of the file structure without requiring further authentication.
C. If you log in as an administrator, and a malicious user gains access to your computer, he or she can edit users’ home folders without requiring further authentication.
D. If you log in as an administrator, and launch Terminal to perform routine tasks, malicious programs can run sudo commands without requiring further authentication.

Correct Answer: B QUESTION 33
What two (2) steps are necessary to configure your HTTP website to forward to an SSL website? (Choose TWO.)
A. In Server Admin, start the https service.
B. In Server Admin’s Web pane, create a rule that forwards all traffic through port 8080
C. In Server Admin’s Web pane, select the Enable Secure Forwarding checkbox and click OK.
D. In Server Admin’s Web pane, select the Enable Secure Sockets Layer (SSL) checkbox and click OK.
E. In Server Admin’s Web pane, edit the http:// site, and select “Add new alias or redirect”, then enter the URL for the secure site.

Correct Answer: DE QUESTION 34
You want to use ACLs to prevent members of the Guest group from reading your file, named file1. Which command will accomplish this?
A. aclctl guest+r file1
B. aclctl add “guest deny read” file1
C. chmod +a “guest deny read” file1
D. chmod setacl “guest deny read” file1

Correct Answer: C QUESTION 35
Which command will find files that have the SUID bit set?
A. sudo locate -s
B. sudo locate -perm suid
C. sudo find / -perm suid -print
D. sudo find / -perm +4000 -print

Correct Answer: D QUESTION 36
Which two (2) steps can you take to prevent your mail service in Mac OS X Server v10.4 from being used as an open relay?
(Choose TWO.)
A. Require SMTP authentication.
B. Require APOP authentication.
C. Configure the firewall to block port 110.
D. Configure the firewall to block port 323.
E. Limit the hosts and networks from which you accept relays.

Correct Answer: AE
QUESTION 37
Which two (2) protocols encrypt data transferred over the network?
(Choose TWO.)
A. SSH
B. SMB
C. SFTP
D. SMTP
E. HTTP

Correct Answer: AC
QUESTION 38
Which action will result in a secure connection to a server?
A. Enable Secure Remote Apple Events in Sharing preferences on the server.
B. Press and hold the Option key while double-clicking the server discovered via Bonjour.
C. In Finder, choose “Connect to Server” from the Go menu, and enter afp-s://<servername> in the Server Address field, then select Connect.
D. In Terminal, choose “Connect to Server” from the File menu, then select Secure Shell (ssh) from the Service column, and the server from the Server column.

Correct Answer: D
QUESTION 39
Which protocol can be enabled in Mac OS X Mail to handle encryption of communication with a mail server?
A. MD5
B. SSL
C. SSH
D. Kerberos
Correct Answer: B
QUESTION 40
Where should you look to determine which Certificate Authorities are trusted by Safari?
A. In Security preferences, select the X509Anchors tab.
B. In Keychain Access, select the X509Anchors keychain.
C. In Network preferences, select Security, then X509Anchors.
D. In Safari preferences, click the Advanced button, then select X509Anchors.
Correct Answer: B
QUESTION 41
You want to give the group labadmin the ability to unlock any user’s screen saver, but not give the group any further administrative rights. How do you do this?
A. Create a new right and rule in the /etc/authorization file
B. Make the labadmin group a subgroup of the admin group.
C. Add all members of the labadmin group to the admin group.
D. Use Desktop and Screen Saver preferences to allow the labadmin group to unlock the screen saver.

Correct Answer: A
QUESTION 42
You have various sensitive documents that you want to keep encrypted, while still being able to distribute them to others. Which feature is best for this task?
A. Keychain
B. FileVault
C. Finder Archive
D. Encrypted Disk Image

Correct Answer: D
QUESTION 43
According to Password Assistant’s policy rules, a “memorable” password consists of ________.
A. a phrase from a syntactically correct sentence
B. a difficult-to-spell word from the local dictionary
C. a one- to three-digit number, followed by a punctuation mark, followed by a word from the local dictionary
D. a word from the local dictionary, followed by a one- to three-digit number, followed by a punctuation mark, followed by another word from the local dictionary

Correct Answer: D
QUESTION 44
You use the Keychain Access Certificate Assistant to create a certificate.
What three (3) items appear in your keychain for the certificate?
(Choose THREE.)
A. the certificate signing request
B. the public key for your certificate
C. the private key for your certificate
D. the password for the encrypted PEM file
E. a link to the proper certificate from X509 Anchors
F. the certificate you just created with the Certificate Assistant

Correct Answer: BCF
QUESTION 45
Which statement describes a practical approach to enforcing security for a computer that has programs owned by root which have the SUID bit set?
A. Disable root with the nicl command.
B. Delete any program that has the SUID bit set.
C. Change all SUID bits to SGID bits, and run a daily script to delete any programs that have the SUID bit set.
D. Create a list of all your essential programs that have the SUID bit set, then check your computers frequently for programs not on the list, and remove them.

Correct Answer: D
QUESTION 46
Which action will enable ACLs on a Mac OS X v10.4 volume?
A. Use Disk Utility to enable ACLs on a volume
B. Get Info on the volume and select Enable ACLs.
C. Type “sudo diskutil enableACL /” in Terminal.
D. Type “sudo /usr/sbin/fsaclctl -p / -e” in Terminal.

Correct Answer: D
QUESTION 47
You must configure Mac OS X so that each of your users can access his or her home folder over the network. Which service, if used to accomplish this goal, would cause a weak hash of each user’s password to be stored in the shadow hash file?
A. FTP
B. Remote Login
C. Windows Sharing
D. Personal File Sharing
E. Personal Web Sharing

Correct Answer: C
QUESTION 48
When configuring Bluetooth on your Mac OS X v10.4 computer, which three (3) security options should you set to restrict access to your computer via Bluetooth?
(Choose THREE.)
A. Require TKIP for all Bluetooth connections.
B. Require pairing for all Bluetooth file transfers.
C. Require Bluetooth serial port for all file transfers.
D. Turn off discoverability in the Bluetooth Status menu.
E. Prompt for each file received via Bluetooth File Transfer.
F. Enable the firewall for Bluetooth File Transfer service in System Preferences.
Correct Answer: BDE
QUESTION 49
Which statement describes an effective method to conceal an installed rootkit?
A. Install the rootkit in /, so it is hidden from most users.
B. Install modified utilities, like ls and ps, that do not see the rootkit.
C. Set the rootkit permissions to 1–, so only the root user can execute it.
D. Add the command #! /bin/csh hidden at the beginning of the shell script, to remove all commands from the history file
Correct Answer: B
QUESTION 50
How do you enable SpamAssassin in Mail services in Mac OS X Server v10.4?
A. Add the line SPAMFILTER=-YES- to /etc/hostconfig.
B. Type “sudo /bin/spamassassin -C” in Terminal.
C. In Server Admin, choose Mail, then Filters, then select “Scan email for junk mail.”
D. On the server computer, type “http://localhost:5729” in a web browser’s address field to open the SpamAssassin web configuration utility, then click Enable.

Correct Answer: C

Flydumps.com will provide you with the most updates material to prepare for the tests all the Apple 9L0-612 torrent are available at the site. Studying with dumps makes it much easier to pass the certification. Number of networking downloads including the Apple 9L0-612 download are available on the website. Various websites offering such information have information in various formats you can easily download the format that is suitable for you it can be in Apple 9L0-612 Testing Engine or in html.

Apple

Apple 9L0-611 Practice Exam, Sale Latest Apple 9L0-611 Certification Braindumps Are Based On The Real Exam

Do not worry about your Apple 9L0-611 exam,Flydumps now has published the new veriosn Apple 9L0-611 exam dumps with more new added questions and answers,also you can free download Apple 9L0-611 vce test software and pdf dumps on Flydumps.com.

QUESTION 21
A search base for an LDAP request describes ________.
A. the matching value in searched entries
B. the network address of the LDAP server
C. the point in the data tree where a data search request is started
D. the attribute in the searched entries being matched to the request

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 22
A Mac OS X v10.4 computer is bound to an Active Directory server using the Active Directory plug-in in Directory Access. Using the default configuration of the plug-in, what is the Mac OS X user ID number for a user account provided by the Active Directory server?
A. It is always set to 500.
B. It is the value stored in the user account UID attribute.
C. The number is generated based upon the user account Globally Unique ID (GUID).
D. It is a randomly generated value that does not conflict with any user IDs used by the local user records.

Correct Answer: C Section: (none)Explanation
Explanation/Reference:
QUESTION 23
You are promoting Open Directory services on a computer running Mac OS X Server v10.4 from Standalone Server to Open Directory Master. Which statement about the administrator account is true?
A. The primary administrator account in the local NetInfo database is copied to the LDAP database and used as the primary administrator account for the LDAP database.
B. A new administrator account with the name iradmin?is created in the LDAP database and assigned the password from the root account in the local NetInfo database.
C. A new administrator account is created in the LDAP database, and you assign it a name and password.
D. The root account in the local NetInfo database is copied to the LDAP database and used as the primary administrator account for the LDAP database.

Correct Answer: C Section: (none)Explanation
Explanation/Reference:
QUESTION 24
On a Mac OS X computer configured to retrieve local user account information from BSD flat files, which file contains the user account information?
A. /etc/master.passwd
B. /etc/services
C. /etc/aliases
D. /etc/users

Correct Answer: A Section: (none)Explanation
Explanation/Reference:
QUESTION 25
You have created new client mappings for the LDAPv3 plug-in. One way to make these mappings accessible to other Mac OS X clients is to ________.
A. use the Write to Server option in Directory Access
B. assign users a network home folder using Workgroup Manager
C. assign your new mappings to the VFSLinkDir attribute on the LDAP server
D. use Workgroup Manager to assign the mappings to a computer account list

Correct Answer: A Section: (none)Explanation
Explanation/Reference:
QUESTION 26
When you define a new LDAP configuration in Directory Access, you might need to enter a distinguished name and password for the connection. The distinguished name is the ________.
A. name of the root user on the server
B. canonical name of a normal user on the Mac OS X client computer
C. short name of a user with administrator permission on the client computer
D. logical path specifying the user record required by your LDAP server to perform queries

Correct Answer: D Section: (none)Explanation
Explanation/Reference:
QUESTION 27
You disable anonymous binding on the Mac OS X Server LDAP server by ________.
A. adding the following line to the /etc/hostconfig file: LDAPSERVER_BINDANON=-NO-
B. adding the following line to the /etc/openldap/slapd.conf file: disallow bind_anon
C. adding the following line to the /etc/openldap/ldap.conf file: disallow anon_binding
D. issuing the following command to the server: sudo NeST -setLDAPConfig “BIND_ANON” off

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 28
Which command would create a backup of the key distribution center (KDC)?
A. sudo kdbexport -all > /etc/secured/kdc_backup
B. sudo kdb5_util dump > /etc/secured/kdc_backup
C. sudo kadmin.local -export /etc/secured/kdc_backup
D. kadmin -p diradmin -q kdc_export > /etc/secured/kdc_backup

Correct Answer: B Section: (none)Explanation
Explanation/Reference:
QUESTION 29
Which statement is NOT true of the krb5kdc process running in Mac OS X Server v10.4?
A. The process is started by launchd.
B. The process reads its configuration data from kdc.conf.
C. The process communicates on UDP and TCP/IP port 88.
D. The process reads its service principals in the local LDAP database.

Correct Answer: D Section: (none) Explanation
Explanation/Reference: QUESTION 30
You are using an LDAP browsing utility such as LDapper to browse user records in the LDAP directory served by a Mac OS X Server computer. Which attribute in the LDAP database maps to the UniqueID attribute in an Open Directory user record?
A. uid
B. guid
C. uidNumber
D. apple-generateduid

Correct Answer: C Section: (none)Explanation
Explanation/Reference:
QUESTION 31
When troubleshooting directory services issues, what is a limitation of using the -d option with the lookupd process?
A. The lookupd process is interactive.
B. The lookupd process is used to find information on DNS resolution.
C. The results of the lookupd process are from a new instance of lookupd.
D. If configured to use DSAgent, lookupd -d will get the same results as the DirectoryService process.

Correct Answer: C Section: (none)Explanation
Explanation/Reference:
QUESTION 32
Which statement about using the Active Directory plug-in to access user records is true?
A. The user home folder must be on an SMB server.
B. Mac OS X will use password policies set by the Active Directory administrator.
C. Address Book will automatically look up user contact information stored in the Kerberos realm.
D. By default, the plug-in generates a unique user ID based upon the user account uniqueID value in the Active Directory domain.

Correct Answer: B Section: (none)Explanation
Explanation/Reference:
QUESTION 33
In an Open Directory user record, what value should the NFSHomeDirectory attribute contain?
A. the local file system path to the user home folder
B. the IP address of the NFS server providing network home folders
C. the URL used to mount the share point containing the user home folder
D. the ID for the mount record that mounts the share point providing the user home folder
Correct Answer: A Section: (none)Explanation

Explanation/Reference:
QUESTION 34
When you set up Mac OS X Server to work with a Kerberos key distribution center (KDC), which file is highly sensitive and should be readable only by root?
A. edu.mit.Kerberos.plist
B. kerberos.conf
C. krb5.keytab
D. key.pem

Correct Answer: C Section: (none)Explanation
Explanation/Reference:
QUESTION 35
What is the command-line utility for requesting a ticket from a key distribution center (KDC)?
A. kmod
B. kinit
C. klist
D. kadmind

Correct Answer: B Section: (none) Explanation
Explanation/Reference:

All most all IT professionals are familiar with the Apple 9L0-611 exam and dream to have that top most demanding certification. This is the top level certification from Apple that is accepted universally. You can get your desired career which you dreamed with passing Apple 9L0-611 test and getting the certificate.

Apple

Apple 9L0-611 Exam Q&As, The Best Apple 9L0-611 Certification Exam For Download

Flydumps has timely updated the Apple 9L0-611 exam questions.With all the new questions and answers, you will pass the Apple 9L0-611 exam easily. If you want to get more Apple 9L0-611 exam dumps, you can free download the new version VCE test engine from Flydumps.All Apple 9L0-611 dumps are new updated and cover all aspect of the examination.

QUESTION 10
When you set up Mac OS X Server to work with a Kerberos key distribution center (KDC), which file is highly sensitive and should be readable only by root?
A. edu.mit.Kerberos.plist
B. Kerberos.conf
C. Krb5.keytab
D. Key.pem

Correct Answer: C Section: (none)Explanation
Explanation/Reference:
QUESTION 11
What authentication token does a client present when accessing a kerberized service?
A. the user’s password
B. a client-generated service ticket
C. a service ticket obtained from the key distribution center (KDC)
D. a ticket-generating ticket (TGT) obtained from the key distribution center (KDC)

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 12
Which statement is NOT true Password Server replication in Mac OS X Server v10.4?
A. Password Server engages in a multimaster replication scheme.
B. Confilicts in the Password Server database replicas are resolved using slapd.access
C. The replication process is entirely encrypted between each Password Server process.
D. Password Server refers to /var/db/authserver/authserverreplicas to determine if the last synchronization was successful.

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 13
You need to configure several Mac OS X computers to bind to an LDAP server that is not running on a Mac OS X computer. This is the first time that you have used this LDAP server. What should be your FIRST step?
A. In the LDAP plug-in in Directory Access, create mappings to supplement required user account attributes that are not on the LDAP database.
B. Use an LDAP browsing tool to verify the connection settings and identify the structure and format of the data stored on the server.
C. Create a new LDAP configuration in Directory Access and determine the connection settings through experimentation
D. Have the server system administrator modify the schema to support missing attributes that are required by Mac OS X

Correct Answer: B Section: (none)Explanation
Explanation/Reference:
QUESTION 14
Review the following partial mount record, then answer the question below:
RecordName: fileserver.pretendoc.com:/Users
VFSLinkDir: /Network/Servers/
VFSopts: net url==afp:// :[email protected]/Users
VSFType: url|
You use dsc 1 to view a mount record provided by an LDAP server. How is the share point mounted?

A. statically, using NFS
B. statically, using AFP
C. dynamically, using AFP
D. dynamically, using NFS
Correct Answer: C Section: (none) Explanation

Explanation/Reference:
Explanation:
in the book “Apple Training Series: Mac OS X System Administration Reference, Volume 1” ISBN:
032136984X. it says:

*
vfstype: Set to nfs for NFS mounts and url for AFP or SMB mounts.

*
dir: The local folder where clients will mount the share point. Dynamically mounted share points always have a value of/Network/Servers/.

* opts: Mount options. There may be both, one, or neither of the options net and url.

*
net indicates that the share point is to be dynamically mounted.

*
url is the URL path to an AFP share point; for example; url=afp://;NO%20USER%[email protected]:/Users.
QUESTION 15
You disable anonymous binding on the Mac OS X Server LDAP server by ________
A. adding this line to the /etc/hostconfig file:LDAPSERVER_BINDANON=-NOB. adding this line to the /etc/openldap/slapd.conf file.disallow bind_anon
B. adding this line to the etc/openldap/ldap.conf file:disallow anon_binding
C. issuing this command to the server.sudo NeST -setLDAPConfig “BIND_ANON” off

Correct Answer: B Section: (none)Explanation
Explanation/Reference:
QUESTION 16
Which statement about the dsc 1 command line utility is true?
A. dsc1 makes requests through lookupd.
B. dsc 1 has a plug-in architecture for compatiability
C. dsc1 makes requests through DirectoryService
D. dsc1 can be run when computer is in single-user mode.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 17
Chris is logged into a Mac OS X computer using a non-admin network user account provided by Mac OS X Server v10.4. The user account is configured to use an Open Directory password. When Chris tries to connect to an AFP server that is configured to use only Kerberos authentication, an “Authenticate to Kerberos ” dialog appears, requesting a name realm, and password Chris enters the user account name and password again and click OK. The same dialog reappears. What can a local system administrator do to resolve Chris’s issue?
A. Tell Chris to log on to the client computer with a secure shadow hash.
B. Enable the Kerberos v5 plug-in in Directory Access on the client computer
C. Use kdestroy to destroy any existing tickets in the cache on the client computer
D. Ensure that the date, time and time zone on the Mac OS X client and on the key distribution center (KDC) are synchronized.
E. Tell Chris to cancel the “Authenticate to Kerberos ” dialog connect to the AFP server as guest, and assume the connection is secure

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 18
What are three to provide data that is missing from a third-party LDAP server to support
Mac OS X client?
A. Repurpose existing fields in the directory schema.
B. Modify the server’s search path to exclude/NetInfo/root
C. Create local mappings with static and variable attributes
D. Remove unused objectClasses from the local directory schema.
E. Remove unused objectClasses from the local directory schema
F. Enable Option 95 to assure communication with the DHCP server
G. Modify the schema for the directory on the third-party LDAP server

Correct Answer: ACF Section: (none) Explanation
Explanation/Reference:
QUESTION 19
You are configuring your Mac OS X computer to authenticate at the login window through an LDAP server. Which Open Directory user attribute are you NOT required to map to an LDAP user attribute?
A. Unique ID
B. MCXFla
C. RealName
D. RecordName

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 20
You are setting up a new server. When the role in Open Directory services on a computer running Mac OS X Server v10.4 is configured to be a standalone server,____
A. directory data is stored in the local LDAP database
B. directory data is stored in the local NetInfo database
C. Password Server is used for password authentication
D. Kerberos service is provided for local accounts only

Correct Answer: B Section: (none) Explanation

Apple 9L0-611 tests containing questions that cover all sides of tested subjects that help our members to be prepared and keep high level of professionalism. The main purpose of Apple 9L0-611 exam is to provide high quality test that can secure and verify knowledge, give overview of question types and complexity that can be represented on real exam certification

Apple

Apple 9L0-010 Real Exam, Welcome To Buy Apple 9L0-010 Study Material For Sale

At Flydumps,we are positive that our Apple 9L0-010 preparation material with questions and answers pdf provide most in-depth solutions for individuals that are preparing for the Apple 9L0-010 exam. Our uodated Apple 9L0-010 brain dumps will allow you the opportunity to know exactly what to expect on the exam day and ensure that you can pass the exam beyond any doubt.

QUESTION 36
What is the proper way to calibrate a removable main battery in a MacBook (13-inch, Mid 2009)?
A. Charge the battery while running the Battery Calibration Utility.
B. The battery is calibrated out of the box; no further steps are needed.
C. Charge the battery overnight. Make sure battery status indicates 100% before disconnecting AC adapter.
D. Charge the battery fully. Wait 2 hours. Run the MacBook on battery until it goes to sleep. Wait 5 hours. Charge it fully again.
E. Charge the battery halfway. Wait 2 hours. Finish charging the battery. Run the MacBook on battery until it goes to sleep. Charge it fullyagain.

Correct Answer: D
QUESTION 37
Which of the following is NOT a valid power saving technique in recent Mac computers?
A. Disconnect all peripherals.
B. Activate automatic display sleep.
C. Activate automatic hard disk sleep.
D. Use wireless networks instead of wired networks.
E. Set up locations optimized for different environments.

Correct Answer: D
QUESTION 38
Which of the following most accurately describes what happens during Safe Sleep activation in Mac portables?
A. The contents of RAM are written to NVRAM before sleep.
B. The contents of the hard disk are encrypted before sleep.
C. The contents of RAM are written to hard disk before sleep.
D. The contents of the hard disk are read into RAM before sleep.

Correct Answer: C
QUESTION 39
MacBook Air comes with a _____ MagSafe power adapter.
A. 45 Watt
B. 60 Watt
C. 65 Watt
D. 80 Watt
E. 85 Watt

Correct Answer: A
QUESTION 40
A MacBook Pro (17-inch Mid-2010) powers on with no image on the built-in display. You connect an external display and restart the MacBook Pro, yet you still see no image on either display. Which of the following is most likely the cause of this symptom?
A. Dead battery
B. Not enough RAM
C. Faulty optical drive
D. RAM not completely seated

Correct Answer: D
QUESTION 41
Which THREE of the following components should you be very careful with, when working inside an Apple portable? SELECT THREE
A. Plastic tab
B. Small screw
C. Ribbon cable
D. Deflection coil
E. Anode aperture
F. Flyback transformer

Correct Answer: ABC QUESTION 42
Which of the following would be the most appropriate question to ask FIRST, when gathering information from customers about a problem with their Apple product?
A. What is the issue?
B. What operating system are you using?
C. Did you turn off the computer improperly?
D. What steps have you taken to resolve the problem yourself?

Correct Answer: A QUESTION 43
A customer claims that her Mac cannot connect to her AirPort Express network at home. Which of the following would be the BEST question to ask her FIRST?
A. Can any other computer successfully join her network?
B. Does your ISP support wireless access to the Internet?
C. What type of wireless card is installed in your Mac?
D. Have you upgraded to Mac OS X v10.7.3?

Correct Answer: A QUESTION 44
When practicing component isolation, which ONE of the following components would NOT be a part of a minimal system configuration for a MacBook 13-inch (Mid 2010)?
A. RAM
B. Logic board
C. Optical drive
D. Power adapter

Correct Answer: C QUESTION 45
Which TWO of the following are clues that may indicate a ‘no video’ condition? SELECT TWO
A. You do not hear a startup chime.
B. You may hear fan or drive noise.
C. You cannot connect to the Internet.
D. The power button or power indicator lights up.
E. The cursor is frozen and the system is unresponsive.

Correct Answer: BD QUESTION 46
Which of the following is ALMOST CERTAINLY a hardware-related problem?
A. No video at startup
B. Error beep at startup
C. Distorted video at startup
D. Blinking question mark at startup

Correct Answer: B QUESTION 47
Which of the following is ALMOST CERTAINLY a software-related problem?
A. No video on display
B. Single beep at startup
C. No Internet connectivity
D. iPhoto quits when launched

Correct Answer: D
QUESTION 48
A customer states that he cannot open a Keynote file. What is the most effective question to ask him FIRST?
A. Can you open any files?
B. Can you open other Keynote files?
C. Is your Mac connected to a network?
D. What version of Keynote are you using?

Correct Answer: B
QUESTION 49
To isolate a video problem as hardware or software on a Mac, which of the following steps should you try FIRST?
A. Replace the built-in display.
B. Reinstall the appropriate Mac OS.
C. Verify the hard disk with Disk First Aid.
D. Start up from a known-good startup volume.

Correct Answer: D
QUESTION 50
Verifying that a computer functions properly after you repair it ensures that _____. SELECT THREE
A. third-party software is working
B. the original issue has been resolved
C. the computer falls under service warranty
D. the computer will continue to function after the repair
E. no new problems have been introduced during the repair
Correct Answer: BDE
QUESTION 51
Which THREE of the following are clues that may indicate a ‘no power’ condition? SELECT THREE
A. You do not hear a startup chime.
B. You cannot connect to the Internet.
C. You do not hear any fan or drive noise.
D. The cursor is frozen and the system is unresponsive.
E. The power button or power indicator does not light up at all.
Correct Answer: ACE
QUESTION 52
What step is required before upgrading the RAM in a Mac Pro (Early 2009)?
A. Remove the processor tray
B. Remove the hard drive carriers.
C. Remove the front inlet fan assembly.
D. Remove the Optical Drive and Carrier.

Correct Answer: A QUESTION 53
The Mac Pro (Early 2009) has SMC functionality split between a primary SMC on the backplane board, and a secondary SMC on the processor board. What service issue should a technician be aware of when servicing the Mac Pro (Early 2009)?
A. SMC firmware must always match on both boards.
B. Three internal buttons must be pressed in order to reset both SMCs.
C. It is required to remove the memory riser card in order to reset the SMC.
D. Processor trays are interchangeable between similar Mac Pro (Early 2009) units.

Correct Answer: A QUESTION 54
A computer service technician says “I don’t use ESD precautions and have never had a problem.” What (if anything) is wrong with this statement?
A. Nothing is wrong with this statement.
B. ESD damage may not appear immediately.
C. ESD happens only to inexperienced technicians.
D. ESD damage is really not as bad as everyone thinks.

Correct Answer: B QUESTION 55
You want to follow ESD prevention rules, but your work area is too small for you to be tethered with a wired wrist strap. What is one acceptable alternative solution to this issue?
A. Use a wireless wrist strap.
B. Use a grounded ESD heel strap.
C. Do not practice ESD prevention.
D. Work on the floor instead of a table.

Correct Answer: B QUESTION 56
When you work at a customer site, you do not need to take any precautions to avoid ESD damage.
A. True
B. False

Correct Answer: B QUESTION 57
ESD causes damage to circuits by ________.
A. slowing the circuit down
B. blasting a hole in the circuit
C. cooling the circuit too quickly
D. increasing the circuit’s clock speed Correct Answer: B
QUESTION 58
You are preparing to service a MacBook. To reduce the risk of damage from ESD, you clear the area of plastic, vinyl, or foamed polystyrene, and have static-shielding storage bags available for ESD-sensitive components. While you are working you should also remember to ________________ and _______________. SELECT TWO
A. ground yourself and the equipment you are working on
B. always place ESD-sensitive components on metal surfaces
C. discharge the display to protect the other ESD-sensitive components
D. handle any ESD-sensitive components by the connectors, rather than by the edges
E. ask other technicians to avoid touching you when you are working on ESD-sensitive components

Correct Answer: AE
QUESTION 59
You are about to replace a MacBook Air (13-inch, Late 2010) logic board. Which of the following is the most important step you should take immediately after removing the bottom case?
A. Remove the thermal module.
B. Install the battery cover.
C. Remove the hard drive.
D. Remove the battery.

Correct Answer: B
QUESTION 60
Which of the following scenarios would be most appropriate to use Apple Service Diagnostic?
A. You want to check a Mac for accidental damage.
B. You want to verify product functionality after a repair.
C. Your customer wants to run diagnostics on his Mac Pro.
D. You need to verify that all installed applications have been updated.

Correct Answer: B
QUESTION 61
A customer asks if there is a diagnostic that he can use to help troubleshoot a hardware problem with his MacBook Pro. Which of the following solutions should you suggest?
A. Apple Service Diagnostic
B. Apple Hardware Test
C. Terminal
D. Console
Correct Answer: B
QUESTION 62
Apple Service Toolkit uses ____ to check Macs with Mac Resource Inspector and other diagnostic utilities.
A. NetBoot
B. Open Firmware
C. Target Disk Mode
D. Apple Remote Desktop
Correct Answer: A
QUESTION 63
Examine the exhibit.

Why is it necessary to use this Service Fixture when replacing the left fan or heat sink in a MacBook Pro (15-inch, Mid 2009)?
A. This tool is used to avoid flexing the logic board.
B. This tool is used to avoid ESD damage to the logic board.
C. It is impossible to remove these components without this tool.
D. This tool is used to properly align the processor with its socket.

Correct Answer: A
QUESTION 64
You are about to begin disassembly of an iMac (27-inch, Mid 2010) to replace the LCD display. Which TWO of the following tools are required to do this? SELECT TWO
A. Multimeter
B. Suction cups
C. Service stand
D. Anti-static, lint-free gloves
E. Torx T-15 driver with 5 inch shaft
Correct Answer: BD
QUESTION 65
Examine the exhibit.

This specialized tool is required for the removal of which component from the Mac mini (Mid 2010)?
A. Fan
B. Memory
C. Bottom Cover
D. Antenna Plate
E. Logic Board Assembly

Correct Answer: E QUESTION 66
When installing a heat sink in a MacBook Pro (15-inch, Mid 2012) do you tighten each of the six heat sink screws completely before tightening the next one?
A. YES
B. NO
Correct Answer: B QUESTION 67
In the MacBook Air (11-inch, Mid 2012) which cable tab includes a 2D barcode of the display clamshell serial number?
A. EDP
B. VDP
C. LVDS
D. LCDS

Correct Answer: A QUESTION 68
The Solid state drive in MacBook Air (11-inch, Mid 2012) is NOT backwards compatible with earlier models.
A. True
B. False

Correct Answer: B QUESTION 69
Which of the following ports is NOT included with the MacBook Pro (13-inch, Mid 2012)?
A. FireWire 800
B. Thunderbolt
C. Gigabit Ethernet
D. DVI

Correct Answer: D QUESTION 70
What converter allows MagSafe peripherals to be compatible with MagSafe 2 ports?
A. MagSafe
B. MagSafe 2
C. MagSave Universal
D. MagSafe-to-MagSafe 2

Correct Answer: D

We help you do exactly that with our high quality Apple 9L0-010 Certification using the above training materials.Regardless of whichever computer you have, you just need to download one of the many Apple 9L0-010 PDF readers that are available for free.

Apple

Apple 9L0-010 Real Exam, Discount Apple 9L0-010 Exam Materials Online Shop

Flydumps provides guarantee of Apple 9L0-010 exam because Flydumps is an authenticated IT certifications site and the high class of the products are developed due to extensive hiring of the experts staff.Apple 9L0-010 study guide is updated with regular basis and the answers are rechecked of every exam.What’s more,you can download the free demos in PDF file,it would be a great help for your exam.All the dumps are updated and cover every aspect of the examination

QUESTION 31
Which of the following is NOT a valid Bluetooth troubleshooting tip for Macs?
A. Check for signal interference.
B. Make sure Bluetooth is turned on.
C. Update Bluetooth software on the Mac.
D. Verify Bluetooth peripheral hardware batteries are charged.
E. Make sure the Bluetooth peripheral is at least 20 meters away from the Mac.

Correct Answer: E
QUESTION 32
You are troubleshooting an iMac (Early 2008) that does not power on. You notice that all diagnostic LEDs remain off when a known-good power cord is connected to the iMac and to a known-good power outlet. What is most likely the cause of these symptoms?
A. Faulty power supply
B. Faulty optical drive
C. Faulty LCD panel
D. Faulty video card
Correct Answer: A
QUESTION 33
Examine the exhibit.

What is this message?
A. Kernel Panic
B. Software Update
C. Firmware Update
D. Power-On Self-Test

Correct Answer: A
QUESTION 34
What is the indication that a Mac has completed a successful power-on self test (POST)?
A. Startup Chime.
B. A series of beeps.
C. The Login Window starts.
D. The Desktop, Dock, and menu bar load.

Correct Answer: A
QUESTION 35
You can use a higher wattage power adapter with an Apple portable computer, but you cannot use one with less wattage without potential operating issues.
A. True
B. False
Correct Answer: A
QUESTION 36
What is the proper way to calibrate a removable main battery in a MacBook (13-inch, Mid 2009)?
A. Charge the battery while running the Battery Calibration Utility.
B. The battery is calibrated out of the box; no further steps are needed.
C. Charge the battery overnight. Make sure battery status indicates 100% before disconnecting AC adapter.
D. Charge the battery fully. Wait 2 hours. Run the MacBook on battery until it goes to sleep. Wait 5 hours. Charge it fully again.
E. Charge the battery halfway. Wait 2 hours. Finish charging the battery. Run the MacBook on battery until it goes to sleep. Charge it fullyagain.

Correct Answer: D
QUESTION 37
Which of the following is NOT a valid power saving technique in recent Mac computers?
A. Disconnect all peripherals.
B. Activate automatic display sleep.
C. Activate automatic hard disk sleep.
D. Use wireless networks instead of wired networks.
E. Set up locations optimized for different environments.

Correct Answer: D
QUESTION 38
Which of the following most accurately describes what happens during Safe Sleep activation in Mac portables?
A. The contents of RAM are written to NVRAM before sleep.
B. The contents of the hard disk are encrypted before sleep.
C. The contents of RAM are written to hard disk before sleep.
D. The contents of the hard disk are read into RAM before sleep.

Correct Answer: C
QUESTION 39
MacBook Air comes with a _____ MagSafe power adapter.
A. 45 Watt
B. 60 Watt
C. 65 Watt
D. 80 Watt
E. 85 Watt

Correct Answer: A
QUESTION 40
A MacBook Pro (17-inch Mid-2010) powers on with no image on the built-in display. You connect an external display and restart the MacBook Pro, yet you still see no image on either display. Which of the following is most likely the cause of this symptom?
A. Dead battery
B. Not enough RAM
C. Faulty optical drive
D. RAM not completely seated

Correct Answer: D
QUESTION 41
Which THREE of the following components should you be very careful with, when working inside an Apple portable? SELECT THREE
A. Plastic tab
B. Small screw
C. Ribbon cable
D. Deflection coil
E. Anode aperture
F. Flyback transformer

Correct Answer: ABC QUESTION 42
Which of the following would be the most appropriate question to ask FIRST, when gathering information from customers about a problem with their Apple product?
A. What is the issue?
B. What operating system are you using?
C. Did you turn off the computer improperly?
D. What steps have you taken to resolve the problem yourself?

Correct Answer: A QUESTION 43
A customer claims that her Mac cannot connect to her AirPort Express network at home. Which of the following would be the BEST question to ask her FIRST?
A. Can any other computer successfully join her network?
B. Does your ISP support wireless access to the Internet?
C. What type of wireless card is installed in your Mac?
D. Have you upgraded to Mac OS X v10.7.3?

Correct Answer: A QUESTION 44
When practicing component isolation, which ONE of the following components would NOT be a part of a minimal system configuration for a MacBook 13-inch (Mid 2010)?
A. RAM
B. Logic board
C. Optical drive
D. Power adapter

Correct Answer: C QUESTION 45
Which TWO of the following are clues that may indicate a ‘no video’ condition? SELECT TWO
A. You do not hear a startup chime.
B. You may hear fan or drive noise.
C. You cannot connect to the Internet.
D. The power button or power indicator lights up.
E. The cursor is frozen and the system is unresponsive.

Correct Answer: BD QUESTION 46
Which of the following is ALMOST CERTAINLY a hardware-related problem?
A. No video at startup
B. Error beep at startup
C. Distorted video at startup
D. Blinking question mark at startup

Correct Answer: B QUESTION 47
Which of the following is ALMOST CERTAINLY a software-related problem?
A. No video on display
B. Single beep at startup
C. No Internet connectivity
D. iPhoto quits when launched

Correct Answer: D
QUESTION 48
A customer states that he cannot open a Keynote file. What is the most effective question to ask him FIRST?
A. Can you open any files?
B. Can you open other Keynote files?
C. Is your Mac connected to a network?
D. What version of Keynote are you using?

Correct Answer: B
QUESTION 49
To isolate a video problem as hardware or software on a Mac, which of the following steps should you try FIRST?
A. Replace the built-in display.
B. Reinstall the appropriate Mac OS.
C. Verify the hard disk with Disk First Aid.
D. Start up from a known-good startup volume.

Correct Answer: D
QUESTION 50
Verifying that a computer functions properly after you repair it ensures that _____. SELECT THREE
A. third-party software is working
B. the original issue has been resolved
C. the computer falls under service warranty
D. the computer will continue to function after the repair
E. no new problems have been introduced during the repair
Correct Answer: BDE
QUESTION 51
Which THREE of the following are clues that may indicate a ‘no power’ condition? SELECT THREE
A. You do not hear a startup chime.
B. You cannot connect to the Internet.
C. You do not hear any fan or drive noise.
D. The cursor is frozen and the system is unresponsive.
E. The power button or power indicator does not light up at all.
Correct Answer: ACE
QUESTION 52
What step is required before upgrading the RAM in a Mac Pro (Early 2009)?
A. Remove the processor tray.
B. Remove the hard drive carriers.
C. Remove the front inlet fan assembly.
D. Remove the Optical Drive and Carrier.

Correct Answer: A QUESTION 53
The Mac Pro (Early 2009) has SMC functionality split between a primary SMC on the backplane board, and a secondary SMC on the processor board. What service issue should a technician be aware of when servicing the Mac Pro (Early 2009)?
A. SMC firmware must always match on both boards.
B. Three internal buttons must be pressed in order to reset both SMCs.
C. It is required to remove the memory riser card in order to reset the SMC.
D. Processor trays are interchangeable between similar Mac Pro (Early 2009) units.

Correct Answer: A QUESTION 54
A computer service technician says “I don’t use ESD precautions and have never had a problem.” What (if anything) is wrong with this statement?
A. Nothing is wrong with this statement.
B. ESD damage may not appear immediately.
C. ESD happens only to inexperienced technicians.
D. ESD damage is really not as bad as everyone thinks.

Correct Answer: B QUESTION 55
You want to follow ESD prevention rules, but your work area is too small for you to be tethered with a wired wrist strap. What is one acceptable alternative solution to this issue?
A. Use a wireless wrist strap.
B. Use a grounded ESD heel strap.
C. Do not practice ESD prevention.
D. Work on the floor instead of a table.

Correct Answer: B QUESTION 56
When you work at a customer site, you do not need to take any precautions to avoid ESD damage.
A. True
B. False

Correct Answer: B QUESTION 57
ESD causes damage to circuits by ________.
A. slowing the circuit down
B. blasting a hole in the circuit
C. cooling the circuit too quickly
D. increasing the circuit’s clock speed Correct Answer: B
QUESTION 58
You are preparing to service a MacBook. To reduce the risk of damage from ESD, you clear the area of plastic, vinyl, or foamed polystyrene, and have static-shielding storage bags available for ESD-sensitive components. While you are working you should also remember to ________________ and _______________. SELECT TWO
A. ground yourself and the equipment you are working on
B. always place ESD-sensitive components on metal surfaces
C. discharge the display to protect the other ESD-sensitive components
D. handle any ESD-sensitive components by the connectors, rather than by the edges
E. ask other technicians to avoid touching you when you are working on ESD-sensitive components

Correct Answer: AE
QUESTION 59
You are about to replace a MacBook Air (13-inch, Late 2010) logic board. Which of the following is the most important step you should take immediately after removing the bottom case?
A. Remove the thermal module.
B. Install the battery cover.
C. Remove the hard drive.
D. Remove the battery.

Correct Answer: B
QUESTION 60
Which of the following scenarios would be most appropriate to use Apple Service Diagnostic?
A. You want to check a Mac for accidental damage.
B. You want to verify product functionality after a repair.
C. Your customer wants to run diagnostics on his Mac Pro.
D. You need to verify that all installed applications have been updated.

Correct Answer: B
QUESTION 61
A customer asks if there is a diagnostic that he can use to help troubleshoot a hardware problem with his MacBook Pro. Which of the following solutions should you suggest?
A. Apple Service Diagnostic
B. Apple Hardware Test
C. Terminal
D. Console
Correct Answer: B
QUESTION 62
Apple Service Toolkit uses ____ to check Macs with Mac Resource Inspector and other diagnostic utilities.
A. NetBoot
B. Open Firmware
C. Target Disk Mode
D. Apple Remote Desktop
Correct Answer: A
QUESTION 63
Examine the exhibit.

Why is it necessary to use this Service Fixture when replacing the left fan or heat sink in a MacBook Pro (15-inch, Mid 2009)?
A. This tool is used to avoid flexing the logic board.
B. This tool is used to avoid ESD damage to the logic board.
C. It is impossible to remove these components without this tool.
D. This tool is used to properly align the processor with its socket.

Correct Answer: A
QUESTION 64
You are about to begin disassembly of an iMac (27-inch, Mid 2010) to replace the LCD display. Which TWO of the following tools are required to do this? SELECT TWO
A. Multimeter
B. Suction cups
C. Service stand
D. Anti-static, lint-free gloves
E. Torx T-15 driver with 5 inch shaft
Correct Answer: BD
QUESTION 65
Examine the exhibit.

This specialized tool is required for the removal of which component from the Mac mini (Mid 2010)?
A. Fan
B. Memory
C. Bottom Cover
D. Antenna Plate
E. Logic Board Assembly

Correct Answer: E QUESTION 66

We provide thoroughly reviewed Apple 9L0-010 using the training resources which are the best for Apple 9L0-010,and to get certified by Microsoft Windows Store apps.It is a best choice to accelerate your career as a professional in the Information Technology industry. Now we add the latest Apple 9L0-010 content and to print and share content.

Apple

Apple 9L0-010 Exams, 50% OFF Apple 9L0-010 Certification Material With High Quality

Are you struggling for the Apple 9L0-010 exam? Good news,Flydumps IT technical experts have collected and certified 445 questions and answers which are updated to cover the knowledge points and enhance candidates’abilities.With Apple 9L0-010 preparation tests you can pass the exam easily and go further on Microsoft career path.

QUESTION 40
A MacBook Pro (17-inch Mid-2010) powers on with no image on the built-in display. You connect an external display and restart the MacBook Pro, yet you still see no image on either display. Which of the following is most likely the cause of this symptom?
A. Dead battery
B. Not enough RAM
C. Faulty optical drive
D. RAM not completely seated

Correct Answer: D
QUESTION 41
Which THREE of the following components should you be very careful with, when working inside an Apple portable? SELECT THREE
A. Plastic tab
B. Small screw
C. Ribbon cable
D. Deflection coil
E. Anode aperture
F. Flyback transformer

Correct Answer: ABC QUESTION 42
Which of the following would be the most appropriate question to ask FIRST, when gathering information from customers about a problem with their Apple product?
A. What is the issue?
B. What operating system are you using?
C. Did you turn off the computer improperly?
D. What steps have you taken to resolve the problem yourself?

Correct Answer: A QUESTION 43
A customer claims that her Mac cannot connect to her AirPort Express network at home. Which of the following would be the BEST question to ask her FIRST?
A. Can any other computer successfully join her network?
B. Does your ISP support wireless access to the Internet?
C. What type of wireless card is installed in your Mac?
D. Have you upgraded to Mac OS X v10.7.3?

Correct Answer: A QUESTION 44
When practicing component isolation, which ONE of the following components would NOT be a part of a minimal system configuration for a MacBook 13-inch (Mid 2010)?
A. RAM
B. Logic board
C. Optical drive
D. Power adapter

Correct Answer: C QUESTION 45
Which TWO of the following are clues that may indicate a ‘no video’ condition? SELECT TWO
A. You do not hear a startup chime.
B. You may hear fan or drive noise.
C. You cannot connect to the Internet.
D. The power button or power indicator lights up.
E. The cursor is frozen and the system is unresponsive.

Correct Answer: BD QUESTION 46
Which of the following is ALMOST CERTAINLY a hardware-related problem?
A. No video at startup
B. Error beep at startup
C. Distorted video at startup
D. Blinking question mark at startup Correct Answer: B
QUESTION 47
Which of the following is ALMOST CERTAINLY a software-related problem?
A. No video on display
B. Single beep at startup
C. No Internet connectivity
D. iPhoto quits when launched

Correct Answer: D
QUESTION 48
A customer states that he cannot open a Keynote file. What is the most effective question to ask him FIRST?
A. Can you open any files?
B. Can you open other Keynote files?
C. Is your Mac connected to a network?
D. What version of Keynote are you using?

Correct Answer: B
QUESTION 49
To isolate a video problem as hardware or software on a Mac, which of the following steps should you try FIRST?
A. Replace the built-in display.
B. Reinstall the appropriate Mac OS.
C. Verify the hard disk with Disk First Aid.
D. Start up from a known-good startup volume.

Correct Answer: D

Pass4sure is now offering Apple 9L0-010 dumps PDF and Test Engine with 100% passing guarantee. Buy Apple 9L0-010 pdf and pass your exam easily. If you want real exam simulation then buy test engine and install on your pc for preparation. Download Apple 9L0-010 CCIE Data Center questions answers study material and prepare for exam.

CheckPoint Certification

CheckPoint 156-215 Dumps, Prompt Updates CheckPoint 156-215 PDF Download Are The Best Materials

Where to find the newest CheckPoint 156-215 exam dumps? if you want to pass exam CheckPoint 156-215 without the second try, you should download the latest updated CheckPoint 156-215 braindump for preparing. Now visit Flydumps.com to get free pdf study guide with valid CheckPoint 156-215 exam dumps and free vce dumps, which will help you passing quickly!

QUESTION 64
One of your remote Security Gateways suddenly stops sending logs, and you cannot install the Security Policy on the Gateway. All other remote Security Gateways are logging normally to the SmartCenter Server, and Policy installation is not affected. When you click the Test SIC status button in the problematic gateway object, you receive an error message “unknown”. What is the problem?
A. The time on the SmartCenter Server’s clock has changed, which invalidates the remote Gateway’s Certificate.
B. The remote Gateway’s IP address has changed, which invalidates the SIC Certificate.
C. The Security Gateway is NG with Application Intelligence, and the SmartCenter Server is NGX.
D. The Internal Certificate Authority for the SmartCenter object has been removed from
objects_5_0.c.
E. There is no connection between the SmartCenter Server and the remote Gateway. Rules or routing may block the connection.

Correct Answer: E
QUESTION 65
Frank wants to know why users on the corporate network cannot receive multicast transmissions from the Internet. A VPN-1 NGX Security Gateway protects the corporate network from the Internet. Which of the following is a possible cause for the connection problem?
A. VPN-1 NGX does not support multicast routing protocols and streaming media through the Security Gateway.
B. The Multicast Rule is below the Stealth Rule. VPN-1 NGX can only pass multicast traffic, it the Multicast Rule is above the Stealth Rule.
C. Multicast restrictions are configured improperly on the external interface properties of the Security Gateway object.
D. Anti-spoofing is enabled. VPN-1 NGX cannot pass multicast traffic, if anti-spoofing is enabled.
E. Frank did not install the necessary multicast license with SmartUpdate, when upgrading the VPN-1 NGX.

Correct Answer: C
QUESTION 66
You are concerned that a message may have been intercepted and retransmitted, thus compromising the security of the communications. You attach a code to the electronically transmitted message that uniquely identifies the sender. This code is known as a:
A. Digital signature
B. Tag
C. Private key
D. AES flag
E. Diffie-Helman verification

Correct Answer: A
QUESTION 67
A user attempts authentication using SecureClient. The user’s password is rejected, even though it is
correctly defined in the LDAP directory.
Which of the following is a valid cause?

A. The LDAP server has insufficient memory
B. The LDAP and Security Gateway databases are not synchronized.
C. The SmartCenter Server cannot communicate with the LDAP server.
D. The user has defined the wrong encryption scheme.
E. The user is defined in both the NGX user database and the LDAP directory

Correct Answer: B
QUESTION 68
Select the correct statement about Secure Internal Communications (SIC) Certificates? SIC Certificates:
A. for NGX Security Gateways are created during the SmartCenter Server installation.
B. For the SmartCenter Server are created during the SmartCenter Server installation.
C. Are used for securing internal network communications between the SmartView Tracker and an OPSEC device
D. Decrease network security by securing administrative communication among the SmartCenter Servers and the Security Gateway
E. Uniquely identify Check Point enabled machines; they have the same function as Authentication Certificates

Correct Answer: E
QUESTION 69
Exhibit: *** MISSING *** Review the following rules and note the Client Authentication Action properties screen as displayed in the exhibit, After being authenticated by the Security Gateway, when a user starts an HPPT connection to a Web site, the user tries to FTP another site using the command line. What happens to the user? The…
A. FTP session is dropped by the implicit Cleanup Rule.
B. User is prompted from that FTP site only, and does not need to enter username and password for Client Authentication.
C. FTP connection is dropped by rule 2.
D. FTP data connection is dropped, after the user is authenticated successfully.
E. User is prompted for authentication bye the Security Gateway again.
Correct Answer: QUESTION 70
Diffie-Hellman uses which type of key exchange?
A. Adaptive
B. Asymmetric
C. Symmetric
D. Static
E. Dynamic
Correct Answer: B QUESTION 71
Certkiller’s main internal network 10.10.10.0/24 allows all traffic to the Internet using Hide NAT. Certkiller
also has a small network 10.10-.20.0/24 behind the internal router. Jack wants to configure the kernel to
translate the source address only when network 10.10.20.0 tries to access the Internet for HTTP, SMTP,
and FTP services.
Which of the following configurations will allow this network to access Internet?

A. Automatic Static NAT on network 10.10.20.0/24
B. Manual Hide NAT rules for HTTP, FTP, and SMTP services for network 10.10.20.0/24.
C. Manual Static NAT rules for network 10.10.20.0/24,
D. Automatic Hide NAT for network 10.10.20.0/24.
E. No change is necessary.
Correct Answer: B QUESTION 72
With SmartDashboard磗 Smart Directory, you can create NGX user definitions on a(n) _____________ Server.
A. NT Domain
B. LDAP
C. Provider-1
D. SecureID
E. Radius

Correct Answer: B QUESTION 73
Jens notices a large amount of traffic from a specific internal IP address. He needs to verify if it is a network attack, or a user’s system infected with a worm. He has enabled Sweep Scan Protection and Host port scan in SmartDefense. Will Jens get all the information he needs from these actions?
A. No. SmartDefense will only block the traffic, but it will not provide a detailed analysis of the traffic.
B. No. SmartDefense will not block the traffic. The logs and alert can provide a further level information, but determining whether the attack is intentional or a worm requires further research by Jens.
C. No. Jens also should set SmartDefense to quarantine the traffic from the suspicious IP address.
D. Yes. SmartDefense will limit the traffic impact from the scans, and identify if the pattern of the traffic matches any known worms.
E. No. To verify if this is a worm or an active attack, Jens should also enable TCP attack defenses.

Correct Answer: B QUESTION 74
Which NGX feature or command provides the easiest path for Security Administrators to revert to earlier versions of the same Security Policy and objects configuration?
A. cpconfig
B. upgrade_export/upgrade_import
C. Database Revision Control
D. Dbexport/dbimport
E. Policy Package management
Correct Answer: C QUESTION 75
How do you configure an NGX Security Gateway’s kernel memory settings, without manually modifying the configuration files in $FWDIR\lib? By configuring:
A. the settings on the Gateway object’s Capacity Optimization screen
B. the settings on the Global Properties Capacity Optimization screen
C. the Settings on the Gateway object’s Advanced screen
D. the settings on the SmartCenter Server object’s Advanced screen
E. SmartDefense Kernel Defender options
Correct Answer: A QUESTION 76
Which of the following is NOT a feature or quality of a hash function?
A. Encrypted with the sender’s RSA private key, the hash function forms the digital signature.
B. It is mathematically infeasible to derive the original message from the message digest.
C. The hash function forms a two-way, secure communication.
D. The hash function is irreversible.
E. It is mathematically infeasible for two different messages to produce the same message digest.
Correct Answer: C QUESTION 77
You are a Security Administrator configuring Static NAT on an internal host-node object. You clear the box “Translate destination on client side”, accessed from Global Properties > NAT settings > Automatic NAT. Assuming all other Global Properties NAT settings are selected, what else must be configured for automatic Static NAT to work?
A. The NAT IP address must be added to the anti-spoofing group of the external Gateway interface
B. Two address-translation rules in the Rule Base
C. No extra configuring needed
D. A proxy ARP entry, to ensure packets destined for the public IP address will reach the Security Gateway’s external interface
E. A static route, to ensure packets destined for the public NAT IP address will reach the Gateway’s internal interface

Correct Answer: E QUESTION 78
Which encryption scheme provides “In-place” encryption?
A. IKE
B. Manual IPSec
C. DES
D. SKIP
E. AES

Correct Answer: C QUESTION 79
After importing the NGX schema into an LDAP server, what should you enable?
A. Schema checking
B. Encryption
C. UserAuthority
D. ConnectControl
E. Secure Internal Communications

Correct Answer: A QUESTION 80
Which ldif file must you modify to extend the schema of a Windows 2000 domain?
A. In NGX you do not need to modify any .ldif file
B. The appropriate .ldif file is located in the Security Gateway: $FWDIR/conf/ldif/Microsoft_ad_schema.ldif
C. The appropriate .ldif file is located in the SmartCenter Server: $FWDIR/lib/ldap/schema_microsoft_ad.ldif
D. The appropriate .ldif file is located in the Security Gateway: $FWDIR/lib/ldif/Microsoft_ad_schema.ldif
E. The appropriate .ldif file is located in the SmartCenter Server: $FWDIR/conf/ldif/Microsoft_ad_schema.ldif

Correct Answer: C QUESTION 81
What is the reason for the Critical Problem notification in this SmartView Monitor example?

A. Active real memory shortage on the Gateway
B. No Security Policy installed on the Security Gateway
C. Version mismatch between the SmartCenter Server and Security Gateway
D. Time not synchronized between the SmartCenter Server and Security Gateway
E. No Secure Internal Communications established between the SmartCenter Server and Security Gateway
Correct Answer: B QUESTION 82
Your standby SmartCenter Server’s status is collision. What does that mean, and how do you synchronize the Server and its peer?
A. The standby and active Servers have two Internal Certificate Authority (ICA) Certificates. Uninstall and reinstall the standby Server.
B. The active Server detected a keep-alive packet from the standby Server.
C. The peer Server has not been properly synchronized. Manually synchronize both Servers again.
D. The peer Server is more up-to-date. Manually synchronize both Servers again.
E. The active SmartCenter Server and its peer have different Security Policies and databases. Manually synchronize the Servers, and decide which Server’s configuration to overwrite.

Correct Answer: E QUESTION 83
Sarah is the Security Administrator for Certkiller . Sarah has configured SmartDefense to block the CWD and FIND commands. Sarah installs the Security Policy, but the Security Gateway continues to pass the
commands. Which of the following could be the cause of the problem?
A. The Rule Base includes a rule accepting FTP to any source, from any destination.
B. The SmartDefense > Application Intelligence > FTP Security Server screen does not have the radio button set to “Configurations apply to all connections”.
C. The FTP Service Object > Advanced > Blocked FTP Commands list does not include CWD and FIND.
D. The Web Intelligence > Application Layer > FTP Settings list is configured to allow, rather than exlude, CW and FIND commands.
E. The Global Properties > Security Server > “Control FTP Commands” box is not checked.

Correct Answer: B
QUESTION 84
Your NGX enterprise SmartCenter Server is working normally. However, you must reinstall the SmartCenter Server, but keep the SmartCenter Server configuration (for example, all Security Policies, databases, etc.) How would you reinstall the Server and keep its configuration?
A. 1. Run the latest upgrade_export utility to export the configuration.
2.
Keep the exported file in the same location.

3.
Use SmartUpdate to reinstall the SmartCenter Server.

4.
Run upgrade_import to import the configuration.
B. 1. Run the latest upgrade_export utility to export the configuration.
2.
Leave the exported .tgz file in $FWDIR.

3.
Install the priCertkiller SmartCenter Server on top of the current installation.

4.
Run upgrade_import to import the configuration.
C. 1. Insert the NGX CD-ROM, and select the option to export the configuration into a .tgz file.
2.
Transfer the .tgz file to another networked machine.

3.
Uninstall all NGX packages, and reboot.

4.
Use the NGX CD-ROM to select the upgrade_import option to import the configuration.
D. 1. Download the latest upgrade_export utility, and run it from $FWDIR\bin to export the configuration into a .tgz file.
2.
Transfer the .tgz file to another networked machine.

3.
Uninstall all NGX packages, and reboot.

4.
Install a new priCertkiller SmartCenter Server.

5.
Run upgrade_import to import the configuration.
Correct Answer: D
QUESTION 85
How can you reset Secure Internal Communications (SIC) between a SmartCenter and Security Gateway?
A. Run the command fwm sic_reset to reinitialize the Internal Certificate Authority (ICA) of the SmartCenter Server. Then retype the activation key on the Security Gateway from SmartDashboard.
B. From cpconfig on the SmartCenter Server, choose the Secure Internal Communication option and retype the activation key. Next, retype the same key in the gateway object in SmartDashboard and reinitialize Secure Internal Communications (SIC).
C. From the SmartCenter Server’s command line type fw putkey -p <shared key> <IP Address of SmartCenter Server>.
D. From the SmartCenter Server’s command line type fw putkey -p <shared key> <IP Address of Security Gateway>.
E. Reinstall the Security Gateway.

Correct Answer: B

Get certified CheckPoint 156-215 is a guaranteed way to succeed with IT careers.We help you do exactly that with our high quality CheckPoint 156-215 Certification Certified Information Systems Security Professional training materials.

CheckPoint Certification

Checkpoint 156-215 Demos, The Most Recommended Checkpoint 156-215 Braindump For Download

100% Valid And Pass With latest Checkpoint 156-215 exam dumps, you will never fail your Checkpoint 156-215 exam.All the questions and answers are updated and added to the new version timely by our experts.Also now Flydumps is offering free Checkpoint 156-215 exam VCE player and PDF files for free on their website.

QUESTION 30
Cara wants to monitor the tap services on her Security Gateway (fw-chicago), but she is getting an error message. Other security gateways are reporting except a new security gateway just recently deployed. Analyze the error message from the out put below and determine what Care can do to correct the problem?

A. She should create a firewall rule to allow the CPMI traffic back to her Smart Console.
B. She should re-install the Security Policy on her Security Gateway since it was using the default rule Base.
C. She should edit the Security gateway object and enable the monitoring Software Blade.
D. She should let the monitoring run longer in order for it to collect sampled data.

Correct Answer: C
QUESTION 31
The Internal Certificate Authority (ICA) CANNOT be used for:
A. Virtual Private Network (VPN) Certificates for gateways
B. NAT rules
C. Remote-access users
D. SIC connections

Correct Answer: B
QUESTION 32
Which of the following commands can provide the most complete restore of an R71 configuration?
A. Cpconfig
B. Upgrade_import
C. fwm db_import -p <export file>
D. cpinfo -recover
Correct Answer: B QUESTION 33

When using the Anti-Virus Content Security, how are different file types analyzed?
A. They are analyzed by their un-encoded format.
B. They are analyzed by their magic number.
C. They are analyzed by the MIME header.
D. They are analyzed by their file extension (i.e. .bat, .exe. .doc)

Correct Answer: B QUESTION 34
Because of pre-existing design constraints, you set up manual NAT rules for HTTP server are both using automatic NAT rules. All traffic from your FTP and SMTP servers are passing through a Security Gateway Way without a problem, but traffic from the Web server is dropped on rule 0 because of anti-spoofing settings. What is causing this?
A. Allow bi-directional NAT is not checked in Global Properties.
B. Manual NAT rules are not configured correctly.
C. Translate destination on client side is not checked in Global Properties under manual NAT rules.
D. Routing is not configured correctly.

Correct Answer: C QUESTION 35
You are creating an output file with the following command:
Fw monitor -e “accept (arc=10 . 20 . 30 . 40 or dst=10 , 20 , 30 – 40) ; ” -o ~/output
Which tools do you use to analyze this file?

A. You can analyze it with Wireshark or Ethereal
B. You can analyze the output file with any ASCI editor.
C. The output file format is CSV. so you can use MS Excel to analyze it
D. You cannot analyze it with any tool as the syntax should be: fw monitor -e accept ( = 10.20.30.40 or =10.20.30.40); -0 ~/output

Correct Answer: A QUESTION 36
URL filtering policy can make exceptions for specific sites by being enforced:
A. Only for specific sources and destinations.
B. For all traffic, except on specific sources and destinations.
C. For alt traffic, except blocked sites.
D. For all traffic. There are no exceptions.

Correct Answer: B QUESTION 37
Which of the following is a hash algorithm?
A. DES
B. IDEA
C. MD5

D. 3DES Correct Answer: C QUESTION 38
The SIC certificate is stored in the________ directory.
A. $FUIDIR/conf
B. $CPDIR/conf
C. $FWDIR/database
D. $CPDIR/registry

Correct Answer: C QUESTION 39
When you hide a rule in a Rule Base, how can you then disable the rule?
A. Use the search utility in SmartDashboard to view all hidden rules Select the relevant rule and click Disable Rule(s).
B. Right-click on the hidden rule place-holder bar and select Disable Rule(s).
C. Right-click on the hidden rule place-holder bar and uncheck Hide, then right-click and select Disable Rule(s), re-hide the rule.
D. Hidden rules are already effectively disabled from Security Gateway enforcement.

Correct Answer: C QUESTION 40
Which of the following can be found in cpinfo from an enforcement point?
A. The complete file objects_5_0. c
B. Policy file information specific to this enforcement point
C. Everything NOT contained in the file r2info
D. VPN keys for all established connections to all enforcement points

Correct Answer: A QUESTION 41
Which antivirus scanning method does not work if the Gateway is connected as a node in proxy mode?
A. Scan by Direction
B. Scan by File Type
C. Scan by Server
D. Scan by IP Address

Correct Answer: A QUESTION 42
Which of the following is a CLI command for Security Gateway R71?
A. fwm policy_print <policyname>
B. fw shutdown
C. fw merge
D. fw tab 璾

Correct Answer: D QUESTION 43
You are working with multiple Security Gateways that enforce an extensive number of rules. To simplify Security administration, which one of the following would you choose to do?
A. Create a separate Security Policy package for each remote Security Gateway.
B. Run separate SmartConsole instances to login and configure each Security Gateway directly.
C. Eliminate all possible contradictory rules such as the Stealth or Cleanup rules.
D. Create network objects that restrict all applicable rules to only certain networks.

Correct Answer: A
QUESTION 44
The customer has a small Check Point installation which includes one Windows 2003 server as the Smart Console and a second server running secure Platform as both Security Management Server and the Security Gateway. This is an example of a (n):
A. Unsupported configuration.
B. Hybrid Installation.
C. Distributed Installation.
D. Stand-Alone Installation.

Correct Answer: C
QUESTION 45
Which set of objects have an Authentication tab?
A. Networks. Hosts
B. Users, Networks
C. Users, User Groups
D. Templates, Users

Correct Answer: C
QUESTION 46
Which operating system is NOT supported by Endpoint Connect R71?
A. MacOS X
B. Windows XP SP2 O C.
C. Windows Vista 64-bit SP1
D. Windows 2000 SP1
Correct Answer: D

QUESTION 47
Security Servers can perform authentication tasks, but CANNOT perform content security tasks?
A. RHV HTTPS
B. FTP
C. RLOGIN
D. HTTP
Correct Answer: C

QUESTION 48
When launching SmartDashboard, what information is required to log into R7?
A. User Name, Management Server IP, certificate fingerprint file
B. User Name, Password. Management Server IP
C. Password. Management Server IP
D. Password, Management Server IP, LDAP Server IP
Correct Answer: B QUESTION 49

SmartView Tracker R71 consists of three different modes. They are
A. Log, Active, and Audit
B. Log, Active, and Management
C. Log, Track, and Management
D. Network & Endpoint, Active, and Management

Correct Answer: D QUESTION 50
Can you upgrade a clustered deployment with zero downtime?
A. No, this is not possible.
B. Yes, if you select the option zero downtime, it will keep one member active
C. No, you must bring all gateways down.
D. Yes, this is the default setting.

Correct Answer: B QUESTION 51
What action CANNOT be run from SmartUpdate R71?
A. Get all Gateway Data
B. Fetch sync status
C. Reboot Gateway
D. Preinstall verifier

Correct Answer: D QUESTION 52
When john first installed the system, he forgot to configure DNS server security Gateway. How could john configure DNS servers now that his security gateway is in production?
A. Login to the firewall using SSH and run cpconfig, then select Domain Name Servers.
B. Login to the firewall using SSH and run fwm, then select System Configuration and Domain Name Servers.
C. Login to the SmartDashboard, edit the firewall Gateway object, and select the tab Interface, than domain name servers.
D. Login to the firewall using SSH and run aysconfig, then select Domain Name Servers.

Correct Answer: D QUESTION 53
Using the out put below, what type of VPN is configured for fw-stlouis?

A. Traditional
B. Meshed
C. Domain-Based
D. Star

Correct Answer: B
QUESTION 54
A clean up rule is used to:
A. Drop without logging connections that would otherwise be dropped and logged fry default
B. Log connections that would otherwise be accepted without logging by default.
C. Log connections that would otherwise be dropped without logging by default.
D. Drop without logging connections that would otherwise be accepted and logged by default

Correct Answer: C
QUESTION 55
When check point translation method allows an administrator to use fewer ISP-assigned IP addresses then the number of internal hosts requiring internet connectivity?
A. Static Destination
B. Hide
C. Dynamic Destination
D. Static Source

Correct Answer: B
QUESTION 56
If you were NOT using IKE aggressive mode for your IPsec tunnel, how many packets would you see for normal Phase 1 exchange?
B. 2
C. 3
D. 9

Correct Answer: A
QUESTION 57
Identify the correct step performed by SmartUpdate a remote Security Gateway. After selecting packages Select / Add from CD, the:
A. entire contents of the CD-ROM arc copied to the packages directory on the selected remote Security Gateway
B. selected package is copied to the Package Repository on the Security Management: Server
C. entire contents of the CD-ROM are copied to the Package Repository on the Security Management Server
D. selected package is copied to the packages directory on the selected remote Security Gateway

Correct Answer: B
QUESTION 58
You would use the Hide Rule feature to:
A. Make rules invisible to incoming packets.
B. View only a few rules without the distraction of others
C. Hide rules from read-only administrators.
D. Hide rules from a SYN/ACK attack.

Correct Answer: A
QUESTION 59
Which of the following methods will provide the most complete backup of an R71 configuration?
A. Policy Package Management
B. Copying the $PWDIR\conf and $CPDIR\conf directories to another server
C. upgrade_export command
D. Database Revision Control

Correct Answer: B
QUESTION 60
To monitor all traffic between a network and the internet on a Security Platform Gateway, what is the best utility to use?
A. Snoop
B. Cpinfo
C. Infoview
D. Tcpdump
Correct Answer: D

QUESTION 61
Where are automatic NAT rules added to the Rule Base?
A. Before last
B. Middle
C. First
D. Last

Correct Answer: D
QUESTION 62
You are responsible for configuration of Meg a Corn’s Check Point Firewall. You need to allow two NAT rules to match a connection. Is it possible? Give the best answer
A. Yes. it is possible to have two NAT rules which match a connection, but only when using Automatic NAT(bidirectional NAT)
B. No, it is not possible to have more one NAT rule matching a connection. When the firewall receives a packet belonging to a concentration, it compares it against the first rule in the Rule Base, then the second rule, and so on When it finds a rule that matches, it stops checking and applies that rule.
C. Yes, it is possible to have two NAT rules which match a connection, but only in using Manual NAT (bidirectional NAT)
D. Yes, there are always as many active NAT rules as there are connections.

Correct Answer: A
QUESTION 63
On of your licenses is set for an IP address no longer in use. What happens to this license during the licenser-upgrade process?
A. It is upgraded with new available features but the IP remains the same
B. It remains untouched.
C. It is upgraded with the previous features using the new IP address
D. It is dropped

Correct Answer: A
QUESTION 64
External commands can be included in SmartView Tracker via the menu Tools / Custom commands. The security management server is running under SecurePlatform, and the GUI is on a system running Microsoft Windows. How do you run the command trecert.exe to the list?
A. Use the program GUI dbedit to add the command trace route to the properties of the security management Server.
B. Go to the menu Tools I Custom Commands and configure the Windows command trecert.exe to the list.
C. There is no possibility to expand the three pre-defined options ping, whois, and nslookup.
D. Go to the menu. Tools / Custom Commands and configure the Linux command trace route to the list.
Correct Answer: B

QUESTION 65
What is used to validate a digital certificate?
A. IPsec
B. CRL
C. S/MIME
D. PKCS

Correct Answer: C
QUESTION 66
An internal router is sending UDP keep-alive packets that are being encapsulated with GRE and sent through your R71 Security Gateway to a partner site. Rules for GRE traffic is configured for ACCEPT/LOG. Although the keep-alive packets are being sent every one minute, a search through the SmartView Tracker logs for GRE traffic only shows one entry for the whole day (early in the morning after a policy install).If your partner site indicates they are successfully receiving the GRE encapsulated keep-alive packets every minute interval.If GRE encapsulation is turned off on the router. SmartView Tracker shows a log entry for the UDP keep-alive packet every minute. Which of the following is the BEST explanation for this behavior?
A. The Log Server log unification process unifies all log entries from the Security Gateway on specific connection into only one log entry in the SmartView Tracker. GRE traffic has a 10 minute session timeout, thus each keep-alive packet is considered part of the original logged. connection at the beginning of the day
B. The Log Server is failing to log GRE traffic property because it is VPN traffic. Disable all VPN configurations to the partner site to enable proper logging.
C. The log unification process is using a LUUID (Log Unification Unique Identification) that has become corrupt. Because it is encrypted, the R71 Security Gateway cannot distinguish between GRE sessions. This is a known issue with the GRE. Use IPSEC instead of the non GRE protocol for encapsulation.
D. The setting Log does not capture this level of details for GRE Set the rule tracking a action to audit since certain types of traffic can only tracked this way.

Correct Answer: A
QUESTION 67
Which do you configure to give remote access VPN users a local IP address?
A. Office mode IP pool
B. NAT pool
C. Encryption domain pool
D. Authentication pool

Correct Answer: A
QUESTION 68
You need to plan the company’s new security system. The company needs a very high level of security and also high performance and high through put for their applications. You need to turn on most of the integrated IPS checks while maintain high throughput. What would be the best solution for this scenario?
A. The IPS does not run when Core XL is enabled
B. You need to buy a strong multi-core machine and run R71 or later on Secure Platform with CoreXL technology enabled.
C. The IPS system does not affect the firewall performance and CoreXL is not needed in this scenario.
D. Bad luck, both together can not be achieved.

Correct Answer: B
QUESTION 69
You intend to upgrade a Check Point Gateway from R65 to R71. Prior to upgrading, you want to backup the gateway should there be any problems with the upgrade of the following allows for the gateway configuration to be completely backup into a manageable size in the least amount of time?
A. Backup
B. Snapshot
C. Upgrade_export
D. Database_revision
Correct Answer: B

QUESTION 70
Which of the following describes the default behavior of an R71 Security Gateway?
A. Traffic is filtered using controlled port scanning.
B. All traffic is expressly permitted via explicit rules.
C. Traffic not explicitly permitted is dropped.
D. IP protocol types listed as secure are allowed by default, i.e ICMP, TCP, UDP sessions are inspected.

Correct Answer: C

Ensure that you are provided with only the best and most updated Checkpoint 156-215 Certification training materials, we also want you to be able to access Checkpoint 156-215 easily, whenever you want.We provide all our Checkpoint 156-215 Certification exam training material in PDF format, which is a very common format found in all computers and gadgets. Now we add the latest Checkpoint 156-215 content and to print and share content.