Welcome to Leader of IT Certifications. Best Practice, Certify for Sure!

Index

Content published at Leader of IT Certifications. Best Practice, Certify for Sure!More then 370 posts found
CheckPoint

CheckPoint 156-515 PDF: Most Reliable CheckPoint 156-515 And Latest CheckPoint 156-515 Questions

Exam A
QUESTION 1
Which files should be acquired from a Windows 2003 Server system crash with a Dr. Watson error?
A. drwtsn32.log
B. vmcore.log
C. core.log
D. memory.log
E. info.log

Correct Answer: A
QUESTION 2
VPN debugging information is written to which of the following files?
A. FWDIR/log/ahttpd.elg
B. FWDIR/log/fw.elg
C. $FWDIR/log/ike.elg
D. FWDIR/log/authd.elg
E. FWDIR/log/vpn.elg

Correct Answer: C
QUESTION 3
fw monitor packets are collected from the kernel in a buffer. What happens if the buffer becomes full?
A. The information in the buffer is saved and packet capture continues, with new data stored in the buffer.
B. Older packet information is dropped as new packet information is added.
C. Packet capture stops.
D. All packets in it are deleted, and the buffer begins filling from the beginning.

Correct Answer: D
QUESTION 4
Which file provides the data for the host_table output, and is responsible for keeping a record of all internal IPs passing through the internal interfaces of a restricted hosts licensed Security Gateway?
A. hosts.h
B. external.if
C. hosts
D. fwd.h
E. fwconn.h
Correct Answer: D

QUESTION 5
You modified the *def file on your Security Gateway, but the changes were not applied. Why?
A. There is more than one *.def file on the Gateway.
B. You did not have the proper authority.
C. *.def files must be modified on the SmartCenter Server.
D. The *.def file on the Gateway is read-only.
Correct Answer: C
QUESTION 6
Assume you have a rule allowing HTTP traffic, on port 80, to a specific Web server in a Demilitarized Zone (DMZ). If an external host port scans the Web server’s IP address, what information will be revealed?
A. Nothing; the NGX Security Server automatically block all port scans.
B. All ports are open on the Security Server.
C. All ports are open on the Web server.
D. The Web server’s file structure is revealed.
E. Port 80 is open on the Web server.

Correct Answer: E
QUESTION 7
Which of the following types of information should an Administrator use tcpdump to view?
A. DECnet traffic analysis
B. VLAN trunking analysis
C. NAT traffic analysis
D. Packet-header analysis
E. AppleTalk traffic analysis

Correct Answer: D
QUESTION 8
Which statement is true for route based VPNs?
A. IP Pool NAT must be configured on each gateway
B. Route-based VPNs replace domain-based VPNs
C. Route-based VPNs are a form of partial overlap VPN Domain
D. Packets are encrypted or decrypted automatically
E. Dynamic-routing protocols are not required

Correct Answer: E
QUESTION 9
The list below provides all the actions Check Point recommends to troubleshoot a problem with an NGX product.
A. List Possible Causes
B. Identify the Problem
C. Collect Related Information
D. Consult Various Reference Sources
E. Test Causes Individually and Logically Select the answer that shows the order of the recommended actions that make up Check Point’s troubleshooting guidelines?
F. B, C, A, E, D
G. A, E, B, D, C
H. A, B, C, D, E
I. B, A, D, E, C
J. D, B, A, C, E
Correct Answer: A
QUESTION 10
NGX Wire Mode allows:
A. Peer gateways to establish a VPN connection automatically from predefined preshared secrets.
B. Administrators to verify that each VPN-1 SecureClient is properly configured, before allowing it access to the protected domain.
C. Peer gateways to fail over existing VPN traffic, by avoiding Stateful Inspection.
D. Administrators to monitor VPN traffic for troubleshooting purposes.
E. Administrators to limit the number of simultaneous VPN connections, to reduce the traffic load passing through a Security Gateway.

Correct Answer: C

CheckPoint

Latest Release CheckPoint 156-515 Practice Answers Easily Free Download

Exam A
QUESTION 1
The fw ctl debug command is used primarily to troubleshoot _________ problems.
A. Kernel
B. Secure Internal Communications (SIC)
C. Policy-load
D. Logging
E. OPSEC

Correct Answer: A
QUESTION 2
Which file provides the data for the host_table output and is responsible for keeping a record of all internal IPs passing through the internal interfaces of a restricted hosts licensed Security Gateway?
A. external.if
B. fwconn.h
C. hosts
D. hosts.h
E. fwd.h

Correct Answer: E
QUESTION 3
What does it indicate when a cluster state is “Active Attention”?
A. Traffic is being passed, but a problem has been detected: There are no other active members in the cluster
B. The cluster member is booting: CluserXL is running, but VPN-1/NGX is not yet ready
C. Cluster members are running different versions: The newer version member is in the ready state, which the older version member is in the active state
D. Both cluster members are up and ready

Correct Answer: A
QUESTION 4
Which type of routing relies on a VPN Tunnel interface (VTI) to route traffic?
A. Host-based VPN
B. Subnet-based VPN
C. Route-Based VPN
D. All VPN types
E. Domain-based VPN

Correct Answer: C
QUESTION 5
In some circumstances, adjusting the number of Security Servers spawned may help in troubleshooting performance issues. Which of the following files would you edit to achieve this?
A. fwssd.conf
B. fwx.conf
C. fwauthd.conf
D. fwd.conf
E. fwm.conf

Correct Answer: C
QUESTION 6
You have implemented a Check Point High Availability solution. You have defined a Gateway Cluster and a group of Security Gateways with synchronized state tables. If the active Security Gateway fails, what happens?
A. Clear text connections survive the failure. Encrypted connections must be re-established
B. All connections must be re-established with the security Gateway that assumes control
C. Encrypted and clear text connections fail over to the Security Gateway that assumes control
D. The remaining Security Gateway force an election to determine who takes over
E. The control network is flooded with synchronization packets

Correct Answer: C
QUESTION 7
To Stop the sr_service debug process, you must first stop VPN-1 SecureClient, delete which of the following files and restart SecureClient?
A. sr_users.all
B. sr_service.dll
C. sr_topo.all
D. sr_auth.all
E. sr_tde.all

Correct Answer: E
QUESTION 8
Setting snaplen to 0 will capture host much of the packet data?
A. None of the packet
B. The first octet of the packet header
C. The whole packet
D. The first protocol level of the packet

Correct Answer: C
QUESTION 9
Which of the following types of information should an Administrator use tcpdump to view?
A. VLAN trunking analysis
B. DeCnet traffic analysis
C. AppleTalk Traffic analysis
D. Packet-header analysis
E. NAT traffic analysis
Correct Answer: D
QUESTION 10
When network address translation is used:
A. It is not necessary to add a static route to the Gateway’s routing table
B. It is necessary to add a static route to the Gateway’s routing table
C. VLAN tagging can’t be defined for any hosts protected by the Gateway
D. The Security Gateway’s ARP file must be modified
E. The Gateway’s lmhosts file must be modified

Correct Answer: A

CheckPoint

Most Accurate CheckPoint 156-215 Guide PDF, Best CheckPoint 156-215 Practice To Ensure You 100% Pass Download

Exam A
QUESTION 1
Frank wants to know why users on the corporate network cannot receive multicast transmissions from the Internet. An NGX Security Gateway protects the corporate network from the Internet. Which of the following is a possible cause for the connection problem?
A. NGX does not support multicast routing protocols and streaming media through the Security Gateway.
B. Frank did not install the necessary multicast license with SmartUpdate, when he upgraded to NGX.
C. The Multicast Rule is below the Stealth Rule. NGX can only pass multicast traffic, if the Multicast Rule is above the Stealth Rule.
D. Multicast restrictions are not configured properly on the corporate internal network interface properties of the Security Gateway object.
E. Anti-spoofing is enabled. NGX cannot pass multicast traffic, if anti-spoofing is enabled.
Correct Answer: D
QUESTION 2
In NGX, what happens if a Distinguished Name (DN) is NOT found in LDAP?
A. NGX takes the common-name value from the Certificate subject, and searches the LDAP account unit for a matching user id.
B. NGX searches the internal database for the username.
C. The Security Gateway uses the subject of the Certificate as the DN for the initial lookup.
D. If the first request fails or if branches do not match, NGX tries to map the identity to the user id attribute.
E. When users authenticate with valid Certificates, the Security Gateway tries to map the identities with users registered in the external LDAP user database.
Correct Answer: B
QUESTION 3
Gary is a Security Administrator in a small company. He needs to determine if the company’s Web servers are accessed for an excessive number of times from the same host. How would he configure this setting in SmartDefense?
A. Successive multiple connections
B. HTTP protocol inspection
C. Successive alerts
D. General HTTP worm catcher
E. Successive DoS attacks
Correct Answer: A
QUESTION 4
In SmartDashboard, you configure 45 MB as the required free hard-disk space to accommodate logs. What can you do to keep old log files, when free space falls below 45 MB?
A. Define a secondary SmartCenter Server as a log server, to transfer the old logs.
B. Configure a script to archive old logs to another directory, before old log files are deleted.
C. Do nothing. Old logs are deleted, until free space is restored.
D. Use the fwm logexport command to export the old log files to other location.
E. Do nothing. The SmartCenter Server archives old logs to another directory.
Correct Answer: B

QUESTION 5
Brianna has three servers located in a DMZ, using private IP addresses. She wants internal users from
10.10.10.x
to access the DMZ servers by public IP addresses. Internal_net

10.10.10.x
is configured for Hide NAT behind the Security Gateway’s external interface.
What is the best configuration for 10.10.10.x users to access the DMZ servers, using the DMZ servers’ public IP addresses?

A. Configure automatic Static NAT rules for the DMZ servers.
B. Configure manual Static NAT rules to translate the DMZ servers, when connecting to the Internet.
C. Configure manual static NAT rules to translate the DMZ servers, when the source is the internal network
10.10.10.x.
D. Configure Hide NAT for the DMZ network behind the DMZ interface of the Security Gateway, when connecting to internal network 10.10.10.x.
E. Configure Hide NAT for 10.10.10.x behind DMZ’s interface, when trying to access DMZ servers.
Correct Answer: C
QUESTION 6
You are setting up a Virtual Private Network, and must select an encryption scheme. Network performance is a critical issue – even more so than the security of the packet. Which encryption scheme would you select?
A. In-place encryption
B. Tunneling mode encryption
C. Either one will work without compromising performance
Correct Answer: A
QUESTION 7
Larry is the Security Administrator for a software-development company. To isolate the corporate network from the developers’ network, Larry installs an internal Security Gateway.
Larry wants to optimize the performance of this Gateway. Which of the following actions is most likely to improve the Gateway’s performance?
A. Remove unused Security Policies from Policy Packages.
B. Clear all Global Properties check boxes, and use explicit rules.
C. Use groups within groups in the manual NAT Rule Base.
D. Put the least-used rules at the top of the Rule Base.
E. Use domain objects in rules, where possible.
Correct Answer: A
QUESTION 8
If a digital signature is used to achieve both data-integrity checking and verification of sender, digital signatures are only used when implementing:
A. A symmetric encryption algorithm.
B. CBL-DES.
C. ESP.
D. An asymmetric encryption algorithm.
E. Triple DES.
Correct Answer: D
QUESTION 9
Ellen is performing penetration tests against SmartDefense for her Web server farm. She needs to verify that the Web servers are secure against traffic hijacks. She has selected the “Products > Web Server” box on each of the node objects. What other settings would be appropriate? Ellen:
A. needs to configure TCP defenses such as “Small PMTU” size.
B. should enable all settings in Web Intelligence.
C. needs to create resource objects for the web farm servers and configure rules for the web farm.
D. must activate the Cross-Site Scripting property.
E. should also enable the Web intelligence > SQL injection setting.
Correct Answer: D
QUESTION 10
Which of the following commands is used to restore NGX configuration information?
A. cpconfig
B. cpinfo -i
C. restore
D. fwm dbimport
E. upgrade_import
Correct Answer: E

CheckPoint

100% Pass CheckPoint 156-215 Exam By Training CheckPoint 156-215 Exam Dumps Download

Exam A
QUESTION 1
Of the three mechanisms Check Point uses for controlling traffic, which enables firewalls to incorporate layer 4 awareness in packet inspection?
A. IPS
B. Packet filtering
C. Stateful Inspection
D. Application Intelligence

Correct Answer: C QUESTION 2
Which of the following statements about Bridge mode is TRUE?
A. When managing a Security Gateway in Bridge mode, it is possible to use a bridge interface for Network Address Translation.
B. Assuming a new installation, bridge mode requires changing the existing IP routing of the network.
C. All ClusterXL modes are supported.
D. A bridge must be configured with a pair of interfaces.

Correct Answer: D QUESTION 3
Which SmartConsole component can Administrators use to track remote administrative activities?
A. WebUI
B. Eventia Reporter
C. SmartView Monitor
D. SmartView Tracker

Correct Answer: D QUESTION 4
Which of the following statements is TRUE about management plug-ins?
A. The plug-in is a package installed on the Security Gateway.
B. A management plug-in interacts with a Security Management Server to provide new features and support for new products.
C. Using a plug-in offers full central management only if special licensing is applied to specific features of the plug-in.
D. Installing a management plug-in is just like an upgrade process. (It overwrites existing components.)

Correct Answer: B QUESTION 5
UDP packets are delivered if they are _________.
A. A legal response to an allowed request on the inverse UDP ports and IP
B. A Stateful ACK to a valid SYN-SYN-/ACK on the inverse UDP ports and IP
C. Reference in the SAM related Dynamic tables
D. Bypassing the Kernel by the “forwarding layer” of clusterXL

Correct Answer: A QUESTION 6
The Check Point Security Gateway’s virtual machine (kernel) exists between which two layers of the OSI model?
A. Session and Network layers
B. Application and Presentation layers
C. Physical and Datalink layers
D. Network and Datalink layers

Correct Answer: D
QUESTION 7
“Pass Any Exam. Any Time.” – www.actualtests.com 3 Checkpoint 156-215.75 Exam The customer has a small Check Point installation, which includes one Linux Enterprise 3.0 server working as the SmartConsole, and a second server running Windows 2003 as both Security Management Server running Windows 2003 as both Security Management Server and Security Gateway. This is an example of a(n).
A. Stand-Alone Installation
B. Distributed Installation
C. Hybrid Installation
D. Unsupported configuration

Correct Answer: D
QUESTION 8
The customer has a small Check Point installation which includes one Windows 2003 server as the SmartConsole and a second server running SecurePlatform as both Security Management Server and the Security Gateway. This is an example of a(n):
A. Unsupported configuration.
B. Hybrid Installation.
C. Distributed Installation.
D. Stand-Alone Installation.

Correct Answer: D
QUESTION 9
The customer has a small Check Point installation which includes one Windows XP workstation as the SmartConsole, one Solaris server working as Security Management Server, and a third server running SecurePlatform as Security Gateway. This is an example of a(n):
A. Stand-Alone Installation.
B. Unsupported configuration
C. Distributed Installation.
D. Hybrid Installation.

Correct Answer: C
QUESTION 10
The customer has a small Check Point installation which includes one Windows 2003 server as SmartConsole and Security Management Server with a second server running SecurePlatform as Security Gateway. This is an example of a(n):
A. Hybrid Installation.
B. Unsupported configuration.
C. Distributed Installation.
D. Stand-Alone Installation.

Correct Answer: C

CheckPoint

First-hand Apple 9L0-964 Flydumps PDF Download,Apple 9L0-964 Question Ensure Pass Certification To Ensure You 100% Pass

Exam A QUESTION 1
What are the results of the command: fw sam ?
A. Connections to the specified target are blocked without the need to change the Security Policy
B. Connections to and from the specified target are blocked without the need to change the Security Policy
C. The Security Policy is compiled and installed on the target’s embedded VPN/FireWall Modules
D. Connections from the specified target are blocked without the need to change the Security Policy

Correct Answer: B QUESTION 2
The command fw fetch causes the:
A. Security Gateway to retrieve the user database information from the tables on theSmartCenter Server.
B. SmartCenter Server to retrieve the debug logs of the target Security Gateway
C. Security Gateway to retrieve the compiled policy and inspect code from theSmartCenter Server and install it to the kernel.
D. SmartCenter Server to retrieve the IP addresses of the target Security Gateway

Correct Answer: C QUESTION 3
Which of the following deployment scenarios CANNOT be managed by Check Point QoS?
A. Two lines connected directly to the Gateway through a hub
B. Two lines connected to separate routers, and each router is connected to separate interfaces on the Gateway
C. One LAN line and one DMZ line connected to separate Gateway interfaces
D. Two lines connected to a single router, and the router is connected directly to the Gateway

Correct Answer: D QUESTION 4
Your company’s Security Policy forces users to authenticate to the Gateway explicitly, before they can use any services. The Gateway does not allow Telnet service to itself from any location. How would you set up the authentication method? With a:
A. Session Authentication rule
B. Client Authentication rule using the manual sign-on method, using HTTP on port 900
C. Client Authentication for fully automatic sign on
D. Client Authentication rule, using partially automatic sign on

Correct Answer: B QUESTION 5
You must set up SIP with a proxy for your network. IP phones are in the 172.16.100.0 network. The Registrar and Proxy are installed on the host, 172.16.101.100. To allow handover enforcement for outbound calls from SIP-net to the Internet, you have defined the following objects:
Network object: SIP-net: 172.16.100.0/24 SIP-gateway: 172.16.101.100 VoIP Domain object: VoIP_domain_A End-point domain: SIP-net VoIP gateway installed at: SIP-gateway host object How would you configure the rule?
A. VoIP_domain_A / any / sip_any / accept
B. VoIP_Gateway_A / any / sip / accept
C. Unsupported because the SIP Registrar and the SIP Proxy are installed on the same host. Separate and create two VoIP Domain objects.
D. SIP-net & SIP-gateway / any / sip / accept

Correct Answer: A QUESTION 6
A _______ rule is used to prevent all traffic going to the VPN-1 NGX Security Gateway
A. Stealth
B. Cleanup
C. SmartDefense
D. Reject

Correct Answer: A QUESTION 7
An advantage of using central vs local licensing is:
A. Only one IP address is used for all licenses.
B. Licenses are automatically attached to their respective Security Gateways.
C. The license must be renewed when changing the IP address of a Security Gateway.
D. A license can be taken from oneSmartCenter Server and given to SmartCenter Server.

Correct Answer: A QUESTION 8
Which command allows verification of the Security Policy name and install date on a Security Gateway?
A. fw ver -p
B. fw show policy
C. fw stat -l
D. fw ctl pstat -policy

Correct Answer: C QUESTION 9
What command displays the version of an already installed Security Gateway?
A. cpstat -gw
B. fw printver
C. fw ver
D. fw stat

Correct Answer: C QUESTION 10
When configuring objects in SmartMap, it is helpful to ____________ the objects so that they are properly defined for use in a policy rule.
A. Save
B. Actualize
C. Physically connect to
D. Expand

Correct Answer: B

Apple

Latest Download Dumps for Apple 9L0-614 With Best Quality Study Guide Guarantee You 100% Pass Download

Exam A
QUESTION 1
Which comparison of Mac OS X Server and Windows user account password policy enforcement is TRUE?
A. Mac OS X Server does not let you set inactivity limits on user account passwords, but Windows does.
B. Both Mac OS X Server and Windows allow you to enforce a minimum length for user account passwords.
C. Neither Mac OS X Server nor Windows has a graphical user interface for entering user account password policies.
D. Both Mac OS X Server and Windows require that user account passwords be different from account names.
E. Mac OS X Serverlets you require that account passwords be different from account names, but Windows does not.

Correct Answer: A
QUESTION 2
How do you configure an Apple Remote Desktop admin computer to use a remote Task Server?
A. Run the cfgtaskserver command line utility with the Task Server’s IP address as its parameter.
B. Open Remote Desktop and select your Task Server from the list that appears in the Task Server window.
C. Open Remote Desktop on the Task Server, and type the host name or lP address of the ARD admin computer.
D. Open Remote Desktop and select “Use remote Task Server” in the Task Server preferences pane of Remote Desktop, then enter the host name or IP address of your Task Server.

Correct Answer: D
QUESTION 3
In Workgroup Manager, which managed preference pane lets you configure proxy server settings for accounts?
A. Sharing
B. Internet
C. Network
D. Applications
E. System Preferences
Correct Answer: C
QUESTION 4
What is the maximum number of computers that can appear in the All Computers list in Remote
Desktop?
A. 1,000
B. 10,000
C. There is no defined upper limit.
D. The upper limit depends on your user license.

Correct Answer: D
QUESTION 5
In Workgroup Manager, which management frequency cannot be used to manage the System Preferences for accounts?
A. Never
B. Once
C. Often
D. Always

Correct Answer: B
QUESTION 6
Which Login preference can you set in Workgroup Manager for computer lists, but not for users or for groups?
A. Enable Fast User Switching
B. Open Specified Items at Login
C. Add Network Home Share Point
D. Hide Opened Login Items after Login

Correct Answer: A
QUESTION 7
How must you authenticate if you want to create a managed network view?
A. You must authenticate in the managed domain as a domain administrator.
B. You must authenticate with the Apple Remote Desktop password on your server computer.
C. You must authenticate as an administrator on the Mac OS X Server computer that manages your domain.
D. No special authentication is required; anyone can use Network preferences to create a network view named ‘Managed” which will be managed automatically by the Mac OS X Server computer that manages your domain.

Correct Answer: A
QUESTION 8
You want your Mac OS X Server to provide SMB service. What directory service role should it be
configured to use?
A. The Mac OS X Servers role must be Domain Member.
B. The Mac OS x Server’s role must be Standalone Server.
C. The Mac OS X Server’s role must be Backup Domain Controller.
D. The Mac OS X Server’s role must be Primary Domain Controller.
E. The Mac OS X Server can use any directory service role available.

Correct Answer: E
QUESTION 9
Which statement best describes how you configure managed Applications preferences in Workgroup Manager?
A. You create a list of users who can open any application on the local drive.
B. You create a list of users who can open specified applications when logged into their mobile account.
C. You select an account, then create a list of applications that can or cannot be opened by that account.
D. You create a list of approved or unapproved applications, then apply the list to selected user accounts.

Correct Answer: C
QUESTION 10
You can generate client computer reports on your Apple Remote Desktop admin computer, but not using your remote ARD Task Server. What is the most likely cause of this problem?
A. SSH is disabled on client computers.
B. The Mac OS X firewall is blocking port 22.
C. The Mac OS X firewall is blocking port 3283.
D. The network DNS is improperly configured.

Correct Answer: C

Apple

Free Sharing The Latest Flydumps Download Apple 9L0-613 Free VCE Files With All New Exam Questions

 

Exam A
QUESTION 1
Which file format and audio codec should you use when creating enhanced audio podcasts?
A. M4A and AAC
B. WAV and MP3
C. WAV and MP3 VBR
D. M4A and Protected AAC

Correct Answer: A
QUESTION 2
Podcast aggregators are applications that search, format, and display podcasts, based on subscriptions to ________.
A. metadata
B. RSS feeds
C. entries from the iTunes Music Store
D. HTML files associated with podcasts

Correct Answer: B
QUESTION 3
Weblogs can be published and syndicated using which THREE protocols? (Choose THREE.)
A. RSS
B. RTP
C. RSS2
D. RTSP
E. Atom
F. PCAST

Correct Answer: ACE
QUESTION 4
Which application can be used to create a live stream that anyone with an Internet connection can access?
A. QuickTime Pro
B. QuickTime Player
C. QuickTime Broadcaster
D. QuickTime Streaming Server

Correct Answer: C
QUESTION 5
What feature of the Weblog Server is defined below? An electronic link between two entries that lets a weblog author (or blogger) respond or refer to another blogger’s entry by using an entry on his or her own weblog.
A. GUID URL
B. trackback URL
C. syndication URL
D. default domain URL
Correct Answer: B
QUESTION 6
You have created a podcast and want users to access it via iTunes or their iPod. Which of the following hosting options will NOT help you achieve your goal?
A. iWeb and .Mac
B. Web Server in Mac OS X Server
C. Weblog Server in Mac OS X Server
D. QuickTime Streaming Server in Mac OS X Server

Correct Answer: D
QUESTION 7
Where are QuickTime Streaming Server user accounts stored by default?
A. /var/db/netinfo/local.nidb
B. /Library/QuickTimeStreaming/Config/qtusers
C. /System/Library/QuickTimeStreaming/Config/qtusers
D. /Library/Application Support/Apple/QuickTime/Streaming/Users/qtusers

Correct Answer: B
QUESTION 8
You want to post a podcast to your new weblog server. You have logged in, configured your first weblog category, and clicked New Entry to create your first weblog entry. Which of these steps should you perform NEXT?
A. Click Advanced to add your podcast file.
B. Test your podcast subscription from iTunes.
C. Test your podcast weblog entry from a web browser.
D. Click New Episode to add the first podcast episode to your weblog.

Correct Answer: A
QUESTION 9
What is an advantage of streaming media via HTTP?
A. Streaming media via HTTP allows you to multicast live streams.
B. Streaming media via HTTP ensures that all movie packets are delivered and that dropped packets are retransmitted.
C. Streams delivered via HTTP allow users to skip to any point in a movie on the server without downloading the intervening material.
D. Streams delivered via HTTP allow long movies and continuous transmissions to be viewed without having to store more than a few seconds of data locally.
Correct Answer: B
QUESTION 10
Which TWO are valid iPod video formats? (Choose TWO.)
A. H.264 (768 kbps, 320×240, AAC-LC up to 160 kbps, 48 kHz)
B. .MOV (2.5 Mbps, 640×480, AAC-LC up to 160 kbps, 48 kHz)
C. MPEG-2 (768 kbps, 320×240, AAC-LC up to 160 kbps, 48 kHz)
D. MPEG-3 (2.5 Mbps, 480×480, AAC-LC up to 160 kbps, 48 kHz)
E. MPEG-4 (2.5 Mbps, 480×480, AAC-LC up to 160 kbps, 48 kHz)
Correct Answer: AE
QUESTION 11
Which is a characteristic of Fast Start delivery?
A. The media plays in real-time over the network.
B. The media is downloaded to the viewer’s hard disk.
C. The media is delivered using the Real-Time Transport Protocol (RTP).
D. The request for the stream is handled using the Real-Time Streaming Protocol (RTSP).

Correct Answer: B

Apple

Professional Download Apple 9L0-612 Exam Study Guide From Flydumps For Free Download

Exam A
QUESTION 1
What are the recommended POSIX permissions for a web folder being shared through WebDAV?
A. user – www group – www user/group/other – 775
B. user – root group – wheel user/group/other – 775
C. user – administrator group – web user/group/other – 744
D. user – administrator group – everyone user/group/other – 750

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 2
What Common Criteria tool lets you specify which log events to display?
A. Audit Log Viewer
B. /usr/sbin/ccfilter
C. /usr/sbin/auditfilter
D. /usr/sbin/auditreduce

Correct Answer: D Section: (none)Explanation
Explanation/Reference:
QUESTION 3
What is the result of adding the line below to the default slapd.conf file? disallow bind_anon
A. All users must authenticate to connect to servers.
B. Clients will be required to provide authentication to use LDAP.
C. Nothing changes because that is the default setting for Open Directory.
D. Anonymous BIND (Berkeley Internet Name Daemon) will no longer be used for this server.

Correct Answer: B Section: (none)Explanation
Explanation/Reference:
QUESTION 4
You have first enabled Personal File Sharing on your computer, and then turned on the built-in firewall. How does the default behavior of the Mac OS X firewall affect file sharing on your computer?
A. No computer can connect to your computer via AFP.
B. Any computer can connect to your computer via AFP.
C. Only computers on the local subnet can connect to your computer via AFP.
D. Only computers with a local Bonjour address can connect to your computer via AFP.

Correct Answer: B Section: (none)Explanation
Explanation/Reference:
QUESTION 5
Which command will force users on local computers to create passwords of at least 12 characters, whether or not they are connected to a directory server?
A. pwpolicy -l /NetInfo/DefaultLocalNode -a root -setpassword minChars=12
B. passwd -l /NetInfo/DefaultLocalNode -a root -setglobalpolicy minChars=12
C. passwd -n /NetInfo/DefaultLocalNode -a administrator -setpassword minChars=12
D. pwpolicy -n /NetInfo/DefaultLocalNode -a administrator -setglobalpolicy minChars=12

Correct Answer: D Section: (none)Explanation
Explanation/Reference:
QUESTION 6
Which file do you configure to enable Common Criteria auditing on startup?
A. /etc/audit
B. /etc/hostconfig
C. /etc/security/cc_audit
D. /etc/security/audit_warn

Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 7
When using certificates, what role does a Certificate Authority (CA) play?
A. A CA must be present on the server before SSL can be enabled.
B. A CA is a trusted third party that ensures the identity of the server.
C. A CA determines what ciphers are available for symmetric encryption.
D. SSL routes traffic through the CA to verify the identity of the client and server.

Correct Answer: B Section: (none)Explanation
Explanation/Reference:
QUESTION 8
Which statement best describes Wired Equivalent Privacy (WEP)?
A. WEP is a moderately secure firewall for wireless devices.
B. WEP optimizes performance of 802.11 devices over distances, so they perform as well as their wired equivalents.
C. WEP represents the first attempt at designing an algorithm to protect wireless communication from eavesdropping.
D. WEP allows wireless access point administrators to require user names and passwords of users who want to connect to the wireless access point.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 9
Which two (2) actions might a rootkit perform? (Choose TWO.)
A. Monitor disk activity on the root volume.
B. Install security tools in root’s home directory.
C. Provide remote access to a computer by opening ports.
D. Hide its presence by installing modified versions of system commands
E. Provide a set of tools that allow the system administrator to monitor security events.

Correct Answer: CE Section: (none) Explanation
Explanation/Reference:
QUESTION 10
________ is a command-line tool that displays the headers of packets seen by a computer’s network interface card.
A. arp
B. ping
C. netstat
D. tcpdump

Correct Answer: D Section: (none) Explanation

Apple

Recent Updated New Apple 9L0-510 Dumps Download with Exam Test From Flydumps

Exam A
QUESTION 1
You have installed Mac OS X Server v10.6, and are performing its initial configuration. If you select “Create Users and Groups” in the “Users and Groups” pane in Server Assistant, what is the result?
A. The new server is configured as an Open Directory master.
B. The new server is configured as an Open Directory replica.
C. The new server is configured as a allow only directory server.
D. The new server is bound to an existing directory server on the network.

Correct Answer: A
QUESTION 2
You want a Mac OS X Server v10.6 computer to use an XML configuration file to configure itself when it starts up for the first time. Which is a valid location to store the configuration file?
A. In /Users/Shared/Auto-Config/ on your DHCP server
B. In /Volumes/usbdrive/Auto Server Setup/ on the new server
C. On any Software Update server on the same subnet as the new server
D. In /Users/Shared/Auto Server Setup/ on any Mac OS X server on your network

Correct Answer: B
QUESTION 3
You want to install and configure Mac OS X Server v10.6 on a computer that has been added to your network. Which steps can you take so the computer will automatically configure itself when it restarts after the installation?
A. Save the configuration details as a text file named generic.list, and store the file at the root of the computer’s hard drive.
B. Save the configuration details as a file named setup.list, and store the file in a folder named Auto Server Setup on the root of the computer’s hard drive.
C. Save the configuration details as a record in a directory service running on your network, with the MAC address of the computer as the name of the record.
D. Save the configuration details as a text file, with the computer’s host name as the name of the file, and store the file on any Mac OS X file server on the same subnet as your computer.

Correct Answer: B
QUESTION 4
You have performed a default installation of Mac OS X Server on a new computer. Which statement is true of the root account on the computer?
A. You can log in as root and use the Finder.
B. You cannot log in remotely using the root account.
C. You must enable the root account in Directory Utility before you can use it.
D. When logged in as root, you cannot access files in the Documents folders in users’ home folders.

Correct Answer: A
QUESTION 5
You have just completed the initial configuration of Mac OS X Server using Server Assistant. The password for the root account is ________.
A. root
B. 12345678
C. the same as the administrator password
D. the first 8 characters of the computer’s hardware serial number
Correct Answer: C QUESTION 6
Which service’s status can you view using the Server Status widget in Mac OS X Server v10.6?
A. DNS
B. DHCP
C. Xgrid
D. NetBoot
E. Address Book

Correct Answer: E QUESTION 7
Which service does Xgrid perform on a Mac OS X Server v10.6 computer?
A. It schedules jobs to run across multiple computers.
B. It offers an end-to-end solution for capturing, encoding, and distributing digital media.
C. It monitors and manages the status of one or more Xserve computers, including their disk capacity, bandwidth usage, and active user accounts.
D. It allows two or more Mac OS X Server v10.6 computers to be linked, so that if one server goes offline, a linked server can automatically assume the offline server’s role(s).

Correct Answer: A QUESTION 8
Which statement describes a function of the Push Notification service in Mac OS X Server?
A. It transmits email and calendar data between servers.
B. It delivers notifications for email and calendar services to mobile devices.
C. It notifies the server when another server has updated calendar and email data.
D. It notifies the server when client computers are ready to send updated data to the server.

Correct Answer: B QUESTION 9
What is the function of the Mobile Access service in Mac OS X Server?
A. It synchronizes user home folders between the server and mobile computers.
B. It delivers notifications for email and calendar to mobile devices outside the firewall.
C. It provides mobile users secure access to the server’s private services without requiring VPN connections.
D. It copies network user accounts to portable computers to allow user to log into the computers even when the computers are not connected to a network.

Correct Answer: C QUESTION 10
Which task can you perform using Workgroup Manager in Mac OS X Server?
A. Manage share points
B. Create user accounts
C. Create NetBoot images
D. Monitor services provided by the server Correct Answer: B
QUESTION 11
Which two tasks can you perform using Server Admin in Mac OS X Server? Choose two.
A. Manage share points.
B. Create user accounts.
C. Create NetBoot images.
D. Monitor the servers power usage.
E. Reset the password for a user account.
F. Configure services provided by the Mac OS X Server v10.6 computer.
G. Assign IP addresses to the servers network interfaces.

Correct Answer: AF

Apple

FLYDUMPS – Take Your Apple 9L0-507 Exam Questions And Answers Download

Exam A
QUESTION 1
You work as the systems administrator at Certkiller .com. You have just completed configuring the / Network default view in Mac OS X Server v10.4. Which of the following will see this view?
A. all users
B. unbound DHCP users
C. users connected via VPN
D. bound unmanaged users

Correct Answer: D Section: (none)Explanation
Explanation/Reference:
QUESTION 2
What is the effect of selecting “Map All users to nobody” when you configure NFS export settings for a share point?
A. Export of any items or contents to any users will be prevented.
B. The group nobody that is used for NFS access is created.
C. The NFS server treats every user the same as nobody.
D. The NFS server identifies all users by their client settings.

Correct Answer: C Section: (none)Explanation
Explanation/Reference:
QUESTION 3
You work as an administrator at Certkiller .com. You are configuring a user account in Workgroup Manager. Which of the following password types would require that the user authenticates via Mac OS X Server password server?
A. Crypt
B. Shadow
C. Open Directory
D. Kerberos Distribution

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 4
Where in the graphical user interface of Mac OS X Server v10.4 would you configure Service Access Control Lists?
A. In Server Admin under the Settings pane associated with general services
B. In Server Admin under the Settings pane associated with each services
C. In Workgroup Manager Accounts User or Group panes
D. In Workgroup Manager Sharing Access pane

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 5
You work as a systems administer at Certkiller .com. You want to manage user preference for the login window appearance and for auto-logout on a Mac OS X Server v10.4 computer. You choose the Always option. What effect will this configuration have at startup?
A. Users will experience the login settings you selected and will not be able to access their login preferences in Accounts preferences.
B. Users will experience the login settings you selected and will be able to access and make changes to their login preferences in Accounts preferences.
C. Users will experience the login settings you selected and will be able to access their login preferences an Accounts preferences but they will not be able to change them.
D. Users will experience the login settings you selected and will be able to access their login preferences in Accounts preferences and make changes to them, but their changes will be overridden by the administrator settings at the next startup.

Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 6
Which of the following tasks does the new Preference Manifests feature in Mac OS X Server v10.4 allow a Workgroup Manager to perform?
A. Access application preferences.
B. Associate preferences to a computer record.
C. Store a common set of preferences in a directory.
D. Read related blocks of managed preferences at user login.

Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 7
You work as a systems administrator at Certkiller .com. You create a SMB share point on a Mac OS X Server v10.4 server. You configure the system to allow users to create files and folders on the share point. Which of the following statements are true regarding newly created files and folders on the share point? (Choose Two)
A. You can assign permission on shared folders.
B. Sharing files permissions are defined by the umask.
C. You can set shared files to inherit permission from the parent folder.
D. Owner and group always get Read & write permission to shared files.
E. The permissions you set files and folder do not apply to administrators.
Correct Answer: AC Section: (none) Explanation

Explanation/Reference:
QUESTION 8
In what order will your Apple File Server attempt to authenticate a user when you choose “Any” as the authentication method for the Apple File Server?
A. Standard first, then Kerberos and then SSH.
B. SSH first, then Standard and then Kerberos.
C. Kerberos first and then Standard.
D. Standard first, then Kerberos.
E. Kerberos first and then SSH.

Correct Answer: C Section: (none)Explanation
Explanation/Reference:
QUESTION 9
What is a printer pool in the Mac OS X Server v10.4 print service?
A. A string identifying the printer manufacturer.
B. A utility that identifies the model of the printer that is shared.
C. The protocol used to access network print queues.
D. A queue that can have more than one printer assigned to it.

Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 10
When should you enable strict locking in Mac OS X Server v10.4? (Choose Two)
A. When you share a volume over FTP.
B. When you share a volume over AFP.
C. When you share a volume over SMB.
D. When you share a volume over SFTP.

Correct Answer: BC Section: (none)Explanation
Explanation/Reference: