2014 Latest CompTIA CN0-201 Exam Dump Free Download!

Voice over IP is an application that requires efficient use of bandwidth and reliability. VoIP must not suffer the delays that can be seen at times with Web sites and Web applications. Which technology can be used to help ensure the efficient transport of VoIP traffic?

A.    RTP
B.    QoS
C.    DNS
D.    RSTP

Answer: B

Continue reading

2014 Latest CompTIA CLO-001 Exam Dump Free Download!

Which of the following does IT outsourcing and cloud computing typically have in common?

A.    Pay as you go agreements
B.    Short-term financial commitment
C.    Tailor-made applications based on client needs
D.    Vendor lock-in potential

Answer: D

Which of the following does the server virtualization layer do?

A.    It allows the underling physical server hardware to be shared
B.    It allows the virtual machines to be dependent on each other
C.    It allows the virtual machines to be load balanced
D.    It prohibits the use of virtual machines by unauthorized users

Answer: A

Which of the following are essential steps to take when creating a virtual server?

A.    Select a machine image to run, select an application set to run, select security credentials.
B.    Select a machine image to run, select an application set to run, select the size of the virtual machine.
C.    Select a machine image to run, select security credentials, select the size of the virtual machine.
D.    Select an application set to run, select security credentials, select the size of the virtual machine.

Answer: C

Which of the following technologies are related to Web services?


Answer: C

Web hosting is a service that enables customers to deploy a website quickly. This is an example

A.    IaaS.
B.    SaaS
C.    PaaS.
D.    On-demand software.
E.    None of the above.

Answer: C

Which of the following describes the amount of data that can be sent across a link in a given time?

A.    Network bandwidth
B.    Network QoS
C.    Network latency
D.    Network speed

Answer: A

How can the internal IT department successfully react to cloud computing?

A.    By becoming an external cloud provider
B.    By becoming an internal cloud provider
C.    By outsourcing all IT services
D.    By solely focusing on security issues

Answer: B

Which of the following is a business reason for IT outsourcing and cloud computing?

A.    Improving cost structure
B.    Improving customer satisfaction
C.    Increasing control over IT systems
D.    Decrease of security issues

Answer: A

Which of the following assets have risks related to a cloud provider going out of business?

A.    Data stored at the provider
B.    Cloud management tools housed at the provider
C.    Investment in servers at the provider
D.    Machine capacity at the provider

Answer: A

Which of the following is included in a compliance audit?

A.    Analyzing chargeback agreements
B.    Analyzing cloud provider Service Level Agreements (SLAs)
C.    Analyzing identity management and access controls
D.    Analyzing the provider release calendar

Answer: C

How does cloud computing influence service operations?

A.    Cloud computing is more cost effective
B.    The provisioning of servers and services is quicker or ceases to be an issue
C.    The provisioning of servers and services can be much slower
D.    The security level will increase

Answer: B

Cloud computing brings new challenges to ___________ management, because traditional licensing models do not fit well with scalable resources.

A.    commercial
B.    financial
C.    legal
D.    service

Answer: B

Which of the following is indicated by a high number of variations of different virtual servers?

A.    Lack of an automated provisioning process of the virtual machines
B.    Lack of automation of virtual machine image manufacturing
C.    Lack of manpower to monitor the virtual machines
D.    Lack of physical servers to accommodate the different virtual servers

Answer: B

Cloud computing is priced according to ___________ or has ___________, rather than having upfront costs.

A.    recurring subscription, a yearly contract
B.    a yearly contract, usage-based charges
C.    recurring subscription, usage-based charges
D.    number of users, a yearly contract

Answer: C
Passing your CompTIA CLO-001 Exam by using the latest CompTIA CLO-001 Exam Dump Full Version: http://www.braindump2go.com/clo-001.html

2014 Latest Citrix 1Y0-A08 Exam Dump Free Download!

Scenario: Printing errors are generated randomly in a Citrix XenApp server farm. An investigation reveals that the Citrix Print Manager Service has been failing at random intervals. An administrator is asked to use the Health Monitoring and Recovery feature to check the service.What should the administrator do to monitor the service?

A.    Create a custom test
B.    Install the HMR Test Pack
C.    Add the CPSVCTEST.EXE test
D.    Add the SPOOLERTEST.EXE test

Answer: C

Scenario: An administrator needs to ensure that users on Windows XP workstations launch published applications with 16-bit colors in a 1024X768 session window. Users in this environment are launching published applications in seamless mode. Which user experience setting should the administrator use in the ICAClient.ADM template?

A.    Audio
B.    Display
C.    Graphics
D.    Applications

Answer: B

Scenario: An administrator has enabled Configuration Logging in a Citrix XenApp farm. Following a number of changes applied over the weekend, users have begun to complain about issues related to accessing farm resources.How can the administrator review the changes implemented in the farm?

A.    Use the Event Viewer on the data store server
B.    Use the Event Viewer on the Data Collector server
C.    Run the Configuration Logging report using SQL reporting services
D.    Run the Configuration Logging report using the Access Management Console

Answer: D

Which Citrix service directly depends on the IMA service?

A.    WMI
B.    Licensing
C.    XTE Server
D.    Print Manager

Answer: A

What is the impact on the user sessions connected over ICA if the IMA service on a Citrix XenApp server is restarted?

A.    The user sessions are forcibly disconnected
B.    The user sessions continue to work uninterrupted
C.    All sessions on the server are gracefully logged off
D.    Users receive an IMA error message but can continue working

Answer: B

What are two options that are available for the scheduling of the virtual memory management optimization process? (Choose two.)

A.    Daily
B.    Every two weeks
C.    Only at startup time
D.    Only at shutdown time

Answer: AC

Scenario: Currently, the Citrix XenApp server farm hosts several streamed applications. The administrator is given a new business intelligence application that leverages Microsoft Excel for data mining. This new business intelligence application needs to be streamed. Microsoft Excel is currently profiled and is a streamed application.What should the administrator do to enable Microsoft Excel as part of this business intelligence application profile using the least amount of storage space?

A.    Create a new profile based on Microsoft Excel Viewer and the business intelligence application
B.    Create a new profile and use the Inter-Isolation Communication option to combine both applications
C.    Create a pre-launch script that launches the profile of the new application and apply it to the existing Microsoft Excel profile
D.    Create a new profile and publish the streamed application using an alternate profile that points to the Microsoft Excel profile

Answer: B

A new resource-intensive application has been added to a farm that consists of single CPU servers, and users are now complaining about poor application performance. What should the administrator enable in order to address this issue?

A.    Fair sharing of CPU between sessions in the farm
B.    The CPU Utilization Management/CPU Rebalancer service
C.    A load evaluator that does NOT include CPU or memory utilization
D.    The removal of servers from the load balancing table within Health Monitoring and Recovery

Answer: A

In which situation should the "CPU Utilization Management/CPU Rebalancer" service be set to start automatically?

A.    Citrix XenApp runs on a single processor server
B.    The Resource Manager tool is used to monitor CPU sharing
C.    It is desirable to monitor CPU sharing using the Access Management Console
D.    Multiple instances of a single-threaded application are running on the same CPU

Answer: D

Scenario: An administrator enables Special Folder Redirection in a Citrix XenApp farm. Windows Vista users are able to save files successfully to their local Documents’ folder. However, when a user tries to save a music file to the Music folder, the user was unable to see the file on the local client drive.What would prevent the user from seeing the saved music file on the local machine?

A.    The user saved the file as a .WAV instead of .MP3
B.    The Special Folder Redirection feature only works for the Documents and Desktop folders
C.    The "Provide special folder redirection to all users" option is de-selected in the XenApp Web site properties
D.    The "Provide special folder redirection to all users" option is de-selected in the XenApp Services site properties

Answer: B
Passing your Citrix 1Y0-A08 Exam by using the latest Citrix 1Y0-A08 Exam Demo Full Version: http://www.braindump2go.com/1y0-a08.html

2014 Latest Citrix 1Y0-A06 Exam Dump Free Download!

Which step must an administrator take before configuring administrative roles within a Provisioning Server environment?

A.    Create an administrative service account
B.    Create the administrative groups in Active Directory
C.    Grant the farm administrator db_admin rights in SQL
D.    Add the currently logged in user to the local administrator group

Answer: B

Scenario: An administrator is planning a Provisioning Server 5.0 environment for a worldwide organization; there are four offices on two continents. The administrator intends to set up a different farm for each of the four office locations in North America and Europe. How many databases must the administrator plan for when setting up the Provisioning Server 5.0 environment?

A.    Four databases, one for each farm
B.    Two databases, one for each continent
C.    One database to keep all vDisks centralized
D.    Five databases, one for each farm and a back up

Answer: A

For which purpose do target devices use TFTP?

A.    To request and receive a boot file from the TFTP service
B.    To request and receive the IP address of the TFTP server
C.    To contact the Stream Service to stream a vDisk to the target device
D.    To contact the least busy Provisioning Server to stream a vDisk to the target device

Answer: A

According to best practices, what should an administrator do prior to installing Provisioning Server?

A.    Set up a proxy DHCP
B.    Set up the SOAP service
C.    Disable spanning tree portfast mode
D.    Assign a static IP address to each server

Answer: D

Which DHCP option identifies the IP address of the TFTP service?

A.    60
B.    66
C.    67
D.    69

Answer: B

An administrator is configuring a store that points to the UNC path of the Windows file share where the vDisks are stored. Which two store types could the administrator be configuring in this scenario? (Choose two.)

A.    Site
B.    Farm
C.    Private
D.    Distributed

Answer: AB

What are the four configuration requirements for a user or system account running the Stream Service? (Choose four.)

A.    Registry read access
B.    Registry read/write access
C.    Domain administration rights
D.    Read/write access to any vDisk location
E.    Datareader/Datawriter permissions to the data store
F.    Read/write access to C:\Program Files\Citrix\Provisioning Server

Answer: ADEF

Scenario: An organization has several branch offices. Each branch office will have an administrator that manages target devices for their location. The farm administrator will oversee the branch office administrators and wishes to make role delegation simple and easy to manage. How should the farm administrator lay out the farm?

A.    Configure a single farm store
B.    Set up a farm for each branch location
C.    Create sites according to branch location
D.    Assign each branch location a farm administrator

Answer: C

An administrator needs to ensure that all DHCP broadcasts are allowed through the routers in a network environment. What must the administrator do to ensure communication between target devices and the Provisioning Server are allowed through the routers in the network?

A.    Configure options 66 and 67 on the DHCP server.
B.    Configure the router using the ip helper command.
C.    Enable spanning tree portfast mode on all switch ports.
D.    Disable spanning tree protocol in the network environment.

Answer: B

Scenario: An administrator wants to delegate management of a Provisioning Server farm. The administrator needs to delegate only these specific tasks:
1. Shut down target devices
2. Boot target devices
3. Send messages to target devices
Which role should the administrator assign for these tasks?

A.    Device Operator
B.    Site Administrator
C.    Farm Administrator
D.    Device Administrator

Answer: A

When preparing to build a vDisk image from a Master Target Device, which boot option should an administrator select in the target device properties?

A.    vDisk
B.    Hard Disk
C.    Floppy Disk
D.    local HD as a boot device

Answer: B

An administrator is preparing a Master Target Device for imaging. What should the administrator do before installing the target device software on the Master Target Device?

A.    Turn on spanning tree
B.    Configure the network adapter BIOS
C.    Run the Provisioning Server Image Builder
D.    Enable hibernation and power management features

Answer: B
Passing your Citrix 1Y0-A06 Exam by using the latest Citrix 1Y0-A06 Exam Demo Full Version: http://www.braindump2go.com/1y0-a06.html

2014 Latest Oracle 1Z0-035 Exam Dump Free Download!

In the Oracle9i Data Guard architecture, what is the purpose of the Log Transport Services?
A.    to transfer redo log information to one or more destinations
B.    to apply redo log records sent from the primary database to a standby database at the receiving location
C.    to synchronize changes to the control files on all standby databases with changes on the primary database when a log switch occurs
D.    to batch archived log files on the primary database until a defined number of checkpoints have been processed and then to distribute the archives to each standby database

Answer: A

Continue reading

2014 Latest Oracle 1Z0-040 Exam Dump Free Download!

You executed the following command to drop a user: DROP USER scott CASCADE; Which two statements regarding the above command are correct? (Choose two.)
A.    All the objects of scott are moved to the Recycle Bin.
B.    Any objects in the Recycle Bin belonging to scott are purged.
C.    All the objects owned by scott are permanently dropped from the database.
D.    All the objects of scott in the Recycle Bin must be purged before executing the DROP command.
E.    Any objects in the Recycle Bin belonging to scott will not be affected by the above DROP command.

Answer: BC

Continue reading

2014 Latest Juniper JN0-141 Exam Dump Free Download!

Which three statements are true about Host Checker? (Choose three.)

A.    Host Checker can collect information for use with MAC authentication.
B.    Host Checker can modify a role assignment immediately if a policy fails.
C.    Host Checker can be invoked before a user is allowed to sign in to the Infranet Controller.
D.    The Host Checker Integrity Measurement Verifier (IMV) works only with Odyssey Access Client.
E.    The Host Checker Integrity Measurement Collector (IMC) can run on Windows, Mac, and Linux systems.

Answer: B C E

Continue reading

2014 Latest Juniper JN0-130 Exam Dump Free Download!

If all OSPF routers on a broadcast network have the same OSPF priority, what parameter is used to determine the new BDR at the time of a DR failure?

A.    area ID
B.    router ID
C.    loopback address
D.    IP address of interface on broadcast network

Answer: B

Continue reading

2014 Latest Vmware VCAW510 Exam Dump Free Download!

Which two operating systems are not supported as a platform for the View Client? (Choose two.)

A.    IOS
B.    Unix
C.    Android
D.    Novell

Answer: BD
https://my.vmware.com/web/vmware/info/slug/desktop_end_user_computing/vmware_horizon_vi ew_clients/2_0

Continue reading

2014 Latest Vmware VCP410-DT Exam Dump Free Download!

A View administrator is creating a new automated pool for a group of 1,000 users. The pool provisioning process fails, and an error message displays:
The status of vCenter Server at address myvcenter.company.com is unknown. Which two configurations should be verified to diagnose the problem? (Choose two.)

A.    that port 18443 is open on the View Connection Server firewall
B.    that there are no network problems between the View Connection Server and vCenter Server
C.    that the View Connection Service is running on the View Connection Server
D.    that the Web service is running on vCenter Server

Answer: BD

Continue reading

2014 Latest EXIN EX0-105 Exam Dump Free Download!

You are the owner of the courier company SpeeDelivery. You employ a few people who, while waiting to make a delivery, can carry out other tasks. You notice, however, that they use this time to send and read their private mail and surf the Internet. In legal terms, in which way can the use of the Internet and e-mail facilities be best regulated?

A.    Installing an application that makes certain websites no longer accessible and that filters attachments in e-mails
B.    Drafting a code of conduct for the use of the Internet and e-mail in which the rights and obligations of both the employer and staff are set down
C.    Implementing privacy regulations
D.    Installing a virus scanner

Answer: B

What is a risk analysis used for?

A.    A risk analysis is used to express the value of information for an organization in monetary terms.
B.    A risk analysis is used to clarify to management their responsibilities.
C.    A risk analysis is used in conjunction with security measures to reduce risks to an acceptable level.
D.    A risk analysis is used to ensure that security measures are deployed in a cost-effective and timely fashion.

Answer: D

You have just started working at a large organization. You have been asked to sign a code of conduct as well as a contract. What does the organization wish to achieve with this?

A.    A code of conduct helps to prevent the misuse of IT facilities.
B.    A code of conduct is a legal obligation that organizations have to meet.
C.    A code of conduct prevents a virus outbreak.
D.    A code of conduct gives staff guidance on how to report suspected misuses of IT facilities.

Answer: A

You are the owner of the courier company SpeeDelivery. On the basis of your risk analysis you have decided to take a number of measures. You have daily backups made of the server, keep the server room locked and install an intrusion alarm system and a sprinkler system. Which of these measures is a detective measure?

A.    Backup tape
B.    Intrusion alarm
C.    Sprinkler installation
D.    Access restriction to special rooms

Answer: B

There was a fire in a branch of the company Midwest Insurance. The fire department quickly arrived at the scene and could extinguish the fire before it spread and burned down the entire premises. The server, however, was destroyed in the fire. The backup tapes kept in another room had melted and many other documents were lost for good. What is an example of the indirect damage caused by this fire?

A.    Melted backup tapes
B.    Burned computer systems
C.    Burned documents
D.    Water damage due to the fire extinguishers

Answer: D

You are the owner of a growing company, SpeeDelivery, which provides courier services. You decide that it is time to draw up a risk analysis for your information system. This includes an inventory of the threats and risks. What is the relation between a threat, risk and risk analysis?

A.    A risk analysis identifies threats from the known risks.
B.    A risk analysis is used to clarify which threats are relevant and what risks they involve.
C.    A risk analysis is used to remove the risk of a threat.
D.    Risk analyses help to find a balance between threats and risks.

Answer: B

Which is a legislative or regulatory act related to information security that can be imposed upon all organizations?

A.    ISO/IEC 27001:2005
B.    Intellectual Property Rights
C.    ISO/IEC 27002:2005
D.    Personal data protection legislation

Answer: D

You are the owner of the courier company SpeeDelivery. You have carried out a risk analysis and now want to determine your risk strategy. You decide to take measures for the large risks but not for the small risks. What is this risk strategy called?

A.    Risk bearing
B.    Risk avoiding
C.    Risk neutral

Answer: C

What action is an unintentional human threat?

A.    Arson
B.    Theft of a laptop
C.    Social engineering
D.    Incorrect use of fire extinguishing equipment

Answer: D
Passing your EXIN EX0-105 Exam by using the latest EXIN EX0-105 Exam Dump Full Version: http://www.braindump2go.com/ex0-105.html

Pages: 1 2 ... 427 428 429 430 431 ... 454 455