-
you want to view the status of a frame relay connection. How to display the status of a Frame-Relay PVC?
-
An administrator learns that users are unable to login to a server via ssh. After making a telnet connection to the server, how can the administrator check the status of the sshd subsystem?()
A . lssys -a com
B . lssys -a sshd
C . lssrc -s sshd
D . lssrc -s tcpi
-
You want users to log on to Active Directory by using a new Principal Name (UPN). You need to modify the UPN suffix for all user accounts. Which tool should you use()
A . Dsmod
B . Netdom
C . Redirusr
D . Active Directory Domains and Trust
-
A developer wants to make a name attribute available to all servlets associated with a particular user,across multiple requests from that user, from the same browser instance. Which two provide this capability from within a tag handler?()
A . pageContext.setAttribute("name", theValue)
B . pageContext.setAttribute("name", getSession())
C . pageContext.getRequest().setAttribute("name", theValue)
D . pageContext.getSession().setAttribute("name", theValue)
E . pageContext.setAttribute("name", theValue,PageContext.PAGE_SCOPE)
F . pageContext.setAttribute("name", theValue,PageContext.SESSION_SCOPE)
-
Under the Oracle Shared Server architecture, client-user processes ultimately connect to a()
A . service
B . listener
C . dispatcher
D . shared server proce
-
Your company has users who connect remotely to the main office though a Windows Server 2008 VPN server. You need to ensure that users cannot access the VPN server remotely from 22:00 to 05:00. What should you do()?
A . Create a network policy for VPN connections. modify the Day and time restrictions.
B . Create a network policy for VPN connections. apply an ip filter to deny access to the corporate network.
C . Modify the Logon hours for all users objects to specify only the VPN server otn he computer restrictions option
D . Modify the Logon hours for the default domain policy to enable the Force logoff when logon hours expire option.
-
A class games.cards.Poker is correctly defined in the jar file Poker.jar. A user wants to execute the main method of Poker on a UNIX system using the command:java games.cards. Poker What allows the user to do this?()
A . put Poker.jar in directory /stuff/java, and set the CLASSPATH to include /stuff/java
B . put Poker.jar in directory /stuff/java, and set the CLASSPATH to include /stuff/java/*.jar
C . put Poker.jar in directory /stuff/java, and set the CLASSPATH to include /stuff/java/Poker.jar
D . put Poker.jar in directory /stuff/java/games/cards, and set the CLASSPATH to include /stuff/java
-
A remote user is trying to telnet to the production server. The session is getting a timeout error. Which command should the user issue to verify the network connection?()
A . iptrace
B . nslookup
C . netstat
D . traceroute
-
Remote users are unable to connect to a shared folder on your computer. You need to allow access to the shared folder. What are the two possible ways to achieve this goal?()
A . Restore the Microsoft Windows Firewall defaults.
B . Validate the permissions on the shared folder by using Microsoft Windows Explorer.
C . Enable the File and Printer Sharing exception in Windows Firewall.
D . Enable the Internet Connection Sharing exception in Windows Firewall.
-
A user wants to be permanently added to the dba group. Which of the following commands or processes can be used to accomplish this()
A . chgrp
B . chuser
C . edit /etc/user
D . edit /etc/security/grou
-
You want users to log on to Active Directory by using a new User Principal Name (UPN). You need to modify the UPN suffix for all user accounts. Which tool should you use()
A . Dsmod
B . Netdom
C . Redirusr
D . Active Directory Domains and Trust
-
An administrator learns that users are unable to login to a server via ssh. After making a telnet connection to the server, how can the administrator check the status of the sshd subsystem?()
A . lssys -a com
B . lssys -a sshd
C . lssrc -s sshd
D . lssrc -s tcpi
-
User SCOTT wants to back out the transactions on the REGIONS table in his schema. As a DBA, which commands must you execute to enable SCOTT to flash back the transactions?()
A . ALTER DATABASE FLASHBACK ON;
B . GRANT SELECT any transaction TO scott;
C . GRANT EXECUTE ON dbms_flashback TO scott;
D . ALTER DATABASE ADD SUPPLEMENTAL LOG DATA;
E . ALTER TABLESPACE undots1 RETENTION GUARANTEE;
F . ALTER DATABASE ADD SUPPLEMENTAL LOG DATA (PRIMARY KEY) COLUMNS
-
User SCOTT wants to back out the transactions on the REGIONS table in his schema. As a DBA, which commands must you execute to enable SCOTT to flash back the transactions?()
A . ALTER DATABASE FLASHBACK ON
B . GRANT SELECT any transaction TO scott
C . GRANT EXECUTE ON dbms_flashback TO scott
D . ALTER DATABASE ADD SUPPLEMENTAL LOG DATA
E . ALTER TABLESPACE undots1 RETENTION GUARANTEE
F . ALTER DATABASE ADD SUPPLEMENTAL LOG DATA (PRIMARY KEY) COLUMNS
-
You need to design a remote access authentication strategy that will allow users in the IT department to remotely connect to the network. Your solution must meet security requirements. What should you do?()
A . Install Internet Authentication Services (IAS) on a server in the den.corp.woodgrovebank.com domain. Configure the VPN servers as RADIUS clients
B . Install Internet Authentication Services (IAS) on a stand-alone server in the Denver extranet. Create local user accounts for the IT personnel on the IAS server. Configure the VPN servers as RADIUS clients
C . Create a remote access policy on each of the VPN servers. Configure the policy to use the den.corp.woodgrovebank.com to authenticate remote access users. Configure the policy to require L2TP to establish a connection
D . Create a remote access policy on each of the VPN servers. Create local user accounts for the IT personnel on the VPN servers. Configure the policy to use the VPN servers’ local accounts database to authenticate users. Configure the policy to require L2TP to establish a connectio
-
You want to use Windows 2000 backup to perform a weekly backup of the user data on a Windows 2000 Professional computer. You want to ensure that the registry, boot files and COM plus objects are also backed up. What should you do?()
A . Configure the Windows backup to backup the system partition.
B . Configure the Windows backup to backup the System State Data.
C . Create a script written in MS Visual Basic scripting addition language to run rdisk.exe/s before the back up starts.
D . Create a batch file to run rdisk.exe/s before the backup starts.
-
You want users to log on to Active Directory by using a new User Principal Name (UPN). You need to modify the UPN suffix for all user accounts. Which tool should you use()
A . Dsmod
B . Netdom
C . Redirusr
D . Active Directory Domains and Trust
-
Which two applications can be used by a user to report emergency work, if the user at least wants to report downtime, classify the request, and report actuals?()
A . Job Plan
B . Quick Reporting
C . Labor Reporting
D . Work Order Tracking
E . Assignment Manager
-
Which DSL encapsulation method requires client software running on the end - user PC that is directly connected to a DSL modem?()
A . PPPoA
B . PPPoE
C . PPP
D . L2TP
E . ATM
-
You are connected to a pluggable database (PDB) as a common user with DBA privileges.The S
You are connected to a pluggable database (PDB) as a common user with DBA privileges.The STATISTICS_LEVEL parameter is PDB_MODIFIABLE. You execute the following:SQL > ALTER SYSTEM SET STATISTICS_LEVEL = ALL SID = ‘*’ SCOPE = SPFILE;Which is true about the result of this command?()
A. The STATISTICS_LEVEL parameter is set to all whenever this PDB is re-opened.
B. The STATISTICS_LEVEL parameter is set to ALL whenever any PDB is reopened.
C. The STATISTICS_LEVEL parameter is set to all whenever the multitenant container database (CDB) is restarted.
D. Nothing happens; because there is no SPFILE for each PDB, the statement is ignored.
-
You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. All client computers run Windows XP Professional.purchases a host-connectivity gateway application developed by an independent software vendor. You need to install the application on a Windows Server 2003 computer named TestKing2.A support technician named Marie is assigned to install the application. Marie‘s user account is not a member of the Administrator‘s group on TestKing2. The installation fails and displays an error message stating the user account used for installing the application needs to be a member of the local Administrators group.Your user account is a member of the Domain Admins group. You want to enable Marie to install applications, but you do not want her to be able to make other changes on TestKing2.What should you do?()
A. Log on locally on TestKing2 as the local administrator. On TestKing2, in Control Panel, start Add or Remove Programs. Instruct Marie to install the application.
B. Use the Run as option to start the Add or Remove Programs Control Panel item on TestKing2. Provide the credentials of the local Administrator account. Instruct Marie to install the application.
C. Make Marie‘s user account a member of the local Administrators group on TestKing2. Instruct him to log on locally by using his user account and to install the application.
D. Instruct Marie to log on locally and to send a Remote Assistance request to you. Accept the request, and take remote control of the session. On TestKing2, in Control Panel, start Add or Remove Programs. Instruct Marie to install the application.
-
A company finished upgrading the wireless encryption to WPA2 Enterprise. The administratorreceives a call from a user who is unable to connect to the company wireless.Which of the following is MOST likely causing the connection problem?()
A. The laptop is missing the software supplicant
B. The access point SSID is hidden.
C. The laptop only supports TKIP and AES encryption,
D. The access point is on the wrong channel.
-
You are the administrator of a Junos Pulse Access Control Service implementation. You must restrict authenticated users connected from the branch offices to a few specific resources within the data center. However, when the authenticated users are connected at the corporate office, they are allowed more access to the data center resources.You have created two roles with different levels of access and are trying to determine the best way of controlling when a user is mapped to a specific role. Having the user prompted to manually select their role is possible, but you want to automate the process.Which configuration solves this problem?()
A. Implement a RADIUS request attribute policy to assist with realm selection and create different role-mapping rules for the user in each realm.
B. Implement a directory/attribute server on the realm and set up this server to determine by group membership the proper role to which a user should be mapped.
C. Reorder the role-mapping rules to allow for the more open role to be mapped first and then enable the "stop processing rules when this rule matches" function on this role.
D. Implement a Host Checker policy on the realm that determines the geographic location of the device and restricts the user based on the results of the policy.
-
Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP.When the users try to connect to the VPN server, they receive the following error message: °Error 721:The remote computer is not responding.You need to ensure that users can establish a VPN connection.What should you do?()
A. Open port 1423 on the firewall.
B. Open port 1723 on the firewall.
C. Open port 3389 on the firewall.
D. Open port 6000 on the firewall.