-
He is trying to find a new way to()a living. Which of the following is not correct?
A . get
B . earn
C . take
D . make
-
Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that remote desktop users can print only to the printers that are installed on the RD Session Host server. What should you do?()
A . Enable the Do not allow client printer redirection Group Policy setting.
B . Disable the Do not allow client printer redirection Group Policy setting.
C . Enable the Do not set default client printer to be default printer in a session Group Policy setting.
D . Disable the Do not set default client printer to be default printer in a session Group Policy setting.
-
Users notify you that their application is failing every time they try to add new records. Because of poor application design, the actual ORA error message is unavailable. What might be the problem?()
A . The application user has exceeded their undo quota.
B . The FLASHBACK GUARANTEE option is set on the undo tablespace.
C . The table is currently being queried by a Flashback Transaction Query operation.
D . The table is currently being queried by a Flashback Versions Query operation.
E . The RETENTION GUARANTEE option is set on the undo tablespace.
-
A customer is trying to remotely upgrade their system BIOS firmware on their xSeries server through their RSA adapter. What feature would best fit the requirement?()
A . Use the remote update feature of the RSA
B . Use the remote diskette/CD feature on the RSA
C . Insert the diskette in the server, flash the BIOS, and reboot the server.
D . Use the remote POST function of the RSA to flash the BIOS
-
You want the user APP_DBA to administer the Oracle database from a remote machine. APP_DBA is granted the SYSDBA privilege to perform administrative tasks on the database. Which file is used by the Oracle database server to authenticate APP_DBA?()
A . control file
B . password file
C . listener controller file
D . control file and password file
-
You are designing a strategy to allow users to have remote access to internal resources. Which service or services should you allow on the public interface of the NAT Server?()
A . HTTP
B . LDAP
C . POP3
D . SMTP
E . VPN Gateway
-
An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()
A . As the root user from serverA run the command rhost serverB
B . As the root user from serverA run the command rlogin serverB
C . As the desired user from serverB run the command rhost serverA
D . As the desired user from serverA run the command rlogin serverB
-
Your company has users who connect remotely to the main office though a Windows Server 2008 VPN server. You need to ensure that users cannot access the VPN server remotely from 22:00 to 05:00. What should you do()?
A . Create a network policy for VPN connections. modify the Day and time restrictions.
B . Create a network policy for VPN connections. apply an ip filter to deny access to the corporate network.
C . Modify the Logon hours for all users objects to specify only the VPN server otn he computer restrictions option
D . Modify the Logon hours for the default domain policy to enable the Force logoff when logon hours expire option.
-
The user is trying to execute a SELECT statement. Which of the following background processes will obtain data from a disk for the user?()
A . DISPATCHER
B . USER
C . SERVER
D . LGWR
E . DBW0
-
A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()
A . reflexive
B . extended
C . standard
D . dynamic
-
A system administrator wants to control the HMC from their workstation. Microsoft Windows 2000 is running and the HMC graphical user interface is being used remotely. Which of the following actions will accomplish this task?()
A . Use any Windows 2000 to graphically access the HMC
B . Load, install, and configure WebSM on the workstation
C . Telnet to the HMC using Exceed or a GUI emulator product from the workstation
D . Load, install, and configure OpenSSH or SSH on the workstation and access the HMC through the GUI interface
-
You need to design a remote access solution for the mobile sales users in the litwareinc.com domain. Which two actions should you perform?()
A . Configure autoenrollment for user certificates and computer certificates
B . Configure Web enrollment for user certificates and computer certificates
C . Configure a Certificate Services hierarchy in the litwareinc.com domain
D . Configure qualified subordination between the litwareinc.com and the contoso.com domains
E . Configure PEAP authentication on the remote access server
-
Which attribute is used to pass the user role back to the Nexus when remote AAA is enabled?()
A . Cisco AV-pair
B . TACACS+ or RADIUS ack frame role attribute
C . DH-CHAP challenge attribute
D . privilege level attribute
-
Remote users are unable to connect to a shared folder on your computer. You need to allow access to the shared folder. What are the two possible ways to achieve this goal?()
A . Restore the Microsoft Windows Firewall defaults.
B . Validate the permissions on the shared folder by using Microsoft Windows Explorer.
C . Enable the File and Printer Sharing exception in Windows Firewall.
D . Enable the Internet Connection Sharing exception in Windows Firewall.
-
You need to design a remote access strategy for the customer support users when they work from home. Your solution must meet security requirements. What should you do?()
A . Deploy an L2TP/IPsec VPN server in each call center. Configure the portable computers as L2TP VPN clients
B . Create IPSec tunnel mode connections between the customer support users home and the company’s Internet-facing routers
C . Create IP packet filters on the company’s Internet-facing routers to allow the Remote Desktop Protocol (RDP).Create IPSec filters on the terminal servers to allow only connections that use RDP
D . Create IP packet filters on the company’s Internet-facing routers to allow the IPSec protocols. Assign the Secure Server (Require Security) IPSec policy to the terminal servers. Assign the Client (Respond only) IPSec policy to the portable computer
-
An administrator has set up serverA and serverB to use the /etc/hosts.equiv file so that applications on serverA can remotely run commands on serverB. Which command will verify if a new user from serverA is trusted on serverB?()
A . As the root user from serverA run the command rhost serverB
B . As the root user from serverA run the command rlogin serverB
C . As the desired user from serverB run the command rhost serverA
D . As the desired user from serverA run the command rlogin serverB
-
You are designing a security strategy for users who need remote access to the corporate network. What should you do?()
A . Configure Internet Authentication Service (IAS) for accounting.
B . Configure the server running Routing and Remote Access to support L2TP.
C . Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.
D . Create a separate account for remote access users. Configure these accounts to access the NewApp server only.
-
You need to design a remote access authentication strategy that will allow users in the IT department to remotely connect to the network. Your solution must meet security requirements. What should you do?()
A . Install Internet Authentication Services (IAS) on a server in the den.corp.woodgrovebank.com domain. Configure the VPN servers as RADIUS clients
B . Install Internet Authentication Services (IAS) on a stand-alone server in the Denver extranet. Create local user accounts for the IT personnel on the IAS server. Configure the VPN servers as RADIUS clients
C . Create a remote access policy on each of the VPN servers. Configure the policy to use the den.corp.woodgrovebank.com to authenticate remote access users. Configure the policy to require L2TP to establish a connection
D . Create a remote access policy on each of the VPN servers. Create local user accounts for the IT personnel on the VPN servers. Configure the policy to use the VPN servers’ local accounts database to authenticate users. Configure the policy to require L2TP to establish a connectio
-
A user wants to connect to the database instance from an application that is running on a remote machine. Which tools should the DBA use to establish the required configuration to ensure that the user is able to connect to the database instance?()
A . Data Pump
B . Oracle Net Manager
C . Oracle Enterprise Manager
D . Oracle Universal Installer (OUI)
E . Database Configuration Assistant (DBCA)
-
Your company network consists of a single Active Directory domain named The network has a print server running Windows 2003 Server. A single printer is installed on the print server. Technicians in the IT Support department have the necessary permissions to manage printers on the print server.You are a member of the Domain Admins group.A user in the Accounts department reports that his documents are not printing. A technician named John examines the print queue and finds a list of documents waiting to be printed. John tries to delete the documents from the queue but is unsuccessful.You need to enable users to successfully print.What should you do?()
A. Install a new print device. Reconfigure the printer to send print jobs to the new print device.
B. Stop and restart the Print Spooler service on the print server. Instruct users to resubmit their print jobs.
C. Install a second instance of the printer. Configure the print queue to hold mismatched documents. Redirect the original printer to the new printer.
D. Install a second instance of the printer. Delete the original printer. Instruct users to resubmit their print jobs.
-
You are the administrator of a Junos Pulse Access Control Service implementation. You must restrict authenticated users connected from the branch offices to a few specific resources within the data center. However, when the authenticated users are connected at the corporate office, they are allowed more access to the data center resources.You have created two roles with different levels of access and are trying to determine the best way of controlling when a user is mapped to a specific role. Having the user prompted to manually select their role is possible, but you want to automate the process.Which configuration solves this problem?()
A. Implement a RADIUS request attribute policy to assist with realm selection and create different role-mapping rules for the user in each realm.
B. Implement a directory/attribute server on the realm and set up this server to determine by group membership the proper role to which a user should be mapped.
C. Reorder the role-mapping rules to allow for the more open role to be mapped first and then enable the "stop processing rules when this rule matches" function on this role.
D. Implement a Host Checker policy on the realm that determines the geographic location of the device and restricts the user based on the results of the policy.
-
Your company is main office and a branch office are connected by a slow WAN link. All servers are located in the main office run Windows Server 2008 R2. All client computers run Windows 7.You install an application on a Remote Desktop Session Host (RD Session Host) server. Users in the branch office experience slow performance when accessing the application through Remote Desktop.You need to minimize the bandwidth utilization to the RD Session Host server.What should you do?()
A.Configure BranchCache in Hosted Cache mode.
B.On the RD Session Host server, configure the RDP-TCP properties to allow only Network Level Authentication.
C.On each client computer, configure the Connect Experience settings in the Remote Desktop Connection client.
D.On each client computer, configure the Connect From Anywhere settings in the Remote Desktop Connection client.
-
Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP.When the users try to connect to the VPN server, they receive the following error message: °Error 721:The remote computer is not responding.You need to ensure that users can establish a VPN connection.What should you do?()
A. Open port 1423 on the firewall.
B. Open port 1723 on the firewall.
C. Open port 3389 on the firewall.
D. Open port 6000 on the firewall.
-
What is the PRIMARY advantage of using a separate authentication server (e.g., Remote Access Dial-In User System, Terminal Access Controller Access Control System) to authenticate dial-in users?()
A.Single user logons are easier to manage and audit.
B.Each session has a unique (one-time) password assigned to it.
C.Audit and access information are not kept on the access server.
D.Call-back is very difficult to defeat.