920-162



Exam Questions, Answers, Braindumps (920-162)



Question: 1.
When installing a CallPilot system using a 201i server and a CS 1000 system, how do you connect the SCSI connection to the server?
A. by using the low profile right-angle SCSI connector on the NTRH3502SCSI cable attached to the SCSI connector on the 201i server faceplate
B. by using the backplane connector in the Media Gateway or Media Gateway Expansion with the multi I/O cable (NTRH0912) to the next device in the SCSI chain
C. by using the CD-ROM drive SCSI cable NTRH1408 attached from the SCSI connector on the 201i server faceplate to the SCSI adapter A0763912 on the CD-ROM drive
D. by using the Intermediate SCSI cable NTRH1408 that connects from the SCSI connector on the 201i server faceplate to the I/O panel connector and the NTRH1410 SCSI cable
Answer: A

Question: 2.
What software is required before installing CallPilot Manager on the standalone web server?
A. PC Anywhere
B. Sybase Database
C. Java Runtime Environment
D. Internet Information Server (IIS)
Answer: D

Question: 3.
CallPilot desktop messaging clients at a company are unable to send messages from the desktop interface. Which messaging protocol must be configured to enable this capability?
A. Simple Mail Transfer Protocol (SMTP)
B. Internet Message Access Protocol (IMAP)
C. Lightweight Directory Access Protocol (LDAP)
D. Simple Network Management Protocol (SNMP)
Answer: A

Question: 4.
My CallPilot can be used to perform many tasks via the web. Which three choices are available from My CallPilot? (Choose three.)
A. Administer CallPilot system
B. Configure personal greetings
C. View, send, and forward video files
D. Configure the Message Forwarding rule
E. Send, forward, receive, and reply to e-mail messages
Answer: BDE

Question: 5.
CallPilot desktop messaging works with most email packages. Desktop messaging allows access to CallPilot messages and email messages from a unified interface. The unified messaging has several CallPilot 4.0 feature enhancements. What are two of these enhancements? (Choose two.)
A. Call Directory.
B. Fax Back feature
C. Instant Messaging Integration
D. Creating personal distribution lists
Answer: AC

Question: 6.
The CallPilot release 4.0 introduced the High Capacity feature. This system uses the 1002rp server. The High Capacity feature expands the channel capacity of the CallPilot system.
What is the capacity now available?
A. 96 channels and 96 MPUs
B. 96 channels and 192 MPUs
C. 192 channels and 288 MPUs
D. 192 channels and 192 MPUs
Answer: C

Question: 7.
Which two interfaces can be used to enable a Message Forwarding Rule? (Choose two.)
A. My CallPilot
B. CallPilot Manager
C. Desktop Messaging
D. Regular telephone interface
Answer: AC

Question: 8.
An administrator CANNOT login to CallPilot Manager from the login web page. You have confirmed that they are entering their correct mailbox number and password and that their mailbox is NOT disabled. However, they still cannot login. Which should you check?
A. The user's PC is running Internet Information Server (IIS).
B. The Server field contains the correct server name for the CallPilot system.
C. The Location field contains the correct server name for the CallPilot system.
D. The Secure Sockets Layer (SSL) option is turned on because passwords can only be passed over SSL.
Answer: B

Question: 9.
A CallPilot customer site will be using Multimedia Messaging. The switch will need a specific kind of configuration for this messaging service. What is the required configuration?
A. Regular DN
B. Phantom DN
C. Control DN (CDN)
D. ACD-DN dummy queue
Answer: C


920-162

NO0-002

NO0-002
Nokia Security Administrator




Q No: 1
What are the advantages of an external syslog server Vs data log files (Choose three):
A. External backup of logs in case of malicious activity
B. Guaranteed delivery of logs
C. Multiple indexing and searching of logs
D. Ability to see more information and select what outputs including internal facility and severity fields?
E. Allows a user to see Object ID
Answer: A,C,D
Incorrect answers:
B - There is no guarantee of delivery. The NAP could be down, or the syslog daemon failed.
E - You will not see Object ID's. What you would be able to see is the remote device IP and hostname.


Q No: 2
You want to live messages in the log file. What command would you use via clish (Choose one):
A. Vi -e /var/log/messages
B. Tail -200 /var/db/messages
C. Tail - t /var/log/messages more
D. Fw log -nft
E. Tail -f /var/log/messages
Answer: E
Tail -f views messages in real-time. Fw log views the Firewall connection logs in real-time


Q No: 3
What commands can display interface statistics (Choose one):
A. Ifconfig -a (iclid)
B. Ipconfig -a (clish)
C. Show interface (clish)
D. Ifconfig -a (clish)
E. Show interface (iclid)
Answer: D, E
IFconfig is a command line shell utility Show interface as with all show commands can be run from Iclid


Q No: 4
When using voyager what will make permanent changes after a reboot (Choose one):
A. Clicking apply
B. Clicking apply and then save
C. Saving changes from advanced fw config
D. Clicking apply and rebooting the NAP
Answer: B
Clicking apply only saves changes to the running configuration. Which are overwritten at startup by /config/db/inital


Q No: 5
(Choose one):
A. /config/db
B. /conf/
C. /var/conf
D. /var/admin
Answer: A
Even when manually saving a hostsfile it is temporary. It's config/db/initial (symlinked as /config/active) and NOT /etc that changes are made to. Changes to /etc are temporary!


Q No: 6
communications. What command will give you access and reset http:
A. Voyager -e 0 80
B. Set voyager ssl-level 0
C. Apachd -0 httpd.conf
D. Set Httpd -r -s
Answer: A, B
The voyager and set voyager commands are the only valid answers listed in the question.


Q No: 7
User UID of 0 will give:
A. Admin permissions of root on the machine
B. Backup user permissions on the enforcement module
C. Monitor user permissions
Answer: A
Setting the UID of 0 from the Voyager or the CLI will give the same machine
permissions as the root user on a Nokia IPSO device.NO0-002


Q No: 8
What ICLID command will show the version of the OS:
A. Show running config
B. Copy run start
C. Show version
D. Fw Ver
Answer: C
Show version from iclid will show the IPSO version, up time and current system time




NO0-002

ILO-786

Intel
IL0-786
Certified Information Forensics Investigator





Q NO: 1 Firewalls are an excellent source of:
A. Details of system usage
B. Details of protocol usage
C. Forensic Evidence for malicious attacks
D. Port/service mappings
Answer: C



Q NO: 2 What technique of layered security design will allow for both investigation and recovery after an incident?
A. RI Technology
B. Highly available systems
C. Overlap design approach
D. Honeypot placement
Answer: B



Q NO: 3 If a CIFI violates the ISFA code of Ethics, her CIFI certification can be immediately revoked.
A. True
B. False
Answer: B



Q NO: 4 The 1st amendment allows hackers to exercise free speech by altering content on websites to express opposing viewpoints.
A. True
B. False
Answer: B



Q NO: 5 The term "Browser Artifacts" refer to:
A. Web browser cache, cookies, favorites, history, auto complete information
B. Older web browser applications that have little or no security and allow for unchecked use
C. Older web browser applications that can be used as a surveillance tool for investigators due to their lack of security
D. Web browser cookies
Answer: A



Q NO: 6 All of the following are methods of auditing except:
A. Internal audit
B. External audit
C. Thorough audit
D. 3rd party audit
Answer: C



Q NO: 7 In selecting Forensic tools for collecting evidence in the investigation of a crime the standard for authenticating computer records is:
A. The same for authenticating other records. The degree of authentication does not vary simply because a record happens to be (or has been at one point) in electronic form.
B. Much more complex, and requires an expert to be present at each step of the process.
C. To convert the technical terms & definitions into a basic understandable language to be presented as evidence.
D. To ensure the tools are equipped with logging to document the steps of evidence collection.
Answer: C



Q NO: 8 "Interesting data" is:
A. Data relevant to your investigation
B. Pornography
C. Documents, spreadsheets, and databases
D. Schematics or other economic based information
Answer: A



Q NO: 9 Social engineer is legal in the United States, Great Britain, Canada, and Australia as long as the social engineer does not:
A. Attempt to extract corporate secrets
B. Lie
C. Apply the Frye Scenario
D. Live outside those countries
Answer: A



Q NO: 10 Drive geometry refers to
A. The algorithms used to computer a specific location of a particular segment.
B. The functional dimensions of a drive in terms of the number of heads, cylinders, and sectors per track.
C. Physical dimensions of the drive platters.
D. The depth of the pits on optical media or magnetic field charge on magnetic media
Answer: B

NOTE: All the questions were from www.exams.ws study material

9E0-111 Questions

9E0-111 (Q & A)
Cisco Secure PIX Firewall Advanced Exam



Q1
You are the network security administrator for an enterprise network with a complex security policy.
Which PIX Firewall feature should you configure to minimize the number of ACLs needed to implement your policy?
A. ASA
B. Packet capture
C. Turbo ACLs
D. IP helper
E. Object grouping
Answer: E


Q2
IPSec works with which switching paths:
A. Process switching
B. Optimum switching
C. Fast switching
D. Flow switching
Answer: A


Q3
Speaking of Security Association requirements, which of the following statements is true?
A. A set of SAs are needed, one per direction, per protected data pipe.
B. A set of SAa are needed, one per direction, per protocol, per protected data pipe.
C. A set of SAs are needed, one per protocol only.
D. A set of SAs are needed, per protocol, per protected data pipe.
Answer: B


Q4
The graphic shows the output from the show failover command. This unit is active and the other unit is Standby. For an unknown reason, the failover is triggered and this unit has become Standby.
We enter the command “show failover” again.
What shall we see as the ip address of the [active-interface-inside]?
A. 172.29.1.2
B. 192.168.89.1
C. 0.0.0.0
D. 172.29.1.1
Answer: D


Q5
Which of the following statements is not true regarding the DNS Guard?
A. If disabled, can be enabled by the command: fixed protocol dns 53
B. The default UDP time expires in two minutes.
C. Immediately tears down the UDP conduit on the PIX Firewall as soon as the DNS response is received.
D. Prevents against UDP session hijacking and denial of service attacks.
Answer: A


Q6
In helping the user to choose the right IPSec transforms combinations, the following rules apply: (Choose all that apply)
A. To provide authentication services for the transform set, include an AH transform.
B. For authentication services include an ESP authentication transform.
C. To provide data authentication for the data and the outer IP header, include an AH transform.
D. For data confidentiality include an ESP encryption transform.
E. ND5 is stronger than SHA.
Answer: A, B, C, D


Q7
What is the command that enables IPSec traffic to bypass the check of conduit or accessgroup command statements?
A. conduit permit ip any any all
B. access-list acl_out permit tcp any any all access-group acl_out interface outside
C. sysopt connection permit-ipsec
D. conduit permit tcp any any all
Answer: C




9E0-111

640-822 Questions

640-822
Interconnecting Cisco Networking Devices Part 1




Try my questions too. You will get the success.


Question: 1
You download a file from an FTP site on the Internet. What is the highest layer in the OSI model used in this FTP operation?
A. Application
B. Presentation
C. Session
D. Transport
E. Internet
F. Data Link
G. Physical
Answer: A
Explanation:
Layer 7 is the application layer, which is the highest layer in the OSI model. This layer describes the use of end user applications, such as opening movie files (avi, mpeg, etc) used Microsoft Office applications, using WWW browsers, using Telnet, and using FTP.


Question: 2
A host computer has been correctly configured with a static IP address, but the default gateway is incorrectly set. Which layer of the OSI model will be first affected by this configuration error?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6
E. Layer 7
Answer: C
Explanation:
IP Addressing and IP routing resides on the OSI Network layer, which is layer 3.


Question: 3
As the Abc network security administrator, you are concerned with the various possible network attacks. Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server?
A. Trojan Horse
B. Reconnaissance
C. Denial of Service
D. Brute Force
E. Virus
F. None of the above
Answer: C
Explanation:
A denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to, motives for and targets of a DoS attack may vary, it generally comprises the concerted, malevolent efforts of a person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Among these are Network connectivity attacks.
These attacks overload the victim with TCP packets so that its TCP/IP stack is not able to handle any further connections, and processing queues are completely full with nonsense malicious packets. As a consequence of this attack, legitimate connections are denied.
One classic example of a network connectivity attack is a SYN Flood


Question: 4
Of the following choices below, only three could be used as WAN encapsulation methods, as opposed to LAN encapsulation. Which three are they? (Choose three)
A. FDDI
B. HDLC
C. Frame Relay
D. PPP
E. Token Ring
F. Ethernet
G. VTP
Answer: B, C, D


Question: 5
Note: Please refer to the Abc Communications scenario.
The Abc 6 PC has sent the ARP request, received an ARP Reply, and sent a packet to the Abc C web server.The Ethernet frame has now been received by Router Abc A and will now be delivered to the local LAN. Consider the addressing of the Ethernet frame that now has been created by Router Abc A. Which two statements apply in this context? Select two.
A. The source address will be the MAC address of PC Abc 6.
B. The source address will be the MAC address of interface S0/0 of router Abc A
C. The source address will be the MAC address of interface S0/0 of router Abc 2.
D. The source address will be the MAC address of interface Fa0/0 of router Abc A
E. The source address will be the MAC address of interface Fa0/0 of router Abc 2.
F. The destination address will be the MAC address of Switch Abc A port attached to the Abc C web server.
G. The destination address will be the IP address of Switch Abc A port attached to the Abc C web server.
H. The destination address will be the MAC address of Switch Abc A port attached to the Abc A Fa0/0 interface..
I. The destination address will be the MAC address of the Abc C web server.
Answer: D, I

Question: 6
A host computer has been correctly configured with a static IP address, but the default gateway is incorrectly set. Which layer of the OSI model will be first affected by this configuration error?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6
E. Layer 7
Answer: C
Explanation:
IP Addressing and IP routing resides on the OSI Network layer, which is layer 3.



70-630




QUESTION 1
Users report that new content is not returned in search results when they perform searches from the root SharePoint site. You need to ensure that search results display all relevant content for the queries. What should you do?
A. Restart the Office SharePoint Server Search service.
B. Perform an IIS reset.
C. Restart the Windows Search Service service.
D. Reset all crawled content. Start a full crawl.
Answer: D

QUESTION 2
You need to extend user profiles to include the employeelD property from Active Directory. What should you do?
A. Create a new connection to an Active Directory directory service domain controller.
B. In the root SharePoint site, add an employeelD column to the Contacts list.
C. Create a new user profile property that has import mapping.
D. Create a new profile properties section named employeelD.
Answer: C

QUESTION 3
You access content in a SharePoint Portal Server 2003 area by using a desktop icon to the following URL http://www.contoso.com/c1/technology. You upgrade the server that runs SharePoint Portal Server 2003 to Microsoft Office SharePoint Server (MOSS) 2007. You need to access the migrated content alter the upgrade. What should you do?
A. Run the stsadm command with the sync solution operator.
B. Run Scan for Broken Links in the site directory.
C. From the Microsoft Office SharePoint Server (MOSS) 2007 installation CD, run the prescan.exe command.
D. Edit the shortcut to reference the new URL.
Answer: D

QUESTION 4
You are planning the migration of a Microsoft Content Management Server (MCMS) 2002 server to your Microsoft Office SharePoint Server (MOSS) 2007 environment. You need to identify the migration tasks that need to be completed. What should you do on the MOSS server?
A. Run the prescan.exe command from the Microsoft Office SharePoint Server 2007 installation CD.
B. Run the stsadm command with the upgrade solution operator
C. Run the stsadm command with the createcmsprofile operator.
D. Run the CMS Assessment tool.
Answer: D

QUESTION 5
You need to place a link on the top navigational bar of your company's corporate Web site. You also need to ensure that the link appears on all pages within the root site collection. What should you do?
A. Modify the logo URL for the root site collection.
B. Modify the default.aspx page for the root site collection by using Microsoft Office SharePoint Designer 2007.
C. Configure the site navigation settings for the root site collection.
D. Enable the tree view navigation option for the root site collection.
Answer: C

QUESTION 6
You store a Microsoft Office Excel spreadsheet on an external Web site. You configure the external Web site to allow anonymous authentication. When users attempt to open the spreadsheet through Excel Services, they receive an access denied error. You need to configure your SharePoint server to ensure that the external Excel spreadsheet is available through Excel Services. What should you do?
A. Add a new Excel Services trusted data provider.
B. Configure the External Data Unattended Access account for Excel Services.
C. Add a new Excel Services trusted file location.
D. Add a new Excel Services trusted data connection library.
Answer: C

QUESTION 7
A list view Web part named Products displays product names. You need to add another Web part to ensure that users are able to manually enter filter values on the Products Web part. Which Web part should you add?
A. Search Box
B. Reusable Content
C. Text Filter
D. Business Data List
Answer: C

QUESTION 8
You create a new SharePoint site that uses the Report Center template.
You need to create a new page in the Report Center that contains the following default Web parts:
Excel Web Access
Key Performance Indicators
KPI Details
What should you do?
A. Create a new page in the Report Center that uses the Article page layout.
B. Create a new page in the Report Center that uses the News Home page layout.
C. Create a new site that uses the Document Center template.
D. Create a new dashboard page in the Report Center.
Answer: D

QUESTION 9
You create a Business Data Catalog (BDC) application that queries a Microsoft SQL Server 2005 database. The content that is exposed through the BDC is not available in search results. You need to make the data available to searches. What should you do?
A. Assign the Selectable in Clients right to the Administrator account.
B. Add the Document Library Web part to the BDC profile page template.
C. Assign the Copy Selected Permissions to all the Applications and Entities in the Business Data Catalog right to the Administrator account.
D. Configure a default access account for the BDC application.
Answer: D

QUESTION 10
You need to create a new site that will have
a built-in key performance indicators (KPI) list.
a built-in data connections library.
a built-in reference library.
Which site template should you use to create the new site?
A. Document Center
B. Records Repository
C. Publishing
D. Report Center
Answer: D

QUESTION 11
You need to add a disclaimer to all e-mail alerts that users receive from Microsoft Office SharePoint Server 2007. Which tile should you modify?
A. the web.config file for the SharePoint application
B. the layouts.sitemap.policy.xml file
C. the alerttemplates.xml file
D. the onet.xml file
Answer: C

QUESTION 12
You need to ensure that when you reset the content index, users do not receive e-mail alerts tore content that has not changed. What should you do?
A. Stop the SharePoint Search service.
B. Configure the Search results removal option. Add the root URL to the URLs to remove list.
C. Set the Search alert status to inactive.
D. Run the stsadm.exe command with the osearch operator.
Answer: C

QUESTION 13
You need to prevent users from printing confidential documents that are stored in the document library. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Install the Internet Printing component for IIS.
B. Enable Information Rights Management on the document library.
C. Configure the server farm to use Information Rights Management.
D. Create a new Web application policy to deny write access to the Authenticated Users group.
E. Add a permissions policy level to deny Use Remote Interlaces.
Answer: D

QUESTION 14
An Active Directory security group named Sales contains all users from the sales department. You need to ensure that only users from the sales department can create personal sites by using the My Site feature of SharePoint Server. What should you do?
A. Modify the personalization services permissions for the shared services provider.
B. Modify the site creation rights for the root SharePoint site.
C. Use the personalization site template to create a new site. Add the Sales group to the Owners group of the new site.
D. Add the Sales group to the Owners group of the root SharePoint site.
Answer: A

QUESTION 15
Your company's internal and remote users require access to an existing Web application. You need to configure your environment to meet the following requirements:
Remote users must use forms-based authentication.
Internal users must use Integrated Windows authentication.
Internal users and remote users must use different UPL5 to gain access.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Modify the authentication provider for the default zone.
B. Modify the authentication provider for the intranet zone.
C. Modify the authentication provider for the extranet zone.
D. Add a managed path to the existing Web application.
E. Extend an existing Web application to the extranet zone.
Answer: C, E

QUESTION 16
You need to create a Business Data Catalog (BDC) data list Web part that will query a Microsoft SQL Server 2005 database. You also need to ensure that users are not prompted for authentication when they access the BDC data list Web part. What should you do?
A. Implement a new Web application security policy.
B. Implement an LDAP membership provider.
C. Implement a SQL Server membership provider.
D. Enable and configure single sign-on.
Answer: D

QUESTION 17
You need to create a link to the sales department SharePoint site for all users in the sales department. You also need to ensure that the link is visible only in the sales department users personal sites. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Use the Shared Services Administration Web site to Modify the profile services policy.
B. Create an Active Directory global group that contains all sales department users.
C. Create an audience that contains all sales department users.
D. Use the Shared Services Administration Web site to create a personalization link.
Answer: C, D

QUESTION 18
Users report that several links within the SharePoint site directory no longer function. The links all appear to reference external Web sites. You need to identity all links within the site directory that are not functioning. What should you do?
A. From the site directory, run Scan for Broken Links.
B. Run the stsadm -o enumsites command.
C. Run the stsadm -o delete sites command.
D. Open the site directory by using SharePoint Designer, and run the Optimize HTML command.
Answer: A

QUESTION 19
A site collection administrator reports that she is unable to view usage analysis reports for the site collection. You need to ensure that she is able to view the site collection usage summary. Which two actions should you perform? (Each answer presents part of the solution. Choose two.)
A. In the Shared Services Provider, enable advanced usage analysis processing.
B. In Central Administration Operations, enable recurring policy usage reports.
C. In Central Administration Operations, change the storage location of the trace log to a file share.
D. In Central Administration Operations, enable logging and usage analysis processing.
E. In Central Administration Application Management, configure a records repository connection.
Answer: A, D

QUESTION 20
A developer provides you with a new feature for a site collection. You need to make the feature available for activation by your site collection Administrator. What should you do?
A. Run the stsadm command with the activate feature operator.
B. Run the stsadm command with the scan for features operator.
C. Run the stsadm command with the install feature operator.
D. Run the stsadm command with the addwppack operator.
Answer: C

QUESTION 21
You enable usage analysis processing. You need to identity the links that users follow to access your SharePoint sites. What should you do?
A. Analyze the SharePoint trace log.
B. In the Application event log, analyze events from the Office SharePoint Server source.
C. In the Report Center, create a dashboard named Usage.
D. In the site collection, analyze the Referrers report.
Answer: D

QUESTION 22
A user frequently accesses resources on a Microsoft Office SharePoint Server (MOSS) 2007 server. You change the users logon name. You need to ensure that the user maintains access to the same resources on the MOSS server. What should you do?
A. On the Policy for Web Application settings, give the user account full read permissions.
B. Create a new user profile property.
C. Run the stsadm command with the migrate user operator.
D. Run the stsadm command with the update farm credentials operator.
Answer: C

QUESTION 23
You create a custom home page for a site collection that is shared between the sales department and the marketing department. You add a Web part for the sales department to the home page of the site collection. You need to configure the Web part to ensure that only users in the sales department can view the Web part by default. What should you do?
A. Create an audience that contains all sales department users. Target the Web part to the audience.
B. Create an Active Directory group. Add all sales department users to the group. Add the group to the site Members group.
C. Create an Active Directory group. Add all sales department users to the group. Add the group to the site Owners group.
D. Create an Active Directory group. Add all sales department users to the group. Add the group to the site Readers group. Ensure that no marketing department users are members of the site Owners group.
Answer: A

QUESTION 24
You want to perform scheduled maintenance on your server farm. You need to prevent users from establishing new sessions. You must achieve this goal without terminating user sessions that are already established. What should you do?
A. Disable the Config Refresh timer job in the Timer Job definitions.
B. Stop the Windows SharePoint Services Timer service.
C. Disable session state for the server farm.
D. Quiesce the server farm.
Answer: D

QUESTION 25
You create a site collection for each department in your company. You need to schedule the deployment of content from the Sales site collection to the Marketing site collection. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Configure the content deployment settings for the Marketing site to accept incoming content deployment jobs.
B. Create a new content deployment path and job.
C. Configure the Data Retrieval Service for update query support.
D. Create a new Content Management Server migration profile.
E. Configure the content deployment settings for the Sales site to not require encryption.
Answer: A, B

QUESTION 26
Your company stores profile information for remote users in Active Directory Application Mode (ADAM). You need to import profiles for the remote users. What should you do?
A. Configure the user profile import source to be the Entire Forest.
B. Create a new user profile import source connection. Use the Business Data Catalog connection type.
C. Create a new user profile import source connection. Use the LDAP Directory connection type.
D. Create a new user profile import source connection. Use the Active Directory connection type.
Answer: C

70-548

70-548
Designing and Developing Windows-Based Applications by
Using the Microsoft .NET Framework



QUESTION 1:
You work as the developer at Abc .com. The Abc .com network consists of a single Active Directory domain named Abc .com. All servers in the domain run Windows Server 2003. The configuration and customization of Web Service applications forms part of your responsibilities at Abc .com. Abc .com operates as an information centre for the California Property Title Deeds Office. You are currently busy developing a Microsoft Windows Forms application. This application is intended to allow the California Property Title Deeds Office to perform property deed verifications and renewals for the state of California. The application will be installed at all the California Property Title Deeds Office locations all round California. The application must meet the following requirements:
1. It must negate the possibility of malicious tampering of Property Title deeds data.
2. Users of the application must be authenticated.
The logical design includes the following aspects:
1. Host driver data are to be located on a central server at the California Property Title Deeds Head Quarters.
2. Extensible Markup Language (XML) Web services will be used to access the Property Title data.
3. A Symmetric key will be used to encrypt and decrypt Property Title Deed data at the Web service.
4. A Custom role-based security mechanism will be used to grant access to the application.
You now need to make a decision as to whether the design meets the security requirements.
What conclusion can you draw?
A. The design meets the requirements.
B. The design does not meet the requirements. You should grant access to the application using Active Directory.
C. The design does not meet the requirements. You should encrypt and decrypt data at the application and the Web service.
D. The design does not meet the requirements. You should encrypt and decrypt data at the Web service using asymmetric keys.
Answer: C
Explanation:
You should encrypt and decrypt the property title deed data at both the application and the Web service. If not you would not meet the requirement or negating the malicious tampering of data. The data needs to be transmitted in an unencrypted form when transmitted to and from the application (this provides a window for individuals to tamper with the data. You need to make use of Secure Sockets Layer (SSL) to provide confidentiality and data integrity. And this can be achieved by should encrypt and decrypt the property title deed data at both the application and the Web service. Thus the design does not meet the requirements.
Incorrect answers:
A: This is incorrect since you will still require encrypting and decrypting data at both the application and the Web Service.
B: There is no need to make use of Active Directory to grant access to the application. You can make use of whatever appropriate mechanism provided the credential store is secure.
D: The problem with this option is that the data is not encrypted or signed during transmission.

QUESTION 2:
You work as the Enterprise application developer at Abc .com. The Abc .com network consists of a single Active Directory domain named Abc .com. All servers in the domain run Windows Server 2003. The design of applications forms part of your responsibilities at Abc .com. Abc .com operates as a financial institution. You are planning to develop a Microsoft Windows Forms application for Abc .com. This application, when completed will access data in the Abc .com database which is a Microsoft SQL Server 2005 database. The logical design has the following aspects:
1. Every Sunday, at 12:00 A.M. a full database backup must occur.
2. Every 60 minutes on the half hour a transaction log (incremental) backup must occur.
3. Every six hours on the hour a differential database backup must occur.
4. No more than seven tapes will be used to store each backup.
Each backup is expected to require only a single tape, and in the event of a failure there should not be a loss of more than 60 minutes worth of transactions. It is up to you to ensure that the design will provide complete data recovery in the event of a failure. What conclusion can you draw?
A. The design makes provision for complete data recovery.
B. The design does not make provision for complete data recovery. You should rather use only full backups and transaction log backups.
C. The design does not make provision for complete data recovery. You should rather use only full backups.
D. The design does not make provision for complete data recovery. You should rather use only transaction log backups.
Answer: A
Explanation:
This design does indeed make adequate provision for complete data recovery. A full backup consists of complete backups; and a transaction log backup consists of transactions that occurred since the last transaction log backup. A differential backup consists of only the changes that occurred since the last full backup. If a full backup is made at 12:00 A.M. every Sunday, you will require one backup tape. Then you will also require a backup tape for each transaction log backup until 6:00 A.M. when the differential backup occurs. One the differential backup is performed; you can throw away the previous transaction log backups. This way you will not require more than seven tapes.
Incorrect answers:
B: Transaction log backups consist of only the transactions that occurred since the last transaction log backup. And then you would require a new tape every sixty minutes for a whole week. And since you are limited to only seven tapes per day, you cannot make use of only the full backups and transaction log backups.
C: Using only full backups will not allow you to restore data if a failure occurs at any time other than every Sunday at 12:00 A.M. when a full backup is performed.
D: Making use of only transaction log backups will require an infinite supply of tapes and you are only allowed seven tapes.

QUESTION 3:
You work as the Enterprise application developer at Abc .com. The Abc .com network consists of a single Active Directory domain named Abc .com. All servers in the domain run Windows Server 2003. The design of applications forms part of your responsibilities at Abc .com. Abc .com operates as a financial institution. As such they are obligated to comply with the legislation governing the financial institutions while protecting the assets of their customers. One of these laws governing financial institutions and the rights of the customers involves the assurance that the risk of hackers tampering with information is negated. Another of these laws states that Abc .com must be able to submit data to the government in case of them auditing all transactions that involves amounts greater than $10,000. You are currently developing an application for Abc .com. This application will allow Abc .com to submit relevant data to the government. This application must thus meet the following requirements:
1. It must prevent malicious users from interpreting the data.
2. It must prevent malicious users from tampering with the data.
Following are the aspects included in the design of the application:
1. Submit data to the government by accessing an Extensible Markup Language (XML) Web service.
2. Encrypt data before transmission by using the government's public key.
It is now up to you to make a decision as to whether the design will meet the data integrity requirement.
What conclusion can you draw?
A. The design meets the data integrity requirement.
B. The design does not meet the data integrity requirement. You should use the Abc .com private key to sign the data.
C. The design does not meet the data integrity requirement. You should use the Abc .com public key to sign the data.
D. The design does not meet the data integrity requirement. You should use the government's public key to sign the data.
Answer: B
Explanation:
The design should make provision for the signing of the data to prevent malicious tampering. When you sign data, you in essence hash the data and encrypt the hash with a private key that is only known to the signer. When the government receives the data, they will decrypt the hash by using the Abc .com public key, rehash the data, and comparing the hash with the decrypted hash. If the two hash values match, then you have proof that the data was not tampered with. Thus the data integrity requirement is not met in this scenario and you should make use of the Abc .com private key to sign the data.
Incorrect answers:
A: This design does not meet with the data integrity requirements.
C: You cannot use the Abc .com public key to sign the data. Encryption makes provision for confidentiality, not data integrity. Furthermore if you encrypt data using a public key, then only the corresponding private key can be used to decrypt the data.
Because the Abc .com private key should only be available to Abc .com, the government will not be able to decrypt the data.
D: You cannot use the government public key to sign the data. Public keys are publicly available and will thus allow malicious users to tamper with the data and then resign it as if the data is still intact and not tampered with.

QUESTION 4:
You work as the Enterprise application developer at Abc .com. The Abc .com network consists of a single Active Directory domain named Abc .com. All servers in the domain run Windows Server 2003. The design of applications forms part of your responsibilities at Abc .com. Abc .com offers financial and accounting services to their customers. You are currently developing a Microsoft Windows Forms application for Abc .com. This application will allow users to file their federal and state income taxes. The application will make use of fifty assemblies that will provide the business logic for state income taxes. These assemblies are for the exclusive use of the application, and each assembly will be signed with a strong name. There is currently an existing design that suggests a deployment of the fifty assemblies to the application runtime directory. The new design suggests a deployment of the fifty assemblies to the global assembly cache (GAC). You are now required to make a decision as to whether the new design will offer better performance. What conclusion can you draw?
A. The new design does offer better performance.
B. The new design does not offer better performance. Only shared assemblies should be installed in the GAC.
C. The new design does not offer better performance. The state income tax business logic should be exposed via Extensible Markup Language (XML) Web services.
D. The new design does not offer better performance. Each assembly should be loaded into the application domain of a Microsoft .NET Remoting host application.
Answer: A
Explanation:
When one installs strong-named assemblies in a GAC, then one eliminates the performance overhead required to verify strong-name signatures. Thus this option is correct.
Incorrect answers:
B: Even though the GAC is used mainly as a repository for shared assemblies, you are allowed to install non-shared assemblies that are signed with strong names into the GAC to improve performance.
C: The business logic should not be exposed via XML Web services. This will seriously degrade performance because then there would be a need to serialize and deserialize objects every time a Web service method is invoked.
D: There is no need to load each assembly into the application domain of a .NET Remoting host application as this would degrade performance as then there will be a requirement for marshalling between application domains.

QUESTION 5:
You work as the Enterprise application developer at Abc .com. The Abc .com network consists of a single Active Directory domain named Abc .com. All servers in the domain run Windows Server 2003. The design of applications forms part of your responsibilities at Abc .com. Abc .com operates as a financial institution. You are planning to develop the following three Microsoft Windows Forms applications for Abc .com:
1. CashManager
2. CreditManager
3. CustomerCarePro
Each of these applications will be designed to use business logic components, business entity components as well as data access components. Each component will further be specific to an application and each application will be maintained by a different development group. All three applications will be hosted in the same Microsoft Visual Safe database. This design suggests make use of the following Microsoft Visual Studio 2005 projects:
1. Mex.BusinessLogic
2. Mex.BusinessEntity
3. Mex.DataAccess
4. Mex.CashManager
5. Mex.CreditManager
6. Mex.CustomerCarePro
You now need to make a decision as to whether these applications will be maintainable.
What conclusion can you draw?
A. The three applications will be maintainable.
B. The three applications will not be maintainable. The Mex.CashManager, Mex.CreditManager and Mex.CustomerCarePro projects should be consolidated into a single project.
C. The three applications will not be maintainable. The Business logic, Business entities and data access logic should be separated into multiple projects.
D. The three applications will not be maintainable. The Mex.BusinessLogic, Mec.BusinessEntity and Mex.DataAccess projects should be consolidated into a single project.
Answer: C
Explanation:
The three applications do not lend itself to maintainability. The problem is due to the components that are applicable to one application are part of the same projects as components that are applicable to the other two application. This will require the three teams to work with the same projects which make maintenance difficult.
Incorrect answers:
A: This is incorrect since the maintainability requirement will need you to separate the Business logic, Business entities and data access logic into multiple projects
B: The Mex.CashManager, Mex.CreditManager and Mex.CustomerCarePro projects should not be consolidated into a single project. This will require that the three teams will need to work with the same project.
D: The Mex.BusinessLogic, Mec.BusinessEntity and Mex.DataAccess projects should not be consolidated into a single project as this will require that the three teams need to work with the same project.

QUESTION 6:
You work as the Enterprise application developer at Abc .com. The Abc .com network consists of a single Active Directory domain named Abc .com. All servers in the domain run Windows Server 2003. The design of applications forms part of your responsibilities at Abc .com. Abc .com offers financial and accounting services to their customers. You are planning on developing a Microsoft Windows Forms application for Abc .com. This application will allow users to file their federal and state income tax returns. The application must make provision for frequent updates to be made easily since the government revises the laws governing tax frequently and often security vulnerabilities are discovered that has to be addressed. Abc .com estimates that approximately 150 million users will make use of the application after it has run for three consecutive years. Currently the design suggests the use of ClickOnce technology that will provide automatic updates from a Web server. You need to make a decision as to whether the design is scalable. What conclusion can you draw?
A. The design is scalable.
B. The design is not scalable. Make use of Windows Installer technology instead.
C. The design is not scalable. Create a Web application instead.
D. The design is not scalable. Implement a Web service to provide the updates.
Answer: A
Explanation:
The design does lend itself to scalability. The ClickOnce type of application allows you to implement horizontal scaling by deploying a Web farm which will also reduce the load on a single Web server.
Incorrect answers:
B: There is no need to make use of Windows Installer technology since the ClickOnce application is scalable. Besides applications using Windows Installer deployment is not able to take full advantage of automatic updates without custom implementation.
C: There is no requirement to create a Web application since the ClickOnce application is deployable to a Web farm, much the same as Web applications.
D: You should not implement a Web service to provide automatic updates because the ClickOnce application does provide scalable automatic updates.

QUESTION 7:
You work as the Enterprise application developer at Abc .com. The Abc .com network consists of a single Active Directory domain named Abc .com. All servers in the domain run Windows Server 2003. The design of applications forms part of your responsibilities at Abc .com. Abc .com operates as a department of the Federal Bureau of Investigation. You are planning on developing a Microsoft Windows Forms application for Abc .com. This application will allow for the sharing of information for the FBI and will be deployed to 60 FBI offices nation-wide. The following aspects are included in the design of the application:
1. Making use of Microsoft .NET Remoting to facilitate inter-office communication.
2. Making use of asymmetric encryption to secure transmission messages.
3. Storing the public key in an ASCII text file in the application's runtime directory.
4. Storing the private key in an ASCII text file in the application's runtime directory.
5. Allowing only users of the application to access files that are used by the application.
You now need to change the design to enhance the security of the application.
What should you do?
A. Make use of Distributed Component Object Model (DCOM) and not .NET Remoting for inter-office communication.
B. Store the private key in a binary file that is encrypted with a symmetric key.
C. Store the private key in a key container of a cryptographic storage provider (CSP).
D. Make use of Extensible Markup Language (XML) Web services and not .NET Remoting for inter-office communication.
Answer: C
Explanation:
The private key should be protected and you can do this by storing the key in a key container of a CSP. The key container can be configured to allow only the application to access the private key. If the private key is not protected, then any application running under the same identity as the information sharing application will be able to access the private key in the text file.
Incorrect answers:
A : You should not make use of DCOM to improve security since the problem is related to the physical location of the private key in this case.
B: The private key should not be stored in a binary file that is encrypted with a symmetric key because then any application that runs under the same identity as the information sharing application will be able to access the private key in the text file.
D: You should not make use of Extensible Markup Language (XML) Web services to improve security since the problem is related to the physical location of the private key in this case.

QUESTION 8:
You work as the Enterprise application developer at Abc .com. The Abc .com network consists of a single Active Directory domain named Abc .com. All servers in the domain run Windows Server 2003. The design of applications forms part of your responsibilities at Abc .com. You are currently evaluating the physical design of a Microsoft Windows Forms application for Abc .com. This application was designed to access data from a Microsoft SQL Server 2005 database via an Extensible Markup Language (XML) Web service. The application also makes use of Microsoft .Net Remoting to access a digital image device. The physical design is as follows:
1. Host the application on a Terminal server computer named Abc -TS01.
2. Host the database on a server computer named Abc -DB01.
3. Host the Web service on a Web server computer named Abc -SR01.
4. Host the remote components on an application server named Abc -APP01.
You then decide to implement a redundant array of independent disks to provide recoverability in case of failure. To this end you need to make a decision as to where you should implement the RAID solution. What should you do?
A. Use the Abc -APP01 server to implement RAID.
B. Use the Abc -SR01 server to implement RAID.
C. Use the Abc -DB01 server to implement RAID.
D. Use the Abc -TS01 server to implement RAID.
Answer: C
Explanation:
Raid is implemented when multiple disks are used to provide fault tolerance. Thus, if one disk fails, the data can be accessed on other disks. Thus the RAIDS solution should be implemented on Abc -DB01.
Incorrect answers:
A: The RAID solution should not be implemented on Abc -APP01 because it does not store data; it only hosts the remote components that are used to access the digital image device.
B: The RAID solution should not be implemented on Abc -SR01 that is hosting the Web service, since there is no data stored on that server.
D: The Raid solution should not be implemented on Abc -TS01 since it does not store data; it only hosts the Windows Forms application.

QUESTION 9:
You work as the Enterprise application developer at Abc .com. The Abc .com network consists of a single Active Directory domain named Abc .com. All servers in the domain run Windows Server 2003. The design of applications forms part of your responsibilities at Abc .com. Abc .com operates as a College of Education. You are planning to develop a Microsoft Windows Forms application for Abc .com. This application will allow the Abc .com educational centers to manage transcripts. The plan is to make use of Microsoft SQL Server 2005 to store the transcripts for the application. The logical design of the application indicates a many-to-many relationship between candidates and examinations. The physical design suggests making use of three tables that are named Candidate, Examination, and CandidateExamination, respectively. These three tables are to be stored in the same database.
Following is a list of the requirements that should be met by the design:
1. Referential integrity between the candidates and the examinations must be maintained by SQL Server.
2. There should be no excessive duplication of data in existence.
You need to make a decision as to whether the design meets these requirements. What conclusion can you draw?
A. The design does meet the requirements.
B. The design does not meet the requirements. The data of the three tables should be consolidated into one table named Transcript in the same database.
C. The design does not meet the requirements. The three tables should be placed in different databases on the same server.
D. The design does not meet the requirements. The data of the three tables should be consolidated into two tables named Candidate and Examination in the same database.
Answer: A
Explanation:
Since it is mentioned that there is a many-to-many relationship between two entities, there is a need for a junction table which only exists to hold data that is unique to the relationship. Because the three tables are located in the same database, you can allow SQL Server to enforce referential integrity between the tables.
Incorrect answers:
B: The three tables should not be consolidated into a single table named Transcript in the same database. This will not prevent the excessive duplication of data.
C: The three tables should not be placed in different databases on the same server. This way SQL Server cannot enforce referential integrity between data in different databases.
D: Though this consolidation of the three tables into two tables named Candidate and Examination in the same database will allow SQL Server to enforce referential integrity, it does not prevent excessive duplication of data because either Examination data would need to be duplicated for each candidate who takes a particular examination, or Candidate data would need to be duplicated for each examination that the candidate takes.

QUESTION 10:
You work as the Enterprise application developer at Abc .com. The Abc .com network consists of a single Active Directory domain named Abc .com. All servers in the domain run Windows Server 2003. Your responsibilities at Abc .com include the design and development of applications. All applications should be in a Microsoft Windows Forms environment. Abc .com operates as the Administration department for a College of Education. You are currently designing the user interface for a form in a student management application. The logical design indicates that the content is divided into sections. The number of sections depends on the identity of the logged-on user. However, this number ranges from one to ten. The main purpose of the form is to allow users to manage the following aspects of student applications.
1. Lecturer assignments
2. Educational history
3. Personal information
4. Religious and philosophical information
5. Courses
6. Bursaries
Now you need to implement the form by using the best mechanism to achieve fulfillment of the purpose of the form. What should you do?
A. Add a TabControl control to the form.
Dynamically add TabPage controls based on a user's identity.
Map each TabPage control to a section in the logical design.
B. Add 10 GroupBox controls to the form.
Show or hide a GroupBox control based on a user's identity.
Map each GroupBox control to a section in the logical design.
C. Add a FlowLayoutPanel control to the form.
Add input controls to the FlowLayoutPanel control based on the user's identity.
Map a set of input controls to a section in the logical design.
D. Add 10 PropertyGrid controls to the form.
Show or hide a PropertyGrid control based on the user's identity.
Map each ProeprtyGrid control to a section in the logical design.
Answer: A
Explanation:
A TabControl visually resembles dividers in a notebook when one makes use of TabPage controls. The contents of only one TabPage can be visible at any one time. This makes the TabControl the ideal mechanism to display lots of information that can be grouped together.
Incorrect answers:
B: You should not be adding 10 GroupBox controls to the form. This will result in a situation that when a user is granted access to multiple sections, one would need to display multiple GroupBox controls on the form. This is an adverse effect on the usability of the application and its purpose.
C: When making use of a FlowLayoutPanel and a user is granted access to all section, one would then require displaying all input controls on a single form at the same time.
This renders the application unusable.
D: You should not add 10 PropertyGrid controls to the form because this will result in a situation where a user when granted access to multiple sections, one would be compelled to display multiple PropertyGrid controls on the form. This affects the usability of the application negatively.

QUESTION 11:
You work as the Enterprise application developer at Abc .com. The Abc .com network consists of a single Active Directory domain named Abc .com. All servers in the domain run Windows Server 2003. Your responsibilities at Abc .com include the design and development of applications. All applications should be in a Microsoft Windows Forms environment. Abc .com offers financial and accounting services to their customers. You are currently developing a Microsoft Windows Forms application for Abc .com. This application will allow users to file their federal and state income tax returns. The application must fulfill one requirement: it must provide users with questions that will assist them in making a choice in the types of tax forms that they need to file. You need to develop a solution that will meet this requirement. What should you do?
A. You should implement a multiple document interface (MDI) application. Display the appropriate forms based on selections from a context menu.
B. You should implement an application that resembles a tax forms booklet. Display a question at the top of each form.
C. You should implement a Wizard-like application. Use the Back and Next buttons to allow users to navigate to the appropriate forms based on user input.
D. You should implement a single document interface (SDI) application. Display the appropriate forms based on selections from a main menu.
Answer: C
Explanation:
With a Wizard-type application you can choose the forms to display based on user input or selections on a previous form. This will eliminate the need to have the user to figure out which tax forms to file.
Incorrect answers:
A: You should not display the appropriate forms in a context menu. This will result in the user being required to invoke the menu and make a menu selection. You cannot effective pose questions in menu items and this solution would thus affect the usability of the application in a negative way.
B: Implementing an application that resembles a booklet of tax forms and displaying a question at the top of each form will require that the user must visit every form to decide and determine whether he/she is filing the correct tax forms and whether that particular tax form is indeed a requirement.
D: You should not display the appropriate forms in a main menu. This will result in the user being required to invoke the menu and make a menu selection. You cannot effective ask questions in menu items and this solution would thus affect the usability of the application in a negative way.

QUESTION 12:
You work as the Enterprise application developer at Abc .com. Your responsibilities at Abc .com include the design and development of applications. All applications should be in a Microsoft Windows Forms environment. You are planning on developing a Microsoft Windows Forms application that, upon completion, must meet the following requirements:
1. It must have the ability to display different types of legal documents.
2. It must make allowance for users to toggle easily between legal documents and other applications' documents.
3. It must run on Microsoft Windows XP Professional computers.
The following aspects are included in the design:
1. Create a single document interface (SDI) application.
2. Allow users to toggle between documents by means of using the Alt + Tab keys.
3. Allow users to toggle between documents by means of using the Windows Task Bar.
You now need to make a decision as to whether the design meets the requirements. What conclusion can you draw?
A. The design meets the requirements.
B. The design does not meet the requirements. You must implement a multiple document interface (MDI) application.
C. The design does not meet the requirements. Users should be allowed to toggle between documents with the Ctrl + Esc keys.
D. The design does not meet the requirements. Users should be allowed to toggle between documents with the Ctrl + Tab keys.
Answer: A
Explanation:
This design adequately meets the requirements. An SDI application contains a Task Bar icon for each instance of the application that is running. This is a common design choice for Windows XP Professional applications. Users can navigate between different open documents using the Alt + Tab keys or the Windows Task Bar.
Incorrect answers:
B: A MDI application does not make for easy navigation of users between documents of different types of applications. The Windows Task Bar does not display documents in an MDO application as separate Task Bar buttons.
C: The Ctrl + Esc key combination is usually used to invoke the Windows Start menu and will thus not allow for easy navigation between documents.
D: The Ctrl + Tab key combination is typically used to toggle between documents in an MDO application. Not in this scenario.
NOTE: Orignal are also available www.exams.ws.