9E0-111 Questions

9E0-111 (Q & A)
Cisco Secure PIX Firewall Advanced Exam



Q1
You are the network security administrator for an enterprise network with a complex security policy.
Which PIX Firewall feature should you configure to minimize the number of ACLs needed to implement your policy?
A. ASA
B. Packet capture
C. Turbo ACLs
D. IP helper
E. Object grouping
Answer: E


Q2
IPSec works with which switching paths:
A. Process switching
B. Optimum switching
C. Fast switching
D. Flow switching
Answer: A


Q3
Speaking of Security Association requirements, which of the following statements is true?
A. A set of SAs are needed, one per direction, per protected data pipe.
B. A set of SAa are needed, one per direction, per protocol, per protected data pipe.
C. A set of SAs are needed, one per protocol only.
D. A set of SAs are needed, per protocol, per protected data pipe.
Answer: B


Q4
The graphic shows the output from the show failover command. This unit is active and the other unit is Standby. For an unknown reason, the failover is triggered and this unit has become Standby.
We enter the command “show failover” again.
What shall we see as the ip address of the [active-interface-inside]?
A. 172.29.1.2
B. 192.168.89.1
C. 0.0.0.0
D. 172.29.1.1
Answer: D


Q5
Which of the following statements is not true regarding the DNS Guard?
A. If disabled, can be enabled by the command: fixed protocol dns 53
B. The default UDP time expires in two minutes.
C. Immediately tears down the UDP conduit on the PIX Firewall as soon as the DNS response is received.
D. Prevents against UDP session hijacking and denial of service attacks.
Answer: A


Q6
In helping the user to choose the right IPSec transforms combinations, the following rules apply: (Choose all that apply)
A. To provide authentication services for the transform set, include an AH transform.
B. For authentication services include an ESP authentication transform.
C. To provide data authentication for the data and the outer IP header, include an AH transform.
D. For data confidentiality include an ESP encryption transform.
E. ND5 is stronger than SHA.
Answer: A, B, C, D


Q7
What is the command that enables IPSec traffic to bypass the check of conduit or accessgroup command statements?
A. conduit permit ip any any all
B. access-list acl_out permit tcp any any all access-group acl_out interface outside
C. sysopt connection permit-ipsec
D. conduit permit tcp any any all
Answer: C




9E0-111

640-822 Questions

640-822
Interconnecting Cisco Networking Devices Part 1




Try my questions too. You will get the success.


Question: 1
You download a file from an FTP site on the Internet. What is the highest layer in the OSI model used in this FTP operation?
A. Application
B. Presentation
C. Session
D. Transport
E. Internet
F. Data Link
G. Physical
Answer: A
Explanation:
Layer 7 is the application layer, which is the highest layer in the OSI model. This layer describes the use of end user applications, such as opening movie files (avi, mpeg, etc) used Microsoft Office applications, using WWW browsers, using Telnet, and using FTP.


Question: 2
A host computer has been correctly configured with a static IP address, but the default gateway is incorrectly set. Which layer of the OSI model will be first affected by this configuration error?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6
E. Layer 7
Answer: C
Explanation:
IP Addressing and IP routing resides on the OSI Network layer, which is layer 3.


Question: 3
As the Abc network security administrator, you are concerned with the various possible network attacks. Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server?
A. Trojan Horse
B. Reconnaissance
C. Denial of Service
D. Brute Force
E. Virus
F. None of the above
Answer: C
Explanation:
A denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to, motives for and targets of a DoS attack may vary, it generally comprises the concerted, malevolent efforts of a person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. Among these are Network connectivity attacks.
These attacks overload the victim with TCP packets so that its TCP/IP stack is not able to handle any further connections, and processing queues are completely full with nonsense malicious packets. As a consequence of this attack, legitimate connections are denied.
One classic example of a network connectivity attack is a SYN Flood


Question: 4
Of the following choices below, only three could be used as WAN encapsulation methods, as opposed to LAN encapsulation. Which three are they? (Choose three)
A. FDDI
B. HDLC
C. Frame Relay
D. PPP
E. Token Ring
F. Ethernet
G. VTP
Answer: B, C, D


Question: 5
Note: Please refer to the Abc Communications scenario.
The Abc 6 PC has sent the ARP request, received an ARP Reply, and sent a packet to the Abc C web server.The Ethernet frame has now been received by Router Abc A and will now be delivered to the local LAN. Consider the addressing of the Ethernet frame that now has been created by Router Abc A. Which two statements apply in this context? Select two.
A. The source address will be the MAC address of PC Abc 6.
B. The source address will be the MAC address of interface S0/0 of router Abc A
C. The source address will be the MAC address of interface S0/0 of router Abc 2.
D. The source address will be the MAC address of interface Fa0/0 of router Abc A
E. The source address will be the MAC address of interface Fa0/0 of router Abc 2.
F. The destination address will be the MAC address of Switch Abc A port attached to the Abc C web server.
G. The destination address will be the IP address of Switch Abc A port attached to the Abc C web server.
H. The destination address will be the MAC address of Switch Abc A port attached to the Abc A Fa0/0 interface..
I. The destination address will be the MAC address of the Abc C web server.
Answer: D, I

Question: 6
A host computer has been correctly configured with a static IP address, but the default gateway is incorrectly set. Which layer of the OSI model will be first affected by this configuration error?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4
E. Layer 5
F. Layer 6
E. Layer 7
Answer: C
Explanation:
IP Addressing and IP routing resides on the OSI Network layer, which is layer 3.



70-630




QUESTION 1
Users report that new content is not returned in search results when they perform searches from the root SharePoint site. You need to ensure that search results display all relevant content for the queries. What should you do?
A. Restart the Office SharePoint Server Search service.
B. Perform an IIS reset.
C. Restart the Windows Search Service service.
D. Reset all crawled content. Start a full crawl.
Answer: D

QUESTION 2
You need to extend user profiles to include the employeelD property from Active Directory. What should you do?
A. Create a new connection to an Active Directory directory service domain controller.
B. In the root SharePoint site, add an employeelD column to the Contacts list.
C. Create a new user profile property that has import mapping.
D. Create a new profile properties section named employeelD.
Answer: C

QUESTION 3
You access content in a SharePoint Portal Server 2003 area by using a desktop icon to the following URL http://www.contoso.com/c1/technology. You upgrade the server that runs SharePoint Portal Server 2003 to Microsoft Office SharePoint Server (MOSS) 2007. You need to access the migrated content alter the upgrade. What should you do?
A. Run the stsadm command with the sync solution operator.
B. Run Scan for Broken Links in the site directory.
C. From the Microsoft Office SharePoint Server (MOSS) 2007 installation CD, run the prescan.exe command.
D. Edit the shortcut to reference the new URL.
Answer: D

QUESTION 4
You are planning the migration of a Microsoft Content Management Server (MCMS) 2002 server to your Microsoft Office SharePoint Server (MOSS) 2007 environment. You need to identify the migration tasks that need to be completed. What should you do on the MOSS server?
A. Run the prescan.exe command from the Microsoft Office SharePoint Server 2007 installation CD.
B. Run the stsadm command with the upgrade solution operator
C. Run the stsadm command with the createcmsprofile operator.
D. Run the CMS Assessment tool.
Answer: D

QUESTION 5
You need to place a link on the top navigational bar of your company's corporate Web site. You also need to ensure that the link appears on all pages within the root site collection. What should you do?
A. Modify the logo URL for the root site collection.
B. Modify the default.aspx page for the root site collection by using Microsoft Office SharePoint Designer 2007.
C. Configure the site navigation settings for the root site collection.
D. Enable the tree view navigation option for the root site collection.
Answer: C

QUESTION 6
You store a Microsoft Office Excel spreadsheet on an external Web site. You configure the external Web site to allow anonymous authentication. When users attempt to open the spreadsheet through Excel Services, they receive an access denied error. You need to configure your SharePoint server to ensure that the external Excel spreadsheet is available through Excel Services. What should you do?
A. Add a new Excel Services trusted data provider.
B. Configure the External Data Unattended Access account for Excel Services.
C. Add a new Excel Services trusted file location.
D. Add a new Excel Services trusted data connection library.
Answer: C

QUESTION 7
A list view Web part named Products displays product names. You need to add another Web part to ensure that users are able to manually enter filter values on the Products Web part. Which Web part should you add?
A. Search Box
B. Reusable Content
C. Text Filter
D. Business Data List
Answer: C

QUESTION 8
You create a new SharePoint site that uses the Report Center template.
You need to create a new page in the Report Center that contains the following default Web parts:
Excel Web Access
Key Performance Indicators
KPI Details
What should you do?
A. Create a new page in the Report Center that uses the Article page layout.
B. Create a new page in the Report Center that uses the News Home page layout.
C. Create a new site that uses the Document Center template.
D. Create a new dashboard page in the Report Center.
Answer: D

QUESTION 9
You create a Business Data Catalog (BDC) application that queries a Microsoft SQL Server 2005 database. The content that is exposed through the BDC is not available in search results. You need to make the data available to searches. What should you do?
A. Assign the Selectable in Clients right to the Administrator account.
B. Add the Document Library Web part to the BDC profile page template.
C. Assign the Copy Selected Permissions to all the Applications and Entities in the Business Data Catalog right to the Administrator account.
D. Configure a default access account for the BDC application.
Answer: D

QUESTION 10
You need to create a new site that will have
a built-in key performance indicators (KPI) list.
a built-in data connections library.
a built-in reference library.
Which site template should you use to create the new site?
A. Document Center
B. Records Repository
C. Publishing
D. Report Center
Answer: D

QUESTION 11
You need to add a disclaimer to all e-mail alerts that users receive from Microsoft Office SharePoint Server 2007. Which tile should you modify?
A. the web.config file for the SharePoint application
B. the layouts.sitemap.policy.xml file
C. the alerttemplates.xml file
D. the onet.xml file
Answer: C

QUESTION 12
You need to ensure that when you reset the content index, users do not receive e-mail alerts tore content that has not changed. What should you do?
A. Stop the SharePoint Search service.
B. Configure the Search results removal option. Add the root URL to the URLs to remove list.
C. Set the Search alert status to inactive.
D. Run the stsadm.exe command with the osearch operator.
Answer: C

QUESTION 13
You need to prevent users from printing confidential documents that are stored in the document library. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Install the Internet Printing component for IIS.
B. Enable Information Rights Management on the document library.
C. Configure the server farm to use Information Rights Management.
D. Create a new Web application policy to deny write access to the Authenticated Users group.
E. Add a permissions policy level to deny Use Remote Interlaces.
Answer: D

QUESTION 14
An Active Directory security group named Sales contains all users from the sales department. You need to ensure that only users from the sales department can create personal sites by using the My Site feature of SharePoint Server. What should you do?
A. Modify the personalization services permissions for the shared services provider.
B. Modify the site creation rights for the root SharePoint site.
C. Use the personalization site template to create a new site. Add the Sales group to the Owners group of the new site.
D. Add the Sales group to the Owners group of the root SharePoint site.
Answer: A

QUESTION 15
Your company's internal and remote users require access to an existing Web application. You need to configure your environment to meet the following requirements:
Remote users must use forms-based authentication.
Internal users must use Integrated Windows authentication.
Internal users and remote users must use different UPL5 to gain access.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Modify the authentication provider for the default zone.
B. Modify the authentication provider for the intranet zone.
C. Modify the authentication provider for the extranet zone.
D. Add a managed path to the existing Web application.
E. Extend an existing Web application to the extranet zone.
Answer: C, E

QUESTION 16
You need to create a Business Data Catalog (BDC) data list Web part that will query a Microsoft SQL Server 2005 database. You also need to ensure that users are not prompted for authentication when they access the BDC data list Web part. What should you do?
A. Implement a new Web application security policy.
B. Implement an LDAP membership provider.
C. Implement a SQL Server membership provider.
D. Enable and configure single sign-on.
Answer: D

QUESTION 17
You need to create a link to the sales department SharePoint site for all users in the sales department. You also need to ensure that the link is visible only in the sales department users personal sites. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Use the Shared Services Administration Web site to Modify the profile services policy.
B. Create an Active Directory global group that contains all sales department users.
C. Create an audience that contains all sales department users.
D. Use the Shared Services Administration Web site to create a personalization link.
Answer: C, D

QUESTION 18
Users report that several links within the SharePoint site directory no longer function. The links all appear to reference external Web sites. You need to identity all links within the site directory that are not functioning. What should you do?
A. From the site directory, run Scan for Broken Links.
B. Run the stsadm -o enumsites command.
C. Run the stsadm -o delete sites command.
D. Open the site directory by using SharePoint Designer, and run the Optimize HTML command.
Answer: A

QUESTION 19
A site collection administrator reports that she is unable to view usage analysis reports for the site collection. You need to ensure that she is able to view the site collection usage summary. Which two actions should you perform? (Each answer presents part of the solution. Choose two.)
A. In the Shared Services Provider, enable advanced usage analysis processing.
B. In Central Administration Operations, enable recurring policy usage reports.
C. In Central Administration Operations, change the storage location of the trace log to a file share.
D. In Central Administration Operations, enable logging and usage analysis processing.
E. In Central Administration Application Management, configure a records repository connection.
Answer: A, D

QUESTION 20
A developer provides you with a new feature for a site collection. You need to make the feature available for activation by your site collection Administrator. What should you do?
A. Run the stsadm command with the activate feature operator.
B. Run the stsadm command with the scan for features operator.
C. Run the stsadm command with the install feature operator.
D. Run the stsadm command with the addwppack operator.
Answer: C

QUESTION 21
You enable usage analysis processing. You need to identity the links that users follow to access your SharePoint sites. What should you do?
A. Analyze the SharePoint trace log.
B. In the Application event log, analyze events from the Office SharePoint Server source.
C. In the Report Center, create a dashboard named Usage.
D. In the site collection, analyze the Referrers report.
Answer: D

QUESTION 22
A user frequently accesses resources on a Microsoft Office SharePoint Server (MOSS) 2007 server. You change the users logon name. You need to ensure that the user maintains access to the same resources on the MOSS server. What should you do?
A. On the Policy for Web Application settings, give the user account full read permissions.
B. Create a new user profile property.
C. Run the stsadm command with the migrate user operator.
D. Run the stsadm command with the update farm credentials operator.
Answer: C

QUESTION 23
You create a custom home page for a site collection that is shared between the sales department and the marketing department. You add a Web part for the sales department to the home page of the site collection. You need to configure the Web part to ensure that only users in the sales department can view the Web part by default. What should you do?
A. Create an audience that contains all sales department users. Target the Web part to the audience.
B. Create an Active Directory group. Add all sales department users to the group. Add the group to the site Members group.
C. Create an Active Directory group. Add all sales department users to the group. Add the group to the site Owners group.
D. Create an Active Directory group. Add all sales department users to the group. Add the group to the site Readers group. Ensure that no marketing department users are members of the site Owners group.
Answer: A

QUESTION 24
You want to perform scheduled maintenance on your server farm. You need to prevent users from establishing new sessions. You must achieve this goal without terminating user sessions that are already established. What should you do?
A. Disable the Config Refresh timer job in the Timer Job definitions.
B. Stop the Windows SharePoint Services Timer service.
C. Disable session state for the server farm.
D. Quiesce the server farm.
Answer: D

QUESTION 25
You create a site collection for each department in your company. You need to schedule the deployment of content from the Sales site collection to the Marketing site collection. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Configure the content deployment settings for the Marketing site to accept incoming content deployment jobs.
B. Create a new content deployment path and job.
C. Configure the Data Retrieval Service for update query support.
D. Create a new Content Management Server migration profile.
E. Configure the content deployment settings for the Sales site to not require encryption.
Answer: A, B

QUESTION 26
Your company stores profile information for remote users in Active Directory Application Mode (ADAM). You need to import profiles for the remote users. What should you do?
A. Configure the user profile import source to be the Entire Forest.
B. Create a new user profile import source connection. Use the Business Data Catalog connection type.
C. Create a new user profile import source connection. Use the LDAP Directory connection type.
D. Create a new user profile import source connection. Use the Active Directory connection type.
Answer: C