Top Banner
PART 1 Global systems, inc. is an expanding enterprise that provides financial services, such as banking service, to its customers . the enterprise has decided to provide additional services , such as insurance services to its customers. The management asks Ron, the network administrator, to design an enterprise network so that additional services can be provided efficiently Ron observes that providing additional services would result in an increase in the number of customers of the enterprise. Ron also observer that he need to change the existing IT infrastructure of the enterprise in older to provide the services efficiently to a large number of customers. What should Ron do to perform the required task? a. create a group, which would be responsible for implementing the changes b. implement the required change and inform the reviewing broad about the change to be implemented c. implement the change and prepare a document containing information about the changes, which need to be made to the IT infrastruture d. Prepare a document containing information about the changes, which need to be made to the IT infrastructure and send the document to the reviewing board Dap an: D Red sky IT system has decided to expand is business by setting up a new branch in Chicago. The management needs to implement the latest IT technologies in the new branch. The management ask Steve, an IT consultant, to suggest the type and number of resources that would be required to set up the IT infrastructure of the new enterprise. Which of the following systems management task should the IT consultant perform? a. storage management b. capacity planning
76
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Test 2.

PART 1

Global systems, inc. is an expanding enterprise that provides financial services, such as banking service, to its customers . the enterprise has decided to provide additional services , such as insurance services to its customers. The management asks Ron, the network administrator, to design an enterprise network so that additional services can be provided efficientlyRon observes that providing additional services would result in an increase in the number of customers of the enterprise. Ron also observer that he need to change the existing IT infrastructure of the enterprise in older to provide the services efficiently to a large number of customers. What should Ron do to perform the required task?

a. create a group, which would be responsible for implementing the changesb. implement the required change and inform the reviewing broad about the change

to be implementedc. implement the change and prepare a document containing information about the

changes, which need to be made to the IT infrastrutured. Prepare a document containing information about the changes, which need to be

made to the IT infrastructure and send the document to the reviewing boardDap an: D

Red sky IT system has decided to expand is business by setting up a new branch in Chicago. The management needs to implement the latest IT technologies in the new branch. The management ask Steve, an IT consultant, to suggest the type and number of resources that would be required to set up the IT infrastructure of the new enterprise. Which of the following systems management task should the IT consultant perform?

a. storage managementb. capacity planningc. disaster recoveryd. change managementDap an: B

Jim Lewis is the network administrator at red sky IT systems. The employees of the Accounts department of the enterprise have complained to Jim that they are unable to use the payroll application. Jim observer that the payroll application contains some bugs . which must be fixed. Which feature of enterprise management should Jim implement to solve the preceding problem?

a. patch deploymentb. remote administratorc. network monitoring d. securityDap an: A

Page 2: Test 2.

The management of global system, Inc . observes that the se of paper and printer ink in the enterprise has increased recently. The management ask Chris, the network administrator, to identify and solve the problem After monitoring the network resources, Chris observes that the printer placed in the sales department is being misused. Therefore , Chris decides to restrict the user of the sales department from accessing the printer. Chris also decides to measure the network resource utilization parameters in order to identify whether a particular user is misusing the printer . which of the following network management task should chris perform to meet the preceding requirements ?

a. Fault management and accounting managementb. accounting management Security managementc. configuration management and performance managementd. performance management and security managementDap an: B

Pat Green, the IT consultant of Blue Moon computers ask ED Young, the network administrator to develop a Network Management system ( NMS), which will monitor all the servers and routers in the network. Pat asks ED to ensure that all the devices in the network support the communication protocol used by NMS. In addition , Pat also asks ED to ensure that the NMS is able to collect large amount of information from the devices in the network. Which protocol should large amount of the information from the devices in the network, which protocol should ED use to develop the NMS ?

a. SNMP version 1b. Remote monitoring ( RMON)c. SNMP version 2d. Common management information protocol (CMIP)Dap an: C

Global systems, INC. provides IT-related services, such as customer care and technical support , to its customer. The organization decides to provide web hosting services to its customer. To provide WEB hosting service, the organization needs to set up a data center. Therefore, the management of global systems, Inc. hire a team of IT professionals to set up the required data center The management assigns Jim Lewis, a member of the hired team, to increase the number of server in the data center. Jim is also assigned the task to ensure that all the hardware components and service used in the data center remain operation round-the-clock. Which features of a data center help Jim to perform the assigned tasksa. server housing, value added services, and proper monitoringb. network connectivity. Server housing, and VLANc. proper monitoring, server housing, and network connectivity d. VLAN , proper monitoring, and server housingDap an: C

Page 3: Test 2.

Blue Moon computer is a financial organization that provides banking servers to its customer. The organization needs to maintain accounts of its customer so that money transaction which the customer are correctly performed. Maintaining accounts of all the customer involves maintaining large volumes of dataIn order to maintain large volumes of data , the organization has established a data center. Currently, the data related to the customer accounts stored on servers that are distributed across the LAN of the data center. Chris, the network administrator has observed that maintaining data stored on the distributed server is a difficult task. Therefore, Chris has decided to store the data related to customer accounts at a centralized location in the LAN . In addition, the Chris has decided to implement security mechanisms in the LAN to ensure that the money transactions with the customer are secure. What should chris do to perform the required task?implement NAS in the organization data and then implement virtualization in the LAN to secure data

a. implement NAS in the organization data and then implement VLAN in the LAN to secure data

b. implement SAN in the organization data and then implement VLAN in the LAN to secure data

c. Implement DAS in the organization to centralize data and then implement virtualization in the LAN to secure data

Dap an: C

Good Graphics, Inc. is a non-government organization that provides weather related information. For example , it informs people when is a possibility of a thunderstorm . In order to provide correct information, the organization collects ad stores detailed data related to various aspects of the environment, such as temperature and humidity. In addition, the organization needs to maintain an archive of previous data, which can be used for predicting natural event, such as thunderstorm. Due to this, the organization needs to manage large volumes of data related to the weatherTo manage data, the organization has set up a data center and implemented NAS in the LAN. Due to this the performance of the LAN has degraded and it takes a long time to create archives. The management has asked Steve, the network administrator, to solve the problem of create archives in the data center. In addition, the management has asked Steve to ensure that data is placed at a centralized location and is efficiently managed. What should Steve do to perform the required tasks ?

a. implement SAN in the LAN of the data center b. implement SAN a separate hig-speed network in the data centerc. implement NAS in the LaN of the data center d. implement DAS in a separate high-speed network in the data center.Dap an: B

Global system, INC. has set up a data center to provide data center services, such as co-location and WEB hosting, to its customer. The customers have placed their database

Page 4: Test 2.

servers in the data center and frequently access large volumes of data from the data center. To ensure that the customers are able to access data efficiently, the network administrator , Jim, has implemented SAN in the data center. However, recently the customers of the data center have increased. Due to this, it is difficult to manage data in the SAN can be managed from a single location. What should Steve do to perform the required task?

a. implement VLAN in the SAN of the data centerb. implement storage virtualization in the LAN of the data centerc. implement storage virtualization in the SAN of the data center d. implement transparent bridging in the LAN of the data centerDap an: C

Safest Software Co. has set up a data center torrent sure that the center data of the organization is placed at a central location and is easily accessible to its customers. Recently , the organization has acquired customers from remote states, who want to utilize the various benefits provided by the data center, such as secure data and round-the-clock connectivity. In addition , the customers have demanded that their field executives should also be able to access data from the data center by using laptops. Therefore, safest Software Co. has asked Ken , the network administrator, to implement networking technologies so that the requirements of the customers are met. which networking technologies should Ken implement in the data center to meet the requirements of the customers ?

a. Ken should implement Wi-Max to allow the field executives of the remote customers to access data. Ken should also implement VLN to ensure data security inside the data center

b. Ken should implement Wi-MFi to allow the field executives of the remote customers to access data. Ken should also implement VLN to ensure data security inside the data center

c. Ken should implement Wi-MFi to allow the field executives of the remote customers to access data. Ken should also implement transparent bridging to ensure data security inside the data center

d. Ken should implement Wi-MFi to allow the field executives of the remote customers to access data. Ken should also implement VLAN to ensure data security inside the data center+

Dap an: A

John is a network administrator in smart Software Developer, Network . the organization has its branch office in Denver and Houston. John find it difficult to control the operations of all three offices. To overcome this, the management decides to centralize the operations of an enterprise network. The management decides to provide a Mini remote control to John in order to remotely install services and devices across the network and control them. Which enterprise management tool should John implement to perform the required task

Page 5: Test 2.

a. Dameware NT utilities toolb. OpenView NNM tool c. SiteScope toold. Asset tracker for Network toolDap an: A

Michael is a network administrator in quality Software developers, Chicago. The organization has its branch office at New york, Denver, and Houston. Michael is assigned the task to audit the hardware and software components installed on all the computer at various office. Michael has to also export the audited inventory information to the company’s website. Which enterprise management tool should John use to perform the above task ?

a. webNMb. SiteScopec. Asset tracker for Networksd. Dameware NT Utilities

Dap an: C

Mary is a network administrator in Sky Blue Computer, Chicago. The organization has its branch offices at Houston , New York, and Denver. The network set up of all the offices includes a mainframe server and clients running on Windows 98 operating systems. To expand the business, the organization has recruited business development managers and has provide laptop computer the them. Mary is assigned the task of connecting laptop computer to the organization’s network so that files can be accessed whenever required. Mary also needs to centralize the operations of all the four officesThe management plans to implement an Enterprise Management tool in the enterprise that will decrease the resolution time required to solve the problem that occur in the network. The enterprise management tool should also maintain the operational availability of server round the clock Which enterprise management solve should Mary implement to solve the preceding problem ?

a. Unicenterb. Tivolic. Openviewd. SitescopeDap an: A

Steven is a network administrator at blue valley consulting Inc. the management has implemented Tivoli in the enterprise network to automate the process f monitoring and resolving problems that arise in the enterprise network. Steve has observed that certain unauthorized users are illegally trying to access confidential information of the enterprise. Steve decides to deploy a security package that will enable only authorized users to view confidential information related to the enterprise. Which Enterprise Management tool Tivoli suite Steve implement to accomplish the given task

Page 6: Test 2.

a. Tivoli Access Manager b. Tivoli Storage Managerc. Tivoli Netview d. Tivoli Switch Analyzer

Dap an: A

Blue moon Computer provides Knowledge solutions to its customer. The network set up of the organization includes various server, such as WEB server, FTP server, SL server, and e-mail server. The set up includes computer running on different operating system , such as Windows, Linux, and Solari. Don Allen, the network administrator is assigned the task of monitoring the operation of server. Don observer that certain unauthorized users are illegally trying to access the confidential information of the enterprise. Don decides to implement a tool in the organization that will raise alarms in case a malicious user tries to access the information. Which enterprise management tool should don user to perform the required task?

a. WebNMb. Asset tracker for networksc. Dameware Nt utilitiesd. SiteScope

Dap an: D

Steve is a network administrator in Blue Moon Computer, New York. The organization has its branch office in Denver and Houston. Steve is facing a problem in management and controlling the operations of all the three offices in a distributed environment. Steve is also facing problem in troubleshooting individual computers and analyzing network problem of the entire enterprise network The management asks Steve to implement an optimum enterprise Management tool that suits the requirement of their network. Therefore, Steve needs to implement a tool that should automate the distribution of software. This tool should also analyze and troubleshoot the hardware and software related problem of client computer at remote locations from a centralized location. Which tool should Steve implement to accomplish the preceding requirements?

a. tivolib. unicenterc. openviewd. SMSDap an: D

John is a network administrator in Blue valley consulting, Chicago. The organization has its branch offices in New York , Denver, and Houston. John has installed SMS 2003 on the network to manager and maintain clients and server in the distributed network. John decides to update the functionality of SMS 2003 by installing SMS 2003 SP1. which feature of SMS 2003 enables compliance with the installed application base by reducing the software costs?

Page 7: Test 2.

a. asset management b. security patch managementc. application deploymentd. windows management Services Integration

Dap an: A

Good Graphics, INC. provides graphic solutions to its customer. This organization decides to implement SMS on the network to enhance the operational efficiency Steve, the network administrator , has deployed SMS 2003 on the enterprise network and installed central, primary, and secondary sites, Now, Steve need to configure SMS sites. Therefore, Steve decides to configure SMS site system and site roles. hit requirement is that advanced clients should be able to communicate which the SMS sites. Which site system role should be configure to accomplish the preceding requirement?

a. management pointb. distribution pointc. client access pointd. aserver locator pointDap an: A

Blue Moon computer provides software solutions to its customers. The organization decides to implement SMS on the network to centralize operations Steve, the network administrator, has deployed SMS 2003 on the network and installed central, primary, and secondary sites. Steve site component will perform the task successfully ?

a. site system roleb. SMS providerc. SMS administrator consoled. Site boundary

Dap an: D

Smart Software developers provides software solutions to its customer, Michael the network administrator has implemented SMS across the network . john observer that unauthorized users are breaching the security of computer managed to SMS client and SMS sites across the network. Which of the following aspect of SMS security environment should Michael primarily use to protect the SMS security environment ?

a. operating system Security b. SL server securityc. WMI securityd. IIS security

Dap an: A

Chris is a network administrator in Blue moon Computer . he need to set up the network of the organization. The developer in the organization create multimedia presentation and software. Therefore, the network of the organization should be able to support high data

Page 8: Test 2.

traffic and fast transfer speeds. Chris decides to use the fiber optic based network. Which type of Ethernet is best suited for his requirement?

a. 10Base2b. 10Base5c. 10Base-Td. 100Base-FX

Dap an: D

Steve is a network administrator in Blue Moon computer . he needs to set up the network of the organization . the developers in the organization create banking and data warehousing software. Therefore, the network of the organization should be able to support high data traffic . Steve has also identified that the required data transfer speed is around 10 Mbps. Steve decides to use the coaxial cable network . which type of Ethernet will resolve the problem?

a. 100Base-Tb. 10Base2c. 10Base-Td. 10Base-F

Dap an: B

Chris is a network administrator in Red sky IT system. The organization has opened its new development center in Houston . the new development center has three departments development , planning and MarketingThe organization has a policy to provide each team with a specific seating zone Chris needs to constantly update the network configuration according to changes in teams. Chris also needs to use remote management tools, such as telnet to configure and manage switches. Which of the following task should be performed to implement the preceding features?

a. Implement a Virtual LANb. Implement LAN using star topologyc. Implement LAN using ring topologyd. Implement LAN using fiber optic

Dap an: A

Steve is a network administrator in quality software developers. He needs to setup the network in the organization . the developers in quality Software developers create telecom and database software. Therefore, the network of the organization should be able to support high data traffic. The data transfer speeds should be of the order of hundreds of Mbps. Steve also need to minimize the noise level in data transmission. Which type of cable should be used to get up the network

a. CAT 1 cableb. Fiber optic cablec. CAT 4 cable

Page 9: Test 2.

d. Coaxial CableDap an: B

Nancy is a network administrator in Blue moon computers. She needs to Implement the network of the organization. The developers in the organization create telecom and database software . therefore , the network of the organization should be able to support high data traffic. The data transfer speeds should be around 20 Mbps. Which type of cable should be used to connect the various computer in the network?

a. CAT 1b. CAT 2c. CAT 3d. CAT 4

Dap an: D

Chris is a network administrator in Blue moon computer . the organization has decided to create a meeting room and conference hall. The meeting room should enable the users to use Internet on their laptop computer. Which of the following technology should Chris to set up the network

a. VSATb. IrDAc. Wi-Fid. Ethernet

Dap an: C

John is a network administrator in red sky IT systems. The organization has decided to set up its Geographic Information system (GIS) at various remote locations in the country. The remote stations are located very far apart and not in line of sight of each other. Each station need to send the weather data to other stations. Which technology should be used to implement the GIS network

a. VSATb. Ethernet c. WiMaxd. Wi-Fi

Dap an: A

Nancy is a system administrator in technology Systems. She has been assigned the task of establishing a communication link with another office, which is located 20 kilometers away. The technology should provide a fast connection between the two offices. The terrain between the two office is very difficult and there is a river between the two offices as well. Which technology should Nancy use to implement the communication link

a. VSATb. Bluetoothc. Wi-Fid. WiMAX

Dap an: D

Page 10: Test 2.

Chris is working as an embedded developer in Red sky IT systems. He is developing the communication method for the latest mobile phones manufactured by Red Sky IT systems. The communication method should enable the mobile phones to connect to nearby computers and other mobile devices o transfer data. The power consumption of the communication between mobile devices should be minimum. Which of the following technology should he use to implement the communication method

a. Bluetoothb. VASTc. Wi-Fid. WiMAX

Dap an: A

John is a network administrator in Smart Software developers. He is assigned the task of creating a labeling technology for Blue moon computer, which is a client . the technology should enable the client’s systems to track the inventory details of the good in their store. He needs to develop a wireless system. Which enables the inventory personnel to track the movement of the goods within the store. The system should also enable the Inventory personnel to read the inventory details, such as name, description, quantity, vendor address, and manufacturing details. Which of the following technologies should John use to implement the inventory tracking system?

a. VSATb. WiMAXc. RFIDd. Wi-Fi

Dap an: C

PART 2

1. Blue Moon Computers provides software solutions to its customers. A team of software developers is working on a project that’s needs to be executed on different platforms without making any modification software. To verify the compatibility of the project for different platforms , developers need to install all these platforms on the same server. John , the network administrator in the organization , decides to implement the concept of virtualization in the network which virtualization technique enables him to perform the required task?

A; network virtualization B: Hardware virtualization C Server virtualization D: Storage virtualizationDap an: B

Page 11: Test 2.

2 : Sky Blue Computers is a leading manufacturer of computer components. The network setup of the organization includes a mainframe server and clients running on window98 operating system . the backup of all the client computers needs to be stored on the mainframe server. John , the network administrator , installs four 20 GB hard disk drives to store the backup of all the computers . the overall storage capacity of the server becomes 80 GB. However, a user cannot have a storage quota more than 20GB on the server . To allocate more than 20 GB to a user, John decides to group the existing 20GB drives to form a single , logical 80GB virtual drive . which virtualization technique enables him to perform the required task ?A server virtualizationB network virtualizationC Hardware virtualizationD Storage virtualizationDap an: D

3 Quality software developers provides knowledge solutions to its customers . Steve, the network administrator, decides to implement virtualization in the network to hide the complexities of devices used in the network. The employees are complaining to Steve that they are not able to access the server resources in the network .

Steve decides to provide a shared access to users to retrieve all the resources of the enterprise network from a single computer . Steve also decides to combine network resources by splitting the available bandwidth into channels . Each channel is assigned to an individual server on the enterprise network . which virtualization technique enables him to perform the required task ?

A storage virtualizationB server virtualizationC network virtualizationD hardware virtualizationDap an: C

4 SSPT corporation is a leading manufacturer of computer components . the management has implemented storage virtualization in its enterprise network to reduce the complexities involved in storage management . Mary is assigned the task of specifying the time , cost incurred, and the quality of data transmitted across the enterprise network. Which level of storage virtualization will provide the required information ?A server level storage virtualizationB file level storage virtualizationC storage level storage virtualizationD Fabric level storage virtualizationDap an: D

5 Michael is a network administrator at smart software developers . the network setup of the organization uses a centralized server to store the data. Michel finds it difficult to manage the complexities involved in storing and managing the data . Michael

Page 12: Test 2.

decides to create a common namespace that enables users to access different files within that namespace without changing the pathname .which virtualization technique enables him to perform the required task ?A hardware virtualizationB Network virtualizationC Server virtualizationD Storage virtualization Dap an: D

6 : Blue Moon Computer , Chicago , provide software solutions to its customers. The organization has various branch offices across the country. John . the network administrator , decides to optimize server resource utilization by implementing virtual Server 2005 in the network John decides to provide remote access to the computer connected to virtual server . which task should john perform while configuring virtual server 2005.

A configure VMRCB configure scriptsC configure the virtual machine D configure virtual server manager search pathDap an: A

7 Michael is a network administrator at quality software developers . the employees at quality software developers require windows server2003 with enterprise edition and datacenter edition operating systems installed on a single server to execute their applications. Michael is assigned the task of installing virtual server 2005 in the network . what is the minimum ram capacity on which he can install virtual 2005 ?A 256 and 512B 128 and 512C 64 and 128D 128 and 256Dap an: A

8 Smart software developers provides software solutions to its customers. Tom Wilkins ,the network administrator , is assigned the task of configuring virtual server 2005 according to the requirements of the organization . while configuring virtual server 2005 . tom needs to assign permissions to the selected users or groups so that they are not able to manipulate the configuration information and the event log generated by virtual server. Which access control should tom provide for the given task ?

A Full B modifyC view D changeDap an: C

Page 13: Test 2.

9 Steve is a network administrator at Blue Valley consulting. he needs to implement virtual server 2005 in the network to execute multiple windows operating systems concurrently on a single server. He decides to use VMRC to configure the components of virtual server 2005 remotely . he needs to specify the default port value for VMRC while configuring it . what port value should Steve specify to perform the task ?A 5900B 1024C 137D 138Dap an: A

10 Safest software co. provides software solutions to its customers . the organization needs to implement virtual server 2005 in its network for an upcoming development project. Don Allen , a network administrator is assigned the task of configuring virtual machines on the network . He needs to provide security to the virtual machines while configuring them . therefore , he decides to specify a file , which contains additional information about the virtual machine, such as CPU usage of virtual machine. Which property of virtual machine configuration should Don use to perform the task ?A user accountA user accountB passwordC NotesD User name Dap an: C

11 Chris is a network administrator at Blue Moon computers. Recently , the organization has faced several security attacks from specific ports on the servers. These attacks are being caused from some specific IP addresses . It is also observed that these attacks target only certain port numbers of the web server of the enterprise network . which of the following security tool is easiest to implement and use to solve the preceding problem ?A Antivirus B Proxy serverC IDS D Stateful inspection system.Dap an: D

12 John is a network administrator at Red Sky It Systems. Some users in the organization are accessing illegal and multimedia rich sites for entertainment. These sites cause severe traffic on the network of the organization . which of the following is the most effective and easiest technique to block such sites ?A HTTP application proxy firewallB FTP application proxy firewallC SMTP proxy firewallD SOCKS proxy firewallDap an: A

Page 14: Test 2.

13 Nancy is a network administrator at red sky IT systems. Some users inside the organization are illegally trying to access the centralized database of important information . which technique should Nancy use to block such unauthorized access ?A Real time IDSB network based IDSC host based IDSD interval based IDSDap an: C

14 nancy is a system administrator in technology systems. The organization has recently installed checkpoint NG with AI suite to meet its security needs. Before installing Checkpoint NG with AI package , Nancy used to manage the details of security software licenses in an MS Excel sheet. She now needs to track the details on updates of various security software . which tool should Nancy use to accomplish this task?

A SmartUpdateB Smart LSMC VPN1/FireWall1D SecuRemote VPNsDap an: A

15 Chris is a network administrator in Red Sky It Systems. The organization uses checkpoint NG with AI suite to meet its security needs. The organization is planning to expand its network by connecting its local branch offices to its headquarters. Chris needs to define and implement a global security policy for the organization network and distribute this policy among various computers in he branch offices and headquarters. Which of the following tools of the checkpoint NG with suite will solve the problem ?

A: LDAPB: VPN1/firewall1C SmartLSMD SmartUpdate Dap an: C

1. Global Systems, Inc. provides insurance services to its customers. In order to provide the services, the organization collects and stores information related to is customers in a customer database. The organization also maintains backup of the customers related data is not lost. The entire data involved in the data collection, storage, and backup processes flows across the LAN of the organization.Recently, the organization has expanded its business and the number of customers has increased. Due to this, the amount of data following across the LAN of the organization has in assured Jim that it would make the required investment to implement the correct solution. What should Jim do to solve the preceding problem ?

Page 15: Test 2.

A Implement a SAN by using the iSCSI standardB increase the bandwidth of the LANC Implement a SAN by using the fibre channel technology D: Increase the number of storage devices used in the LANDap an: A

2. Red sky IT systems is a software development organization where all the clients , servers, and network connectivity devices are centrally managed by using network management tools . Chris , the network administrator of the organization, observers that centralized management of the devices has resulted in an increase in the management traffic flowing across the Lan , Chris also observes that it takes a lot of time to perform backup and recovery operations through the Lan . Therefore , Chris Decides to setup a San to reduce the traffic load on the Lan .

Chris decides to set up the San so that the complexity of the overall network of the organization is minimized. to reduce the complexity of the network, Chris decides to form small storage networks with 50 devices each. In addition, Chris also needs to ensure that the cost incurred in deploying the storage networks is minimized. What should Chris do to set up the SAN.

A Attach the storage devices directly to the San and connect the servers and storage devices by using the arbitrated loop topology.

B Connect the clients , servers ,and connectivity devices by using the fibre channel switched fabric topology .

C Attach the storage devices directly to the San and connect the servers and storage devices by using the fibre channel switched fabric topology .

D connect the client ,servers , and connectivity devices by using the arbitrated loop topology .Dap an: D

3 Ken Burton, the network administrator at blue valley consulting , has implemented a San in the organization by using fibre channel switched fabric topology. Ken has configured the storage devices in the San so that multiple servers can access the same storage device. Ken observers that the existing San has improved the utilization of the storage devices. however, it has introduced some security issues, such as unauthorized access to storage devices. Therefore , Ken needs to implement security mechanism to ensure that the storage devices are shared among the servers, mechanism by using the existing hardware in the fibre channel . which security mechanism should Ken implement to ensure that the preceding security requirements are met?

A Software zoningB Hardware zoning C Lun Security by using switch zoning D Persistent binding

Dap an: B

Page 16: Test 2.

4 Blue Moon Computers Provides banking services to its customers. Steve , the network administrator , has recently set up a San to efficiently manage the storage traffic in the organization. However, the management has observed that the performance of the San is not adequate. The management asks Steve to improve the performance of the existing San . In addition, the management also asks Steve to plan for the growth of the San .To improve the performance of the San , Steve needs to obtain a high- level of the San and identify the problem areas in the San. Which tool should Steve use to improve the performance of the existing San ?

A McDATA SanavigatorB NetwisdomC IBM storwatch D Finisar’s Analyzer

Dap an: B

5 Good Graphics, Inc .creates graphical designs of products manufactured by its clients. The employees of the organization need to create and store alternative designs for each product so that the clients can choose the best design . In addition, the employees need to ensure that none of designs are lost because it takes a lot of effort to create each design.

To ensure that none of the designs are lost , Ron Floyd, the network administrator, has implemented a backup and recovery system in the organization’s network. Ron has implemented the backup and recovery system so that the backup data flows through the San instead of the LAN . However , the employees have complained that the multimedia applications running on their systems are affected during the backup operations . what should Ron do to solve the employees problem?

A Configure the backup and recovery system to that multimedia applications are executed on a different console during the backup process.

B Configure the backup and recovery system to that Lan – free backups are taken.

C Configure the backup and recovery system to that a part of the backup data flows through the LAN

D Configure the backup and recovery system to that client – free backups are takenDap an: B

6 Larry Williams is the network administrator in technology systems , which is a broadcasting organization . The organization. The organization is currently using direct attached storage (DAS) technology to store and retrieve data from servers. The management observes that the data management in the enterprise is not efficient. Therefore, the management asks Larry to implement a network storage technology , which allows users to efficiently access the files placed at a centralized location in the LAN of an organization. Larry plans to implement NAS in the LAN of the organization in order to perform the required task . To implement NAS , Larry connects a files to the

Page 17: Test 2.

LAN of the organization and configures it .Now , Larry needs to manage the filer remotely from a central location to simplify the management of storage devices connected to the filers . What should Larry do to perform the required task?

A use a management consoleB use a configuration interfaceC use a network interfaceD use a management tool

Dap an: D

7 Pat Greene is working as the network administrator in Blue Moon Computers, which provides banking services to its customers . the organization stores data related to its customers on various database servers in its LAN . The management has observed that it is difficult to manage the customer-related data stored on the database servers. Therefore, the management asks pat to implement NAS to consolidate data of the organization . the management also asks pat to ensure that data is not lost . in addition , the management asks pat to ensure that the NAS system provides efficient performance . What should Pat do to perform the required tasks?

A implement NFS/CIFS technique in the NAS system.B implement plug – and- play technique in the NAS systemC implement NDMP technique in the NAS systemD implement server – to – server mirroring technique in the NAS system

Dap an: C

8 Donna Johnson is the system administrator in Red Eye Experts . Donne has been assigned the task of managing data in the organization so that clients are able to access data efficiently from the servers in the LAN . Donna has also been asked to simplify the management of existing backup and recovery operations in the organization. Donna plans to create and manage home directories to simplify the backup and recovery processes. Donna observes that the number of the users in the enterprise is large and the workload on the servers managing the home directories is high. In addition, the data storage resources of the enterprise are distributed across the enterprise network . therefore , Donna needs to use the application area that allows the filer of NAS to directly plug into the enterprise network and share data. Which application area of NAS would you suggest that Donna should use to perform the required task ?

A Database applicationsB ERP applications C Data consolidationD internet application

Dap an: C

9 Steve Irving in the network administrator at Global systems. Steve has been assigned the task of configuring filers of the NAS system in the network of the organization to ensure that the filers are secure and are accessible to the servers . In addition , Steve has been asked to ensure that duplicate copies of data are available on redundant disks. To perform the task , Steve plans to use secure configuring interfaces and configure the storage devices connected to the filers .To configure the storage

Page 18: Test 2.

devices, Steve needs to execute commands to the filer so that the disk drives of the filers are converted into RAID groups. Which of the configuring interface and disk space should Steve use to execute the required tasks?

A HTTP , disk shelvesB rsh, volumeC CLI, file systemD ssh, physical disk drives

10. Tom Wilkins is the network administrator in a software development organization Global systems, Inc . Tom has been assigned the task of analyzing the performance of a NAS system in the organization . to measure the performance of the NAS system, tom needs to obtain information related to CPU utilization, disk utilization and bandwidth utilization. To perform this task , tom plans to use a tool that can access information related to the internal configuration and operational status of the NAS devices. The tool should also collect information related to the operational status of the channels that connect the NAS devices to the LAN of the enterprise. which of the following tools should Tom use to monitor performance related data collected from the various NAS devices?

A EMC control center symmetric managerB network appliance data fabric managerC TcpdumpD netMon

Dap an: D

1 Red Sky It systems has recently set up a data center to simplify the management of data in the enterprise . the enterprise has appointed on – premises security officers in the enterprise in order to prevent strangers from entering the premises of the data center. In addition, the system administrator have implemented various security mechanisms , such as firewalls and IDS, to protect the servers in the data center from network attacks. However, the management wants to ensure that only the system administrators in the data center are allowed to enter the server room . the management has asked john, a security consultant to ensure that only system administrators are allowed to enter the server room. In addition, the management has asked john to identify the personnel other than the system administrators who try to enter the server room. What should john do perform the required tasks?

A Implement physical security by using video surveillance cameras and electronic motion sensors.

B Implement physical security by using video surveillance cameras and finger authentication system

C Implement physical security by using video surveillance cameras and voice authentication system.

D Implement physical security by using video surveillance cameras and UPSDap an: A

Page 19: Test 2.

2 Technology system is an enterprise that provides financial services , such as loans to its customers. Therefore , the enterprise stores storages confidential data related to the bank accounts of its customers on servers placed in the enterprise network . the enterprise also needs to ensure that the customers on servers placed in the enterprise network. The enterprise also needs to ensure that the customers are able to perform secure money translations. In addition , the enterprise needs to ensure that the information about the customer accounts is not modified by unauthorized users . the management of the enterprise has asked ken , the network administrator , to ensure that the preceding security requirements are met. What should Ken do to perform the required tasks?

A apply security measures , such as firewalls, and enforce rules for distribution of access controls

B secure information related to the status of users logged on to the enterprise network and encrypt the data accessed by the customers.

C apply security measures, such as firewalls , and encrypt the data accessed by the customers

D secure information related to the status of users logged on to the enterprise network and implement authentication by using passwords.Dap an: D

3 Blue Moon computers provides online shopping services to its customers. To provide the online shopping services , the web administrator , ken , has created a website and hosted it on a web server. Ken has also stored confidential information related to the features and prices of products on the web server that hosts the online shopping web site. In addition , ken has implemented various security mechanisms, such as authentication, encryption , and firewalls ,to secure the information related to the products. However, the management has observed that the competitors have been able to access confidential information related to products. Therefore, the management has asked Steve, a security consultant to analyze and solve this problem . Steve observes that the security mechanisms implemented in the enterprise are adequate. Therefore, it is not possible for the competitors to access the confidential information stored on the web server without the help of an employee of the enterprise. What should Steve do to ensure that the competitors are not able to access the confidential information stored on the web server ?

A implement security mechanisms to prevent social engineering .B implement password security mechanisms to restrict authorized users.C implement IDS techniques to restrict intruders.D implement security mechanisms to prevent strangers from entering the

enterprise premisesDap an: B

4 Blue valley consulting has recently set up a data center to provide data center services to its customers. The enterprise has appointed on - premises security officers in the enterprise in order to prevent strangers from entering the data center. Recently , the security officers have prevented a strangers from forcefully entering the premises of the data center. Due to this incident , the management has decided to implement additional

Page 20: Test 2.

physical security systems in the data center. The enterprise requires that these systems should automatically inform the security personnel if a resource in the data center is being moved by an employee without permission . the management has assigned the task of implementing the physical security systems to Jim , a security consultant. Which physical security system should Jim implement in the data center so that security requirements of the data center are met?

A electronic motion sensors .B Fingerprint authentication systemC voice authentication systemD security breach alarms

Dap an: A

5 . global systems, Inc is an enterprise threat provides various data center services ,such as co-cocation and web hosting , to its customers. Therefore , the enterprise needs to host the servers of its customers and store confidential data on the servers. The enterprise also needs ensure that customers are able to access the data stored on the server placed in the data center. In addition the enterprise needs to ensure that unauthorized users are not able to access confidential data when the data is a transferred to customers. Jim , the network administrator has placed server racks in the data center in order to host the server . Jim has implement SAN in the data center to allow customers to efficiently access data store on the server. Jim has also implemented authentication mechanisms to ensue that only customer can access the server place in the data center . however , the customer are complaining that their competitors have been able to access confidential data store on the server placed in the data center. What should Jim to do ensure that unauthorized users do not access confidential data store on the server ?

A: apply security measures , such as firewall and implement authentication by using pass wordsB: secure information related to status of users logged on to the enterprise network and encrypt the data access by customes C: apply security measures , such as firewalls and encrypt the data accessed by the customersD: secure information related to status users logged on to the enteprise network and implement authentication by using passwords

Dap an: D

Planning IT project 1. To estimate the effort, size, or cost of completing a project correctly, it is important to be aware of:

a. The project goal

b. The stakeholders

c. Completion date of the project

Page 21: Test 2.

d. Multiple tasks that comprise the project

Dap an: D

2. Which of the following is not required to create a WBS?

a. Brainstorm and identify a list of possible tasks

b. Refine the list of tasks and look for gaps

c. Categorize each task into appropriate task headers

d. Identify the stakeholders of the project

Dap an: B

3. The FP technique is used to calculate ...........................

a. The cost of the project

b. The size of the project

c. The effort required to complete the project

d. Number of modules into which the project should be broken down

Dap an: C

4. Which of the following is not a part of SLOC?

a. Delivered lines of code

b. Comments inserted to improve the readability of programs

c. Inputs, and outputs

d. Reports, screens and files

5. Which of the following type of projects is not considered by the basic COCOMO technique to calculate effort?

a. Organic

Page 22: Test 2.

b. Embedded

c. Semidetached

d. Datached

Dap an: D

6. Which of the following is true regarding Gantt chart?

a. It specifies the earliest of latest time of completion of an activity

b. It shows the critical path of a project

c. It shows the dependencies of the activities on other activities

d. It is easier to create and modify

Dap an: D

7. Which of the following is not used by PERT chart?

a. Optimistic time

b. Least likely time

c. Pessimistic time

d. Most likely time

Dap an: B

8. To calculate the earliest finish time, which way do you need to move along the schedule?

a. Right to left

b. Top on Bottom

c. Left to right

d. Bottom to top

Page 23: Test 2.

Dap an: D

9. To determine the critical path of a network, you identify the nodes where:

a. The EF time and the LF time are equal

b. The EF time is greater than the LF time

c. The EF time is less than the LF time

d. The EF time and the LF time zero

10. In a network schedule, the node where an activity begins is known as:

a. Start node

b. End node

c. Tail node

d. head node

Dap an: C

11. Which of the following is used for qualitative risk analysis?

a. Risk probability and impact

b. Sensitivity analysis

c. Decision tree analysis

d. Monte carlo simulation

Dap an: A

12. Which of the following is not used to identify risks?

a. Brainstorming

Page 24: Test 2.

b. Questionnaires

c. Checklists

d. Decision tree analysis

Dap an: D

13. Which of the following is used for quantitative risk analysis?

a. Risk probability and impact

b. Risk rating matrix

c. Interviewing

d. Data precision ranking

Dap an: C

14. Which of the following is a response that can happen to an identified risk?

a. Accept risk

b. Monitor risk

c. Create contingency plan

d. Brainstorm

Dap an: D

15. Which of the following is not a part of risk mitigation process?

a. Risk avoidance

b. Monte Carlo simulation

c. Contingency plan

Page 25: Test 2.

d. Risk monitoring

Dap an: B

16. Which of the following is not the principle to estimate project time?

a. Interdependence

b. Time and effort allocation

c. Validation Criteria

d. Identify the organizational baseline value for the metric

Dap an: D

17. Which of the following is not used for software estimation?

a. Effort metric

b. Cost metric

c. Time metric

d. Size metric

Dap an: C

18. Which of the following is not the guideline to estimate duration more precisely?

a. Estimating the productive hours per day

b. Determining the resources to be allocated to each activity

c. Factoring in unavailable workdays

d. Taking into consideration the resources that are not full time

Dap an: C

Page 26: Test 2.

19. Which of the following is a step to create a metric?

a. Calculating delays and lag times

b. Determining what work can be done simultaneously

c. Documenting all estimations in a metric

d. Review the metric for its usability

Dap an: D

20. Indentifying project trade-offs helps in:

a. Access the project feasibility in terms of duration

b. Strategizing Best Duration Reduction and its Trade-off

c. Determining the Best Trade-off to Satisfy Customer Requirments

d. Strategizing Best Risk Reduction and its Trade-offs

Dap an: C

initiating IT project

1. _______ is a disciplined and systematic approach that divides the software development process into carious phases.a. software project managementb. software development lifecyclec. feasibility analysis d. scope management processDap an: B

2. which phase deals with gathering, analyzing, validating, and specifying requirements?a. feasibility analysisb. requirement analysisc. designd. SDLCDap an: D

3. which of the following is not a primary constraint?

Page 27: Test 2.

a. resource b. technologicalc. behaviorald. timeDap an: C

4. ________ can be defined as the implementation of a range of activities for managing the development of a software project using software engineering practices effectively.a. software development b, feasibility analysisc. software project managementd. requirement analysisDap an: D

5. Which phase includes the tasks to implement changes that a software product might undergo over a period of time or implement new requirements after the software is deployed at the customer location?a. Requirement analysisb. testingc. maintenance d. designDap an: C

6. The ________ of a software project includes the functions the software is expected to perform, its performance criteria, and the constraints under which the software is developed.a. SDLCb. scopec. feasibility analysisd. requirements analysisDap an: C

7. which of the following constraints arises due to lack of facilities, aquipment, training, or skilled people during project development?a. timeb. behavioralc. technologicald. resourceDap an: D

8. Which of the following is the correct sequence of phases in the scope management process?

Page 28: Test 2.

a. initiation, planning, definition, change control, verificationb. initiation, planning, change control, definition, verificationc. initiation, definition, planning, change control, verificationd. initiation, planning, definition, verification, change controlDap an: D

9. ______ is the first document given by the customer and states the requirements, scope, and terms of the project.a. scope statementb. RFPc. contractd. SRSDap an: B

10. which of the following methodologies is used to translate the spoken and unspoken customer requirements into technical specifications?a. brainstorming b. context-free questionc. quality function deploymentd. interviewingDap an: B

1. Indentify the requirement elicitation technique in which various documents or formats maintained by an organization are gathered.a. root cause analysis b. document samplingc. background readingd. questionnairesDap an: A

2. ________ are the restrictions pertaining to the IT solution to be developed.a. product requirementsb. non-functional requirementsc. Functional requirementsd. process requirementsDap an: D

3. Indentify the requirements that do not depend on subjective judgment for interpretation.a. Functional requirementsb. non-functional requirementsc. explicit requirementsd. Implicit requirementsDap an: B

Page 29: Test 2.

4. the ___ section of the SRS document is used by the software developers to design, create, test, implement, and deliver a software product.a. appendixb. descriptionc. explicit requirementsd. specific requirementsDap an: C

5. ______ refers to the ability of the system to crosscheck information.a. reusability b. correctnessc. verifiability d. scalabilityDap an: C

6. the phases in a ______ model are linearly sequenceda. waterfall modelb. incremental modelc. spiral modeld. prototyping modelDap an: A

7.in which phase of the SDLC are the scope and basic objectives of a software project propounded?a. design phase b. analysis phasec. testing phased. coding phaseDap an: B

8. the ______ prototyping model uses the previous version of the prototyping design.a. reusable prototypingb. modular prototypingc. rapid prototypingd. design prototypingDap an: B

9. which software process model uses logical builds to describe the development cycle of a project?a. waterfall modelb. prototyping modelc. incremental model

Page 30: Test 2.

d. spiral modelDap an: D

10. in which software process model, phases follow each other in succession?a. waterfall modelb. prototyping modelc. incremental modeld. spiral modelDap an: A

executing and closing IT project

1, which of the following is the output of the performance reporting process?a. project planb. work resultsc. performance reportsd. project variancesDap an: C

2. meetings that are conducted to assess the project status and project progress are termed as _______a. performance reviewsb. earned value analysisc. variance analysisd. trend analysisDap an: A

3. the ____________________ presents a ratio between the work performed on a task and work scheduleda. cost performance indexb. schedule performance indexc. to-complete performance indexd. budget ad completionDap an: B

4. _______________ is a set of procedures through which the cost baseline of a project can be changed.a. schedule change control systemb. resource change control systemc. cost change control systemd. additional planningDap an: A

Page 31: Test 2.

5. which of the following changes is an example of change due to the external facto?a. stakeholders changeb. people changec. technology changed. budget changeDap an: A

6. ___________ refers to the cost of the project that was estimated at the very start of the projecta. budget at completionb. estimate at completionc. budget cost of work performedd. actual cost of work performedDap an: A

7. ____________ is the currently estimated project’s cost at completion and is evaluated in between the project when variances have already occurred to the project a. budget at completionb. estimate at completionc. budgeted cost of work performedd. actual cost of work performedDap an: C

8, which of the following should be established to evaluate a change request?a. change rework committeeb. change decision meetingc. change approval committeed. change review committeeDap an: B

9. which of the following procedures helps in proper in corporation of changes and orderly development of work products?a. performance analysisb. change controlc. variance analysisd. additional planningDap an: D

10. which of the following items in the change request form describes the priority level of the change?a. change descriptionb. change justificationc. change type

Page 32: Test 2.

d. change priorityDap an: A

advance system and Network management

1.Which of the following features of Enterprise Management enables management of the physical environment in an enterprise?

a. Patch deploymentb. Change managementc. Network managementd. Facilities managementDap an: C

2. Which of the following component of the network management architecture is used to monitor problems in routers?

a. Managed devicesb. Agentsc. Management protocolsd. Management entitiesDap an: A

3. Which of the following data types is a new inclusion in SNMP v2?a. ASN 1 data typesb. SMI specific data typesc. SNMP MIB tablesd. Bit stringsDap an: c

4. Which field of the SNMP version 3 message format provides support to control the processing of messages?

a. Msg IDb. Msg flafsc. Msg Scoped. Msg version

Dap an: A

5. Which of the following protocols provides built-in security features, such as authorization and access control?

a. SNMP version 1b. CMIPc. SNMP version 2d. RMONDap an: D

Page 33: Test 2.

6. Which feature of a data center provides round-the-clock technical support services?

a. Value added servicesb. Server housingc. Power optionsd. Proper MonitoringDap an: B

7. Which network technology implemented in a data center network involves data transmission by using electromagnetic waves?

a. IrDAb. Wi-Fic. Wi-Maxd. VSAT

Dap an: B

8. which feature of autonomic computing enables the autonomic computer system to detect and correct errors in the system without disrupting another application?

a. Self-healingb. Self-optimizingc. Self- protectingd. Self- configuringDap an: C

9. Which computing technique provides efficient services at low cost and reduces the Total cost of Ownership (TCO) for a data center?

a. Grid computingb. Cluster computingc. Utility computingd. Autonomic computingDap an: A

10. Which service of a data center provides security to the servers by using firewalls and Intrusion Detection Systems (IDS)?

a. Managed servicesb. Server hostingc. Dedicated hostingd. Load balancingDap an: B

11. Which of the following products of the Unicenter suite provides event correlation?

Page 34: Test 2.

a. Unicenter NetMaster Network Managementb. Unicenter NSM Network Performance Optionc. Unicenter NSM Wireless Network Management Optiond. Unicenter Advanced Network OperationsDap an: A

12. Which Enterprise Management tool provides the Exporter utility for fast retrieval of information from remote Windows-Based systems?

a. SiteScopeb. Dameware NT utilitiesc. WebNMd. Asset Tracker for NetworksDap an: D

13. Which of the following Enterprise Management tools does not require an agent to run on clients?

a. SiteScopeb. WebNMc. Dameware NT utilitiesd. Asset Tracker for NetworksDap an: D

14. Which Tivoli suite product performs root-cause analysis of problems related to the data link layer of the OSI Model?

a. Tivoli Switch Analyzerb. Tivoli Enterprise Consolec. Tivoli Storage Managerd. Tivoli NetviewDap an: A

15. Which of the following Enterprise managerment suites uses the TNG framework to perform systems managerment and network management tasks in an enterprise network?

a. Ca Unicenterb. HP Openviewc. IBM Tivolid. WebNMDap an: A

16. Which feature of SMS 2003 helps in identifying the software license requirements and the number of concurrent instances of the application in an enterprise network?

a. Software distributionb. Software meteringc. Asset management

Page 35: Test 2.

d. Software update managementDap an: B

17. Which site system role of SMS 2003 provides management information from the site server to legacy clients?

a. Distribution pointb. Client acces pointc. Component serverd. Site serverDap an: D

18. Which of the following aspects of the security environment act as an interface between SMS site database and servers by providing security to SMS servers and clients?

a. Physical Securityb. SQL Server Securityc. IIS securityd. WMI SecurityDap an: B

19. Which standard security mode account allows SMS 2003 services running on remote site systems to access the site server?

a. SMS service accountb. Site system connection accountc. SMS clients accountd. Server connection accountDap an: D

20. Which of the following accounts help run SMS services and allow SMS sites to access the SMS sites database?

a. Advanced security server accountsb. SNS clients accountsc. SNS database accountsd. Standard security server accountsDap an: B

21. Which of the following cable consists of pairs of twisted cables that are covered by a plastic sheath that protects the wires from electrical and magnetic interference?

a. UTP cableb. FTP cablec. Coaxial cabled. Fiber optic cableDap an: C

Page 36: Test 2.

22. Which of the following cables transmits data in the form of light within 50 to 100 micron diameter range?

a. Multimode cableb. Single mode cablec. CAT1 cabled. CAT3 cable

23. Which twister pair cable transmits voice and digital data at a speed of 100Mbps?a. CAT3b. CAT5c. CAT1d. CAT2Dap an: B

24. Which transparent bridge operation send the frame to all the computers connected to the bridge in an enterprise network?

a. Floodingb. Agingc. Forwardingd. LearningDap an: C

25. Which network connectivity device examines the destination address of a frame and forwards it to the destination address?

a. Switchesb. Routersc. Gatewaysd. HubsDap an: A

26. Which of the following radio waves support a frequency range of 3-30 Megahertza. VHFb. LFc. HFd. MF

Dap an: C

27. Which of the following type of communication involves waves traveling in all directions and passing through various media

Page 37: Test 2.

a. infrared communicationb. microwave communicationc. radio communicationd. Bluetooth communication

Dap an: C

28. which wireless technology connects computers across long distances and supports information broadcasting

a. VSATb. Wi-Fic. IrDAd. WiMAX

Dap an: D

29. Which of the following is a modulation technique that is used to generate waves for wireless LANs

a. IrDAb. OFDMc. VLANd. RFID

Dap an: D

30. Which technology enables active tags to transmit and receive data from a transpondera. Wi-Maxb. RFIDc. IrDAd. Wi-Fi

31. Which of the following SAN security mechanisms includes switch zoning a. LUN securityb. Hardware zoning c. Persitent bindingd. Software zoning

Dap an: D

32. Which application area of a SAN connects multiple server to each other to provide fault tolerance

a. storage consolidationb. data backup c. clusteringd. data interchange

Dap an: C

Page 38: Test 2.

33. which approach to secure LUN enable multiple hosts to access different LUNs using the same port

a. host softwareb. HBA utilitiesc. Switch zoning d. Storage controller mapping

Dap an: D

34. Which tool is used to manage the entire storage fabric of a SANa. IBM storWatch toolb. McDATA SANavigator toolc. Finisar’s Analyze toold. Finisar’s NetWisdom tool

Dap an: B

35. Which of the following tools easily integrates with the NetWisdom toola. McDATA SANavigator toolb. Finisar’s Analyze toolc. IBM StorWatch toold. IBM FAStT storage manager tool

Dap an: B

36. Which feature of NAS uses plug-and-play technology that enables network administrators to easily deploy NAS systems in an enterprise network

a. Scalabiltyb. Availabilityc. Remote managementd. Seamless integration

Dap an: A

37. Which component of a NAS system perform I/O processing taska. network interfaceb. Diskc. Consoled. Filer

Dap an: D

38. Which application area of NAS involves management of home directoriesa. Internet applicationb. Data consolidationc. Business applicationd. Database application

Dap an: B

39. Which of the following is an example of proprietary systems

Page 39: Test 2.

a. data onTapb. RAIDZONEc. SNAZ OSd. Windows 2000 SAK

40. Which of the following network interfaces decreases the latency of an enterprise network

a. 10 Mb ethernetb. 100 Mb ethernetc. Gigabit Ethernetd. Fast Ethernet

Dap an: C

41. Which virtualization tecnique consolidates multiple devices, such as hard disk and tape drivers, into a single unit

a. hardware virtualizationb. storage virtualizationc. server virtualizationd. network virtualization

Dap an: B

42. Which virtualization tecnique enables a computer to meet CPU requirements by borrowing CPU capacity from idle computers

a. hardware virtualizationb. storage virtualizationc. server virtualizationd. network virtualization

Dap an: C

43. which level of storage virtualization is used to consolidate physical attributes of storage devices, such as the data path , on an enterprise network

a. fabric levelb. server levelc. storage leveld. file level

Dap an: A

44. which type of virtualization places the virtualization software centrally between the data path of the server and the storage devices on an enterprise network

a. hardware virtualizationb. server virtualizationc. symmetrical virtualizationd. asymmetrical virtualization

Page 40: Test 2.

Dap an: C

45. which level of storege virtualization is used to map logical storage units to physical storage devices by using alr=gorithms

a. fabric levelb. server level c. storage leveld. file level

Dap an: C

46. which task of managing a virtual machine enable the network administrator to modifi thenumber of virtual machines displayed in the list

a. view the vitual machine configurationb. manage the state of the virtual machinec. view the status of avirtual machined. remove a virtual machine

Dap an: C

47. what is the minimum RAM capacity to install virtual server 2005 enterprise edition on a computer that is running on windows small business server 2003, premirum edition

a. 256 MB RAMb. 512 MB RAMc. 64 MB RAMd. 128 MB RAM

Dap an: B

48. Which of the following permission specifed in the virtual server security properties page enables users of groups to manage virtual server by using the access and COM interface

a. controlb. changec. fulld. modify

Dap an: A

49. which of the following is the default port for the administration WEBsitea. 5900b. 1024c. 137d. 138

Dap an: B

50. Which VHD stores a record of all the changes made to its parent disk without altering the parent disk

Page 41: Test 2.

a. differencing VHDb. Linked VHDc. Dynamically expanding VHDd. Fixed-size VHD

Dap an: A

1. which type of physical security in an enterprise is implemented by installing CCTV in the premises of an enterprise?a. electronic motion sensorsb. video surveillancec. security Breach Alarmd. Biometric security

2. which feature of security management involves data encryption that helps encode important data and application resources?a. resource availability b. resource integrityc. information confidentialityd. user authentication

3. which kind of physical security devices record and maintain vigilance of a specific accident-prone area in the enterprise premises?a. video surveillanceb. biometric securityc. security breach alarmd. electronic motion sensors

4. which type of security mechanism can be deployed by installing various security devices, such as firewalls and password authentication?a. physical securityb. information securityc. financial securityd. logical security

5. which security device is used to control the fire hazards within an enterprise?a. NOTIFY-IP alarmsb. equipment alarmsc. access point alarms d. panic button alarms

1. which Checkpoint NG with the AI suite tool enables the management of licenses?a. smart LSMb. smart Updatec. meta IPd. cluster XL

Page 42: Test 2.

2. which type of firewall is used to stop users of the enterprise network from accessing a specific website?a. HTTP proxy firewallb. SMTP prosy firewallc. FTP proxy firewallb. SOCKS proxy firewall

3. which security toll provides secure and scalable solutions for managing DNS and DHCP server?a. VPN1b. meta IPc. cluster XLd. smart Defense

4. which complimentary IDS tool simulates the working environment of the enterprise network?a. Vulnerability scannersb. file integrity checkersc. antivirusd. honey potsDap an: A

5. which IDS identifies attacks before they actually happen?a. interval based IDSb. real time IDSc. host-based IDSd. network-based IDS

wich…. part 1-2.doc

1. Which aspect of systems management specifies the time when additional resources will be required by the enterprise?

a. Disaster recoveryb. Capacity planningc. Facilities managementd. Storage management

Dap an: B

2. Which component of network management enables the maintenance of version related information?

Page 43: Test 2.

a. Configuration managementb. Accounting managementc. Fault managementd. Security management

Dap an: A3. Which of the following network management components can

consider the Network View tool as an example?a. Agent b. Managed entityc. Management console applicationd. Management console

Dap an: C4. Which of the following SMI specific data types can retain their

maximum value?a. Countersb. Gaugesc. Time ticksd. OpaquesDap an:B

5. Which of the following commands is not available with SNMP version 1?

a. GetBulkb. Getc. Setd. TrapDap an: A

6. Which features of a data center involves providing round-the-clock technical support services to solve system related problems?

a. Server housingb. Access control and securityc. Value added servicesd. Data backup and restore

Dap an: C

Page 44: Test 2.

7. Which of the following sections of a data center enables network administrators to hide the complexity of the wired networks in the data center?

a. Network operations centerb. Reception lobbyc. Raised floor basementd. Managed server roomDap an: C

8. Which managed service enables multiple servers in a data center to efficiently perform computational and database management tasks?

a. Data backupb. Load balancingc. Database administrationd. System administrationDap an: B

9. Which networking technology enables network administrators to efficiently manage the traffic across a network?

a. VLANb. VSATc. Transparent bridgingd. Wi-MaxDap an: A

10. Which type of virtualization involves emulating the operating system of a computer?

a. Storage resource virtualizationb. Computer memory virtualizationc. Server resources virtualizationd. Computer hardware virtualizationDap an: D

11. Which product of the Unicenter suite enables network administrators to monitor Access Points?

a. Unicenter Advanced Network Operationsb. Unicenter NetMaster Network Management for TCP/IP

Page 45: Test 2.

c. Unicenter Network and Systems Management Network Performance Option

d. Unicenter Network and Systems Management Wireless Network Management Option

Dap an: D

12. Which component of the Tivoli suite architecture represents an initial interface for systems management?

a. Tivoli serverb. Managed nodec. Gatewayd. Endpoint

Dap an: D

13. Which tool enhances the efficiency of an enterprise network by verifying the status of network devices through target polling and automated actions?

a. NetViewb. Network Node Managerc. Switch Analyzerd. ReporterDap an: B

14. Which of the following is primarily used to audit the hardware and software components installed on computers is an enterprise?

a. SiteScopeb. DameWare NT Utilitiesc. Asset Tracker for Networks d. OpenViewDap an: C

15. Which feature of SMS 2003 enables a network administrator to identify software applications and the users associated with each application?

a. Software distributionb. Software update managementc. Software metering

Page 46: Test 2.

d. Asset managementDap an: C

16. Which site system role enables network administrators to install both Ledacy and Advanced Clients on SMS client computers?

a. Distribution pointb. Management pointc. Server locator pointd. Client access pointDap an: C

17. Which standard security server account enables a network administrator to run SMS site system services?

a. Site system connection accountb. Remote service accountc. SMS service accountd. Server connection accountDap an: B

18. Which SMS account is used to create operating system objects, such as files and directories, on a site server?

a. Advanced security server accountb. Standard security server accountc. SMS Client accountd. SMS Database accountDap an: B

19. Which SMS monitoring resource enables a network administrator to effectively monitor site in an enterprise network by configuring its various optional settings?

a. Network diagnostic toolsb. SMS log filesc. SMS status systemd. SMS recovery and repair toolsDap an: C

Page 47: Test 2.

20. Which type of cable is best suited to implement basic voice based telephony in a small region?

a. CAT 1b. CAT 3c. CAT 5d. CAT 6Dap an: A

21. Which type of cable is used to transmit video signals of the cable television to homes?

a. UTPb. Twisted Pairc. Coaxiald. CAT 1Dap an: C

22. Which of the following cables use optical technology for data transmission?

a. Single modeb. Coaxial cablec. CAT1 cabled. CAT3 cableDap an: A

23. Which of the following operations is used to fill the address lookup table in a Transparent bridge?

a. Learningb. Floodingc. Agingd. ForwardingDap an: A

24. Which connection device is used to examine and forward the frames to a single appropriate destination computer?

a. Switchb. Bridge c. Router

Page 48: Test 2.

d. HubDap an: A

25. Which of the following radio waves has a frequently range of 30-300 Megahertz?

a. LFb. MFc. HFd. VHFDap an: D

26. Which of the following frequently waves travels in straight lines and are easily focused in a narrow straight beam?

a. 1 Gigahertzb. 10 Megahertzc. 100 Hertzd. 100 KilohertzDap an: A

27. Which of the following waves are used in remote controls of television and other electronic devices?

a. VHF radio wavesb. HF radio wavesc. Microwavesd. Infrared wavesDap an: D

28. Which of the following technology uses satellites for digital data transmission?

a. Wifib. WiMaxc. Ethernetd. VSATDap an: D

29. Which of the following technologies is used in mobile phones for transferring data to desktop computer?

Page 49: Test 2.

a. Bluetoothb. Ethernetc. Token ringd. VSATDap an: A

30. Which feature of SAN enables multiple servers to concurrently access a single file?

a. High bandwidthb. Data sharing c. Data Interchanged. Global available storage

Dap an: B

31. What is the maximum number of servers and storage devices that can be connected in a single loop by using the arbitrated loop technology?

a. 16b. 8c. 128d. 126Dap an: D

32. Which of the following LUN security approach uses drivers for LUN masking?

a. HBA utilitiesb. Host softwarec. Switch zoningd. Storage controller mappingDap an: A

33. Which of the following SAN performance optimization tasks is performed by network administrators by using the NetWisdom tool?

a. Planningb. Monitoringc. Analyzingd. Tuning

Page 50: Test 2.

Dap an: B

34. Which of the following is an advantage of using client-free backups?

a. Enables network administrators to recover data instantly from backup mirror when the primary disk set becomes corrupt

b. Improves the speed of backup and recovery operations because data is directly transferred from the disk set to tape drives

c. Enables application to run efficiently on the servers by using the server resources. This is because server resources are not used in performing backup and recovery operations

d. Does not require additional servers to manage the backup and recovery operations

Dap an: A

35. Which feature of NAS involves using the server-to-server mirroring technique to protect permanent loss of data stored on NAS devices?

a. Scalabilityb. Remote managementc. Low TCOd. Availability Dap an: D

36. Which benefit provided by NAS helps network administrators to implement Internet applications?

a. Quick learningb. Central storagec. Ease of setupd. Management of home directoriesDap an: A

37. Which configuration interface should a network administrator use to securely execute commands on a system?

a. Rsh

Page 51: Test 2.

b. Sshc. Consoled. CLIDap an: B

38. Which of the following data migration techniques involves mounting and unmounting disk volumes to transfer data?

a. NDMP copyb. Network Appliance SnapMirrorc. EMC Celerra data moversd. EMC Celerra Time Finder/FSDap an: C

39. Which tool enables network administrators to automatically discover NAS devices in an enterprise network?

a. EMC tool enables network administrators to automatically discover NAS devices in an enterprise network?

b. Network Appliance DFMc. NetMond. EtherealDap an: B

40. Which backup and recovery technique requires network administrators to shut down applications, which were using the disk that failed while the applications were accessing the files?

a. Snapshotsb. Server-to-Server mirroringc. NFS/CIFSd. NDMP

Dap an: A

41. Which virtualization technique helps to combine resources by splitting the available bandwidth into channels, each of which is assigned to an individual server of an enterprise network?

Page 52: Test 2.

a. Hardware virtualizationb. Network virtualizationc. Storage virtualizationd. Server virtualizationDap an: B

42. Which virtualization technique enables an application to execute on multiple hardware platforms, such as Windows, Macintosh, and UNIX

a. Hardware virtualizationb. Network virtualizationc. Storage virtualizationd. Symmetrical virtualizationDap an: A

43. Which level of storage virtualization enables network administrators to control and access physical attributes of a network, such as QOS, cost, and latency?

a. Server level storage virtualizationb. Fabric level storage virtualizationc. Storage level storage virtualizationd. File system level storage virtualizationDap an: B

44. Which model has the virtualization engine located outside the data path between the storage servers and storage devices of an enterprise network?

a. Asymmetrical storage virtualizationb. Symmetrical storage virtualizationc. Server level storage virtualizationd. Fabric level storage virtualizationDap an: A

45. Which virtualization technique enables multiple operating systems to run a single computer by separating each server logically from the other?

a. Hardware virtualization

Page 53: Test 2.

b. Network virtualizationc. Storage virtualizationd. Server virtualizationDap an: D

46. Which of the following enables the network administrators to secure the configuration and resource files of Virtual Server 2005?

a. COMb. VMRCc. VHDd. DACLDap an: D

47. What is the minimum RAM capacity required to install Virtual Server 2005 on a Windows Server 2003, Standard Edition?

a. 256 MBb. 512 MBc. 64 MBd. 128 MBDap an: A

48. Which property of Administration Website specifies the number of virtual machines to be displayed on the Status section of Administration Website?

a. Auto-refresh rateb. Master status viewc. Virtual Machine Remote Control properties d. Virtual Server manager search pathsDap an: B

49. Which property should network administrators use to modify the state of the virtual machine?

a. User nameb. User account on virtual machinec. Action when Virtual Machine Service is stoppedd. File associated with Virtual machineDap an: C

Page 54: Test 2.

50. What is the default size of a dynamically expanding virtual hard disk?

a. 2 GBb. 4 GBc. 10 GBd. 16 GBDap an: D

51. Which of following is the reason of uncontrolled resource unavailability?

a. Software installationb. Software upgradationc. Software maintenanced. Software failureDap an: D

52. Which of the following is the reason of controlled resource availability?

a. Virus attacksb. Password hackingc. Server upggradationd. Hardware theftsDap an: C

53. Which of the following is physical security mechanism?a. Close circuit television camerab. Anti virusc. IDSd. Password authentication systemDap an: A

54. Which role of the on- premises security officers involves noting unusual activity within the enterprise premises and taking appropriate action after detecting the unusual activity ?

a. Record maintenance representativeb. Enforcement agents

Page 55: Test 2.

c. Intelligence agentsd. Assistance and information booth representativeDap an: C

55. What kind of physical security in an enterprise is implemented by installing close circuit in its premises?

a. Electronic Motion Sensorsb. Biometric Securityc. Security Breach Alarm d. Video SurveillanceDap an: D

56. Chris is working as a Network administrator in Red Sky IT Systems. He has been assigned the task of protecting the internal network of the enterprise from unauthorized access .He also needs to restrict the users from accessing illegal sites. Which of the following security system should Chris use to perform these operation?

a. IDSb. Packet filteringc. Proxy serverd. Stateful inspectionDap an: C

57. Which of the following tools is used to implement client-end authentication mechanism for VPN?

a. VPN1/Firewall1b. Smart Updatec. SecuRemote VPNsd. SecureClientDap an: D

58. Which of the following tools is used to define and implement a global security policy for an enterprise network and distribute this policy among various computers?

a. SecureClientb. SmartUpdate

Page 56: Test 2.

c. SmartDefensed. SmartLSM

Dap an: D

59. Which of the following authentication schemes uses the randomly generated and one time usable passwords?

a. OS Passwordb. TACACSc. SecurIDd. RADIUSDap an: C

60. Which of the following tools enables the customers to configure, enforce, and update enterprise network security against various types of security attacks?

a. SecureClientb. SmartUpdatec. SecuRemote VPNsd. SmartDefense

Dap an: D