Day: August 27, 2016

CheckPoint 156-510 Exam Tests, Useful CheckPoint 156-510 Exam Download Is Your Best ChoiceCheckPoint 156-510 Exam Tests, Useful CheckPoint 156-510 Exam Download Is Your Best Choice

FLYDUMPS ensures the quality and value of the CheckPoint 156-510 exam sample questions, and one hundred percent pass the exam, let you can pass the CheckPoint 156-510 exam successfully in your first studying. In addition, Killtest provide you with high-quality CheckPoint 156-510exam sample questions to help you learn more about the CheckPoint 156-510 examination of information, learning more knowledge of the entire examination, complete your dream of entering the IT Dream. FLYDUMPS CheckPoint 156-510 exam sample questions are based on the actual template of CheckPoint 156-510 Exam. You will learn all the tactics and techniques in FLYDUMPS CheckPoint 156-510 exam sample questions.

QUESTION 127
What is the name of the traffic capture tool that is available on Unix platforms?
A. Network monitor
B. Snoop
C. Sniffer
D. Tcpdump
Correct Answer: B
QUESTION 128
When initially setting up high availability, where would you enable the high availability services?
A. The cpconfig utility
B. The fwstart script
C. The management server global properties screen
D. The gateway cluster properties screen
Correct Answer: A
QUESTION 129
What is true about hardening the operating system of a firewall gateway?
A. It is only necessary on a Solaris platform
B. It is necessary on both Solaris and NT platforms
C. It is not necessary
D. It is only necessary on an NT platform

Correct Answer: B QUESTION 130
What command would you use to initiate a packet capture on a Unix machine?
A. snoop -o filename
B. tcpdump -i filename
C. snoop -i filename
D. tcpdump -o filename

Correct Answer: A QUESTION 131
If you use the -a option in the “fw dbexport” command to export a subset of the possible user attributes. What happens if you import the exported file back into the FW-1 user database using the “fw import” command?
A. The database is merged with the subset database
B. You will get a warning, stating that you may delete part of your database
C. The process will error with no change to the original database
D. The database is overwritten with the subset database

Correct Answer: D QUESTION 132
How do you remake a connection between a management server and a firewall module, if not using backward compatibility?
A. Reboot
B. Bounce the management server
C. Remake the SIC connection
D. Remake the putkey association

Correct Answer: C QUESTION 133
What is true about the following command? snoop -i filename | more
A. The file named “filename” contains raw captured traffic
B. It analyses captured traffic
C. It will continue the display until it ends
D. It captures traffic

Correct Answer: AB QUESTION 134
When configuring automatic synchronization for HA management modules, which is NOT a valid trigger for the synchronization to take place?
A. When the policy is installed
B. When the policy is saved
C. Regularly after a specified period
D. When you log off the GUI client

Correct Answer: D
QUESTION 135
To create synchronization between gateways in NG, which file do you need to edit?
A. conf.sync
B. sync.conf
C. None
D. rulebases.fws

Correct Answer: C
QUESTION 136
When a primary gateway cluster member fails another will take over. When the primary recovers what is true?
A. The action depends on the configuration of the ClusterXL screen of the cluster properties
B. The primary always resumes primary function
C. The action depends on the configuration of the Cluster member gateway general properties
D. The primary will become a lower priority and not resume its primary function

Correct Answer: A
QUESTION 137
When exporting a checkpoint user database for importation to an LDAP server, what format should the output file take?
A. LDAP
B. Binary
C. LDIF
D. HTTP
Correct Answer: C
QUESTION 138
Which of the following are termed CPMAD global parameters?
A. MAD_Memory
B. MAD_syn_attack_action
C. MAD_number_of_connection_attempts
D. MAD_anti_spoofing_mode AC
Correct Answer: AC
QUESTION 139
What is true about the effects of configuring a high MAD_clean_interval in CPMAD?
A. It reduces CPU utilization
B. It increases CPU utilization
C. It decreases memory usage
D. It increases memory usage

Correct Answer: AD QUESTION 140
What is the meaning of the “collision” status when seen against a secondary management module?
A. Synchronization was attempted from both primary and secondary at the same time
B. The primary management module database lags behind the secondary
C. Both the primary and secondary management module have independently updated databases since the last synchronization
D. Synchronization has failed due to network problems

Correct Answer: C QUESTION 141
If you want to use information from a cpinfo file produced by a Windows platform, you first need to perform a series of operations to extract the file concerned. True or false?
A. False
B. True

Correct Answer: A QUESTION 142
What command would you use on a Solaris machine to increase the amount of memory allocated to the kernel to approximately 16Mbytes?
A. set fw:fwhmem=0x16
B. set fw:fwhmem=0x10
C. set fw:fwhmem=0x1000000
D. set fw:fwhmem=0x16000000

Correct Answer: C QUESTION 143
How would you specify the primary member of a gateway cluster?
A. On the gateway cluster properties screen select “cluster members”, then arrange priority sequence using the increase and decrease priority buttons
B. On the gateway cluster properties screen select “cluster members”, then select priority number (1 is the highest)
C. On the member gateway properties general screen arrange priority sequence using the increase and decrease priority buttons
D. On the member gateway properties general screen select priority number (1 is the highest)

Correct Answer: A QUESTION 144
Which debug option will gather information regarding the accept or drop action performed on traffic?
A. ioctl
B. packet
C. driver
D. kbuf

Correct Answer: B QUESTION 145
Which of the following files is held on a management module and cotains the whole rulebase?
A. rulebases_5_0.C
B. objects.C
C. objects_5_0.C
D. rulebases_5_0.fws

Correct Answer: D
QUESTION 146
In the peer status area of the high availability management module screen of the active server, there are defined status levels that can apply to a peer module. Which status implies that a secondary module has a later version of the database than the primary?
A. Advanced
B. Lagging
C. Collision
D. Never Synchronized

Correct Answer: A
QUESTION 147
On a Windows platform, you can enable VPN and IKE logging by setting an environment variable. What is the command to do that?
A. Setenv VPN_DEBUG 1
B. Setenv VPN_DEBUG 0
C. Set VPN_DEBUG=0
D. Set VPN_DEBUG=1

Correct Answer: D
QUESTION 148
To configure a fully overlapping encryption domain, what type of group(s) do you need to configure?
A. A group containing both gateways and all the networks they protect
B. A group containing both gateways only
C. A group containing all the networks that both gateways protect
D. Two groups, one containing both gateways and the networks that one protects. The other containing both gateways and the networks the other protects.

Correct Answer: A
QUESTION 149
What is the approximate memory requirement of a simple (I.e. not authenticated or encrypted) connection in VPN-1/FW-1?
A. 3 Kbytes
B. 70 bytes
C. 10 bytes
D. 1 Kbytes

Correct Answer: B
QUESTION 150
If you want to run the cpinfo utility to gather diagnostic information for a problematic enforcement module in a distributed system, what is true?
A. You should run cpinfo on the enforcement module only
B. You should run cpinfo on all the modules in the distributed system
C. You should run cpinfo on both the management and enforcement modules
D. You should run cpinfo on the management module only

Correct Answer: C QUESTION 151
Which two types of overlapping encryption domains are supported by FW-1?
A. Partial overlap
B. Full overlap
C. Proper subset
D. Partial subset

Correct Answer: BC QUESTION 152
Which is NOT a valid log file maintained on the SecuRemote client?
A. sr_watchdog_tde.log
B. sr_service_<serial number>.log
C. sr_background_tde.log
D. sr_gui_tde.log

Correct Answer: C QUESTION 153
Which debug option will gather information about input/output control messages, such as loading of FW-1 or kernel to daemon communications?
A. kbuf
B. ioctl
C. misc
D. driver

Correct Answer: B QUESTION 154
It is not possible to use two gateways running a standalone installation in an MEP environment. True or false?
A. False
B. True

Correct Answer: B QUESTION 155
How would you use a policy editor gui in local mode when using FW-1 NG FP-2?
A. Enter *local in the “management server” box of the GUI login screen
B. Check the “demo mode” box of the GUI login screen
C. Enter demo_mode in the “management server” box of the GUI login screen
D. Enter *local in the “user name” box of the GUI login screen

Correct Answer: AB QUESTION 156
How would you restart CPMAD on a firewall?
A. $FWDIR/conf/fwstart
B. $FWDIR/bin/cpmad
C. $FWDIR/cpmad/fwstart
D. $FWDIR/bin/fwstart

Correct Answer: D QUESTION 157
What is used by FW-1 to create a SIC certificate?
A. External CA
B. Putkey
C. LDAP
D. Internal CA

Correct Answer: D QUESTION 158
How would you find more information about the “fw tab” options?
A. fw tab help
B. fw tab -h
C. fw tab -?
D. fw tab options -h

Correct Answer: B QUESTION 159
What is contained in the rulebases.fws file?
A. Auditing information
B. All rulebases
C. All rulebases plus auditing information
D. Only the rulebase from the last load

Correct Answer: B QUESTION 160
When using management high availability, you can synchronize from the primary or secondary management server. True or false?
A. False
B. True

Correct Answer: A QUESTION 161
On a SecuRemote client, in which directory are the log files located?
A. $CPDIR/log
B. $SCDIR/log
C. $SRDIR/log
D. $FWDIR/log

Correct Answer: C QUESTION 162
If you were having problems with a CVP server, you may want to capture traffic to and from the server. What could you do to get this information?
A. Run “fw monitor” for port 18182 on the interface connected to the management server
B. Run “fw monitor” for port 18182 on the interface connected to the CVP server
C. Run “fw monitor” for port 18181 on the interface connected to the management server
D. Run “fw monitor” for port 18181 on the interface connected to the CVP server

Correct Answer: D
QUESTION 163
When using backward compatibility, what is true?
A. It restricts inter-module communications to the putkey method
B. It allows the management of 4.1 gateways
C. It restricts inter-module communication to the SIC method
D. It allows the use of the old putkey function

Correct Answer: BD
QUESTION 164
Why would you disable NetBEUI on a FW-1 Windows Platform?
A. It can cause FW-1 to crash
B. It clashes with internal FW-1 protocols
C. It is an inefficient protocol
D. It is a security risk
Correct Answer: D
QUESTION 165
What does “resolver_ttl” do in relation to SecuRemote configuration?
A. Specifies the interval in seconds between RDP status queries
B. Specifies that RDP status queries are sent automatically
C. Specifies the number of seconds that a Securemote client waits for a reply to a RDP status query
D. Controls the time to live when accessing a DNS server
Correct Answer: C

By the use of CheckPoint 156-510 exam sample questions along with most relevant CheckPoint 156-510 questions and answers as they are an ideal study tool to pass CheckPoint 156-510 test in very first try. FLYDUMPS CheckPoint 156-510 exam sample questions are developed by our team of IT experts. Send us a scanned copy of your failed exam and we will promptly proceed to refund. The last package which is certainly not the least but a royal pack, which can give you full preparation on the subject and provide you 100 per cent guarantee of clearing the CheckPoint 156-510 exam sample questions. We are all well aware that a major problem in the IT industry is that there is a lack of quality questions answers.

Checkpoint 156-215 Dumps, First-hand Checkpoint 156-215 Exam Online ShopCheckpoint 156-215 Dumps, First-hand Checkpoint 156-215 Exam Online Shop

Not only will you be given theoretical, but also given practical labs which will give you even more practice than before. Our site offers you a comprehensive look at the best prospects available in Checkpoint 156-215 exam sample questions throughout the Industry. The Checkpoint 156-215 exam sample questions offered by FLYDUMPS is very comprehensive and covers all exam questions that need to be covered to pass the Checkpoint 156-215 exam. Professionals and experts at FLYDUMPS are very dedicated and they prepare Checkpoint 156-215 exam sample questions with great effort. In our Checkpoint 156-215 exam sample questions you will the accurate and up-to-date information.

QUESTION 119
You create implicit and explicit rules for the following network. The group object “internal-networks” include networks 10.10.10.0 and 10.10.20.0. Assume “Accept ICMP requests” is enabled as before last in the Global Properties.

Based on these rules, what happens if you Ping from host 10.10.10.5 to a host on the Internet, by IP address? ICMP will be:
A. dropped by rule 0
B. dropped by rule 2, the Cleanup Rule
C. accepted by rule 1
D. dropped by the last implicit rule
E. accepted by the implicit rule

Correct Answer: C
QUESTION 120
What does schema checking do?
A. Authenticates users attempting to access resources protected by an NGX Security Gateway.
B. Verifies that every object class, and its associated attributes, is defined in the directory schema.
C. Maps LDAP objects to objects in the NGX objects_5_0.c files.
D. Verifies the Certificate Revocation List for Certificate Validity.
E. Provides topology downloads for SecuRemote and SecureClient users authenticated by an LDAP server.

Correct Answer: B
QUESTION 121
Jill is about to test some rule and object changes suggested in an NGX newsgroup. Which backup and restore solution should Jill use, to ensure she can most easily restore her Security Policy to its previous configuration, after testing the changes?
A. SecurePlatform backup utilities
B. Manual copies of the $FWDIR/conf directory
C. Upgrade_export and upgrade_import commands
D. Policy Package management
E. Database Revision Control

Correct Answer: E
QUESTION 122
You want VPN traffic to match packets from internal interfaces. You also want the traffic to exit the Security Gateway, bound for all site-to-site VPN Communities, including Remote Access Communities. How should you configure the VPN match rule
A. internalclear>All-GwToGw
B. Communities>Communities
C. Internalclear>ExternalClear
D. Internalclear>Communities
E. Internalclear>Allcommunities

Correct Answer: E
QUESTION 123
Review the following rules and note the Client Authentication Action properties screen, as shown in the
exhibit.
After being authenticated by the Security Gateway when a user starts an HTTP connection to a Web site
the user tries to FTP to another site using the command line. What happens to the user?
The….

A. FTP session is dropprd by the implicit Cleanup Rule.
B. User is prompted from the FTP site only, and does not need to enter username nad password for the Client Authentication.
C. FTP connection is dropped by rule 2.
D. FTP data connection is dropped, after the user is authenticated successfully.
E. User is prompted for authentication by the Security Gateway again.

Correct Answer: B
QUESTION 124
What is the command to see the licenses of the Security Gateway Certkiller from your SmartCenter Server?
A. print Certkiller
B. fw licprint Certkiller
C. fw tab -t fwlic Certkiller
D. cplic print Certkiller
E. fw lic print Certkiller
Correct Answer: D
QUESTION 125
Ophelia is the security Administrator for a shipping company. Her company uses a custom application to update the distribution database. The custom application includes a service used only to notify remote sites that the distribution database is malfunctioning. The perimeter Security Gateways Rule Base includes a rule to accept this traffic. Ophelia needs to be notified, via atext message to her cellular phone, whenever traffic is accepted on this rule. Which of the following options is MOST appropriate for Ophelia’s requirement?
A. User-defined alert script
B. Logging implied rules
C. SmartViewMonitor
D. Pop-up API
E. SNMP trap

Correct Answer: A
QUESTION 126
Which of the following is the final step in an NGXbackup?
A. Test restoration in a non-production environment, using the upgradeimport command
B. Move the *.tgz file to another location
C. Run the upgradeexport command
D. Copy the conf directory to another location
E. Run the cpstop command

Correct Answer: B
QUESTION 127
Which mechanism is used to export Check Point logs to third party applications?
A. OPSE
B. CPLogManager
C. LEA
D. SmartViewTracker
E. ELA

Correct Answer: C
QUESTION 128
In NGX, what happens if a Distinguished Name (ON) is NOT found in LADP?
A. NGX takes the common-name value from the Certificate subject, and searches the LADP account unit for a matching user id
B. NGX searches the internal database for the username
C. The Security Gateway uses the subject of the Certificate as the ON for the initial lookup
D. If the first request fails or if branches do not match, NGX tries to map the identity to the user id attribute
E. When users authenticate with valid Certificates, the Security Gateway tries to map the identities with users registered in the extemal LADP user database
Correct Answer: D
QUESTION 129
Which command allows you to view the contents of an NGX table?
A. fw tab -s <tablename>-
B. fw tab -t <tablename>-
C. fw tab -u <tablename>-
D. fw tab -a <tablename>-
E. fw tab -x <tablename>-

Correct Answer: B QUESTION 130
The following is cphaprobstate command output from a New Mode High Availability cluster member:

Which machine has the highest priority?
A. 192.168.1.2,since its number is 2
B. 192.168.1.1,because its number is 1
C. This output does not indicate which machine has the highest priority
D. 192.168.1.2, because its state is active

Correct Answer: B
QUESTION 131
What do you use to view an NGX Security Gateway’s status, including CPU use, amount of virtual memory, percent of free hard-disk space, and version?
A. SmartLSM
B. SmartViewTracker
C. SmartUpdate
D. SmartViewMonitor
E. SmartViewStatus

Correct Answer: D
QUESTION 132
Which of the following commands is used to restore NGX configuration information?
A. cpcontig
B. cpinfo-i
C. restore
D. fwm dbimport
E. upgradeimport

Correct Answer: E
QUESTION 133
Which of the following commands shows full synchronizalion status?
A. cphaprob -i list
B. cphastop
C. fw ctl pstat
D. cphaprob -a if
E. fw hastat
Correct Answer: C
QUESTION 134
Which VPN Community object is used to configure VPN routing within the SmartDashboard?
A. Star
B. Mesh
C. Remote Access
D. Map

Correct Answer: A
QUESTION 135
If you are experiencing LDAP issues, which of the following should you check?
A. Secure lnternal Cornrnunicalions(SIC)
B. VPN tunneling
C. Overlapping VPN Domains
D. NGX connectivity
E. VPN Load Balancing

Correct Answer: D
QUESTION 136
Which operating system is not supported byVPN-1 SecureClient?
A. IPS0 3.9
B. Windows XP SP2
C. Windows 2000 Professional
D. RedHat Linux 7 0
E. MacOS X

Correct Answer: A
QUESTION 137
Which Check Point QoS feature issued to dynamically allocate relative portions of available bandwidth?
A. Guarantees
B. Differentiated Services
C. Limits
D. Weighted Fair Queueing
E. Low Latency Queueinq

Correct Answer: D
QUESTION 138
You are running a VPN-1 NG with Application Intelligence R54 SecurePlatform VPN-1 Pro Gateway. The Gateway also serves as a Policy Server. When you run patch add cd from the NGX CD, what does this command allow you to upgrade?
A. Only VPN-1 Pro Security Gateway
B. Both the operating system (OS) and all Check Point products
C. All products, except the Policy Server
D. On~ the patch utility is upgraded using this command
E. Only the OS

Correct Answer: B
QUESTION 139
Amanda is compiling traffic statistics for Certkiller .com’s Internet activity during production hours. How could she use SmartView Monitor to find this information? By
A. using the “Traffic Counters” settings and SmartView Monitor to generate a graph showing the total HTTP traffic for the day
B. -monitoring each specific user’s Web traffic use.
C. Viewing total packets passed through the Security Gateway
D. selecting the “Tunnels” view, and generating a report on the statistics
E. configuring a Suspicious Activity Rule which triggers an alert when HTTP traffic passes through the Gateway

Correct Answer: A
QUESTION 140
Certkiller is the Security Administrator for a software-development company. To isolate the corporate network from the developer’s network, Certkiller installs an internal Security Gateway. Jack wants to optimize the performance of this Gateway. Which of the following actions is most likely to improve the Gateway’s performance?
A. Remove unused Security Policies from Policy Packages
B. Clear all Global Properties check boxes, and use explicit rules
C. Use groups within groups in the manual NAT Rule Base
D. Put the least-used rules at the top of the Rule Base
E. Use domain objects in rules, where possible

Correct Answer: A
QUESTION 141
Certkiller is the Security Administrator for a chain of grocery stores. Each grocery store is protected by a Security Gateway. Certkiller is generating a report for the information-technology audit department. The report must include the name of the Security Policy installed on each remote Security Gateway, the date and time the Security Policy was installed, and general performance statistics (CPU Use, average CPU time, active real memory, etc.). Which SmartConsole application should Certkiller use to gather this information?
A. SmartUpdate
B. SmartView Status
C. SmartView Tracker
D. SmartLSM
E. SmartView Monitor

Correct Answer: E
QUESTION 142
How can you reset Secure Internal Communications (SIC) between a SmartCenter Server and Security Gateway?
A. Run the command fwm sicreset to reinitialize the Internal Certificate Authority (ICA) of the SmartCenter Server. Then retype the activation key on the Security-Gateway from SmartDashboard
B. From cpconfig on the SmartCenter Server, choose the Secure Internal Communication option and retype the actrvation key Next, retype the same key in the gateway object in SmartDashboard and reinitialize Secure Internal Communications (SIC)
C. From the SmartCenter Server’s command line type fw putkey -p <shared key>- <IP Address of SmartCenter Server>-.
D. From the SmartCenter Server’s command line type fw putkey -p <shared key>- <IP Address of security Gateway>-.
E. Re-install the Security Gateway
Correct Answer: B QUESTION 143
Which NGX feature or command allows Security Administrators to revert to earlier versions of the Security Policy without changing object configurations?
A. upgradeexport/upgradeimport
B. Policy Package management
C. fwm dbexport/fwm dbimport
D. cpconfig
E. Database Revision Control

Correct Answer: B
QUESTION 144
Certkiller is the Security Administrator for Certkiller .com’s large geographically distributed network. The internet connection at one of her remote sites failed during the weekend, and the Security Gateway logged locally for over 48 hours. Certkiller is concerned that the logs may have consumed most of the free space on the Gateway’s hard disk. Which SmartConsole application should Certkiller use, to view the percent of free hard-disk space on the remote Security Gateway?
A. SmartView Status
B. SmartView Tracker
C. SmartUpdate
D. SmartView Monitor
E. SmartLSM

Correct Answer: D
QUESTION 145
Certkiller is recently hired as the Security Administrator for a public relations company. Certkiller’s manager has asked her to investigate ways to improve the performance of the firm’s perimeter Security Gateway. Certkiller must propose a plan based on the following required and desired results Required Result #1: Do not purchase new hardware Required Result #2: Use configuration changes that do not reduce security Desired Result #1: Reduce the number of explicit rules in the Rule Base Desired Result #2: Reduce the volume of logs Desired Result #3: Improve the Gateway’s performance Proposed Solution: Certkiller recommends the following changes to the Gateway’s configuration:
1.
Replace all domain objects with network and group objects.

2.
Stop logging Domain Name over UDP (queries)

3.
Use Global Properties, instead of explicit rules, to control ICMP. VRRP, and RIP. Does Certkiller’s proposed solution meet the required and desired result s?
A. The solution meets the required results, and two of the desired results
B. The solution does not meet the required results
C. The solution meets all required results, and none of the desired results
D. The solution meets all required and desired results
E. The solution meets the required results, and one of the desired results
Correct Answer: A
QUESTION 146
What is a Consolidation Policy?
A. The collective name of the Security Policy, Address Translation, and SmartDefense Policies
B. The specific Policy used by Eventia Reporter to configure log-management practices
C. The state of the Policy once installed on a Security Gateway
D. A Policy created by Eventia Reporter to generate logs
E. The collective name of the logs generated by Eventia Reporter

Correct Answer: B
QUESTION 147
To change an existing ClusterXL cluster object from Multicast to Unicast mode, what configuration change must be made?
A. Change the cluster mode to Unicast on the cluster object Reinstall the Security Policy
B. Reset Secure Internal Communications (SIC) on the cluster-member objects. Reinstall the Security Policy
C. Run cpstop and cpstart, to reenable High Availability on both objects. Select Pivot mode in cpconfig
D. Change the cluster mode to Unicast on the cluster-member object
E. Switch the internal network’s default Security Gateway to the pivot machine’s IP address
Correct Answer: A

Checkpoint 156-215 exam from FLYDUMPS will certainly assist you in gaining the knowledge and experience needed to study. Many of our customers claim that the Checkpoint 156-215 exam included in our study guide are a great compliment to already popular CCB-400 exam sample questions. FLYDUMPS Checkpoint 156-215 exam can guarantee that combined with proper effort, Checkpoint 156-215 exam questions will certainly boost your chance of passing the Checkpoint 156-215 exam. FLYDUMPS Checkpoint 156-215 exam follows the same syllabus followed by actual Checkpoint 156-215 certification exam, we also constantly upgrade our Checkpoint 156-215 exam so you always get the best and updated information.

Apple 9L0-401 Study Guide Book, Buy Apple 9L0-401 Questions And Answers UP To 50% OffApple 9L0-401 Study Guide Book, Buy Apple 9L0-401 Questions And Answers UP To 50% Off

If you are already an IT professional then FLYDUMPS Apple 9L0-401 exam sample questions will not only enhance you current career but it will also offer much better opportunities in the market. Due to high demanding Apple 9L0-401 exam questions and other helping materials for exams are easily available in the market. There are many sites which provide information on Apple 9L0-401 exam and provide you study material like Apple 9L0-401 certification and others. The Apple 9L0-401 certification in the FLYDUMPS are written in detail to explain each and every point and completely Apple 9L0-401 questions and answers that can come in your final exams.

QUESTION 91
Which is the requirement when initially configuring a Bluetooth device, such as a cell phone, to pair with a computer running Mac OS X v10.3?
A. The computer or the device must be set up to be Discoverable.
B. The computer and the device must have the sleep function disabled.
C. The computer and the device must be within line of sight of each other.
D. The computer or the device must be set to Require Network Authentication.
Correct Answer: A
QUESTION 92
The Universal Access pane in System Preferences allows you to __________________.
A. Configure the screen to zoom in and out.
B. Turn speech recognition on and off.
C. Create new keyboard shortcuts.
D. Configure a USB tablet.

Correct Answer: A
QUESTION 93
Which is the default location of all kernel extensions (“kext” files) in Mac OS X v10.3?
A. /Library/Extensions/
B. /System/Extensions/
C. /System Folder/Extensions/
D. /System/Library/Extensions/

Correct Answer: D
QUESTION 94
What can you use to find out the number of hops between your computer and another computer on an IP network?
A. Traceroute
B. Lookup
C. Whois
D. Ping

Correct Answer: A
QUESTION 95
Which three are useful steps in troubleshooting an issue where a webpage won’t load? (Choose three.)
A. Use Network Utility DNS Scan command to locate DNS servers on the network.
B. Verify the network settings in the Network pane of System Preferences.
C. Use Network Utility Ping command to test IP connectivity.
D. Use Network Utility Lookup tool to test known DNS servers.
E. Use System Profiler to review the Network Activity report.
F. Use Network Monitor to review the Activity Report.
Correct Answer: BCD
QUESTION 96
Which Mac OS X v10.3 utility is helpful when troubleshooting a computer’s Ethernet connectivity?
A. Network Utility
B. Activity Monitor
C. Network Monitor
D. Internet Connect
Correct Answer: A
QUESTION 97
Which method below will NOT help you confirm that you have set up TCP/IP correctly?
A. Use the Ping feature in Network Utility
B. Transfer a file using Bluetooth File Exchange.
C. Open Internet Explorer and view an external webpage
D. Verify that you can successfully send mail from a configured mail account.

Correct Answer: B
QUESTION 98
To set up PPPoE, which port must you configure?
A. Modem
B. Ethernet
C. FireWire
D. AppleTalk

Correct Answer: B
QUESTION 99
Network administrators can create and distribute specific VPN configurations, which users can add to their systems by ___________.
A. Copying and pasting the Internet Connect application preferences at UserName>Library>Preferences>com.apple.internetconnect.plist
B. Choosing Import Configurations from the File menu of the Internet Connect application
C. Choosing Save and Open Configurations from the File menu of the Internet Connect application
D. Clicking the Import button in the Internal Modem window of the Internet Connect application

Correct Answer: B
QUESTION 100
Mac OS X v10.3 supports which kinds of VPN connections? (Choose all that apply.)
A. PPoE
B. L2TP
C. PPTP
D. NAT
E. P2P

Correct Answer: BC
QUESTION 101
The Lookup pane in Network Utility is used to _____________. (Choose all that apply).
A. Find the complete route between your computer and another computer on an IP network.
B. Determine which ports on a computer are closed.
C. Determine which ports on a computer are open.
D. Resolve domain names to IP addresses.
E. Resolve IP addresses to domain names.
F. Display routing table information
Correct Answer: DE
QUESTION 102
In Mac OS X v10.3, changes to network configuration ____________.
A. Require a restart
B. Are user-specific
C. Require administrator authorization
D. Are made in the Internet pane of System Preferences.

Correct Answer: C
QUESTION 103
What can you use to determine whether there is an active network connection between two computers?
A. Lookup
B. Netstat
C. Whois
D. Ping

Correct Answer: D
QUESTION 104
Which three tasks can you perform with Disk Utility? (Choose three).
A. Erase a CD-RW disk.
B. Determine disk usage by user name.
C. Verify and repair a UFS-formatted disk.
D. Create an encrypted partition on a hard disk.
E. Discover details about top-level directories on a FireWire disk drive.
F. Discover details about a FireWire drive such as size and configuration.

Correct Answer: ACF
QUESTION 105
To make a font available to Classic applications, install the font in ______________.
A. /User/Fonts
B. /Library/Fonts
C. /System Folder/Fonts
D. /System Library/Fonts
E. /System Folder/Font Book

Correct Answer: C
QUESTION 106
Mac OS X v10.3 administrator named “Certkiller” can view the details of a kernel panic in ____________.
A. /Library/Logs/kp.log
B. /Library/Logs/panic.log
C. /Users/Certkiller/Library/Logs/kp.log
D. /Users/Certkiller /Library/Logs/panic.log
Correct Answer: B
QUESTION 107
A disk image file ___________. (Choose all that apply.)
A. can be encrypted at the time it is created
B. has the extension .img or .dmg by default
C. can only be created from the command line
D. is represented by a folder icon when mounted
E. can only be create by the System Administrator
F. may represent a compressed folder and its content
Correct Answer: ABF QUESTION 108
Disk utility can display _______________. (Choose all that apply.)
A. a disk drive capacity
B. a list of partitions on a disk drive
C. the volume format of a mounted partition
D. the number of files in the system folder
E. the number of files on an unmounted partition
F. information about internal drives only, not external drives

Correct Answer: ABC
QUESTION 109
Suppose you are an administrator named “sandra”. To make a font available for all local users to access, install the font file in ______________.
A. /Users/Sandra/Library/Fonts
B. /System/Library/Fonts
C. /Users/Library/Fonts
D. /Library/Fonts

Correct Answer: D
QUESTION 110
The Repair Disk Permissions feature of Disk Utility can ONLY repair permissions_____________________. (Choose all that apply.)
A. on a volume with Mac OS X system software installed.
B. If the computer is booted from the Mac OS X Install disc
C. Of top-level directories, such as /System and /Users only
D. Of user-created files, by restoring them to a previously saved state
E. Of system files, by restoring their permissions to the default configuration

Correct Answer: AE
QUESTION 111
Which two directories will NOT exist by default on which you have installed Mac OS X v10.3 and added a single user named “Certkiller”? (Choose two.)
A. /Fonts
B. /Applications
C. /Library/Preferences
D. /System/Library/Caches
E. /Users/Certkiller/Documents
F. /Users/Certkiller/Library/Caches
G. /Users/Shared/Library/Caches
Correct Answer: AG
QUESTION 112
Disk Utlity with Mac OS X v10.3 allows you to configure drives in RAID configurations of what level(s)?
A. Level 0 only
B. Level 1 only
C. Level 0 or 1
D. Level 1 or 5
E. Level 0, 1, or 5

Correct Answer: C
QUESTION 113
By default in Mac OS X v10.3, you can use the Finder to______________. (Choose all that apply.)
A. Burn a CD
B. Create a disk image file
C. See every file in your home directory
D. To archive multiple items simultaneously using the Archive menu item
E. Empty the trash securely, so that data-recovery software cannot restore the files.

Correct Answer: ADE
QUESTION 114
In what order does Mac OS X v10.3 search for resources such as fonts?
A. ~/Library,/Library,/System/Library
B. /Library,~/Library,/System/Library
C. /System/Library,~/Library,/Library
D. ~/Library,/System/Library,/Library
E. /Library,/System/Library, ~/Library

Correct Answer: A
QUESTION 115
You can use ___________ to create disk image files.
A. CpMac
B. Image Disk
C. Disk Utility
D. Image Capture

Correct Answer: C
QUESTION 116
You are currently in the same directory as a file called ” Certkiller 3″. To view this file contents from the command line you can type ____________. (Choose all that apply.)
A. cat Certkiller 3
B. cat Certkiller \3
C. cat Certkiller \3
D. cat Certkiller \ 3
E. cat ” Certkiller 3″

Correct Answer: DE
QUESTION 117
Exhibit
ls *.*
You enter this command in a Terminal Window. Which file names would be listed in the output of the
command? (Choose all that apply.)

A. Certkiller .exe
B. Index.html
C. Myfile
D. Hello
E. X

Correct Answer: AB
QUESTION 118
Which command is included with the Mac OS X Developer Tools, but NOT with a default installation of Mac OS X v10.3?
A. du
B. pwd
C. open
D. ditto
E. CpMac

Correct Answer: E
QUESTION 119
Which command is found on Mac OS X v10.3, as well as on other versions of UNIX?
A. system_profiler
B. ditto
C. ppen
D. ls

Correct Answer: D
QUESTION 120
A Mac OS X v10.3 user can view a file ownership and access permissions by _________. (Choose all that apply.)
A. viewing the file in Column View
B. using the ls -l command in the Terminal utility.
C. Pressing the Verify Permissions button in Disk Utility.
D. Selecting the file and choosing Get Info from the File menu.
E. Selecting the Permissions tab in the Apple System Profiler utility

Correct Answer: BD
QUESTION 121
By default, the Mac OS X v10.3 shell prompt includes the “#” character after the user name when you ____________.
A. Are in your home directory.
B. Have connected to another computer using ssh
C. Are logged in as a user who is the Group Admin
D. Are running the shell as the System Administrator
Correct Answer: D
QUESTION 122
Which three are ways to access the command line in Mac OS X v10.3? Choose three.
A. Use the Console Utility.
B. Use the Network Utility.
C. Use the Terminal Utility.
D. Start up in verbose mode.
E. Log in remotely using SSH.
F. Start up in single-user mode.
G. Choose Command from the Apple menu.

Correct Answer: CEF
QUESTION 123
You are in a Terminal window, and your current directory is your home directory.
What could you type to display the contents of the file named ” Certkiller File”, which resides in your home directory? (Choose all that apply.)
A. cat Certkiller File
B. cat ../ Certkiller File
C. cat ~ Certkiller File
D. cat ./ Certkiller File
E. cat ~/ Certkiller File

Correct Answer: ADE
QUESTION 124
Exhibit Owner: Read & Write Group: Write only Others: Write only You create a folder in your home directory from the Finder, and set its permissions as shown in the exhibit. When you an ls -l ~ listing, the file for this folder begins with _____________.
A. -rw–w–w-
B. drw-w-w-
C. drwx-wx-wx
D. -rwx-wx-wx
E. frwx-wx-wx-
F. frw–w-wLeading the way in IT testing and certification tools, www. Certkiller .com
Correct Answer: C
QUESTION 125
Which method would you use to shut down Classic?
A. Hold down Control-Option-Escape
B. Quite all running Classic applications.
C. Click Stop in the Classic pane of System Preferences.
D. Control-click on the Finder icon in the Dock and choose Quite Classic from contextual menu.

Correct Answer: C
QUESTION 126
Suppose you are a Mac OS X v10.3 user named Certkiller. Where would you put a file in order to share it with network guests?
A. /Users/Shared
B. /Users/Public
C. /Users/Certkiller/Shared
D. /Users/Certkiller/Public
Correct Answer: D QUESTION 127
A non-administrative Mac OS X v10.3 user named “Dr Bill” wants to use an iMac with Mac OS X v10.3 as web server. Where should he put his HTML files to be shared?
A. /Users/Public
B. /Users/Shared
C. /Users/Dr Bill/Sites
D. /Users/Dr Bill/Shared

Correct Answer: C
QUESTION 128
Mac OS X v10.3 Internet Sharing lets you share your Internet connections with other users via _______. (Choose all that apply.)
A. AirPort
B. Ethernet
C. Bluetooth
D. Modem
E. USB

Correct Answer: AB
QUESTION 129
The Sharing pane of System Preferences has an option to __________.
A. Create network users and groups
B. Share your Internet connection
C. Create a disk partition to share
D. Set up FTP accounts

Correct Answer: B
QUESTION 130
If Sandra disables AppleTalk in the Directory Access utility on her iMac running Mac OS X v10.3, what is the result?
A. Sandra cannot print to AppleTalk printers from her iMac.
B. Sandra’s iMac no longer discovers servers via AppleTalk.
C. Sandra cannot connect to an AFP filer server from her iMac.
D. Users on other computers cannot connect to Sandra’s iMac via AFP.

Correct Answer: B
QUESTION 131
Network users often have multiple passwords, a distinct password for each network service they caccess. Which is NOT a valid way to simplify this situation for users in Mac OS X v10.3?
A. Set up a Kerberos environment on the network.
B. Have users store their login information for different server in Keychain.
C. Set up a directory service to make user and password information available to all computers.
D. Have users access network servers without authentication, using the Network icon in the Finder -rather than using the Connect to Server command, which requires users to authenticate.
Correct Answer: D
QUESTION 132
What are two ways to configure Mac OS X v10.3 to get LDAP information? Choose two.
A. Use Directory Access to configure Mac OS X v10.3 to get LDAP information from a DNS server.
B. Use Directory Access to configure Mac OS X v10.3 to use DHCP-supplied LDAP server information.
C. Use Directory Access to configure Mac OS X v10.3 with the IP address, type, and search base of a specific LDAP server.
D. Use the Sharing pane of System Preferences to configure Mac OS X v10.3 to use an Active Directory server as an LDAP server.

Correct Answer: BC
QUESTION 133
Authentication is ______________.
A. The system feature that determines whether you can access a file as Owner, Group, or Other.
B. The process whereby you prove your claimed identity to the computer system.
C. The association between your claimed user name and UID.
D. Used as a substitute for a password.

Correct Answer: B
QUESTION 134
Which statements are true of Kerberos? (Choose all that apply.)
A. Kerberos uses tickets.
B. Kerberos requires LDAP.
C. Kerberos requires service discovery.
D. Kerberos is a way to perform authentication.
E. Your computer presents your user name and password to each server.

Correct Answer: AD
QUESTION 135
In Mac OS X v10.3, you cannot use the Finder’s “Connection to Server” command to select ______________.
A. WebDAV servers
B. SSH servers
C. AFP servers
D. Your iDisk
Correct Answer: B
QUESTION 136
Dynamic service discovery protocols on Mac OS X v10.3 include ____________.
Choose all that apply.
A. Active Directory
B. Rendezvous
C. AppleTalk
D. Netinfo
E. LDAP
F. SMB
Correct Answer: BCF QUESTION 137
Some computers on a subnet have statically assigned IP addresses that start with “10”. And others are using the built-in Rendezvous protocol to self-assign link-local IP addresses. All the computers have file sharing turned on. What statement is FALSE?
A. A user on a computer with a link-local address can browse a computer with a static address.
B. A user on a computer with a static address can browse a computer with a link-local address.
C. A user on a computer with a link-local address can browse a computer with a link-local address.
D. A user on a computer with a static address can browse a computer with a static address by specifying the IP address.
E. A user on a computer with a link-local address can connect to a computer with a static address by specifying the IP address.

Correct Answer: A
QUESTION 138
Which can you NOT do using the Kerberos application in Mac OS X v10.3?
A. View a ticket.
B. Renew a ticket.
C. Force a network service to accept a ticket.
D. Change the password you sue to get a ticket.

Correct Answer: C
QUESTION 139
Using Directory Access, you can configure your computer to__________.
A. Use a specific WINS server for SMB service discovery.
B. Be a member of more than one Windows workgroup.
C. Disable Finder’s Connect to Server feature.
D. Use AppleTalk to discover SMB services.

Correct Answer: A
QUESTION 140
Over which three of these protocols can network volumes be mounted using the “Connect to Server” command from the Finder? Choose three.
A. SMB
B. POP
C. FTP
D. DSL
E. NFS
F. IPP

Correct Answer: ACE
QUESTION 141
In Mac OS X v10.3, the default permission for Group and Others on the Drop Box folder in a user’s Public folder are ____________.
A. Read only
B. Write only
C. No Access
D. Read & Write

Correct Answer: B
QUESTION 142
The Accounts pane of System Preferences lets you configure an account to __________.
A. Have Read only access.
B. Use a Simple Finder environment
C. Recognize multiple valid passwords
D. Log in to the computer only via FTP

Correct Answer: B
QUESTION 143
Which statement about FileVault is TRUE?
A. Once a user enables FileVault, it cannot be disabled.
B. FileVault can only be enabled for non-administrator user accounts.
C. There is no way to recover a FileVault-protected account user’s data if the password is lost.
D. When a user enables FileVault, that user’s home directory is transferred into an encrypted disk image.

Correct Answer: D
QUESTION 144
In Mac OS X v10.3, where can a non-administrator user named “ann” store her files?
A. /System
B. /Users/ann
C. /Applications
D. /Users/Home/ann

Correct Answer: B
QUESTION 145
Which statement about file and folder permissions is TRUE Mac OS X v10.3?
A. Any user can delete a file from another user’s Drop Box.
B. A file’s permissions are always identical to its enclosing folder’s permissions.
C. A user Read only permissions to a folder cannot view any files in that folder.
D. A user with Read & Write permissions to a folder cannot delete any files in that folder.
E. A user with Read only permissions to a folder cannot rename any files in that folder.

Correct Answer: E
QUESTION 146
When you delete a user named “Certkiller” using the graphical user interface in Mac OS X v10.3, the contents of Certkiller’s home folder can be ______________. (Choose all that apply.)
A. Deleted immediately
B. Moved to a folder named “Certkiller Deleted”
C. Converted to a .sit file and moved to the Deleted Users folder.
D. Converted to a .zip file and moved to the Deleted Users folder.
E. Converted to a .dmg file and moved to the Deletes Users folder.
Correct Answer: AE
QUESTION 147
How does an administrator user delete another user in Mac OS X v10.3 OS X v10.3?
A. Open Terminal and use the du command to delete the selected user.
B. Open the Users control panel, select a user to delete, and click the Delete button.
C. Open the Accounts pane of System Preferences, select a user to delete, and click the Delete (minus sign) button.
D. Open the /Users folder, select a user’s folder to delete, drag the folder to the Trash, and choose Empty Trash from the finder menu.

Correct Answer: C
QUESTION 148
By default in Mac OS X v10.3, the contents of which folders in a user’s home directory can be accessed by all other user accounts? Choose all that apply.
A. Documents
B. Library
C. Public
D. Music
E. Sites

Correct Answer: CE
QUESTION 149
What permissions can you set on file named ” Certkiller .rtf” using Ownership & Permissions section of the file’s Info window? Choose all that apply.
A. Delete
B. Read only
C. Write only
D. No access
E. Execute only
F. Read & Write

Correct Answer: BDF
QUESTION 150
During the Mac OS X v10.3 startup sequence, a Macintosh checks for a pressed C key, which tells the computer to start up from a CD volume rather than from a hard disk volume. This checks occurs immediately after _______________.
A. BootX loads
B. Open Firmware is initialzed.
C. The Kernel environment loads
D. The POST (Power On Self Test) passes
Correct Answer: B
QUESTION 151
How do you boot a Mac OS X v10.3 computer in a single-user mode?
A. Restart while holding down the S key.
B. Restart while holding down Command-S.
C. Restart while holding down Command-Option-S.
D. Choose “Restart in single-user mode” from the Apple menu.
E. Click the Single User checkbox in the Startup Disk pane of System Preferences, and restart.
Correct Answer: B QUESTION 152
Booting Mac OS X v10.3 in verbose mode is most useful as a troubleshooting tool when _____________.
A. The system repeatedly crashes during startup
B. You repeatedly encounter application crashes.
C. The computer cannot communicate with a printer
D. You repeatedly encounter system crashes after logging in

Correct Answer: A QUESTION 153
After the mach_init and BSD init processes execute successfully, init runs the rc scripts located in _________ to perform basic system initialization tasks.
A. /etc
B. /var
C. /init
D. /System/Library

Correct Answer: A QUESTION 154
Which application provides the most detail about system processes in Mac OS X v10.3?
A. Process Viewer
B. System Profiler
C. Activity Monitor
D. CPU Monitor Expanded Window

Correct Answer: C QUESTION 155
The Classic pane of System Preferences lets you____________.
A. Install Mac OS X v10.3 OS 9 applications.
B. Run Mac OS X v10.3 OS 9 Software Updates.
C. Prevent Mac OS 8 applications from being started.
D. Monitor the memory usage of Classic applications and processes.

Correct Answer: D QUESTION 156
UNIX-based applications that require the X Windows System server can be opened in Mac OS X v10.3 using ________________.
A. FreeX98 for Mac OS X.
B. WIN-X for Mac OS X
C. X11 for Mac OS X
D. Console

Correct Answer: C QUESTION 157
Which are ways to force quite an open Mac OS X v10.3 application? Choose all that apply.
A. Use the forcequit command in Terminal.
B. Press Command-Option-Escape and select the application from the list.
C. Press Command-Control-Escape and select the application from the list.
D. Select the application in System Profiler and click the Force Quit button.
E. Choose Force Quit from the Apple menu and select the application from the list.

Correct Answer: BE
QUESTION 158
The function of journaling in the Mac OS Extended file system is to _______________.
A. Provide support for file forks
B. Make the file system case-sensitive
C. Make the file system compatible with the Windows (MS-DOS) format
D. Provide the user with a journal that lists recently created files and directories
E. Help protect the file system integrity in the case of power outages or unforeseen system failures

Correct Answer: E
QUESTION 159
Mac OS X v10.3 administrator users can enable a personal firewall by clicking the Start button in the Firewall pane of _________________.
A. Network Utility
B. NetInfo Manager
C. The Network pane of System Preferences
D. The Sharing pane of System Preferences
Correct Answer: D

You will get full refund if you don’t get the expected mark. We promise you almost 100% guarantee success. Using FLYDUMPS Apple 9L0-401 exam sample questions, your self-confidence and proficiency will be enhanced; your knowledge will be strengthened. The FLYDUMPS Apple 9L0-401 exam sample questions will be within your grasp very soon after you taking the Apple 9L0-401 test. Don’t hesitate to contact FLYDUMPS if you have any questions about the Apple 9L0-401 exam. We will resolve your difficulty timely after receiving them. It’s our duty to offer all customers the best after-sale service on Cloudera Certified Specialist in Apple 9L0-401. FLYDUMPS provides the examinees with the Apple 9L0-401 exam sample questions. You can take a quiz to check out the questions and answers quality of FLYDUMPS Certified Specialist in Apple 9L0-401 demo before you purchase it.