Exam A QUESTION 1
Which of the following statements about Bridge mode is TRUE?
A. When managing a Security Gateway in Bridge mode, it is possible to use a bridge interface for Network Address Translation.
B. Assuming a new installation, bridge mode requires changing the existing IP routing of the network.
C. All ClusterXL modes are supported.
D. A bridge must be configured with a pair of interfaces.
Correct Answer: D QUESTION 2
Which SmartConsole component can Administrators use to track remote administrative activities?
A. WebUI
B. Eventia Reporter
C. SmartView Monitor
D. SmartView Tracker
Correct Answer: D QUESTION 3
UDP packets are delivered if they are _________.
A. A legal response to an allowed request on the inverse UDP ports and IP
B. A Stateful ACK to a valid SYN-SYN-/ACK on the inverse UDP ports and IP
C. Reference in the SAM related Dynamic tables
D. Bypassing the Kernel by the “forwarding layer” of clusterXL
Correct Answer: A QUESTION 4
The Check Point Security Gateway’s virtual machine (kernel) exists between which two layers of the OSI model?
A. Session and Network layers
B. Application and Presentation layers
C. Physical and Datalink layers
D. Network and Datalink layers
Correct Answer: D QUESTION 5
The customer has a small Check Point installation which includes one Windows 2003 server as the SmartConsole and a second server running SecurePlatform as both Security Management Server and the Security Gateway. This is an example of a(n):
A. Unsupported configuration.
B. Hybrid Installation.
C. Distributed Installation.
D. Stand-Alone Installation.
Correct Answer: D QUESTION 6
The customer has a small Check Point installation which includes one Windows XP workstation as the SmartConsole, one Solaris server working as Security Management Server, and a third server running SecurePlatform as Security Gateway. This is an example of a(n):
A. Stand-Alone Installation.
B. Unsupported configuration
C. Distributed Installation.
D. Hybrid Installation.
Correct Answer: C QUESTION 7
You are a security architect and need to design a secure firewall, VPN and IPS solution. Where would be the best place to install IPS in the topology if the internal network is already protected?
A. On the firewall itself to protect all connected networks centrally.
B. On each network segment separately.
C. On the LAN is enough, the DMZ does not need to be protected.
D. In front of the firewall is enough.
Correct Answer: A QUESTION 8
You are installing a Security Management Server. Your security plan calls for three administrators for this particular server. How many can you create during installation?
A. Depends on the license installed on the Security Management Server
B. Only one with full access and one with read-only access
C. One
D. As many as you want
Correct Answer: C QUESTION 9
During which step in the installation process is it necessary to note the fingerprint for first-time verification?
A. When establishing SIC between the Security Management Server and the Gateway
B. When configuring the Security Management Server using cpconfig
C. When configuring the Security Gateway object in SmartDashboard
D. When configuring the Gateway in the WebUl
Correct Answer: B QUESTION 10
How can you recreate the account of the Security Administrator, which was created during initial installation of the Management Server on SecurePlatform?
A. Launch cpconfig and delete the Administrator’s account. Recreate the account with the same name.
B. Export the user database into an ASCII file with fwm dbexport. Open this file with an editor, and delete the Administrator Account portion of the file. You will be prompted to create a new account.
C. Type cpm -a, and provide the existing Administrator’s account name. Reset the Security Administrator’s password.
D. Launch SmartDashboard in the User Management screen, and delete the cpconfig administrator.
Correct Answer: A
QUESTION 1
Which statement best defines the term “bundle” as it applies to the Mac OS X v10.6 file system?
A. A folder that is invisible in the Finder
B. A folder of files that the Finder displays as a single file
C. A folder of files that have been gathered and organized for deployment
D. A hierarchical directory structure containing resources geared for a specific purpose
Correct Answer: D
QUESTION 2
Which command-line tool can display the ID of a specific installation package?
A. pkgs
B. pkgutil
C. swupdate
D. packagemaker
Correct Answer: B
QUESTION 3
In Mac OS X v10.6, which tool do you use to restore a multicasted image to a target volume?
A. asr
B. hdiutil
C. diskutil
D. Disk Utility
E. System Image Utility
Correct Answer: A
QUESTION 4
Your organization has 100 Intel iMac computers. You are creating a NetInstall image on a Mac OS X Server v10.6 computer. Which Automator action should you add if you want to specify that the finished image can be accessed only by a specific subset of your iMac computers?
A. Define Image Source
B. Filter Computer Models
C. Filter Clients by IP Address
D. Customize Package Selection
E. Filter Clients by MAC Address
F. Apply System Configuration Settings
Correct Answer: E
QUESTION 5
A Mac OS X Server v10.6 computer has the MAC address 0030654dbcef, the serial number ABCD1234XYZ, and the IP address 10.0.0.4, which resolves to myserver.pretendco.com. Which file will Mac OS X Server use to automatically configure the computer?
A. 10.0.4.plist
B. ABCD12.plist
C. myserver.plist
D. 0030654d.plist
QUESTION 6
On a Mac OS X Server v10.6 computer, what is the default port used by the Software Update service to provide updates to Mac OS X computers?
A. 80
B. 548
C. 8088
D. 63000
Correct Answer: C
QUESTION 7
You are creating a package using PackageMaker on a Mac OS X v10.6 computer. You specify “Mac OS X
10.4 Tiger” for Minimum Target, and add preupgrade, preinstall, preflight, and postinstall scripts. Which script will execute first?
A. Preflight
B. Preinstall
C. Preupgrade
D. Postinstall
Correct Answer: A
QUESTION 8
In a Mac OS X v10.6 file system, Disk Utility can repair permissions errors in which files?
A. All files installed by the packages listed in the standard packages list
B. All files installed from the Install DVD that shipped with the computer
C. All files listed in the BOMs in all of the .pkg files in /Library/Receipts/
D. All files listed in the BOMs in all of the .pkg files in /System/Library/ Receipts/
Correct Answer: A
QUESTION 9
You are creating a NetBoot image in Mac OS X Server v10.6. What is the minimum version of Mac OS X that you can use as the source for the NetBoot image?
A. Mac OS X v10.3.9
B. Mac OS X v10.4.0
C. Mac OS X v10.4.8
D. Mac OS X v10.6.0
Correct Answer: D
QUESTION 10
How can you start up in target disk mode a Mac OS X-compatible computer that has a FireWire port?
A. Hold down the T key on the keyboard while the computer starts up, until an icon appears on the screen.
B. Hold down the Option key on the keyboard while the computer starts up, until a dialog appears, and click the Target Disk Mode button.
C. Hold down the S key on the keyboard while the computer starts up, and type the command reboot -target -firewire at the command line.
D. Insert the Mac OS X Install DVD, and hold down the C key on the keyboard while the computer starts up, then choose Target Disk Mode from the Utilities menu, and choose Restart from the Apple menu.
Exam A
QUESTION 1
Which statement describes a standard attribute in Mac OS X v10.5 directory services?
A. An attribute defined by RFC2307
B. An attribute required by Mac OS X v10.5 to publish services with Bonjour
C. An attribute required by Open Directory to support network logins in Mac OS X v10.5
D. An attribute in an Open Directory record that includes default mappings to one or more native attributes in a local or connected directory
Correct Answer: D QUESTION 2
In Mac OS X v10.5, which command should you enter in Terminal to send a HUP signal to a process?
A. sig
B. kill
C. stop
D. signal
Correct Answer: B QUESTION 3
In a default installation of Mac OS X v10.5, which command should you enter in Terminal to search for a user named “kim” in all directory domains in your search path?
A. dscl localhost read /Search/Users/kim
B. dscl localhost read /Default/Users/kim
C. dscl localhost read /127.0.0.1/Users/kim
D. dscl localhost read /Local/Default/Users/kim
Correct Answer: A QUESTION 4
Which attribute in a Mac OS X network user account stores the network location of the user’s home folder?
A. The UserHome attribute in the mount record
B. The VFSLinkDir attribute in the mount record
C. The ExportDirectory attribute in the computer record
D. The HomeDirectory attribute in the user account record
Correct Answer: D QUESTION 5
A Mac OS X v10.5 computer is bound to an Active Directory server using the Active Directory plug-in in Directory Access. Using the default configuration of the plug-in, what is the Mac OS X user ID number for a user account provided by the Active Directory server?
A. The user ID number is always set to 500.
B. The user ID number is the value stored in the user account’s UID attribute.
C. The user ID number is generated based on the user account’s Globally Unique ID (GUID).
D. The user ID number is a randomly generated value that does not conflict with any user IDs used by the local user records.
Correct Answer: C QUESTION 6
There is one Open Directory master with many replicas. But it fails to work fine. How should you promote one of the replicas to master and have all the other replicas look to the new master?
A. You should use Server Admin to change one of the Open Directory replicas to a master, and then change all of the remaining Open Directory replicas to standalone servers, and back to replicas.
B. You should use dsconfigldap to change one of the Open Directory replicas to a master, and then use Server Admin to change all of the remaining Open Directory replicas to standalone servers, and back to replicas.
C. You should use Server Admin to change one of the Open Directory replicas to a master, and then change the address of the Open Directory master on all of the remaining replicas, without changing the role of the replicas.
D. You should use dscl to change one of the Open Directory replicas to a master, and then use serveradmin to change the address of the Open Directory master on all of the replicas, without changing the role of the replicas.
Correct Answer: A
QUESTION 7
You are configuring a Mac OS X Server v10.5 computer to search multiple directory domains. How to specify the order in which the server searches the directories when authenticating users?
A. You should define a custom search path in the Authentication pane of Directory Utility.
B. You should run slapconfig -setauthmechanisms and specify the directory domain search order.
C. You should modify the mapping for the AuthenticationAuthority attribute in the Mappings pane of Directory Utility.
D. You should configure the computer account and enter the authentication search path in the Advanced pane of Workgroup Manager.
Correct Answer: A
QUESTION 8
GeneratedUIDs provide for user identification in which TWO contexts?
A. file ACLs
B. file ownership
C. password policies
D. group membership
Correct Answer: AD
QUESTION 9
A search base for an LDAP request describes the location in the LDAP hierarchy where the search will begin.
A. TRUE
B. FALSE
Correct Answer: A
QUESTION 10
A search base for an LDAP request describes the client application making the search request
A. TRUE
B. FALSE
Correct Answer: B
QUESTION 1
Which method of increasing the storage capacity of a SAN does NOT require that a volume be unmounted and stopped?
A. add LUNs
B. add volumes
C. add storage pools
D. reduce block allocation size
Correct Answer: B
QUESTION 2
You want to use different block allocation sizes for two applications. To do so, you must set up a ________ for each application.
A. LUN
B. volume
C. storage pool
D. metadata controller
Correct Answer: B
QUESTION 3
You try to save a file from an Xsan client to an Xsan volume, but receive an alert message that indicates error -1425 has occurred. What is the MOST LIKELY cause?
A. The Xsan volume is busy.
B. Saving the file would cause you to exceed your hard quota.
C. Another user is saving changes simultaneously to the same file on the Xsan volume.
D. You are trying to save the file to a folder or volume where you do not have write permissions.
Correct Answer: B
QUESTION 4
Xsan is a ________ file system.
A. local
B. cluster
C. network
D. distributed
Correct Answer: B
QUESTION 5
You are creating an Xsan volume in Xsan Admin. Below is a list of steps required to accomplish this task. In what order should you perform these steps?
A. label LUNs
B. create LUNs
C. create volumes
D. create storage pools
E. add LUNs to storage pools
F. BACDE
G. BADEC
H. CBADE
I. CDBAE
Correct Answer: A QUESTION 6
In Xsan, you can set up an affinity between a folder and a ________.
A. volume
B. hard disk
C. storage pool
D. metadata controller
Correct Answer: C QUESTION 7
Fibre Channel switched fabrics use ____-bit addresses.
A. 8
B. 16
C. 24
D. 32
Correct Answer: C QUESTION 8
Which command-line utility can you use to return a LUN to a state in which Disk Utility can initialize it?
A. cvfsck
B. cvmkfs
C. cvlabel
D. cvadmin
E. cvupdatefs
Correct Answer: C QUESTION 9
You try to set up an access control list (ACL) for several folders on your Xsan volume, but you are unable to do so. What is MOST LIKELY preventing you from completing this task?
A. ACLs have not been enabled for your Xsan volume.
B. Your client is not bound to the Open Directory master.
C. Your controller is not bound to the Open Directory master.
D. Your Xsan volume has not been mounted on the primary metadata controller.
Correct Answer: A QUESTION 10
Setting up a separate storage pool to store both metadata and journal data can ________.
A. complicate user quota configuration
B. improve I/O throughput for user data
C. increase free disk space on the primary metadata controller
D. cause data loss due to multiple files having the same address
Correct Answer: B
Exam A
QUESTION 1
In Server app, which procedure will configure OS X Server to let members of a specific group use the Messages service?
A. Select the Messages service, click the Users and Groups tab, and then select the group, and click OK.
B. Select Groups, then select the group, and from the Action pop-up menu, choose “Edit Access to Services.” Select the Messages checkbox, and click OK.
C. Select the server, click Access, and then click the Services button. Select Messages in the Service list, click “Allow only users and groups below,” click Add (+) to add the group, and then click Done.
D. Select the server, click Settings, and then click the Services button. Select Messages in the Service list, click Allow Access, click Add (+) to add the group, and click OK.
Correct Answer: B
QUESTION 2
At PretendCo, users currently have to remember multiple names and passwords to access various servers. Which of these OS X Server services can you deploy to let users access the servers using a single set of credentials?
A. Contacts
B. File Sharing
C. Open Directory
D. Profile Manager
Correct Answer: C
QUESTION 3
On an OS X computer running Mountain Lion, changes made in the Software Update pane of System Preferences apply to ALL users of the system.
A. True
B. False
Correct Answer: A
QUESTION 4
Which utility can you use to display the status of Kerberos TGTs on an OS X Mountain Lion computer?
A. Ticket Viewer
B. Server app
C. Directory Utility
D. System Preferences
Correct Answer: A
QUESTION 5
You want to manage iOS devices over the air using Profile Manager. To do so, which THREE of these
must be available to Profile Manager?
(Select 3)
A. A running AFP server
B. A computer with iPhone Configuration Utility running
C. A valid Apple Push Notification Service certificate
D. An Open Directory master
E. A valid self-signed or verified SSL certificate
F. A configured WebDAV share
Correct Answer: CDE
QUESTION 6
In a default OS X configuration, you want to change the way that Finder handles ZIP archives. Where can you make that change?
A. System Preferences
B. Disk Utility Preferences
C. Archive Utility Preferences
D. Finder Preferences
Correct Answer: C
QUESTION 7
A user named Robert has an existing user account. The user name associated with his account is Robert. Robert wants to use Bob as his user name when accessing some of the services provided by a Mac running OS X Server. How can you accommodate his request?
A. In Workgroup Manager, click Settings and add a rule to the Services list that substitutes Bob in place of Robert.
B. In Workgroup Manager, create a new user with the user name Bob. Select the Robert account, and add the new Bob account to the list in the Aliases pane.
C. In Server app, go to the Advanced Options pane for Robert’s account, and add Bob as an alias.
D. In Server app, add a rule to the Services list in the Settings pane that substitutes Bob in place of Robert.
Correct Answer: C
QUESTION 8
ORRECT TEXT On an OS X Mountain Lion computer with OS X Server installed, you have created a share point named “Finance Dept” that contains a folder named “Reports.” The permissions for both are shown below.
Chris is not a member of the Finance group, but you would like her to have access to the Finance Dept share point. In Server app, you select the server, click the Storage tab, select the Finance Dept folder, and modify its permissions a shown below.
After changing the permissions on the share point, what access will Chris have to the reports Folder in the share point?
A. None
B. Read & Write
C. Write-only
D. Read-only
Correct Answer: B
QUESTION 9
Which utility is on the OS X Recovery partition?
A. Firmware Password Utility
B. Boot Camp Assistant
C. Activity Monitor
D. Console
Correct Answer: A
QUESTION 10
Which statement best describes the function of Gatekeeper?
A. To prevent users from opening untrusted applications.
B. To prevent users from downloading untrusted applications.
C. To prevent users from installing untrusted applications.
D. To prevent users from installing viruses and trojan horses.
Correct Answer: A
QUESTION 11