REAL QUESTIONS SUBMIT MATERIAL ADVERTISE
Braindumps

Microsoft

Cisco

Citrix

CIW

CompTia

CWNA

Apple

Adobe

HP

Legato

Exin

Filemaker

Brocade

Ericsson

TIA

Veritas

ISEB

SCP

IISFA

ISM

OMG

Apc

Mile2

Foundry

Huawei

McData

Symantec

TeraData

RedHat

Solar Winds

Blue Coat

Riverbed

 

 
 
Click on name of dumper to view the dump
 
Ewan
 
 

 

Braindumps of 50-690

Advanced Novell Network Management

 

Exam Questions, Answers, Braindumps (50-690)

Thanks to www.exams.ws and www.4exam.com But there’s no need to have it from both of them, only questions from only one are sufficient I think.

Question: 1
NAT provides protection at the _____ layer of the OSI model.
A. Network
B. Physical
C. Data Link
D. Transport
Answer: A

Question: 2
You're configuring an SLP Directory Agent on your NetWare 6.5 server. You want to statically configure your server to communicate with another Directory Agent whose IP address is 10.0.0.4. This server resides on a different network segment than your server. Which of the following is the correct command to enter in the SLP.CFG file to accomplish this?
A. DA=10.0.0.4
B. SLPDA=10.0.0.4
C. DA IPV4 10.0.0.4
D. DA IPV4, 10.0.0.4
E. SLPDA IPV4 10.0.0.4
F. SLPDA IPV4, 10.0.0.4
Answer: D

Question: 3
Deployment Manager fails when run from the NetWare 6.5 Operating System CD on your Windows 2000 Professional workstation with Novell Client 4.83 installed. What is the cause?
A. Deployment Manager requires Windows XP Home edition.
B. Deployment Manager is not compatible with Novell Client 4.83.
C. You must upgrade to Internet Explorer 6.0 or later on the workstation.
D. Deployment Manager is not compatible with Windows 2000 Professional.
E. Deployment Manager must be installed on the workstation before running the program.
F. The version of Deployment Manager on the Operating System CD only runs on Windows 95/98 workstations.
Answer: B

Question: 4
What is another name for the server certificate?
A. WEP key
B. Key material object
C. Certificate authority
D. Certificate signing request
Answer: B

Question: 5
Which statements are true regarding subordinate reference replicas? (Choose 2)
A. There can be multiple subordinate references per partition.
B. Subordinate references must reside on every server in the tree.
C. Subordinate references link a parent partition with its child partition.
D. Subordinate references can be changed to be a master replica without losing any information.
E. Subordinate references should be removed to help reduce traffic across the communication channel.
Answer: A, C

Question: 6
Which command will enable Transition Tracking System (TTS) on an NSS volume named DATA?
A. TTS
B. NSS /TTS=DATA
C. TTS VOLUME=DATA
D. NSS /TRANSACTION=DATA
E. NSS /TRANSACTIONTRACKING=DATA
Answer: D

Question: 7
You just deleted the DATA volume from your NetWare 6.5 server. You realize that this was a mistake and you need to restore it. By default, how long do you have before the volume is automatically purged?
A. 12 hours
B. 36 hours
C. 48 hours
D. 72 hours
E. 96 hours
F. It's too late, the volume has been purged. You must recreate it and restore data from a back up device.
Answer: E

Question: 8
Your organization is implementing an e-commerce web site where external customers can shop for and purchase products. It's imperative that you establish a secure web site to do this. Which type of certificate authority should you use?
A. Public Certificate Authority
B. Internal Certificate Authority
C. External Certificate Authority
D. Integrated Certificate Authority
Answer: C


Question: 9
In a time provider group, which server carries the most weight when voting on a time?
A. Master
B. Primary
C. Reference
D. Secondary
E. Single reference
Answer: C

50-690


 

 

Braindumps Real exam questions and verified answers - 100% passing guarantee - cheap prices.

 

Free brain dumps Braindumps, notes, books for free

 

Braindumps and Exams - Instant download real exam questions - Passing guarantee.

Follow us on FaceBook
Braindumps on Facebook
 
 
 
 
 

CheckPoint

Linux

Novell

DB/2

Network Appliance

EC-Council

Nortel

McAfee

Juniper

ISACA

PMI

Sybase

EMC

HDI

SNIA

ISC

Sair

IBM

Lotus

Exam Express

3COM

BICSI

DeLL

Enterasys

Extreme Networks

Guidance Software

Computer Associates

Network General

SAS Institute

Alcatel Lucent

SeeBeyond

TruSecure

Polycom

Hyperion

Hitachi

Nokia

Fortinet

Vmware

Fujitsu

Tibco

Intel

PostgreSQLCE

BusinessObjects

RESSoftware

BlackBerry

AccessData

ICDL

Isilon

SAP

The Open Group

ACSM

Altiris

Avaya

Cognos

F5

Genesys

SDI

ACI

ASQ

Google

H3C

HIPAA

HRCI

SOA

IIBA

Zend