www.cert24.com,test dumps, practice test, pdf 220-701 CompTIA cert24

www.cert24.com,test dumps, practice test, pdf 220-701 CompTIA cert24
www.cert24.com,test dumps, practice test, pdf 220-701 CompTIA cert24

IT Exam,IT Certification,braindump,original questions, question pool,document, braindump, test questions, test question, dumps, test answers, cert24.com, preparation, pdf, certification questions, answers Certification, certification test, practice test, exam dumps, certification training, answers real questions

220-701 CompTIA A+ Essentials (2009) We believe in helping our customers achieve their goals. For this reason, we take great care while preparing our Questions and Answers , Core Administration. Our practice tests Administration are prepared with the help of highly professional people from the industry, so we benefit from their vast experience and knowledge.

www.cert24.com,test dumps, practice test, pdf 220-701 CompTIA cert24

QUESTION NO: 1
A customer has asked for the ability to operate dual digital monitors. Which of the following is the BEST solution for accomplishing this?

A. Split the onboard video port.
B. Update the video drivers to allow for multiple monitors.
C. Add an adaptor to the onboard VGA port.
D. Install a video card with multiple DVI ports.

Answer: D

QUESTION NO: 2
A user is trying to use Remote Desktop to connect to another computer on the LAN. The
connection fails. The technician opens up a command prompt and types the following: “telnet computernamE. 3389” and also gets the same error message. Which of the following is the MOST likely cause of this error, assuming that the OS firewall has been disabled?

A. The antivirus software is blocking the incoming connection.
B. The ISP is blocking Remote Desktop at their end.
C. The RDP connection has been configured to use a non-standard port.
D. The telnet service has not been installed.

Answer: C

QUESTION NO: 3
Which of the following is the correct arrangement of the data pairs in a T568B wire pattern? (Select TWO).

A. Orange & orange/white on pins 1 & 2
B. Blue & blue/white on pins 4 & 5
C. Orange & orange/white on pins 4 & 5
D. Brown & brown/white on pins 1 & 2
E. Green & green/white on pins 3 & 6

Answer: A,E

www.cert24.com,test dumps, practice test, pdf 220-701 CompTIA cert24

www.cert24.com,test dumps, practice test, pdf 220-702 CompTIA cert24

www.cert24.com,test dumps, practice test, pdf 220-702 CompTIA cert24

www.cert24.com,test dumps, practice test, pdf 220-702 CompTIA cert24

IT Exam,IT Certification,braindump,original questions, question pool,document, braindump, test questions, test question, dumps, test answers, cert24.com, preparation, pdf, certification questions, answers Certification, certification test, practice test, exam dumps, certification training, answers real questions

220-702 CompTIA A+ Practical Application (2009 Edition) We believe in helping our customers achieve their goals. For this reason, we take great care while preparing our Questions and Answers , Core Administration. Our practice tests Administration are prepared with the help of highly professional people from the industry, so we benefit from their vast experience and knowledge.

www.cert24.com,test dumps, practice test, pdf 220-702 CompTIA cert24

QUESTION NO: 1
A technician is replacing a processor in a workstation. After installation, the workstation starts up and immediately shuts down; the technician tries to start the workstation several more times and gets the same result. Which of the following is the cause of this issue?

A. The workstation is not plugged in.
B. The thermal paste was not applied.
C. The memory was not installed properly.
D. The L2 cache was not cleared.

Answer: B

QUESTION NO: 2
Which of the following is the correct socket type for a Pentium 4 processor?

A. 478
B. 939
C. 1366
D. AM2+

Answer: A

QUESTION NO: 3
Which of the following is an advantage of installing a 64-bit processor versus a 32-bit processor?

A. Uses less bandwidth on the front side bus
B. Only requires half of the clock speed
C. Able to access a larger amount of RAM memory
D. Able to be used as two 32-bit processors

Answer: C

www.cert24.com,test dumps, practice test, pdf 220-702 CompTIA cert24

www.cert24.com,test dumps, practice test, pdf 250-309 Symantec cert24

www.cert24.com,test dumps, practice test, pdf 250-309 Symantec cert24
www.cert24.com,test dumps, practice test, pdf 250-309 Symantec cert24

IT Exam,IT Certification,braindump,original questions, question pool,document, braindump, test questions, test question, dumps, test answers, cert24.com, preparation, pdf, certification questions, answers Certification, certification test, practice test, exam dumps, certification training, answers real questions

250-309 Administration of Symantec Enterprise Vault 9 for Exchange We believe in helping our customers achieve their goals. For this reason, we take great care while preparing our Questions and Answers , Core Administration. Our practice tests Administration are prepared with the help of highly professional people from the industry, so we benefit from their vast experience and knowledge.

www.cert24.com,test dumps, practice test, pdf 250-309 Symantec cert24

QUESTION 1
In which locations must auditing be enabled?

A. Directory and Policy
B. Site and Enterprise Vault Server
C. Directory and Site
D. Directory and Enterprise Vault Server

Answer: D

QUESTION 2
What is the minimum indexing level that supports phrase searching?

A. Brief
B. Medium
C. Full
D. All

Answer: C

QUESTION 3
When a Symantec Enterprise Vault 9 for Exchange (EV 9) alert reaches its threshold level, EV 9 writes an entry in the Event Log. EV 9 writes the alert to which other location?

A. EV Audit database
B. EV Trace logs
C. EV Status
D. EV Operations reports

Answer: C

www.cert24.com,test dumps, practice test, pdf 250-309 Symantec cert24

www.cert24.com,test dumps, practice test, pdf 250-316 Symantec cert24

www.cert24.com,test dumps, practice test, pdf 250-316 Symantec cert24

www.cert24.com,test dumps, practice test, pdf 250-316 Symantec cert24

IT Exam,IT Certification,braindump,original questions, question pool,document, braindump, test questions, test question, dumps, test answers, cert24.com, preparation, pdf, certification questions, answers Certification, certification test, practice test, exam dumps, certification training, answers real questions

250-316 Administration of Symantec Backup Exec 2012 We believe in helping our customers achieve their goals. For this reason, we take great care while preparing our Questions and Answers , Core Administration. Our practice tests Administration are prepared with the help of highly professional people from the industry, so we benefit from their vast experience and knowledge.

www.cert24.com,test dumps, practice test, pdf 250-316 Symantec cert24

QUESTION NO: 1
Which two are required to correctly configure a Symantec Backup Exec 2012 Central
Administration Server (CAS) environment? (Select two.)

A. Only Fully Qualified Domain Names can be used for all servers.
B. Only the NetBIOS name can be used for all servers.
C. Servers must all be on the same subnet.
D. Servers must be part of a domain.
E. Servers must all be in the same time zone.

Answer: B,D

QUESTION NO: 2
Which two rights does Symantec Backup Exec 2012 assign to the Symantec Backup Exec Service Account during installation? (Select two.)

A. log on as a service
B. start, restart, or stop Symantec Backup Exec services
C. create a token object
D. alter file system objects
E. manage operator rights

Answer: A,C

QUESTION NO: 3
Which operation is available with legacy backup-to-disk folders when upgrading to Symantec Backup Exec 2012?

A. allows storing data back to the folder
B. allows reading and writing to the folder
C. allows only reading data from the folder
D. allows writing to the folder

Answer: C

www.cert24.com,test dumps, practice test, pdf 250-316 Symantec cert24

www.cert24.com,test dumps, practice test, pdf 310-019 SUN cert24

www.cert24.com,test dumps, practice test, pdf 310-019 SUN cert24
www.cert24.com,test dumps, practice test, pdf 310-019 SUN cert24

IT Exam,IT Certification,braindump,original questions, question pool,document, braindump, test questions, test question, dumps, test answers, cert24.com, preparation, pdf, certification questions, answers Certification, certification test, practice test, exam dumps, certification training, answers real questions

310-019 Sun Certified Associate.Java Platform.Se. Exam Version 1.0 We believe in helping our customers achieve their goals. For this reason, we take great care while preparing our Questions and Answers , Core Administration. Our practice tests Administration are prepared with the help of highly professional people from the industry, so we benefit from their vast experience and knowledge.

www.cert24.com,test dumps, practice test, pdf 310-019 SUN cert24

QUESTION NO: 1
Which two are true? (Choose two.)
A. The javax.servlet package contains part of the servlet API.
B. A servlet is an open source framework developed for creating web applications.
C. A servlet is a Java class that executes within a web container.
D. A servlet is a Java class that executes within a web browser.
E. The servlet API is included in J2SE.
Answer: A,C

QUESTION NO: 2
Which two are true about JavaScript and HTML? (Choose two.)
A. HTML is displayed in a client-side environment.
B. JavaScript must be deployed in a separate file from HTML.
C. JavaScript runs only in a server-side environment.
D. JavaScript has a function that can open a new browser window.
Answer: A,D

QUESTION NO: 3
You are asked to create a Dog class that exposes the Dog class String name and int breed to
other code as read-only attributes, provides encapsulation, and adheres to the standard
JavaBeans naming conventions.
Which approach implements these requirements?
A. Provide public name() and public breed() methods in the Dog class, and mark the name and
breed instance variables private.
B. Provide private getName() and private getBreed() methods in the Dog class, and mark the
name and breed instance variables
private.
C. Provide public getName() and public getBreed() methods in the Dog class, and mark the name
and breed instance variables private.
D. Provide private name() and private breed() methods in the Dog class, and mark the name and
breed instance variables public.
E. Provide public getName()/setName() and public getBreed()/setBreed() methods in the Dog
class, and mark the name and breed
instance variables private.
Answer: C

www.cert24.com,test dumps, practice test, pdf 310-019 SUN cert24

www.cert24.com,test dumps, practice test, pdf 312-49 EC-COUNCIL cert24

www.cert24.com,test dumps, practice test, pdf 312-49 EC-COUNCIL cert24
www.cert24.com,test dumps, practice test, pdf 312-49 EC-COUNCIL cert24

IT Exam,IT Certification,braindump,original questions, question pool,document, braindump, test questions, test question, dumps, test answers, cert24.com, preparation, pdf, certification questions, answers Certification, certification test, practice test, exam dumps, certification training, answers real questions

312-49 EC-COUNCIL Certified Associate.Java Platform.Se. Exam Version 1.0 We believe in helping our customers achieve their goals. For this reason, we take great care while preparing our Questions and Answers , Core Administration. Our practice tests Administration are prepared with the help of highly professional people from the industry, so we benefit from their vast experience and knowledge.

www.cert24.com,test dumps, practice test, pdf 312-49 EC-COUNCIL cert24

QUESTION NO: 1
In conducting a computer abuse investigation you become aware that the suspect of the
investigation is using ABC Company as his Internet Service Provider (ISP). You contact ISP and request that they provide you assistance with your investigation. What assistance can the ISP provide?

A. The ISP can investigate anyone using their service and can provide you with assistance
B. The ISP can investigate computer abuse committed by their employees, but must preserve the privacy of their customers and therefore cannot assist you without a warrant
C. The ISP can’t conduct any type of investigations on anyone and therefore can’t assist you
D. ISP’s never maintain log files so they would be of no use to your investigation

Answer: B

QUESTION NO: 2
You are assisting in the investigation of a possible Web Server Hack. The company who called you stated that customers reported to them that whenever they entered the web address of the company in their browser, what they received was a porno graphic web site. The company checked the web server and nothing appears wrong. When you type in the IP address of the web site in your browser everything appears normal. What is the name of the attack that affects the DNS cache of the name resolution servers, resulting in those servers directing users to the wrong web site?

A. ARP Poisoning
B. DNS Poisoning
C. HTTP redirect attack
D. IP Spoofing

Answer: B

QUESTION NO: 3
You are working as an independent computer forensics investigator and receive a call from a systems administrator for a local school system requesting your assistance. One of the students at the local high school is suspected of downloading inappropriate images from the Internet to a PC in the Computer lab. When you arrive at the school, the systems administrator hands you a hard drive and tells you that he made a simple backup copy of the hard drive in the PC and put it on this drive and requests that you examine that drive for evidence of the suspected images. You inform him that a simple backup copy will not provide deleted files or recover file fragments. What type of copy do you need to make to ensure that the evidence found is complete and admissible in future proceedings?

A. Bit-stream Copy
B. Robust Copy
C. Full backup Copy
D. Incremental Backup Copy

Answer: A

www.cert24.com,test dumps, practice test, pdf 312-49 EC-COUNCIL cert24

www.cert24.com,test dumps, practice test, pdf 312-50 EC-COUNCIL cert24

www.cert24.com,test dumps, practice test, pdf 312-50 EC-COUNCIL cert24
www.cert24.com,test dumps, practice test, pdf 312-50 EC-COUNCIL cert24

IT Exam,IT Certification,braindump,original questions, question pool,document, braindump, test questions, test question, dumps, test answers, cert24.com, preparation, pdf, certification questions, answers Certification, certification test, practice test, exam dumps, certification training, answers real questions

312-50 Ethical Hacker Certified We believe in helping our customers achieve their goals. For this reason, we take great care while preparing our Questions and Answers , Core Administration. Our practice tests Administration are prepared with the help of highly professional people from the industry, so we benefit from their vast experience and knowledge.

www.cert24.com,test dumps, practice test, pdf 312-50 EC-COUNCIL cert24

QUESTION NO: 1
Bob has a good understanding of cryptography, having worked with it for many years.
Cryptography is used to secure data from specific threats but it does not secure the data
from the specific threats but it does no secure the application from coding errors. It can
provide data privacy; integrity and enable strong authentication but it can’t mitigate
programming errors. What is a good example of a programming error that Bob can use to
explain to the management how encryption will not address all their security concerns?
A. Bob can explain that using a weak key management technique is a form of programming error
B. Bob can explain that using passwords to derive cryptographic keys is a form of a programming error
C. Bob can explain that a buffer overflow is an example of programming error and it is a common mistake associated with poor programming technique
D. Bob can explain that a random number generation can be used to derive cryptographic keys but it uses a weak seed value and this is a form of a programming error

Answer: C

Explanation:
In computer security and programming, a buffer overflow, or buffer overrun, is a
programming error which may result in a memory access exception and program termination, or in the event of the user being malicious, a possible breach of system security.

QUESTION NO: 2
Which of the following built-in C/C++ functions you should avoid to prevent your program
from buffer overflow attacks?
A. strcpy()
B. strcat()
C. streadd()
D. strscock()

Answer: A,B,C
Explanation:
When hunting buffer overflows, the first thing to look for is functions which write into
arrays without any way to know the amount of space available. If you get to define the function, you can pass a length parameter in, or ensure that every array you ever pass to it is at least as big as the hard-coded maximum amount it will write. If you’re using a function someone else (like, say, the compiler vendor) has provided then avoiding functions like gets(), which take some amount of data over which you have no control and stuff it into arrays they can never know the size of, is a good start. Make sure that functions like the str…() family which expect NUL-terminated strings actually get them – store a ‘\0′ in the last element of each array involved just before you call the
function, if necessary. Strscock() is not a valid C/C++ function.

QUESTION NO: 3
An attacker runs netcat tool to transfer a secret file between two hosts.
Machine A: netcat -1 –p 1234 < secretfile Machine B: netcat 192.168.3.4 > 1234
He is worried about information being sniffed on the network.
How would the attacker use netcat to encrypt information before transmitting it on the
wire?
A. Machine A: netcat -1 –p –s password 1234 < testfile
Machine B: netcat 1234
B. Machine A: netcat -1 –e magickey –p 1234 < testfile
Machine B: netcat 1234
C. Machine A: netcat -1 –p 1234 < testfile –pw password
Machine B: netcat 1234 –pw password
D. Use cryptcat instead of netcat.

Answer: D

www.cert24.com,test dumps, practice test, pdf 312-50 EC-COUNCIL cert24

www.cert24.com,test dumps, practice test, pdf 312-50v7 EC-COUNCIL cert24

www.cert24.com,test dumps, practice test, pdf 312-50v7 EC-COUNCIL cert24
www.cert24.com,test dumps, practice test, pdf 312-50v7 EC-COUNCIL cert24

IT Exam,IT Certification,braindump,original questions, question pool,document, braindump, test questions, test question, dumps, test answers, cert24.com, preparation, pdf, certification questions, answers Certification, certification test, practice test, exam dumps, certification training, answers real questions

312-50v7 Ethical Hacking and Countermeasures (CEHv7) We believe in helping our customers achieve their goals. For this reason, we take great care while preparing our Questions and Answers , Core Administration. Our practice tests Administration are prepared with the help of highly professional people from the industry, so we benefit from their vast experience and knowledge.

www.cert24.com,test dumps, practice test, pdf 312-50v7 EC-COUNCIL cert24

QUESTION NO: 1
SSL has been seen as the solution to a lot of common security problems. Administrator will often time make use of SSL to encrypt communications from points A to point B. Why do you think this could be a bad idea if there is an Intrusion Detection System deployed to monitor the traffic between point A and B?
A. SSL is redundant if you already have IDS’s in place
B. SSL will trigger rules at regular interval and force the administrator to turn them off
C. SSL will slow down the IDS while it is breaking the encryption to see the packet content
D. SSL will blind the content of the packet and Intrusion Detection Systems will not be able to detect them

Answer: D

QUESTION NO: 2
Jake is a network administrator who needs to get reports from all the computer and network devices on his network. Jake wants to use SNMP but is afraid that won’t be secure since passwords and messages are in clear text. How can Jake gather network information in a secure manner?
A. He can use SNMPv3
B. Jake can use SNMPrev5
C. He can use SecWMI
D. Jake can use SecSNMP

Answer: A

QUESTION NO: 3
June, a security analyst, understands that a polymorphic virus has the ability to mutate and can change its known viral signature and hide from signature-based antivirus programs. Can June use an antivirus program in this case and would it be effective against a polymorphic virus?
A. Yes. June can use an antivirus program since it compares the parity bit of executable files to the database of known check sum counts and it is effective on a polymorphic virus
B. Yes. June can use an antivirus program since it compares the signatures of executable files to the database of known viral signatures and it is very effective against a polymorphic virus
C. No. June can’t use an antivirus program since it compares the signatures of executable files to the database of known viral signatures and in the case the polymorphic viruses cannot be detected by a signature-based anti-virus program
D. No. June can’t use an antivirus program since it compares the size of executable files to the database of known viral signatures and it is effective on a polymorphic virus

Answer: C

www.cert24.com,test dumps, practice test, pdf 312-50v7 EC-COUNCIL cert24

www.cert24.com,test dumps, practice test, pdf 412-79 EC-COUNCIL cert24

www.cert24.com,test dumps, practice test, pdf 412-79 EC-COUNCIL cert24
www.cert24.com,test dumps, practice test, pdf 412-79 EC-COUNCIL cert24

IT Exam,IT Certification,braindump,original questions, question pool,document, braindump, test questions, test question, dumps, test answers, cert24.com, preparation, pdf, certification questions, answers Certification, certification test, practice test, exam dumps, certification training, answers real questions

412-79 EC-Council Certified Security Analyst (ECSA) We believe in helping our customers achieve their goals. For this reason, we take great care while preparing our Questions and Answers , Core Administration. Our practice tests Administration are prepared with the help of highly professional people from the industry, so we benefit from their vast experience and knowledge.

www.cert24.com,test dumps, practice test, pdf 412-79 EC-COUNCIL cert24

QUESTION NO: 1
Frank is working on a vulnerability assessment for a company on the West coast. The company hired Frank to assess its network security through scanning, pen tests, and vulnerability assessments. After discovering numerous known vulnerabilities detected by a temporary IDS he set up, he notices a number of items that show up as unknown but questionable in the logs. He looks up the behavior on the Internet, but cannot find anything related. What organization should Frank submit the log to find out if it is a new vulnerability or not?
A. CVE
B. IANA
C. RIPE
D. APIPA

Answer: A

Explanation:
Answer A is the correct answer. CVE (Common Vulnerabilities and Exposures) is a dictionary of publically known vulnerabilities and exposure maintained by Mitre.

QUESTION NO: 2
George is a senior security analyst working for a state agency in Florida. His state’s congress just passed a bill mandating every state agency to undergo a security audit annually. After learning what will be required, George needs to implement an IDS as soon as possible before the first audit occurs. The state bill requires that an IDS with a “time-based induction machine” be used. What IDS feature must George implement to meet this requirement?
A. Pattern matching
B. Statistical-based anomaly detection
C. Real-time anomaly detection
D. Signature-based anomaly detection

Answer: C

QUESTION NO: 3
Software firewalls work at which layer of the OSI model?
A. Data Link
B. Network
C. Transport
D. Application

Answer: A

www.cert24.com,test dumps, practice test, pdf 412-79 EC-COUNCIL cert24

www.cert24.com,test dumps, practice test, pdf 640-722 Cisco cert24

www.cert24.com,test dumps, practice test, pdf 640-722 Cisco cert24
www.cert24.com,test dumps, practice test, pdf 640-722 Cisco cert24

IT Exam,IT Certification,braindump,original questions, question pool,document, braindump, test questions, test question, dumps, test answers, cert24.com, preparation, pdf, certification questions, answers Certification, certification test, practice test, exam dumps, certification training, answers real questions

640-722 CCNA – Wireless Associate – IUWNE We believe in helping our customers achieve their goals. For this reason, we take great care while preparing our Questions and Answers , Core Administration. Our practice tests Administration are prepared with the help of highly professional people from the industry, so we benefit from their vast experience and knowledge.

www.cert24.com,test dumps, practice test, pdf 640-722 Cisco cert24

QUESTION NO: 1
Which two statements about the results of the Cisco WCS version 7.0 client troubleshooting tool are true? (Choose two.)

A. Results of Layers 1 – 3 are provided.
B. Results of only Layers 2 and 3 are provided.
C. Results of Layers 4 – 7 are provided.
D. The tabulated results vary depending on the client type.
E. Results are provided in a fixed four-part tabulation.
F. Results are provided in a fixed six-part tabulation.

Answer: A,D

QUESTION NO: 2
When using Cisco WCS version 7.0, which two features are available for the client troubleshooting tool when a Cisco Compatible Extensions v5 wireless client gets connected? (Choose two.)

A. Request CleanAir reports from the client
B. Send text messages to the client
C. Aggregated Cisco ACS authentication client information
D. Request the client to ping the DHCP-supplied IP gateway
E. Display a summary of client event history

Answer: B,D

QUESTION NO: 3
Which portion of a WLAN deployment can WLC message logs help to troubleshoot?
RF issues

A. encryption issues between APs and clients
B. configuration verification issues
C. infrastructure and client Issues
D. AP placement issues

Answer: D

www.cert24.com,test dumps, practice test, pdf 640-722 Cisco cert24