Month: June 2016
Flydumps Apple 9L0-007 exam material details are researched and created by the Most Professional Certified Authors who are regularly using current exams experience to create precise and logical dumps.You can get questions and answers from many other websites or books, but logic is the main key of success, and Flydumps will give you this key of success.
QUESTION 11
The basis for the component isolation troubleshooting technique is an undertanding of ____________ and __________ within computers.? ( Select two )
A. network flow
B. coolant flow
C. power flow
D. fan air flow
E. signal flow
Correct Answer: CE
QUESTION 12
Which of the following is NOT one of the steps of the Apple recommended troubleshooting process?
A. Vertify repair
B. Vertify problem
C. Clean plastics
D. Try quick fixes
E. Run diagnostics
Correct Answer: C
QUESTION 13
A customer states that he cannot open an AppleWorks file. What is the most productive question to ask him FIRST?
A. Can you open any files?
B. Is your MAC connected to a network?
C. Can you open other Apple Work Files?
D. What version of Apple Works are you using?
Correct Answer: C
QUESTION 14
You require additional information about a specific problem with a customer’s Mac. Which one of the following resources is the Apple-recommended choice for researching the problem?
A. Downloads
B. Discussions
C. User’s manual
D. Knowledge Base
Correct Answer: D QUESTION 15
Examine the exhibit. What is the correct name for this type of pixel anomaly?
A. Dark dot effect
B. Stuck sub-pixel
C. Bright dot defect
D. Vertical TAB fault
Correct Answer: D
QUESTION 16
When removing or replacing the heat sink or processor on the Mac Pro (8x), what is the maximum acceptable amount of time for the heat sink to be separated from the processor?
A. Five (5) minutes
B. Fifteen (15) minutes
C. Thirty (30) minutes
D. Sixty (60) mintues
Correct Answer: B
QUESTION 17
Which of the following can permanently damage an LCD display?
A. Rubbing the display
B. Using a screen saver
C. Not using a screen saver
D. Turning brightness up to high
Correct Answer: A
QUESTION 18
Which FOUR of the following actions helps reduce the risk of damage from ESD? SELECT FOUR
A. Ground yourself and the equipment you are working on
B. Always place ESD-sensitive components on metal surfaces
C. Handle all ESD-sensitive boards by the connections, not the edges
D. Use static-shielding storage bags for ESD-sensitive components
E. Do not touch anyone who is working on ESD-sensitive components
F. Do not bring plastic, vinyl or foamed polystyrene near ESD-sensitive components
Correct Answer: ADEF
QUESTION 19
Which THREE of the following are symptoms of a ‘no power’ condition? SELECT THREE
A. You don’t hear a startup chime
B. You can’t connect to the internet
C. You don’t hear any fan or drive noise
D. The cursor is frozen and the system is unresponsive
E. The power button or power indicator doesn’t light up at all
Correct Answer: ACE
QUESTION 20
Which of the following is ALMOST CERTAINLY a hardware-related problem?
A. No video at startup
B. Error beep at startup
C. Distorted at startup
D. Blinking question mark at startup
Correct Answer: B
Flydumps.com is the absolute way to pass your Apple 9L0-007 exam within no time. An authentic and comprehensive Apple 9L0-007 exam solution is available at Flydumps.com. With our exclusive online Apple 9L0-007 braindump you will pass Apple 9L0-007 exam easily.Flydumps.com guarantees 100% success rate
Where to free download the new Cisco 642-515 exam questions to pass the exam easily? Now,Flydumps has publised the new version of Cisco 642-515 exam dumps with new added exam questions.you can also get free VCE and PDF, and the new Cisco 642-515 practice tests ensure your exam 100% pass. Visit Flydumps.com to get the 100% pass ensure!
QUESTION 60
Modular Policy Framework provides a consistent and flexible way to configure security appliance features in a manner similar to Cisco IOS software QoS CLI. Your company asked you to examine the current Cisco Modular Policy Framework configurations on the LA-ASA Cisco Adaptive Security Appliance (ASA) by use of the Cisco Adaptive Security Device Manager (ASDM).
What is the impact of the FTP inspection policy named MY-FTP-MAP on FTP traffic entering the partnernet interface?
A. Masks the FTP banner.
B. Tracks each FTP command and response sequence for certain anomalous activity.
C. Has no effect on the behavior of the Cisco Adaptive Security Appliance.
D. Prevents web browsers from sending embedded commands in FTP requests.
Correct Answer: C Section: Firewall/Policys Explanation
Explanation/Reference:
QUESTION 61
Modular Policy Framework provides a consistent and flexible way to configure security appliance features in a manner similar to Cisco IOS software QoS CLI. Your company asked you to examine the current Cisco Modular Policy Framework configurations on the LA-ASA Cisco Adaptive Security Appliance (ASA) by use of the Cisco Adaptive Security Device Manager (ASDM).
Which two impacts are of the policy map named PARTNERNET-POLICY on FTP traffic entering the partnernet interface?
A. Prevents all users except “root” from accessing the path /root.
B. Logs all attempts to download files from the FTP server on the inside interface.
C. Blocks the FTP request commands DELE, MKD, PUT, RMD, RNFR, and RNTO.
D. Resets connections that send embedded commands.
Correct Answer: CD Section: Firewall/Policys Explanation
Explanation/Reference: QUESTION 62
Modular Policy Framework provides a consistent and flexible way to configure security appliance features in a manner similar to Cisco IOS software QoS CLI. Your company asked you to examine the current Cisco Modular Policy Framework configurations on the LA-ASA Cisco Adaptive Security Appliance (ASA) by use of the Cisco Adaptive Security Device Manager (ASDM).
Which option is correct with regard to HTTP inspection on the Cisco Adaptive Security Appliance?
A. HTTP traffic is inspected as it enters or exits the outside interface.
B. HTTP traffic is inspected only as it enters any interface.
C. Advanced HTTP inspection is applied to traffic entering the outside interface, and basic HTTP inspection is applied to traffic entering any interface.
D. HTTP traffic is inspected as it enters or exits any interface.
Correct Answer: A Section: Firewall/Policys Explanation
Explanation/Reference: QUESTION 63
Modular Policy Framework provides a consistent and flexible way to configure security appliance features in a manner similar to Cisco IOS software QoS CLI. Your company asked you to examine the current Cisco Modular Policy Framework configurations on the LA-ASA Cisco Adaptive Security Appliance (ASA) by use of the Cisco Adaptive Security Device Manager (ASDM).
Which step will be taken by the Cisco Adaptive Security Appliance on FTP traffic entering its outside interface?
A. Masks the FTP greeting banner.
B. Translates embedded IP addresses.
C. Blocks the FTP request commands APPE, GET, RNFR, RNTO, DELE, MKD, and RMD.
D. Prevents all users except “root” from accessing the path/root.
Correct Answer: B Section: Firewall/Policys Explanation Explanation/Reference:
QUESTION 64
Which options can a clientless SSL VPN user access from a web browser without port forwarding, smart tunnels, or browser plug-ins?
A. web-enabled applications
B. Microsoft Outlook Web Access
C. files on the network, via FTP or the CIFS protocol
D. internal websites
Correct Answer: ABCD Section: VPN Explanation
Explanation/Reference:
QUESTION 65
While implementing QoS, which two types of queues are available on the Cisco ASA security appliance? (Choose two.)
A. best effort queue
B. round robin queue
C. weighted fair
D. low latency queue
Correct Answer: AD Section: Firewall/Policys Explanation
Explanation/Reference:
QUESTION 66
Which three statements correctly describe protocol inspection on the Cisco ASA adaptive security appliance? (Choose three.)
A. The protocol inspection feature of the security appliance securely opens and closes negotiated ports and IP addresses for legitimate client-server connections through the security appliance.
B. For the security appliance to inspect packets for signs of malicious application misuse, you must enable advanced (application layer) protocol inspection.
C. If inspection for a protocol is notenabled, traffic for that protocol may be blocked.
D. If you want to enable inspection globally for a protocol that is not inspected by default or if you want to globally disable inspection for a protocol, you can edit the default global policy.
Correct Answer: ACD Section: Firewall/Policys Explanation
Explanation/Reference:
QUESTION 67
Multimedia applications transmit requests on TCP, get responses on UDP or TCP, use dynamic ports, and use the same port for source and destination, so they can pose challenges to a firewall. Which three items are true about how the Cisco ASA adaptive security appliance handles multimedia applications? (Choose three.)
A. It dynamically opens and closes UDP ports for secure multimedia connections, so you do not need to open a large range of ports.
B. It supports SIP with NAT but not with PAT.
C. It supports multimedia with or without NAT.
D. It supports RTSP, H.323, Skinny, and CTIQBE.
Correct Answer: ACD Section: Firewall/Policys Explanation
Explanation/Reference:
QUESTION 68
Reverse route injection (RRI) is the ability for static routes to be automatically inserted into the routing process for those networks and hosts protected by a remote tunnel endpoint. These protected hosts and networks are known as remote proxy identities. Study the following exhibit carefully. What does Reverse Route Injection enable in this configuration?
A. The Cisco ASA security appliance will advertise its default routes to the distant end of the site- to-site VPN tunnel.
B. The Cisco ASA security appliance will advertise routes that are at the distant end of the site-to- site VPN tunnel.
C. The Cisco ASA security appliance will advertise routes that are on its side of the site-to-site VPN tunnel to the distant end of the site-to-site VPN tunnel.
D. The Cisco ASA security appliance will advertise routes from the dynamic routing protocol that is running on the Cisco ASA security appliance to the distant end of the site-to-site VPN tunnel.
Correct Answer: B Section: Other Explanation
Explanation/Reference: QUESTION 69
Which two options are correct about the threat detection feature of the Cisco ASA adaptive security appliance? (Choose two.)
A. The security appliance scanning threat detection feature is based on traffic signatures.
B. The threat detection feature can help you determine the level of severity for packets that are detected and dropped by the security appliance inspection engines.
C. Because of their impact on performance, both basic threat detection and scanning threat detection are disabled by default.
D. Scanning threat detection detects network sweeps and scans and optionally takes appropriate preventative action.
Correct Answer: BD Section: Firewall/Policys Explanation
Explanation/Reference:
QUESTION 70
For configuring VLAN trunking on a security appliance interface, which three actions are mandatory? (Choose three.)
A. associating a logical interface with a physical interface
B. specifying a VLAN ID for asubinterface
C. specifying a name for asubinterface
D. specifying the maximum transmission unit for asubinterface
Correct Answer: ABC Section: Other Explanation
Explanation/Reference:
QUESTION 71
Which three features can the Cisco ASA adaptive security appliance support? (Choose three.)
A. 802.1Q VLANs
B. OSPF dynamic routing
C. static routes
D. BGP dynamic routing
Correct Answer: ABC Section: Other Explanation
Explanation/Reference:
QUESTION 72
What is the reason that you want to configure VLANs on a security appliance interface?
A. for use in multiple contextmode, where you can map only VLAN interfaces to contexts
B. for use in conjunction with device-level failover to increase the reliability of your security appliance
C. to increase the number of interfaces available to the network without adding additional physical interfaces or security appliances D. for use in transparent firewall mode, where only VLAN interfaces are used
Correct Answer: C Section: Other Explanation
Explanation/Reference:
QUESTION 73
The P4S security department would like to apply specific restrictions to one network user, Bob, because he works from home and accesses the corporate network from the outside interface of the security appliance. P4S decides to control network access for this user by using the downloadable ACL feature of the security appliance. Authentication of inbound traffic is already configured on the security appliance, and Bob already has a user account on the Cisco Secure ACS. Which three tasks should be completed in order to achieve the goal of limiting network access for Bob via downloadable ACLs? (Choose three.)
A. Configure the security appliance to use downloadable ACLs.
B. Configure the downloadable ACLs on the Cisco Secure ACS.
C. Attach the downloadable ACL to the user profile for Bob on the Cisco Secure ACS.
D. Configure the Cisco Secure ACS to use downloadable ACLs.
Correct Answer: BCD Section: Firewall/Policys Explanation
Explanation/Reference:
QUESTION 74
The security department of the P4S company wants to configure cut-through proxy authentication via RADIUS to require users to authenticate before accessing the corporate DMZ servers. Which three tasks are needed to achieve this goal? (Choose three.)
A. Configure a rule that specifies which traffic flow to authenticate.
B. Designate an authentication server.
C. Specifya AAA server group.
D. Configure per-user override.
Correct Answer: ABC Section: Other Explanation
Explanation/Reference:
QUESTION 75
Which two statements correctly describe the local user database in the security appliance? (Choose two.)
A. You can create user accounts with or without passwords in the local database.
B. You cannot use the local database for network access authentication.
C. You can configure the security appliance to lock a user out after the user meets a configured maximum number of failed authentication attempts.
D. The default privilege level for a new user is 15.
Correct Answer: AC Section: Other Explanation
Explanation/Reference: QUESTION 76
Which one of the following commands can provide detailed information about the crypto map configurations of a Cisco ASA adaptive security appliance?
A. show run ipsec sa
B. show run crypto map
C. show ipsec sa
D. show crypto map
Correct Answer: B Section: VPN Explanation
Explanation/Reference:
QUESTION 77
Which three commands can display the contents of flash memory on the Cisco ASA adaptive security appliance? (Choose three.)
A. show disk0:
B. dir
C. show flash:
D. show memory
Correct Answer: ABC Section: Other Explanation
Explanation/Reference:
QUESTION 78
Which two statements about the downloadable ACL feature of the security appliance are correct? (Choose two.)
A. Downloadable ACLs enable you to store full ACLs on a AAA server and download them to the security appliance.
B. Downloadable ACLs are supported using TACACS+ or RADIUS.
C. The downloadable ACL must be attached to a user or group profile on a AAA server.
D. The security appliance supports only per-user ACL authorization.
Correct Answer: AC Section: Other Explanation
Explanation/Reference:
QUESTION 79
In the default global policy, which three traffic types are inspected by default? (Choose three.)
A. TFTP
B. FTP
C. ESMTP
D. ICMP
Correct Answer: ABC Section: Firewall/Policys Explanation
Explanation/Reference:
QUESTION 80
What does the redundant interface feature of the security appliance accomplish?
A. to increase the number of interfaces available to your network without requiring you to add additional physical interfaces or security appliances
B. to increase the reliability of your security appliance
C. to allow a VPN client to sendIPsec-protected traffic to another VPN user by allowing such traffic in and out of the same interface
D. to facilitate out-of-band management
Correct Answer: B Section: Other Explanation
Explanation/Reference:
Preparing Cisco 642-515 exam is not difficult now.You can prepare from Cisco 642-515 Certification or Cisco 642-515 dumps.Here we have mentioned some sample questions.You can use our Cisco 642-515 study material notes for test preparation.Latest Cisco 642-515 study material available.
[The Newest Dumps] Real Cisco 642-515 exam dumps revised by experts, they were updated with the change of the Cisco 642-515 ,covering all the whole aspects of Cisco 642-515 exam. Just have a training of Flydumps Cisco 642-515 exam questions to guarantee your 100% pass
QUESTION 51
The IT department of your company must perform a custom-built TCP application within the clientless SSL
VPN portal configured on your Cisco ASA security appliance. The application should be run by users who
have either guest or normal user mode privileges.
In order to allow this application to run, how to configure the clientless SSL VPN portal?
A. configure a smart tunnel for the application
B. configure a bookmark for the application
C. configure the plug-in that best fits the application
D. configure port forwarding for the application
Correct Answer: A Section: VPN Explanation
Explanation/Reference:
QUESTION 52
Which major benefit do digital certificates provide when deploying IPsec VPN tunnels?
A. Resiliency
B. Obfuscation
C. Simplification
D. Scalability
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 53
Refer to the exhibit. As the administrator of a Cisco ASA security appliance for remote access IPsec VPNs,
you are assisting a user who has a digital certificate that is configured for the Cisco VPN Client.
Based on the exhibit, how would you find the MD5 and SHA-1 thumb print of the certificate?
A. Choose the certificate and then click the Certificate drop-down menu.
B. Choose the certificate and then click Options > Properties.
C. Choose the certificate and then click the View button.
D. Choose the certificate and then click the Verify button.
Correct Answer: C Section: Cert Authentication Explanation
Explanation/Reference:
QUESTION 54
Refer to the exhibit. You are configuring a laptop with the Cisco VPN Client, which will use digital certificates for authentication. Which protocol will the Cisco VPN client use to retrieve the digital certificate from the CA server?
A. FTP
B. HTTPS
C. TFTP
D. LDAP
E. SCEP
Correct Answer: E Section: Cert Authentication Explanation
Explanation/Reference:
QUESTION 55
Refer to the exhibit. A junior Cisco ASA security appliance administrator has asked for your help in configuring a Cisco ASA security appliance for an identity certificate to be used for IPsec VPNs. Based on the two Cisco ASDM configuration screens that are shown, what is needed to configure the Cisco ASA security appliance for an identity certificate?
Exhibit:
A. To retrieve an identity certificate, a new pair of RSA keys must be created.
B. To retrieve an identity certificate, the Cisco ASA security appliance must have the certificate of the CA.
C. To retrieve an identity certificate, the common name must be an FQDN.
D. The Cisco ASA security appliance doesn’t need to retrieve an identity certificate. It can use a self-signed identity certificate for IPsec.
E. Because of the lack of a CA certificate, the administrator must import the identity certificate from a file.
Correct Answer: B Section: (none) Explanation
Explanation/Reference:
QUESTION 56
SSL VPNs can provide increased flexibility over IPsec VPNs, based on the location of the client and ownership of the endpoint. However, security of the endpoint is a potential problem. Which three of these potential security issues can the Cisco ASA security appliance address through SSL VPN policies or features? (Select three.)
A. SSL attacks
B. Malware
C. Phishing
D. Spoofing
E. Viruses
F. Spyware
Correct Answer: BEF Section: (none) Explanation
Explanation/Reference:
QUESTION 57
You have been tasked with configuring access for development partners using the clientless SSL VPN portal on your Cisco ASA security appliance. These partners need access to the desktop of internal development servers. Which three of these configurations for the clientless SSL VPN portal would allow these partners to access the desktop of remote servers? (Choose three.)
A. RDP bookmark using the RDP plug-in
B. Xwindows bookmark using the Xwindows plug-in
C. Telnet bookmark using the Telnet plug-in
D. Citrix plugin using the Citrix plug-in
E. SSH bookmark using the SSH plug-in
F. VNC bookmark using the VNC plug-in
Correct Answer: ADF Section: (none) Explanation
Explanation/Reference:
QUESTION 58
You are the administrator for Cisco ASA security appliances that are used for site-to-site VPNs between remote and corporate offices. You have used the Service Policy Rule Wizard within ASDM to configure low-latency queuing for unified communications on all the appropriate ASAs. Users are still having issues with unified communications between the remote and corporate offices. Assuming that the Cisco Unified Communications equipment is functioning properly and that the VPN configurations are correct, which of these choices is most likely the cause of the problems?
A. The DSCP, expedite forward, ef (46), was used to determine unified communications traffic within the Service Policy Rule Wizard.
B. The tunnel group and DSCP traffic matching criteria were configured within the Service Policy Rule Wizard.
C. Both a policing and priority queue must be applied on the interface to expedite the voice and control data flows.
D. A priority queue must be created on the interface where the site-to-site VPN tunnel is terminated.
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 59
You have been tasked with examining the current Cisco Modular Policy Framework configurations on the LA-ASA Cisco Adaptive Security Appliance (ASA) using the Cisco Adaptive Security Device Manager (ASDM). Answer the multiple-choice questions in this simulation using the appropriate Cisco ASDM configuration screens.
Which two actions does the Cisco Adaptive Security Applicance take on HTTP traffic entering its outside interface? (Choose two.)
A. Drops HTTP request messages whose request method is post and whose user-agent field contains either the string Some_New_P2P_Client1 or the string Some_New_P2P_Client2.
B. Logs HTTP request messages whose request method is post and whose user-agent field contains either the string Some_New_P2P_Client1 or the string Some_New_P2P_Client2.
Correct Answer: AB Section: Case Study Explanation
Explanation/Reference:
QUESTION 60
You have been tasked with examining the current Cisco Modular Policy Framework configurations on the LA-ASA Cisco Adaptive Security Appliance (ASA) using the Cisco Adaptive Security Device Manager (ASDM). Answer the multiple-choice questions in this simulation using the appropriate Cisco ASDM configuration screens.
What is the effect of the FTP inspection policy named MY-FTP-MAP on FTP traffic entering the partnernet interface?
A. Has no effect on the behavior of the Cisco Adaptive Security Appliance.
Correct Answer: A Section: Case Study Explanation
Explanation/Reference:
QUESTION 61
You have been tasked with examining the current Cisco Modular Policy Framework configurations on the LA-ASA Cisco Adaptive Security Appliance (ASA) using the Cisco Adaptive Security Device Manager (ASDM). Answer the multiple-choice questions in this simulation using the appropriate Cisco ASDM configuration screens.
What are the two effects of the policy map named PARTNERNET-POLICY on FTP traffic entering the partnernet interface?
A. Resets connections that send embedded commands.
B. Blocks the FTP request commands DELE, MKD, PUT, RMD, RNFR, and RNTO.
Correct Answer: AB Section: Case Study Explanation
Explanation/Reference:
QUESTION 62
You have been tasked with examining the current Cisco Modular Policy Framework configurations on the LA-ASA Cisco Adaptive Security Appliance (ASA) using the Cisco Adaptive Security Device Manager (ASDM). Answer the multiple-choice questions in this simulation using the appropriate Cisco ASDM configuration screens.
Which statement is true about HTTP inspection on the Cisco Adaptive Security Appliance?
A. HTTP traffic is inspected as it enters or exits the outside interface.
Correct Answer: A Section: Case Study Explanation
Explanation/Reference:
QUESTION 63
You have been tasked with examining the current Cisco Modular Policy Framework configurations on the LA-ASA Cisco Adaptive Security Appliance (ASA) using the Cisco Adaptive Security Device Manager (ASDM). Answer the multiple-choice questions in this simulation using the appropriate Cisco ASDM configuration screens.
Which action does the Cisco Adaptive Security Appliance take on FTP traffic entering its outside interface?
A. Translates embedded IP addresses.
Correct Answer: A Section: Case Study Explanation
Explanation/Reference:
Well-regarded for its level of detail, assessment features, and challenging review questions and hands-on exercises, Cisco 642-515 helps you master the concepts and techniques that will enable you to succeed on the Cisco 642-515 exam the first time.
The 100% valid Flydumps latest Cisco 642-513 question answers ensure you 100% pass! And now we are offering the free new version along with the VCE format Cisco 642-513 practice test. Free download Cisco 642-513 more new PDF and VCE on Flydumps.com.
QUESTION 50
Which protocol is required for the administrative workstation to communicate with the CSA MC?
A. SSH
B. Telnet
C. SSL
D. IPSec
Correct Answer: C Section: (none) Explanation Explanation/Reference:
QUESTION 51
How can the Agent kit be sent out to host machines?
A. via a URL that is e-mailed to clients
B. via a TFTP server
C. via an FTP server
D. via a Telnet server
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 52
What is the purpose of the sniffer and protocol detection rule?
A. to stop sniffers from running on a network
B. to allow sniffers to run on a network
C. to cause an event to be logged when non-IP protocols and sniffer programs are detected running on systems
D. to deny non-IP protocols and sniffer programs from running on systems
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 53
What are three types of variables used for CSA? (Choose three.)
A. global sets
B. file sets
C. API sets
D. data sets
E. network address sets
Correct Answer: BDE Section: (none) Explanation
Explanation/Reference:
QUESTION 54
What is the purpose of connection rate limit rules?
A. to limit the number of connections to an application
B. to limit the number of calls to the kernel in a specified time frame
C. to limit the number of network connections within a specified time frame
D. to limit the number of malformed connection requests to a web server
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 55
Which port is used to access the CSA MC from the administrative workstation?
A. 21
B. 23
C. 1741
D. 1802
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 56
Which two of the following file access rule criteria can you use to allow or deny the operations that the selected applications can perform on files? (Choose two.)
A. the application attempting to access the file
B. the application attempting to access the service or address
C. the operation attempting to act on the file
D. the direction of the communications
E. the address with which a system is attempting to communicate
Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 57
What action is taken on user query windows when the Agent UI is not present on a system?
A. The default action is always taken.
B. All actions are denied.
C. All actions are allowed.
D. All actions are allowed and logged.
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 58
Which three make up the CSA architecture model? (Choose three.)
A. Cisco Trust Agent
B. Cisco Security Agent
C. Cisco Security Agent Management Center
D. Cisco Intrusion Prevention System
E. an administrative workstation
F. a syslog server
Correct Answer: BCE Section: (none) Explanation
Explanation/Reference:
QUESTION 59
Which two of the following network access rules can you use to control access to specified network services? (Choose two.)
A. the application attempting to access the file
B. the application attempting to access the service or address
C. the operation attempting to act on the file
D. the direction of the communications
Correct Answer: AC Section: (none) Explanation
Explanation/Reference:
QUESTION 60
What is the purpose of the rootkit/kernel protection rule?
A. to restrict access to the operating system
B. to log access to the operating system
C. to restrict user access to the operating system
D. to restrict administrator access to the operating system
Correct Answer: A Section: (none) Explanation
Explanation/Reference:
QUESTION 61
Drag Drop question A.
B.
C.
D.
Correct Answer: Section: (none) Explanation
Explanation/Reference:
QUESTION 62
Which definitions can be used to allow consistent configuration of policies across multiple systems and can also be used for event reporting purposes?
A. hosts
B. software updates
C. Agent kits
D. registration control
E. groups
Correct Answer: E Section: (none) Explanation
Explanation/Reference:
QUESTION 63
Which two items make up Agent kits? (Choose two.)
A. groups
B. hosts
C. policies
D. rules
E. network shim
Correct Answer: AE Section: (none) Explanation
Explanation/Reference:
QUESTION 64
Which two types of rules apply to Windows systems only? (Choose two.)
A. Agent service control rules
B. clipboard access control rules
C. Agent UI control rules
D. COM component access control rules
E. data access control rules
Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 65
Which portion of an HTTP request is examined by data access control rules?
A. the TCP header
B. the UDP header
C. the URI portion of the request
D. the URL portion of the request
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 66
Which two types of rules are UNIX-only rules?
A. network interface control rules
B. COM component access control rules
C. connection rate limit rules
D. file access control rules
E. rootkit/kernel protection rules
Correct Answer: AE Section: (none) Explanation
Explanation/Reference:
QUESTION 67
Choose three types of rules that apply to both Windows and UNIX systems.
(Choose three.)
A. Agent service control rules
B. Agent UI control rules
C. application control rules
D. COM component access control rules
E. file version control rules
Correct Answer: ABC Section: (none) Explanation
Explanation/Reference:
QUESTION 68
What application is installed on the server after the CSA MC is installed?
A. Cisco Trust Agent
B. ACS
C. SQL
D. CSA
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 69
Which two attacks could an attacker use during the penetrate phase of an attack? (Choose two.)
A. install new code
B. modify configuration
C. ping scans
D. buffer overflow
E. erase files
F. e-mail attachment
Correct Answer: DF Section: (none) Explanation
Explanation/Reference:
Cisco 642-513 Questions & Answers covers all the knowledge points of the real exam. We update our product frequently so our customer can always have the latest version of Cisco 642-513. We provide our customers with the excellent 7×24 hours customer service.We have the most professional Cisco 642-513 expert team to back up our grate quality products.If you still cannot make your decision on purchasing our product, please try our Cisco 642-513 free pdf
100% Valid And Pass With latest Apple 9L0-401 exam dumps, you will never fail your Apple 9L0-401 exam.All the questions and answers are updated and added to the new version timely by our experts.Also now Flydumps is offering free Apple 9L0-401 exam VCE player and PDF files for free on their website.
QUESTION 20
You are in Terminal and have navigated to your Home folder. Which three commands can you type to display the contents of a file named MyFile that resides in your Home folder? (Choose THREE.)
A. cat MyFile
B. cat ../Myfile
C. cat ~MyFile
D. cat ./MyFile
E. cat ~/MyFile
Correct Answer: ADE Section: (none) Explanation
Explanation/Reference:
QUESTION 21
What are two security advantages of using SSH to log in to a remote computer? (Choose TWO.)
A. SSH requires a strong password.
B. SSH traffic is encrypted on the network.
C. SSH passwords are stored in the Keychain.
D. SSH logins must be enabled by an administrator.
E. SSH connections must be made from a static IP address.
Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 22
Which command in Terminal lets you move to the top level of your hard drive from any location in the file system?
A. cd ~
B. cd /
C. cd \
D. cd ..
Correct Answer: B Section: (none)Explanation
Explanation/Reference:
QUESTION 23
Press Exhibit to view the image. In the Finder, Chris creates a folder in her home directory and sets the permissions as shown in the exhibit. In Terminal, Chris types: ls -l ~ and presses Return. What permissions are shown for the new folder?
A. -rwx-wx-wx
B. drw–w–w-
C. drwx-wx-wx
D. drw–wx-wx
E. -rw–wx-wx
Correct Answer: C Section: (none)Explanation
Explanation/Reference:
QUESTION 24
Which two procedures will let a Mac OS X v10.4 user view a file ownership and access permissions? (Choose TWO.)
A. Run the ls -l command in Terminal.
B. View the file in Column View in the Finder.
C. Press the Verify Permissions button in Disk Utility.
D. Select the file and choose Get Info from the File menu.
E. Click the Permissions tab in Apple System Profiler and select the file.
Correct Answer: AD Section: (none) Explanation
Explanation/Reference:
QUESTION 25
What are three ways to access the command line in Mac OS X v10.4? (Choose THREE.)
A. Launch Console.
B. Launch Terminal.
C. Launch Network Utility.
D. Start up in verbose mode.
E. Log in remotely using SSH.
F. Start up in single user mode.
G. Choose Command from the Apple menu.
Correct Answer: BEF Section: (none) Explanation
Explanation/Reference:
QUESTION 26
Which three shortcuts can be used in Terminal in Mac OS X v10.4? (Choose THREE.)
A. Press Tab to complete an unambiguous path.
B. Type ~~/ to go to the System Administrator home folder.
C. Drag a Finder item into the Terminal window to auto-enter its path.
D. Press the Up Arrow key to reuse a previously executed command.
E. Type a command and press F9 to see the man page for that command in a new window.
F. Type and press Return to see all commands you have entered in your current Terminal session.
Correct Answer: ACD Section: (none)Explanation
Explanation/Reference:
QUESTION 27
You have configured your Mac OS X v10.4 computer to share a USB printer. Mac OS X users can locate and print to it, but Windows users cannot. What additional step must you take to allow Windows users to print to your shared USB printer?
A. In Printer Setup Utility choose Windows from the Printer Sharing menu.
B. In Printer Setup Utility choose Windows Printing from the Printers menu.
C. In the Services pane of Sharing preferences click the Windows Sharing checkbox.
D. In the Sharing pane of Print & Fax preferences click the Windows Printing checkbox.
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 28
In Mac OS X v10.4, how do you enable printing to a printer shared by a Windows computer?
A. In Printer Setup Utility, select the workgroup and printer from the Default Browser pane in the Printer Browser window, and click Add.
B. From the Printing pane of Print & Fax preferences, choose Windows Printers in the pop-up menu, then select the workgroup and printer.
C. In the Print dialog, choose the workgroup from the Windows Printer entry in the Printer pop-up menu, then select the printer from the list.
D. In Printer Setup Utility, click More Printers in the Printer Browser window and choose Windows Printing from the pop-up menu, then choose the workgroup, select the printer, and click Add.
Correct Answer: D Section: (none)Explanation
Explanation/Reference:
QUESTION 29
Press Exhibit to view the image. When Chris prints a PDF document to a network laser printer, the lower half of the last line at the bottom of each page does not print, as shown in the exhibit. When other users print this document to the same printer, the last line prints properly. What is the MOST LIKELY cause of this problem?
A. The printing system needs to be reset from Printer Setup Utility.
B. Chris did not select the Full Page option in the Page Setup dialog.
C. Chris added the printer via AppleTalk instead of Bonjour in Printer Setup Utility.
D. The correct printer is not chosen in the ormat for?pop-up menu in the Page Setup dialog.
Correct Answer: D Section: (none)Explanation
Explanation/Reference:
QUESTION 30
How do you configure your Mac OS X v10.4 computer to allow other Mac OS X computers to send faxes through your computer?
A. In Printer Setup Utility, choose Enable Sharing from the Fax/Modem menu.
B. Click the checkbox for Fax Sharing in the Services pane of Sharing preferences.
C. Select Printer Sharing in the Services pane of Sharing preferences, and click the llow fax sharing? checkbox.
D. Enable the et others send faxes through this computer?option in the Sharing pane of Print & Fax preferences.
Correct Answer: D Section: (none)Explanation
Explanation/Reference:
QUESTION 31
Which two computers below meet the minimum hardware requirements for installing Mac OS X v10.4? (Choose TWO.)
A. iMac 233 MHz (revision B) / 256 MB RAM / 4 GB available disk space
B. iMac DV SE G3 (CRT) / 512 MB RAM / 4 GB available disk space
C. Power Macintosh G3 / 128 MB RAM / 3 GB available disk space
D. Power Macintosh G5 / 512 MB RAM / 2 GB available disk space
E. iBook G3 (FireWire) / 320 MB RAM / 3 GB available disk space
Correct Answer: BE Section: (none) Explanation
Explanation/Reference:
QUESTION 32
What is one task the Migration Assistant performs in Mac OS X v10.4?
A. Migrates all user data that resides on diverse computers onto a single computer.
B. Configures its host computer with settings from the Mac OS 9 Multiple Users control panel.
C. Prepares its host computer to be reassigned to another user by storing all user information in a disk image.
D. Configures its host computer with user data and settings from another computer attached in target disk
mode.
Correct Answer: D Section: (none) Explanation
Explanation/Reference:
QUESTION 33
You have to update multiple computers with Apple’s latest software updates. How do you accomplish this with Software Update, so that the task requires the least possible Internet bandwidth?
A. Choose Copy Update to Multiple Computers from the Update menu in Software Update on one computer, and click Download.
B. Choose Download Checked Items from the Update menu in Software Update on one computer, then distribute the updates manually or over the local area network.
C. Download the update packages on one computer, and store them in the /Network/Software Updates folder; this folder will be searched first automatically by Software Update when it runs on the other computers.
D. Run Software Update on one computer, then turn on Software Update Sharing in the Sharing preferences; when Software Update runs on the other computers, it will preferentially download software updates from the local computer.
Correct Answer: B Section: (none)Explanation
Explanation/Reference:
QUESTION 34
Mac OS X v10.4 can be installed on volumes formatted as ________ or ________. (Choose TWO.)
A. Mac OS Standard
B. NT File System (NTFS)
C. UNIX File System (UFS)
D. Mac OS Extended (Journaled)
E. File Allocation Table 32 bit (FAT32)
Correct Answer: CD Section: (none) Explanation
Explanation/Reference:
QUESTION 35
To identify which firmware version a Mac OS X v10.4 computer has, ________.
A. open System Profiler
B. choose About This Mac
C. start up in verbose mode
D. start up in single user mode
Correct Answer: A Section: (none)Explanation Explanation/Reference:
QUESTION 36
Deborah installed a utility that downloads movies from her Mac OS X v10.4 computer to a digital video recorder (DVR), so she can play them on her television. But the DVR is only able to access the movies files on her computer while she has the firewall on the computer turned off. How can Deborah configure her system to allow the DVR to access movie files on her computer while the firewall is on?
A. Using a text editor, add the port numbers used by the movie sharing utility to /etc/firewall.plist.
B. In the Firewall pane of Network preferences, enter the range of ports used by the movie sharing utility in the Allow list.
C. Using the Firewall Manager utility, add the port numbers used by the sharing utility to /etc/firewall.plist, then enable the ports in the Firewall pane of Sharing preferences.
D. In the Firewall pane of Sharing preferences, create a new port definition with the port numbers used by the movie sharing utility, then turn the port on in the firewall list of ports.
Correct Answer: D Section: (none)Explanation
Explanation/Reference:
QUESTION 37
Phil has enabled Personal Web Sharing on a Mac OS X computer with the domain name finance.pretendco.com. He has put HTML files in /Users/phil/Sites. Web browsers on other computers can access those files at ________.
A. http://phil.finance.pretendco.com/
B. http://www.finance.pretendco.com/
C. http://finance.pretendco.com/~phil/
D. http://finance.pretendco.com/Users/phil/
Correct Answer: C Section: (none) Explanation
Explanation/Reference:
QUESTION 38
Mac OS X v10.4 administrator users can enable a personal firewall by clicking Start in the Firewall pane of ________.
A. Network Utility
B. NetInfo Manager
C. Sharing preferences
D. Network preferences
Correct Answer: C Section: (none) Explanation
Explanation/Reference: QUESTION 39
Which statement represents a valid concern when enabling FTP on a Mac OS X v10.4 computer?
A. FTP service on Mac OS X v10.4 does not use usernames or passwords.
B. FTP service on Mac OS X v10.4 requires the firewall service to be turned off.
C. FTP service on Mac OS X v10.4 is compatible only with other Mac OS X computers.
D. Remote users who connect to the computer over FTP can access files outside of their home directory.
Correct Answer: D Section: (none)Explanation
Explanation/Reference:
QUESTION 40
An administrator, Tina, has enabled Personal File Sharing on a Mac OS X computer. Warren has a standard user account on that computer. What two share points will be available for Tina to mount when she connects via AFP using her admin account? (Choose TWO.)
A. /Users/Public
B. /Users/Shared
C. Tina home folder
D. Warren home folder
E. Macintosh HD (the boot volume)
Correct Answer: CE Section: (none)Explanation
Explanation/Reference:
latest Apple 9L0-401 exam is one of popular Certification.Many candidates won’t have confidence to get latest Apple 9L0-401. Now We guaranteed latest Apple 9L0-401 exam training is available in various formats to best suit your needs and learning style.Whether you are a hands-on tactile learner,visually or even a textbook training veteran,Flydumps has latest Apple 9L0-401 resources that will enable you to pass your Apple 9L0-401 test with flying colors.As with Cisco exams,the Apple 9L0-401 exam is structured to stack or plug into other related courses.The combination of Apple 9L0-401 courses builds the complete core knowledge base you need to meet your Apple 9L0-401 certification requirements.