Enter your email address:

Delivered by FeedBurner

NS0-910 Network Appliance NetCache Internet Access and Security Exam Part 2

http://www.aroopam.com/Which TWO are most probable side-effects of authentication in a transparent deployment? (Choose 2) A - In a Network Address Translation environment, users may obtain shared privileges, never be challenged, or both. B - Its conformance with HTTP 1.1 specification is lost. C - It reduces the number of authentication prompts to the end user. D - It simplifies setup of the NetCache and authentication server. Answer: A, B ________ consistency should be used for service farms that run more than one version of a service, and differences in results are expected to be minor and not noticeable. A - Strong B - Weak C - lBW D - Mixed Answer: B Which ICAP vectoring method does the anti-virus scanning use? A - RESPMOD_PRECACHE B - REQMOD_PRECACHE C - RESPMOD_POSTCACHE D - REQMOD_POSTCACHE Answer: A Which FOUR are licensed protocols? (Choose 4) A - DNS caching B - ICAP C - HTTPS Proxy D - HTTP Proxy E - GRM Server Answer: B, C, D, E Which THREE are advantages of using NetCache as an accelerator? (Choose 3) A - It can offload traffic from a Web server. B - It shields a Web server from the Internet. C - It reduces firewall workload. D - It places content closer to the user. Answer: A, B, C Which FOUR steps are necessary to test that authentication is working properly with NTLM? (Choose 4) A - configure NTLM authentication B - add the appropriate ACLs to use authentication C - visit a Web site through the NetCache proxy D - inspect the Web Access log files for authentication activity E - enable packet tracing with pktt and analyzee the results Answer: A, B, C, D What is the advantage of using multiple authentication servers with a NetCache appliance? A - NetCache will deny requests if authentication isn’t provided within 200ms. B - They ensure authenticated access if authentication server fails. C - They ensure authenticated access across multiple domains. D - Authentication uses encryption and is CPU-intensive. Answer: B Which ACL action is used to send a REQMOD_PRECACHE request to an ICAP service without processing additional ACL5? A - icap B - icap_now C - attribute D - acl icap Answer: B The NetCache appliance supports up to _____ SNMP communities. A - 4 B - 8 C - 16 D - 32 Answer: B Which protocol entries are recorded in the Web access log rile? A - HTTP, FTP, RTSP B - HTTP, FTP, Gopher C - RTSP,NNTP D - Telnet, SNMP, SSH Answer: B Given the following entry from the Web Access log, what is the first column? 1098830250.899 0.001 10.41.72.45 TCP_HIT_ACCESS_DENIED/407 496 GET http://trainerslisting.com “” A - the size in bits B - the time stamp in Greenwich standard time C - the ID of the request D - the time stamp in UNIX epoch time Answer: D What is the difference between TOP_MISS/200 and TOP_HIT/200? A.  The “miss” means that the requested object could not be found and an error is returned to the client. The “hit” means that TCP is used. B.  The “miss” means...that the NetCache will use UDP instead. A “hit” means that TOP is used. C.  he “miss” means...retrieved by the NetCache appliance. The “hit’ means that the NetCache appliance already. D.  The “miss” means that the object was in the cache but not available because either its TTL expired or the entry was flagged by a third party content filter such as a virus scanner. The “hit” means that the TTL was still current. Answer: C Of the following choices, which TWO are paths to configure logging? (Choose 2) A - Setup> System> Logging B - Setup> Maintenance > Logging C - Setup> HTTP > Logging D - Setup> Utilities > Logging Answer: A, C Which TWO are most probable side-effects of authentication in a transparent deployment?(Choose 2)A - In a Network Address Translation environment, users may obtain shared privileges, never bechallenged, or both.B - Its conformance with HTTP 1.1 specification is lost.C - It reduces the number of authentication prompts to the end user.D - It simplifies setup of the NetCache and authentication server.Answer: A, B________ consistency should be used for service farms that run more than one version of aservice, and differences in results are expected to be minor and not noticeable.A - StrongB - WeakC - lBWD - MixedAnswer: BWhich ICAP vectoring method does the anti-virus scanning use?A - RESPMOD_PRECACHEB - REQMOD_PRECACHEC - RESPMOD_POSTCACHED - REQMOD_POSTCACHEAnswer: AWhich FOUR are licensed protocols? (Choose 4)A - DNS cachingB - ICAPC - HTTPS ProxyD - HTTP ProxyE - GRM ServerAnswer: B, C, D, EWhich THREE are advantages of using NetCache as an accelerator? (Choose 3)A - It can offload traffic from a Web server.B - It shields a Web server from the Internet.C - It reduces firewall workload.D - It places content closer to the user.Answer: A, B, CWhich FOUR steps are necessary to test that authentication is working properly with NTLM?(Choose 4)A - configure NTLM authenticationB - add the appropriate ACLs to use authenticationC - visit a Web site through the NetCache proxyD - inspect the Web Access log files for authentication activityE - enable packet tracing with pktt and analyzee the resultsAnswer: A, B, C, DWhat is the advantage of using multiple authentication servers with a NetCache appliance?A - NetCache will deny requests if authentication isn’t provided within 200ms.B - They ensure authenticated access if authentication server fails.C - They ensure authenticated access across multiple domains.D - Authentication uses encryption and is CPU-intensive.Answer: BWhich ACL action is used to send a REQMOD_PRECACHE request to an ICAP service withoutprocessing additional ACL5?A - icapB - icap_nowC - attributeD - acl icapAnswer: BThe NetCache appliance supports up to _____ SNMP communities.A - 4B - 8C - 16D - 32Answer: BWhich protocol entries are recorded in the Web access log rile?A - HTTP, FTP, RTSPB - HTTP, FTP, GopherC - RTSP,NNTPD - Telnet, SNMP, SSHAnswer: BGiven the following entry from the Web Access log, what is the first column?1098830250.899 0.001 10.41.72.45 TCP_HIT_ACCESS_DENIED/407 496 GEThttp://trainerslisting.com “”A - the size in bitsB - the time stamp in Greenwich standard timeC - the ID of the requestD - the time stamp in UNIX epoch timeAnswer: DWhat is the difference between TOP_MISS/200 and TOP_HIT/200?A.  The “miss” means that the requested object could not be found and an error is returned to theclient. The “hit” means that TCP is used.B.  The “miss” means...that the NetCache will use UDP instead. A “hit” means that TOP is used.C.  he “miss” means...retrieved by the NetCache appliance. The “hit’ means that the NetCacheappliance already.D.  The “miss” means that the object was in the cache but not available because either its TTLexpired or the entry was flagged by a third party content filter such as a virus scanner. The“hit” means that the TTL was still current.Answer: COf the following choices, which TWO are paths to configure logging? (Choose 2)A - Setup> System> LoggingB - Setup> Maintenance > LoggingC - Setup> HTTP > LoggingD - Setup> Utilities > LoggingAnswer: A, C

No comments:

Post a Comment

Leave Your Valuable Opinion