Enter your email address:

Delivered by FeedBurner

NS0-910 Network Appliance NetCache Internet Access and Security Exam Part 1

Which THREE of these Internet protocols are supported for ICAP virus scanning? (Choose 3) A - HTTP B - FTP C - HTTPS D - HTTPoverFTP Answer: A, B, D Which THREE are necessary for capacity planning? (Choose 3) A - number of users B - operating systems of users C - type of work or activity D - expected load at peak intervals Answer: A, C, D In what TWO places do you enter License keys? (Choose2) A - command line with the license command B - the Appliance Manager C - SNMP agents. D - the admin host or domain controller Answer: A, B Which THREE are access methods for the NetCache appliance? (Choose 3) A - transparent (indirect) access B - non-transparent (direct) access C - request routing for content distribution networks D - protocol routing for content distribution networks Answer: A, B, C Which FOUR will best prevent client disruption caused by hardware failure when using multiple proxies? (Choose 4) A - load balancer B - round-robin DNS C - direct browser configuration D - transparency utilizing WCCP F - auto configuration using a proxy.pac file Answer: A, B, D, E Where is authentication server information logged? A - Web Access log B - Messages log C - FTP log D - client browser E - SMB Instant Messaging Answer: B Given the following service farm configuration, which request will be directed to the ICAP application? config.icapv1 .farm3.attr http://trainerslisting.comREOMOD_PRECACHE on rr on weak A - Requests about to be initiated by NetCache to the server B - Requests from the client before NetCache has initiated a request to the server C - Requests from the client after NetCache has initiated a request to the server D - Responses to requests initiated by NetCache after being cached on disk E - Responses to requests initiated by NetCache before being cached on disk Answer: B Which TWO of the following can be performed by using a proxy.pac file? (Choose 2) A - provide for failover protection B - check web pages for worms or viruses C - distribute requests to different NetCache pros servers D - shut down the computer if the user doesn’t authenticate promptly Answer: A, C A router performs which one of the following functions for NetCache proxies? A - It fragments large packets into smaller chunks that the NetCache appliance can handle. B - It tags Etherchannel packets for pre-processing. C - It delivers inbound packets from other networks and sends outbound packets destined for other networks. D - It strips virus packets out before they can infect the NetCache appliance. Answer: C Which FOUR cache control headers below are valid? (Choose 4) A - Cache-Control: no-cache B - Pragma: do-not-cache C - Cache-Control: no-store D - Cache-Control: private E - Pragma: no-cache Answer: A, C, D, E When NetCache is implemented as a reverse proxy (accelerator), which FOUR of the following protocols can be accelerated? (Choose 4) A - HTTP B - NTP C - MMS D - RTSP E - HTTPS Answer: A, C, D, E Which THREE of these Internet protocols are supported for ICAP virus scanning? (Choose 3)A - HTTPB - FTPC - HTTPSD - HTTPoverFTPAnswer: A, B, DWhich THREE are necessary for capacity planning? (Choose 3)A - number of usersB - operating systems of usersC - type of work or activityD - expected load at peak intervalsAnswer: A, C, DIn what TWO places do you enter License keys? (Choose2)A - command line with the license commandB - the Appliance ManagerC - SNMP agents.D - the admin host or domain controllerAnswer: A, BWhich THREE are access methods for the NetCache appliance? (Choose 3)A - transparent (indirect) accessB - non-transparent (direct) accessC - request routing for content distribution networksD - protocol routing for content distribution networksAnswer: A, B, CWhich FOUR will best prevent client disruption caused by hardware failure when using multipleproxies? (Choose 4)A - load balancerB - round-robin DNSC - direct browser configurationD - transparency utilizing WCCPF - auto configuration using a proxy.pac fileAnswer: A, B, D, EWhere is authentication server information logged?A - Web Access logB - Messages logC - FTP logD - client browserE - SMB Instant MessagingAnswer: BGiven the following service farm configuration, which request will be directed to the ICAPapplication? config.icapv1 .farm3.attr http://trainerslisting.comREOMOD_PRECACHE on rron weakA - Requests about to be initiated by NetCache to the serverB - Requests from the client before NetCache has initiated a request to the serverC - Requests from the client after NetCache has initiated a request to the serverD - Responses to requests initiated by NetCache after being cached on diskE - Responses to requests initiated by NetCache before being cached on diskAnswer: BWhich TWO of the following can be performed by using a proxy.pac file? (Choose 2)A - provide for failover protectionB - check web pages for worms or virusesC - distribute requests to different NetCache pros serversD - shut down the computer if the user doesn’t authenticate promptlyAnswer: A, CA router performs which one of the following functions for NetCache proxies?A - It fragments large packets into smaller chunks that the NetCache appliance can handle.B - It tags Etherchannel packets for pre-processing.C - It delivers inbound packets from other networks and sends outbound packets destined forother networks.D - It strips virus packets out before they can infect the NetCache appliance.Answer: CWhich FOUR cache control headers below are valid? (Choose 4)A - Cache-Control: no-cacheB - Pragma: do-not-cacheC - Cache-Control: no-storeD - Cache-Control: privateE - Pragma: no-cacheAnswer: A, C, D, EWhen NetCache is implemented as a reverse proxy (accelerator), which FOUR of the followingprotocols can be accelerated? (Choose 4)A - HTTPB - NTPC - MMSD - RTSPE - HTTPSAnswer: A, C, D, E

No comments:

Post a Comment

Leave Your Valuable Opinion