Enter your email address:

Delivered by FeedBurner

NS0-910 Network Appliance NetCache Internet Access and Security Exam Part 5


Which TWO of the following can be performed by using a proxy.pac file? (Choose 2)
A - provide for failover protection
B - check web pages for worms or viruses
C - distribute requests to different NetCache proxy servers
D - shut down the computer if the user doesn’t authenticate promptly
Answer: A, C
Given the following service farm configuration, which request will be directed to the ICAP
application?
config.icapv1 .farm3.attr http://aroopam.comREQMOD_PRECACHE on rr on weak
A - Requests about to be initiated by NetCache to the server
B - Requests from the client before NetCache has initiated a request to the server
C - Requests from the client after NetCache has initiated a request to the server
D - Responses to requests initiated by NetCache after being cached on disk
E - Responses to requests initiated by NetCache before being cached on disk
Answer: B
Where is authentication server information logged?
A - Web Access log
B - Messages log
C - FTP log
D - client browser
E - SMB Instant Messaging
Answer: B
What is the advantage of using multiple authentication servers with a NetCache appliance?
A - NetCache will deny requests if authentication isn’t provided within 200ms.
B - They ensure authenticated access if authentication server fails.
C - They ensure authenticated access across multiple domains.
D - Authentication uses encryption and is CPU-intensive.
Answer: B
Which FOUR are licensed protocols? (Choose 4)
A - DNS caching
B - ICAP
C - HTTPS Proxy
D - HTTP Proxy
E - GRM Server
Answer: B, C, D, E
Which FOUR are key steps in the authentication process? (Choose 4)
A - verify protocol authentication settings (authenticates the user)
B - verity ACL permission settings for the applicable group in the NetCache user database
C - verify whether SmartFilter or WebWasher DynaBLocator denies the request
D - verify connectivity to logging server
E - allow or deny the request, based on the results of the authentication process
Answer: A, B, C, E
Which FOUR will best prevent client disruption caused by hardware failure when using multiple
proxies? (Choose 4)
A - load balancer
B - round-robin DNS
C - direct browser configuration
D - transparency utilizing WCCP
E - autoconfiguration using a proxy.pac file
Answer: A, B, D, E
Which TWO of the following server types can function as a logging target for NetCache? (Choose
2)
A - FTP
B - CIFS
C - HTTP
D - NFS
Answer: A, C
Which FOUR steps are necessary to test that authentication is working properly with NTLM?
(Choose 4)
A - configure NTLM authentication
B - add the appropriate ACLs to use authentication
C - visit a Web site through the NetCache proxy
D - inspect the Web Access log files for authentication activity
E - enable packet tracing with pktt and analwe the results
Answer: A, B, C, D
________ consistency should be used for service farms that run more than one version of a
service, and differences in results are expected to be minor and not noticeable.
A - Strong
B - Weak
C - IBW
D - Mixed
Answer: B
Which TWO are most probable side-effects of authentication in a transparent deployment?
(Choose 2)
A - In a Network Address Translation environment, users may obtain shared privileges, never be
challenged, or both.
B - Its conformance with HTTP 1.1 specification is lost.
C - It reduces the number of authentication prompts to the end user.
D - It simplifies setup of the NetCache and authentication server.
Answer: A, B
Given the following service farm configuration, which requests will be scanned by the ICAP
server? config.icapv1 .farm0.attr = marketing_resp RESPMOD_PRECACHE on rr on weak
A - responses before being sent to NetCache
B - responses from NetCache
C - responses before being sent to the ICAP server
D - responses from the Internet
Answer: C
Which ACL action is used to send a REQMOD_PRECACHE request to an ICAP service without
processing additional ACLs?
A - icap
B - icap_now
C - attribute
D - ad idap
Answer: B
In what TWO places do you enter License keys? (Choose2)
A - command line with the license command
B - the Appliance Manager
C - SNMP agents.
D - the admin host or domain controller
Answer: A, B
Which vector point is used to route an object to the ICAP server from NetCache, but before the
data is requested from the Web server?
A - REQMOD_PRECACHE
B - REQMOD_PDSTCACHE
C - RESPMOD_PRECACHE
D - RESPMOD_POSTCACHE
Answer: B
Which THREE are advantages of using NetCache as an accelerator? (Choose 3)
A - It can offload traffic from a Web server.
B - It shields a Web server from the Internet.
C - It reduces firewall workload.
D - It places content closer to the user.
Answer: A, B, C
Which authentication methods, used to receive client credentials, are performed once per
connection instead of performed once per request?
A - NTLM and Kerberos
B - LDAP and Basic
C - FTP and NTP
D - RADIUS and challenge-response
Answer: A
Which THREE are access methods for the NetCache appliance? (Choose 3)
A - transparent (indirect) access
B - non-transparent (direct) access
C - request routing for content distribution networks
D  - protocol routing for content distribution networks
Answer: A, B, C
When NetCache is implemented as a reverse proxy (accelerator), which FOUR of the following
protocols can be accelerated? (Choose 4)
A - HTTP
B - NTP
C - MMS
D - RTSP
E - HTTPS
Answer: A, C, D, E
Which THREE of these Internet protocols are supported for ICAP virus scanning? (Choose 3)
A - HTTP
B - FTP
C - HTTPS
D - HTTP over FTP
Answer: A, B, D
Which THREE are necessary for capacity planning? (Choose 3)
A - number of users
B - operating systems of users
C - type of work or activity
D - expected load at peak intervals
Answer: A, C, D
What is the difference between the following two ACLs?
Deny url matches “.”.org”
Deny server-domain contains “org’
A - The first ACL reads the entire URL, the second ACL reads only the server-domain field in the
URL.
B - The first ACL is more efficient because it uses regular expressions and will match more UPLs.
C - The first ACL is a syntax that is specific to the HTTP protocol only, while the second URL is a
general purpose ACL.
D - The first ACL uses incorrect syntax and will cause an error message. The second ACL is
correct.
Answer: A
Given the following ACL, if Bob is in group 1, when is he allowed? > allow group grp1 and time
9:00am - 5:00pm> deny group grp2 > deny any
A - Bob has access between 9:00 AM through 5:00 PM.
B - Bob has access after 5:00 PM and until 9:00 AM.
C - Bob has access regardless of the time because he is in group 1.
D - Bob has access either when he is a member of group 1 or between 9:00 AM and 5:00 PM.
Answer: A
Which TWO of the following can be performed by using a proxy.pac file? (Choose 2)A - provide for failover protectionB - check web pages for worms or virusesC - distribute requests to different NetCache proxy serversD - shut down the computer if the user doesn’t authenticate promptlyAnswer: A, CGiven the following service farm configuration, which request will be directed to the ICAPapplication?config.icapv1 .farm3.attr http://aroopam.comREQMOD_PRECACHE on rr on weakA - Requests about to be initiated by NetCache to the serverB - Requests from the client before NetCache has initiated a request to the serverC - Requests from the client after NetCache has initiated a request to the serverD - Responses to requests initiated by NetCache after being cached on diskE - Responses to requests initiated by NetCache before being cached on diskAnswer: BWhere is authentication server information logged?A - Web Access logB - Messages logC - FTP logD - client browserE - SMB Instant MessagingAnswer: BWhat is the advantage of using multiple authentication servers with a NetCache appliance?A - NetCache will deny requests if authentication isn’t provided within 200ms.B - They ensure authenticated access if authentication server fails.C - They ensure authenticated access across multiple domains.D - Authentication uses encryption and is CPU-intensive.Answer: BWhich FOUR are licensed protocols? (Choose 4)A - DNS cachingB - ICAPC - HTTPS ProxyD - HTTP ProxyE - GRM ServerAnswer: B, C, D, EWhich FOUR are key steps in the authentication process? (Choose 4)A - verify protocol authentication settings (authenticates the user)B - verity ACL permission settings for the applicable group in the NetCache user databaseC - verify whether SmartFilter or WebWasher DynaBLocator denies the requestD - verify connectivity to logging serverE - allow or deny the request, based on the results of the authentication processAnswer: A, B, C, EWhich FOUR will best prevent client disruption caused by hardware failure when using multipleproxies? (Choose 4)A - load balancerB - round-robin DNSC - direct browser configurationD - transparency utilizing WCCPE - autoconfiguration using a proxy.pac fileAnswer: A, B, D, EWhich TWO of the following server types can function as a logging target for NetCache? (Choose2)A - FTPB - CIFSC - HTTPD - NFSAnswer: A, CWhich FOUR steps are necessary to test that authentication is working properly with NTLM?(Choose 4)A - configure NTLM authenticationB - add the appropriate ACLs to use authenticationC - visit a Web site through the NetCache proxyD - inspect the Web Access log files for authentication activityE - enable packet tracing with pktt and analwe the resultsAnswer: A, B, C, D________ consistency should be used for service farms that run more than one version of aservice, and differences in results are expected to be minor and not noticeable.A - StrongB - WeakC - IBWD - MixedAnswer: BWhich TWO are most probable side-effects of authentication in a transparent deployment?(Choose 2)A - In a Network Address Translation environment, users may obtain shared privileges, never bechallenged, or both.B - Its conformance with HTTP 1.1 specification is lost.C - It reduces the number of authentication prompts to the end user.D - It simplifies setup of the NetCache and authentication server.Answer: A, BGiven the following service farm configuration, which requests will be scanned by the ICAPserver? config.icapv1 .farm0.attr = marketing_resp RESPMOD_PRECACHE on rr on weakA - responses before being sent to NetCacheB - responses from NetCacheC - responses before being sent to the ICAP serverD - responses from the InternetAnswer: CWhich ACL action is used to send a REQMOD_PRECACHE request to an ICAP service withoutprocessing additional ACLs?A - icapB - icap_nowC - attributeD - ad idapAnswer: BIn what TWO places do you enter License keys? (Choose2)A - command line with the license commandB - the Appliance ManagerC - SNMP agents.D - the admin host or domain controllerAnswer: A, BWhich vector point is used to route an object to the ICAP server from NetCache, but before thedata is requested from the Web server?A - REQMOD_PRECACHEB - REQMOD_PDSTCACHEC - RESPMOD_PRECACHED - RESPMOD_POSTCACHEAnswer: BWhich THREE are advantages of using NetCache as an accelerator? (Choose 3)A - It can offload traffic from a Web server.B - It shields a Web server from the Internet.C - It reduces firewall workload.D - It places content closer to the user.Answer: A, B, CWhich authentication methods, used to receive client credentials, are performed once perconnection instead of performed once per request?A - NTLM and KerberosB - LDAP and BasicC - FTP and NTPD - RADIUS and challenge-responseAnswer: AWhich THREE are access methods for the NetCache appliance? (Choose 3)A - transparent (indirect) accessB - non-transparent (direct) accessC - request routing for content distribution networksD  - protocol routing for content distribution networksAnswer: A, B, CWhen NetCache is implemented as a reverse proxy (accelerator), which FOUR of the followingprotocols can be accelerated? (Choose 4)A - HTTPB - NTPC - MMSD - RTSPE - HTTPSAnswer: A, C, D, EWhich THREE of these Internet protocols are supported for ICAP virus scanning? (Choose 3)A - HTTPB - FTPC - HTTPSD - HTTP over FTPAnswer: A, B, DWhich THREE are necessary for capacity planning? (Choose 3)A - number of usersB - operating systems of usersC - type of work or activityD - expected load at peak intervalsAnswer: A, C, DWhat is the difference between the following two ACLs?Deny url matches “.”.org”Deny server-domain contains “org’A - The first ACL reads the entire URL, the second ACL reads only the server-domain field in theURL.B - The first ACL is more efficient because it uses regular expressions and will match more UPLs.C - The first ACL is a syntax that is specific to the HTTP protocol only, while the second URL is ageneral purpose ACL.D - The first ACL uses incorrect syntax and will cause an error message. The second ACL iscorrect.Answer: AGiven the following ACL, if Bob is in group 1, when is he allowed? > allow group grp1 and time9:00am - 5:00pm> deny group grp2 > deny anyA - Bob has access between 9:00 AM through 5:00 PM.B - Bob has access after 5:00 PM and until 9:00 AM.C - Bob has access regardless of the time because he is in group 1.D - Bob has access either when he is a member of group 1 or between 9:00 AM and 5:00 PM.Answer: A
A customer wants to set up their Centera as CPP and wants to know approximately how muchmore space can be available compared to CPM. What should the CE tell the customer? A. 20% B. 40% C. 60% D. 80% Answer: A

No comments:

Post a Comment

Leave Your Valuable Opinion