VCP-510 Fragenkatalog

Microsft VCP-510 Fragenkatalog Testfragen IT-Pruefung Schulungsunterlagen auf deutsch VCP-510 VCP-510 www.it-pruefungen.ch

Sie
sind als Desktopsupporttechniker für das Unternehmen
it-pruefungen.ch tätig. Das Firmennetzwerk besteht aus einer
einzelnen Active Directory Domäne mit dem Namen
it-pruefungen.ch.de. Auf allen Clientcomputern wird das
Betriebssystem Microsoft Windows 7 ausgeführt.
Die Geschäftsführung
erlässt eine neue Direktive, die es den Benutzern untersagt,
Wechseldatenträger auf ihren Computern zu installieren.
Sie müssen sicherstellen, dass die neue Direktive eingehalten wird.
Wie gehen Sie vor?

A.Aktivieren Sie die Gruppenrichtlinieneinstellung WPD-Geräte: Lesezugriff verweigern.
B.Aktivieren Sie die Gruppenrichtlinieneinstellung Wechseldatenträger: Lesezugriff verweigern.

C.Aktivieren Sie die Gruppenrichtlinieneinstellung Installation von
Geräten mit Treibern zulassen, die diesen Gerätesetupklassen
entsprechen.
D.Aktivieren Sie die Gruppenrichtlinieneinstellung Installation von Wechselgeräten verhindern.

Korrekte Antwort: D

Microsft Schulungsunterlagen auf deutsch

Microsft VCP-510  Fragenkatalog Testfragen IT-Pruefung Schulungsunterlagen auf deutsch VCP-510 VCP-510 www.it-pruefungen.ch

Sie sind als Desktopsupporttechniker für das Unternehmen
it-pruefungen.ch tätig. Das Firmennetzwerk besteht aus einer
einzelnen Active Directory Domäne mit dem Namen
it-pruefungen.ch.de. Auf allen Clientcomputern der Domäne wird
Microsoft Windows 7 ausgeführt.
Sie verwenden einen Clientcomputer
mit dem Namen Desktop1. Sie möchten Hardware- und Softwareprobleme
identifizieren, die in den letzten sechs Monaten auf Ihrem Computer
aufgetreten sind.
Wie gehen Sie vor?

A.Verwenden Sie die
Konsole Leistungsüberwachung und prüfen Sie die Ergebnisse des
Sammlungssatzes System Performance (Systemleistung).
B.Erstellen Sie mit Hilfe der Leistungsüberwachung einen benutzerdefinierten Sammlungssatz und prüfen Sie die Ergebnisse.
C.Prüfen Sie die Ereignisse im Diagramm des Zuverlässigkeitsverlaufes.
D.Erstellen Sie einen Sammlungssatz vom Typ Ereignisablaufverfolgungssitzung und prüfen Sie die Ergebnisse.

Korrekte Antwort: C

Microsft Schulungsunterlagen auf deutsch

Microsft VCP-510  Fragenkatalog Testfragen IT-Pruefung Schulungsunterlagen auf deutsch VCP-510 VCP-510 www.it-pruefungen.ch

LOT-980 LOT-980 LOT-980

LOT-980 LOT-980 LOT-980 www.it-pruefungen.ch

Prüfungsnummer : LOT-980

Prüfungsname: IBM Lotus Notes Domino 8.5 System Administration Operating Fundamentals

Version : Demo

1. John registered a new server. In which one of the following was the
Server document placed?
A. NAMES.NSF
B. CERTLOG.NSF
C. CATALOG.NSF
D. DIRECTORY.NSF
Answer: A

LOT-980 LOT-980 LOT-980 www.it-pruefungen.ch

2.Which one of the following group types is used to prevent access to
Domino servers?
A. Mail only
B. Servers only
C. Deny list only
D. Access Control List only
Answer: C

LOT-980 LOT-980 LOT-980 www.it-pruefungen.ch

3. Jon registered a new user. Which one of the following authentication
elements is NOT found in
that user’s ID file?
A. Public key
B. Privatekey
C. Certificates
D. HTTP password
Answer: D

LOT-980 LOT-980 LOT-980 www.it-pruefungen.ch

LOT-956 LOT-956 LOT-956

LOT-956 LOT-956 LOT-956 www.it-pruefungen.ch

Prüfungsnummer : LOT-956

Prüfungsname: IBM Lotus Notes Domino 8.5 System Administration
Update

Version : Demo

1. Users are able to change settings for their own devices in Lotus
Traveler; however, the synchronization default settings for all users
comes from which of the following files?
A.NTSConfig.xml
B.iltraveler.config
C.travsyncconfig.xml
D.traveler.properties
Answer: A

LOT-956 LOT-956 LOT-956 www.it-pruefungen.ch

2.Domino Attachment and Object Service is supported on each of the
following, EXCEPT?
A.Mail.box databases
B.DB2 enabled databases
C.Non-mail file databases
D.Domino servers hosted on an operating system in a virtual environment
Answer: B

LOT-956 LOT-956 LOT-956 www.it-pruefungen.ch

3.Domino 8.5 includes both Domino server roaming and file server
roaming as an option in this release for end users. You wish to upgrade
one group of users to Domino roaming and another group to file server
roaming.How would you do this?
A.Domino server roaming and file server roaming can only be performed
from a policy and not from the Admin client.
B.Domino server roaming and file server roaming can only be performed
from the Admin client, and not a policy.
C.Domino server roaming is performed from the Admin client, and file
server roaming is performed from a policy.
D.Domino server roaming is performed from a policy, and file server
roaming is performed from the Admin client.
Answer: C

LOT-956 LOT-956 LOT-956 www.it-pruefungen.ch

LOT-926 LOT-926 LOT-926

LOT-926 LOT-926 LOT-926 www.it-pruefungen.ch

Prüfungsnummer : LOT-926

Prüfungsname:Managing and Maintaining IBM Lotus Notes and Domino 8.5 Environments

Version : Demo

1.After DAOS is enabled and functioning on your Domino server, which of the following occurs when a
recipient opens a document with an attachment that is in the DAOS repository?
A. Attachment icons display with a link icon over the attachment icon
B. Attachment icons display a doclink to the attachment stored in DAOS
C. Attachment icons display the same as it would on a server without DAOS enabled
D. Attachment icons do not show and they are replaced with text that describes the attachment and is
linked to the attachment

Answer: C

LOT-926 LOT-926 LOT-926 www.it-pruefungen.ch

2.Event handlers contain numerous notification methods. Which of the following is NOT a supported
notification method?
A. Pager
B. Broadcast
C. Outbound phone call
D. Log to Windows NT Event Viewer

Answer: C

LOT-926 LOT-926 LOT-926 www.it-pruefungen.ch

3.Domino roaming for the Notes standard configuration clients in Domino 8.5 and higher offers the ability
to synchronize which of the following?
A. A notebook database and user ID file
B. The user ID file and local Eclipse XML configuration files
C. A feeds subscription database and an Eclipse plug-in data and preferences database
D. The Activities plug-in configuration and the integrated Sametime Connect configurations

Answer: C

LOT-926 LOT-926 LOT-926 www.it-pruefungen.ch

LOT-925 LOT-925 LOT-925

LOT-925 LOT-925 LOT-925 www.it-pruefungen.ch

Prüfungsnummer : LOT-925

Prüfungsname:Installing and Configuring IBM Lotus Notes and Domino 8.5

Version : Demo

1.A Notes mail message is sent by Miguel to an Internet address through an adjacent Domino domain
over NRPC that then sends mail to the Internet over SMTP. Miguel is now attempting to recall the mail
message. Which of the following will be the result of his attempt?
A. He will receive an email that he cannot recall the email message
B. He will immediately receive a prompt that the message is not enabled for message recall
C. He will receive a message from the Internet recipients mail server that the message cannot be recalled
D. He will successfully recall the message if it is allowed in the server configuration and enabled in his
user policy

Answer: A

LOT-925 LOT-925 LOT-925 www.it-pruefungen.ch

2.In order for Peggy to establish alternate message recall settings on a per server basis, which of the
following is the best solution?
A. Configure the message recall settings in an organization level policy
B. Configure the message recall settings in each server’s notes.ini file
C. Configure the message recall settings in each server configuration document
D. Configure the message recall settings in explicit policies and manually apply to users

Answer: C

LOT-925 LOT-925 LOT-925 www.it-pruefungen.ch

3.While configuring an Internet Site document, Kira has left the option blank for which Domino server
hosts the site. What is the default action the server will perform with this option not configured?
A. The Internet Site will not be loaded on any Domino server
B. The Internet Site will be loaded on all Domino servers in the domain
C. The Internet Site will only accept connections for the first IP Address on the server
D. The Internet Site will only accept connections for the hostname in the server document

Answer: A

LOT-925 LOT-925 LOT-925 www.it-pruefungen.ch

LOT-802 LOT-802 LOT-802

LOT-802 LOT-802 LOT-802 www.it-pruefungen.ch

Prüfungsnummer : LOT-802

Prüfungsname:IBM Lotus Notes Domino 8 System Administration Update

Version : Demo

QUESTION NO: 1
In general, how much space will a DB2 enabled Notes database utilize as compared to a
replica in the standard NSF format?
A. Equal size
B. Half the size
C. Two times more
D. Four times more

Answer: D

LOT-802 LOT-802 LOT-802 www.it-pruefungen.ch

QUESTION NO: 2
The user name that creates the original DB2 database must be a member of which of the
following groups?
A. SYSADM
B. MANAGERS
C. DB2ADMIN
D. ADMINISTRATORS

Answer: A

LOT-802 LOT-802 LOT-802 www.it-pruefungen.ch

QUESTION NO: 3
The DB2 Access server facilitates your use of the Lotus Domino Designer view functions
for DB2. Which of the following are enabled by installing the DB2 Access server?
A. Replication
B. DB2 group locking
C. ACLs and reader lists
D. DB2 container storage

Answer: C

LOT-802 LOT-802 LOT-802 www.it-pruefungen.ch

JN0-532 JN0-532 JN0-532

JN0-532 JN0-532 JN0-532 www.it-pruefungen.ch

Prüfungsnummer : JN0-532

Prüfungsname:FWV,Specialist (JNCIS-FWV)

Version : Demo

1. Review the exhibit.
You’ve been asked to build a route-based hub and spoke network, with policy control for traffic travelling from spoke to spoke. Which two of the following configuration options will meet this requirement? (Choose two.)
A. Place the spoke tunnel interfaces in the trust zone and create policies on the spokes.
B. Place the spoke tunnel interfaces in the untrust zone and create policies on the spokes.
C. Create a single tunnel interface in the trust zone at the hub and enable intra-zone blocking.
D. Create separate tunnel interfaces at the hub and place them in different zones, then create policies at the hub.
Answer: BD

JN0-532 JN0-532 JN0-532 www.it-pruefungen.ch

2. Click the Exhibit button.
Review the exhibit. Track-ip has failed on the device, but the device did not fail over to the second unit in the cluster:
Why has failover not occurred?
A. The physical interfaces have not failed.
B. The track-ip interval is not sufficient to cause failover.
C. The track-ip address weight is not sufficient to cause failover.
D. The track-ip address threshold is not sufficient to cause failover.
Answer: C

JN0-532 JN0-532 JN0-532 www.it-pruefungen.ch

3. Click the Exhibit button.
In the exhibit, the firewall administrator at the Storefront is complaining that when the communication to the DataCenter1 fails, the preexisting transfers and applications are dropped when the traffic is switched to DataCenter2.
Which statement explains this behavior?
A. SYN checking is enabled in the tunnel.
B. The weight value for the DataCenter2 is too high.
C. VPN monitor is misconfigured in the DataCenter2.
D. Phase 1 and Phase 2 negotiations to DataCenter2 did not occur on time.
Answer: A

JN0-532 JN0-532 JN0-532 www.it-pruefungen.ch

ITILF2011 ITILF2011 ITILF2011

ITILF2011 ITILF2011 ITILF2011 www.it-pruefungen.ch

Prüfungsnummer : ITILF2011

Prüfungsname:The ITIL Foundation- 2011

Version : Demo

QUESTION NO: 1
Which one of the following is the BEST description of a service level agreement (SLA)?

A. The part of a contract that specifies the responsibilities of each party
B. An agreement between the service provider and an internal organization
C. An agreement between a service provider and an external supplier
D. An agreement between the service provider and their customer

Answer: D

ITILF2011 ITILF2011 ITILF2011 www.it-pruefungen.ch

QUESTION NO: 2
Which one of the following is NOT part of the service design stage of the service lifecycle?

A. Designing and maintaining all necessary service transition packages
B. Producing quality, secure and resilient designs for new or improved services
C. Taking service strategies and ensuring they are reflected in the service design processes and the service designs that are produced
D. Measuring the effectiveness and efficiency of service design and the supporting processes

Answer: A

ITILF2011 ITILF2011 ITILF2011 www.it-pruefungen.ch

QUESTION NO: 3
Which one of the following activities are carried out during the “Where do we want to be?” step of the continual service improvement (CSI) approach?

A. Implementing service and process improvements
B. Reviewing measurements and metrics
C. Creating a baseline
D. Defining measurable targets

Answer: D

ITILF2011 ITILF2011 ITILF2011 www.it-pruefungen.ch

ITIL ITIL ITIL

ITIL ITIL ITIL www.it-pruefungen.ch

Prüfungsnummer : ITIL

Prüfungsname:ITIL V3 Foundation

Version : Demo

QUESTION NO: 1
Which of the following is NOT an example of Self-Help capabilities?
A. Requirement to always call the service desk for service requests
B. Menu-driven range of self help and service requests
C. Web front-end
D. A direct interface into the back end process handling software

Answer: A

ITIL ITIL ITIL www.it-pruefungen.ch

QUESTION NO: 2
What is a RACI model used for?
A. Defining roles and responsibilities
B. Monitoring services
C. Performance analysis
D. Recording Configuration Items

Answer: A

ITIL ITIL ITIL www.it-pruefungen.ch

QUESTION NO: 3
Which of the following statements is INCORRECT?
A. The SKMS is part of the Configuration Management System (CMS)
B. The SKMS can include data on the performance of the organization
C. The Service Knowledge Management System (SKMS) includes Configuration
Management Databases (CMDB)
D. The SKMS can include user skill levels

Answer: A

ITIL ITIL ITIL www.it-pruefungen.ch

ISFS ISFS ISFS

ISFS ISFS ISFS www.it-pruefungen.ch

Prüfungsnummer : ISFS

Prüfungsname:Information Security Foundation based on ISO/IEC 27002

Version : Demo

1.What physical security measure is necessary to control access to company information?
A. Air-conditioning
B. Username and password
C. The use of break-resistant glass and doors with the right locks, frames and hinges
D. Prohibiting the use of USB sticks
Answer: C

ISFS ISFS ISFS www.it-pruefungen.ch

2.Why do organizations have an information security policy?
A. In order to demonstrate the operation of the Plan-Do-Check-Act cycle within an organization.
B. In order to ensure that staff do not break any laws.
C. In order to give direction to how information security is set up within an organization.
D. In order to ensure that everyone knows who is responsible for carrying out the backup procedures.
Answer: C

ISFS ISFS ISFS www.it-pruefungen.ch

3.You work in the IT department of a medium-sized company. Confidential information has got into the wrong hands several times. This has hurt the image of the company. You have been asked to propose organizational security measures for laptops at your company. What is the first step that you should take?
A. Formulate a policy regarding mobile media (PDAs, laptops, smartphones, USB sticks)
B. Appoint security personnel
C. Encrypt the hard drives of laptops and USB sticks
D. Set up an access control policy
Answer: A

ISFS ISFS ISFS www.it-pruefungen.ch