Free Download Pass4sure and Lead2pass C2150-561 Exam Question with PDF & VCE

Vendor: IBM
Exam Code: C2150-561
Exam Name: IBM Security Network Intrusion Prevention System 4.3 Implementation

QUESTION 1
What are two restrictions placed on remote users using IBM Security Network Intrusion Prevention System V4.3? (Choose two.)

A.    They cannot reboot the appliance.
B.    They cannot log in to the local console.
C.    They cannot change the local user account passwords.
D.    They cannot save changes to policies in the Web interface.
E.    They cannot log in to the appliance when the authentication server is down.

Answer: CE

Read More

IBM WebSphere Portal 7.0 Deployment and Administration

Vendor: IBM
Exam Code: C2040-920
Exam Name: IBM WebSphere Portal 7.0 Deployment and Administration

QUESTION 1
Sunil is designing a portal cluster for production. If he is using a 32bit version of WebSphere Portal and has several multiprocessor servers with 16 GB of memory. What type of cluster configuration should he use?

A.    A vertical cluster, because it ensures minimal latency between cluster members
B.    A horizontal cluster, because it provides fault tolerance
C.    A combination of vertical and horizontal clusters to gain the benefits of both configuration types
D.    A multiproduction cluster because it meets both high availability and high performance criteria

Answer: C

Read More

Latest 2014 Pass4sure and Lead2pass Cisco 200-120 Dumps (91-100)

QUESTION 91
Which two statements describe the process identifier that is used in the command to configure OSPF on a router? (Choose two.)
Router(config)# router ospf 1

A.    All OSPF routers in an area must have the same process ID
B.    Only one process number can be used on the same router.
C.    Different process identifiers can be used to run multiple OSPF processes
D.    The process number can be any number from 1 to 65,535.
E.    Hello packets are sent to each neighbor to determine the processor identifier.

Answer: CD
Explanation:
Multiple OSPF processes can be configured on a router using multiple process ID’s.
The valid process ID’s are shown below:
Edge-B(config)#router ospf ?
<1-65535> Process ID

QUESTION 92
Which three elements must be used when you configure a router interface for VLAN trunking? (Choose three.)

A.    one physical interface for each subinterface
B.    one IP network or subnetwork for each subinterface
C.    a management domain for each subinterface
D.    subinterface encapsulation identifiers that match VLAN tags
E.    one subinterface per VLAN
F.    subinterface numbering that matches VLAN tags

Answer: BDE
Explanation:
This scenario is commonly called a router on a stick. A short, well written article on this operation can be found here:
http://www.thebryantadvantage.com/RouterOnAStickCCNACertificationExamTutorial.htm

QUESTION 93
Which commands are required to properly configure a router to run OSPF and to add network 192.168.16.0/24 to OSPF area 0? (Choose two.)

A.    Router(config)# router ospf 0
B.    Router(config)# router ospf 1
C.    Router(config)# router ospf area 0
D.    Router(config-router)# network 192.168.16.0 0.0.0.255 0
E.    Router(config-router)# network 192.168.16.0 0.0.0.255 area 0
F.    Router(config-router)# network 192.168.16.0 255.255.255.0 area 0

Answer: BE
Explanation:
In the router ospf
command, the ranges from 1 to 65535 so o is an invalid number -> but To configure OSPF, we need a wildcard in the “network” statement, not a subnet mask. We also need to assgin an area to this process -> .

QUESTION 94
A router receives information about network 192.168.10.0/24 from multiple sources. What will the router consider the most reliable information about the path to that network?

A.    a directly connected interface with an address of 192.168.10.254/24
B.    a static route to network 192.168.10.0/24
C.    a RIP update for network 192.168.10.0/24
D.    an OSPF update for network 192.168.0.0/16
E.    a default route with a next hop address of 192.168.10.1
F.    a static route to network 192.168.10.0/24 with a local serial interface configured as the next hop

Answer: A
Explanation:
When there is more than one way to reach a destination, it will choose the best one based on a couple of things. First, it will choose the route that has the longest match; meaning the most specific route. So, in this case the /24 routes will be chosen over the /16 routes. Next, from all the /24 routes it will choose the one with the lowest administrative distance. Directly connected routes have an AD of 1 so this will be the route chosen.

QUESTION 95
What is the default maximum number of equal-cost paths that can be placed into the routing table of a Cisco OSPF router?

A.    2
B.    4
C.    16
D.    unlimited

Answer: B
Explanation:
maximum-paths (OSPF)
To control the maximum number of parallel routes that Open Shortest Path First (OSPF) can support, use the maximum-paths command.
Syntax Description
maximum
Maximum number of parallel routes that OSPF can install in a routing table. The range is from 1 to 16 routes.
Command Default
8 paths

QUESTION 96
Which command shows your active Telnet connections?

A.    show cdp neigbors
B.    show session
C.    show users
D.    show vty logins

Answer: B
Explanation:
The “show users” shows telnet/ssh connections to your router while “show sessions” shows telnet/ssh connections from your router (to other devices). The question asks about “your active Telnet connections”, meaning connections from your router so the answer should be A.

QUESTION 97
Which type of EIGRP route entry describes a feasible successor?

A.    a backup route, stored in the routing table
B.    a primary route, stored in the routing table
C.    a backup route, stored in the topology table
D.    a primary route, stored in the topology table

Answer: C
Explanation:
EIGRP uses the Neighbor Table to list adjacent routers. The Topology Table list all the learned routers to destination whilst the Routing Table contains the best route to a destination, which is known as the Successor. The Feasible Successor is a backup route to a destination which is kept in the Topology Table.

QUESTION 98
Which statement describes the process of dynamically assigning IP addresses by the DHCP server?

A.    Addresses are allocated after a negotiation between the server and the host to determine the length
of the agreement.
B.    Addresses are permanently assigned so that the hosts uses the same address at all times.
C.    Addresses are assigned for a fixed period of time, at the end of the period, a new request for an address
must be made.
D.    Addresses are leased to hosts, which periodically contact the DHCP server to renew the lease.

Answer: D
Explanation:
The DHCP lifecycle consists of the following:
Release: The client may decide at any time that it no longer wishes to use the IP address it was assigned, and may terminate the lease, releasing the IP address.

QUESTION 99
What are two benefits of using NAT? (Choose two.)

A.    NAT facilitates end-to-end communication when IPsec is enabled.
B.    NAT eliminates the need to re-address all hosts that require external access.
C.    NAT conserves addresses through host MAC-level multiplexing.
D.    Dynamic NAT facilitates connections from the outside of the network.
E.    NAT accelerates the routing process because no modifications are made on the packets.
F.    NAT protects network security because private networks are not advertised.

Answer: BF
Explanation:
By not revealing the internal Ip addresses, NAT adds some security to the inside network -> F is correct.
NAT has to modify the source IP addresses in the packets -> E is not correct.
Connection from the outside of the network through a “NAT” network is more difficult than a more network because IP addresses of inside hosts are hidden -> C is not correct.
In order for IPsec to work with NAT we need to allow additional protocols, including Internet Key Exchange (IKE), Encapsulating Security Payload (ESP) and Authentication Header (AH) -> more complex -> A is not correct.
By allocating specific public IP addresses to inside hosts, NAT eliminates the need to re-address the inside hosts -> B is correct.
NAT does conserve addresses but not through host MAC-level multiplexing. It conserves addresses by allowing many private IP addresses to use the same public IP address to go to the Internet -> C is not correct.

QUESTION 100
On which options are standard access lists based?

A.    destination address and wildcard mask
B.    destination address and subnet mask
C.    source address and subnet mask
D.    source address and wildcard mask

Answer: D
Explanation:
Standard ACL’s only examine the source IP address/mask to determine if a match is made. Extended ACL’s examine the source and destination address, as well as port information.

If you want to pass Cisco 200-120 successfully, donot missing to read latest lead2pass Cisco 200-120 practice exams.
If you can master all lead2pass questions you will able to pass 100% guaranteed.

http://www.lead2pass.com/200-120.html

Latest 2014 Pass4sure and Lead2pass Cisco 200-120 Dumps (81-90)

QUESTION 81
What is a global command?

A.    a command that is set once and affects the entire router
B.    a command that is implemented in all foreign and domestic IOS versions
C.    a command that is universal in application and supports all protocols
D.    a command that is available in every release of IOS, regardless of the version or deployment status
E.    a command that can be entered in any configuration mode

Answer: A
Explanation:
When you enter global configuration mode and enter a command, it is applied to the running configuration file that is currently running in ram. The configuration of a global command affects the entire router. An example of a global command is one used for the hostname of the router.

QUESTION 82
Which parameter would you tune to affect the selection of a static route as a backup, when a dynamic protocol is also being used?

A.    hop count
B.    administrative distance
C.    link bandwidth
D.    link delay
E.    link cost

Answer: B
Explanation:
By default the administrative distance of a static route is 1, meaning it will be preferred over all dynamic routing protocols. If you want to have the dynamic routing protocol used and have the static route be used only as a backup, you need to increase the AD of the static route so that it is higher than the dynamic routing protocol.

QUESTION 83
Before installing a new, upgraded version of the IOS, what should be checked on the router, and which command should be used to gather this information? (Choose two.)

A.    the amount of available ROM
B.    the amount of available flash and RAM memory
C.    the version of the bootstrap software present on the router
D.    show version
E.    show processes
F.    show running-config

Answer: BD
Explanation:
When upgrading new version of the IOS we need to copy the IOS to the Flash so first we have to check if the Flash has enough memory or not. Also running the new IOS may require more RAM than the older one so we should check the available RAM too. We can check both with the “show version” command.

QUESTION 84
Which command would you use on a Cisco router to verify the Layer 3 path to a host?

A.    tracert address
B.    traceroute address
C.    telnet address
D.    ssh address

Answer: B
Explanation:
In computing, traceroute is a computer network diagnostic tool for displaying the route (path) and
measuring transit delays of packets across an Internet Protocol (IP) network. The history of the route is recorded as the round-trip times of the packets received from each successive host (remote node) in the route (path); the sum of the mean times in each hop indicates the total time spent to establish the connection. Traceroute proceeds unless all (three) sent packets are lost more than twice, then the connection is lost and the route cannot be evaluated. Ping, on the other hand, only computes the final round-trip times from the destination point.

QUESTION 85
What information does a router running a link-state protocol use to build and maintain its topological database? (Choose two.)

A.    hello packets
B.    SAP messages sent by other routers
C.    LSAs from other routers
D.    beacons received on point-to-point links
E.    routing tables received from other link-state routers
F.    TTL packets from designated routers

Answer: AC
Explanation:
Neighbor discovery is the first step in getting a link state environment up and running. In keeping with the friendly neighbor terminology, a Hello protocol is used for this step. The protocol will define a Hello packet format and a procedure for exchanging the packets and processing the information the packets contain.
After the adjacencies are established, the routers may begin sending out LSAs. As the term flooding implies, the advertisements are sent to every neighbor. In turn, each received LSA is copied and forwarded to every neighbor except the one that sent the LSA.

QUESTION 86
Which statements describe the routing protocol OSPF? (Choose three.)

A.    It supports VLSM.
B.    It is used to route between autonomous systems.
C.    It confines network instability to one area of the network.
D.    It increases routing overhead on the network.
E.    It allows extensive control of routing updates.
F.    It is simpler to configure than RIP v2.

Answer: ACE
Explanation:
The OSPF protocol is based on link-state technology, which is a departure from the Bellman-Ford vector based algorithms used in traditional Internet routing protocols such as RIP. OSPF has introduced new concepts such as authentication of routing updates, Variable Length Subnet Masks (VLSM), route summarization, and so forth.
OSPF uses flooding to exchange link-state updates between routers. Any change in routing information is flooded to all routers in the network. Areas are introduced to put a boundary on the explosion of link-state updates. Flooding and calculation of the Dijkstra algorithm on a router is limited to changes within an area.

QUESTION 87
What is the default administrative distance of OSPF?

A.    90
B.    100
C.    110
D.    120

Answer: C
Explanation:
Administrative distance is the feature that routers use in order to select the best path when there are two or more different routes to the same destination from two different routing protocols. Administrative distance defines the reliability of a routing protocol. Each routing protocol is prioritized in order of most to least reliable (believable) with the help of an administrative distance value.
Default Distance Value Table
This table lists the administrative distance default values of the protocols that Cisco supports:
Route Source
Default Distance Values
Connected interface
Static route
Enhanced Interior Gateway Routing Protocol (EIGRP) summary route External Border Gateway Protocol (BGP)
Internal EIGRP
IGRP
OSPF
Intermediate System-to-Intermediate System (IS-IS)
Routing Information Protocol (RIP)
Exterior Gateway Protocol (EGP)
On Demand Routing (ODR)
External EIGRP
Internal BGP
Unknown*

QUESTION 88
Which characteristics are representative of a link-state routing protocol? (Choose three.)

A.    provides common view of entire topology
B.    exchanges routing tables with neighbors
C.    calculates shortest path
D.    utilizes event-triggered updates
E.    utilizes frequent periodic updates

Answer: ACD
Explanation:
Each of routers running link-state routing protocol learns paths to all the destinations in its “area” so we can say although it is a bit unclear.
Link-state routing protocols generate routing updates only (not the whole routing table) when a change occurs in the network topology so
Link-state routing protocol like OSPF uses Dijkstra algorithm to calculate the shortest path -> . Unlike Distance vector routing protocol (which utilizes frequent periodic updates), link-state routing protocol utilizes event-triggered updates (only sends update when a change occurs) ->

QUESTION 89
Which command would you configure globally on a Cisco router that would allow you to view directly connected Cisco devices?

A.    enable cdp
B.    cdp enable
C.    cdp run
D.    run cdp

Answer: C
Explanation:
CDP is enabled on Cisco routers by default. If you prefer not to use the CDP capability, disable it with the no cdp run command. In order to reenable CDP, use the cdp run command in global configuration mode. The “cdp enable” command is an interface command, not global.

QUESTION 90
Which two locations can be configured as a source for the IOS image in the boot system command? (Choose two.)

A.    RAM
B.    NVRAM
C.    flash memory
D.    HTTP server
E.    TFTP server
F.    Telnet server

Answer: CE
Explanation:
The following locations can be configured as a source for the IOS image:
1. + Flash (the default location)
2. + TFTP server
3. + ROM (used if no other source is found)

If you want to pass Cisco 200-120 successfully, donot missing to read latest lead2pass Cisco 200-120 practice tests.
If you can master all lead2pass questions you will able to pass 100% guaranteed.

http://www.lead2pass.com/200-120.html

Latest 2014 Pass4sure and Lead2pass Cisco 200-120 Dumps (71-80)

QUESTION 71
Which IPv6 address is the all-router multicast group?

A.    FF02::1
B.    FF02::2
C.    FF02::3
D.    FF02::4

Answer: B
Explanation:
Well-known IPv6 multicast addresses:
Address
Description
ff02::1
All nodes on the local network segment
ff02::2
All routers on the local network segment

QUESTION 72
Which IPv6 address is valid?

A.    2001:0db8:0000:130F:0000:0000:08GC:140B
B.    2001:0db8:0:130H::87C:140B
C.    2031::130F::9C0:876A:130B
D.    2031:0:130F::9C0:876A:130B

Answer: D
Explanation:
An IPv6 address is represented as eight groups of four hexadecimal digits, each group representing 16 bits (two octets). The groups are separated by colons (:). An example of an IPv6 address is 2001:0db8:85a3:0000:0000:8a2e:0370:7334. The leading 0’s in a group can be collapsed using ::, but this can only be done once in an IP address.

QUESTION 73
Which command can you use to manually assign a static IPv6 address to a router interface?

A.    ipv6 autoconfig 2001:db8:2222:7272::72/64
B.    ipv6 address 2001:db8:2222:7272::72/64
C.    ipv6 address PREFIX_1 ::1/64
D.    ipv6 autoconfig

Answer: B
Explanation:
To assign an IPv6 address to an interface, use the “ipv6 address” command and specify the IP address you wish to use.

QUESTION 74
Which of these represents an IPv6 link-local address?

A.    FE80::380e:611a:e14f:3d69
B.    FE81::280f:512b:e14f:3d69
C.    FEFE:0345:5f1b::e14d:3d69
D.    FE08::280e:611:a:f14f:3d69

Answer: A
Explanation:
In the Internet Protocol Version 6 (IPv6), the address block fe80::/10 has been reserved for link- local unicast addressing. The actual link local addresses are assigned with the prefix fe80::/64. They may be assigned by automatic (stateless) or stateful (e.g. manual) mechanisms.

QUESTION 75
The network administrator is asked to configure 113 point-to-point links. Which IP addressing scheme defines the address range and subnet mask that meet the requirement and waste the fewest subnet and host addresses?

A.    10.10.0.0/16 subnetted with mask 255.255.255.252
B.    10.10.0.0/18 subnetted with mask 255.255.255.252
C.    10.10.1.0/24 subnetted with mask 255.255.255.252
D.    10.10.0.0/23 subnetted with mask 255.255.255.252
E.    10.10.1.0/25 subnetted with mask 255.255.255.252

Answer: D
Explanation:
We need 113 point-to-point links which equal to 113 sub-networks < 128 so we need to borrow 7 bits (because 2^7 = 128).
The network used for point-to-point connection should be /30.
So our initial network should be 30 ?7 = 23.
So 10.10.0.0/23 is the correct answer.
You can understand it more clearly when writing it in binary form:
/23 = 1111 1111.1111 1110.0000 0000
/30 = 1111 1111.1111 1111.1111 1100 (borrow 7 bits)

QUESTION 76
A Cisco router is booting and has just completed the POST process. It is now ready to find and load an IOS image. What function does the router perform next?

A.    It checks the configuration register.
B.    It attempts to boot from a TFTP server.
C.    It loads the first image file in flash memory.
D.    It inspects the configuration file in NVRAM for boot instructions.

Answer: A
Explanation:
Default (normal) Boot SequencePower on Router – Router does POST – Bootstrap starts IOS load – Check configuration registerto see what mode the router should boot up in (usually 0x2102
to read startup-config in NVRAM / or 0x2142 to start in “setup-mode”) – check the startup-config file in NVRAM for boot-system commands – load IOS from Flash.

QUESTION 77
On a corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?

A.    a router with subinterfaces configured on the physical interface that is connected to the switch
B.    a router with an IP address on the physical interface connected to the switch
C.    a switch with an access link that is configured between the switches
D.    a switch with a trunk link that is configured between the switches

Answer: A
Explanation:
Different VLANs can’t communicate with each other , they can communicate with the help of Layer3 router. Hence , it is needed to connect a router to a switch , then make the sub-interface on the router to connect to the switch, establishing Trunking links to achieve communications of devices which belong to different VLANs.
When using VLANs in networks that have multiple interconnected switches, you need to use VLAN trunking between the switches. With VLAN trunking, the switches tag each frame sent between switches so that the receiving switch knows to what VLAN the frame belongs. End user devices connect to switch ports that provide simple connectivity to a single VLAN each. The attached devices are unaware of any VLAN structure.
By default, only hosts that are members of the same VLAN can communicate. To change this and allow inter-VLAN communication, you need a router or a layer 3 switch.
Here is the example of configuring the router for inter-vlan communication RouterA(config)#int f0/0.1
RouterA(config-subif)#encapsulation ?
dot1Q IEEE 802.1Q Virtual LAN
RouterA(config-subif)#encapsulation dot1Q or isl VLAN ID RouterA(config-subif)# ip address x.x.x.x y.y.y.y

QUESTION 78
What two things will a router do when running a distance vector routing protocol? (Choose two.)

A.    Send periodic updates regardless of topology changes.
B.    Send entire routing table to all routers in the routing domain.
C.    Use the shortest-path algorithm to the determine best path.
D.    Update the routing table based on updates from their neighbors.
E.    Maintain the topology of the entire network in its database.

Answer: AD
Explanation:
Distance means how far and Vector means in which direction. Distance Vector routing protocols pass periodic copies of routing table to neighbor routers and accumulate distance vectors. In distance vector routing protocols, routers discover the best path to destination from each neighbor. The routing updates proceed step by step from router to router.

QUESTION 79
Which command is used to display the collection of OSPF link states?

A.    show ip ospf link-state
B.    show ip ospf lsa database
C.    show ip ospf neighbors
D.    show ip ospf database

Answer: D
Explanation:
The “show ip ospf database” command displays the link states. Here is an example:
Here is the lsa database on R2.
R2#show ip ospf database
OSPF Router with ID (2.2.2.2) (Process ID 1)
Router Link States (Area 0)
Link ID ADV Router Age Seq# Checksum Link count2.2.2.2 2.2.2.2 793 0x80000003 0x004F85 210.4.4.4 10.4.4.4 776 0x80000004 0x005643 1111.111.111.111 111.111.111.111 755 0x80000005 0x0059CA 2133.133.133.133 133.133.133.133 775 0x80000005 0x00B5B1 2 Net Link States (Area 0)
Link ID ADV Router Age Seq# Checksum10.1.1.1 111.111.111.111 794 0x80000001 0x001E8B10.2.2.3 133.133.133.133 812 0x80000001 0x004BA910.4.4.1 111.111.111.111 755 0x80000001 0x007F1610.4.4.3 133.133.133.133 775 0x80000001 0x00C31F

QUESTION 80
If IP routing is enabled, which two commands set the gateway of last resort to the default gateway? (Choose two.)

A.    ip default-gateway 0.0.0.0
B.    ip route 172.16.2.1 0.0.0.0 0.0.0.0
C.    ip default-network 0.0.0.0
D.    ip default-route 0.0.0.0 0.0.0.0 172.16.2.1
E.    ip route 0.0.0.0 0.0.0.0 172.16.2.1

Answer: CE
Explanation:
Both the “ip default-network” and “ip route 0.0.0.0 0.0.0.0 (next hop)” commands can be used to set the default gateway in a Cisco router.

If you want to pass Cisco 200-120 successfully, donot missing to read latest lead2pass Cisco 200-120 practice tests.
If you can master all lead2pass questions you will able to pass 100% guaranteed.

http://www.lead2pass.com/200-120.html