2014年2月28日星期五

The best Citrix certification 1Y0-A06 exam training mode released

Our IT-Tests.com is a professional website to provide accurate exam material for a variety of IT certification exams. And IT-Tests.com can help many IT professionals enhance their career goals. The strength of our the IT elite team will make you feel incredible. You can try to free download part of the exam questions and answers about Citrix certification 1Y0-A06 exam to measure the reliability of our IT-Tests.

If you think you can face unique challenges in your career, you should pass the Citrix 1Y0-A06 exam. IT-Tests.com is a site that comprehensively understand the Citrix 1Y0-A06 exam. Using our exclusive online Citrix 1Y0-A06 exam questions and answers, will become very easy to pass the exam. IT-Tests.com guarantee 100% success. IT-Tests.com is recognized as the leader of a professional certification exam, it provides the most comprehensive certification standard industry training methods. You will find that IT-Tests.com Citrix 1Y0-A06 exam questions and answers are most thorough and the most accurate questions on the market and up-to-date practice test. When you have IT-Tests.com Citrix 1Y0-A06 questions and answers, it will allow you to have confidence in passing the exam the first time.

IT-Tests.com Citrix 1Y0-A06 exam training materials can help you to come true your dreams. Because it contains all the questions of Citrix 1Y0-A06 examination. With IT-Tests.com, you could throw yourself into the exam preparation completely. With high quality training materials by IT-Tests.com provided, you will certainly pass the exam. IT-Tests.com can give you a brighter future.

According to the research of the past exams and answers, IT-Tests.com provide you the latest Citrix 1Y0-A06 exercises and answers, which have have a very close similarity with real exam. IT-Tests.com can promise that you can 100% pass your first time to attend Citrix certification 1Y0-A06 exam.

Exam Code: 1Y0-A06
Exam Name: Citrix (Implementing Citrix Provisioning Server 5.0 )
Free One year updates to match real exam scenarios, 100% pass and refund Warranty.
Total Q&A: 102 Questions and Answers
Last Update: 2014-02-28

All the IT professionals are familiar with the Citrix 1Y0-A06 exam. And everyone dreams pass this demanding exam. Citrix 1Y0-A06 exam certification is generally accepted as the highest level. Do you have it? About the so-called demanding, that is difficult to pass the exam. This does not matter, with the IT-Tests.com's Citrix 1Y0-A06 exam training materials in hand, you will pass the exam successfully. You feel the exam is demanding is because that you do not choose a good method. Select the IT-Tests.com, then you will hold the hand of success, and never miss it.

IT-Tests.com is website that can help a lot of IT people realize their dreams. If you have a IT dream, then quickly click the click of IT-Tests.com. It has the best training materials, which is IT-Tests.com;s Citrix 1Y0-A06 exam training materials. This training materials is what IT people are very wanted. Because it will make you pass the exam easily, since then rise higher and higher on your career path.

What is IT-Tests.com Citrix 1Y0-A06 exam training materials? There are many online sites provide Citrix 1Y0-A06 exam training resources. But IT-Tests.com provide you the most actual information. IT-Tests.com have professional personnel of certification experts, technical staff, and comprehensive language masters. They are always studying the latest Citrix 1Y0-A06 exam. Therefore, if you want to pass the Citrix 1Y0-A06 examination, please Login IT-Tests.com website. It will let you close to your success, and into your dream paradise step by step.

1Y0-A06 (Implementing Citrix Provisioning Server 5.0 ) Free Demo Download: http://www.it-tests.com/1Y0-A06.html

NO.1 What must an administrator use to create a vDisk image of a reference target operating system?
A.vDisk pool
B.Image Builder utility
C.Configuration Wizard
D.Provisioning Server Console
Answer:B

Citrix certification   1Y0-A06   1Y0-A06   1Y0-A06 study guide

NO.2 Which port range must an administrator ensure is open on a firewall to allow communication between
Provisioning Servers?
A.6900 through 6904
B.6905 through 6909
C.6910 through 6914
D.6915 through 6919
Answer:B

Citrix   1Y0-A06 demo   1Y0-A06   1Y0-A06 exam simulations   1Y0-A06 certification

NO.3 Scenario: An administrator is planning a Provisioning Server 5.0 environment for a worldwide
organization; there are four offices on two continents. The administrator intends to set up a different farm
for each of the four office locations in North America and Europe. How many databases must the
administrator plan for when setting up the Provisioning Server 5.0 environment?
A.Four databases, one for each farm
B.Two databases, one for each continent
C.One database to keep all vDisks centralized
D.Five databases, one for each farm and a back up
Answer:A

Citrix exam   1Y0-A06 exam   1Y0-A06   1Y0-A06

NO.4 Scenario: An administrator wants to delegate management of a Provisioning Server farm. The
administrator needs to delegate only these specific tasks: 1. Shut down target devices 2. Boot target
devices 3. Send messages to target devices Which role should the administrator assign for these tasks?
A.Device Operator
B.Site Administrator
C.Farm Administrator
D.Device Administrator
Answer:A

Citrix demo   1Y0-A06   1Y0-A06 braindump   1Y0-A06   1Y0-A06 test   1Y0-A06 test

NO.5 An administrator is preparing a Master Target Device for imaging. What should the administrator do
before installing the target device software on the Master Target Device?
A.Turn on spanning tree
B.Configure the network adapter BIOS
C.Run the Provisioning Server Image Builder
D.Enable hibernation and power management features
Answer:B

Citrix   1Y0-A06   1Y0-A06

NO.6 An administrator is preparing the hard disk of a Master Target Device for imaging. In which order must
the administrator install the software on the Master Target Device before building the vDisk image? Click
the Task button to complete the task. Click the Exhibit button for instructions on how to complete a Drag
and Drop item. Answer & Explanation Correct Answer Explanations No more information available
Answer:

NO.7 How can the administrator set the level of diagnostic information collected for a Provisioning Server
environment to errors only?
A.Set the Stream Service to debug level 2
B.Set the Stream Console to debug level 1
C.Set the MCLI_LOG.CONFIG file to debug level 4
D.Set the ENTERPRISEACCESS_LOG.CONFIG file to debug level 3
Answer:B

Citrix   1Y0-A06 questions   1Y0-A06   1Y0-A06

NO.8 In which three situations would an administrator need to mount a vDisk? (Choose three.)
A.Creating a vDisk file
B.Changing the image mode of the vDisk
C.Editing the contents of a vDisk image file
D.Viewing the contents of a vDisk image file
E.Formatting the vDisk file so that an image can be written to it
Answer:C D E

Citrix certification   1Y0-A06 answers real questions   1Y0-A06 braindump   1Y0-A06

NO.9 Which steps must an administrator take to create a vDisk file? Click the Task button to place the steps
in the correct order. Click the Exhibit button for instructions on how to complete a Drag and Drop item.
Answer & Explanation Correct Answer Explanations No more information available
Answer:

NO.10 Which step must an administrator take to create a vDisk image that will be used by multiple target
devices?
A.Run the Common Image utility.
B.Set the vDisk to private image mode.
C.Set the vDisk to standard image mode.
D.Associate the vDisk with a device collection.
Answer:C

Citrix exam   1Y0-A06 exam   1Y0-A06   1Y0-A06

NO.11 Scenario: An administrator completed the vDisk creation process as well as the creation of several
target devices. The administrator took the necessary steps for Active Directory integration including
enabling Active Directory machine account password management for the vDisk and enabling automatic
password support for the server. The administrator also made sure that the Master Target Device was
added to the correct domain. However, the administrator is unable to log on to the domain from any of the
target devices when attempting to stream the vDisk. Which step should the administrator take to
troubleshoot this issue?
A.Verify that the vDisk is in standard image mode
B.Reset all the machine accounts in Active Directory
C.Create a machine account for each target device in Active Directory
D.Run the Image Optimization Wizard and deselect the disable machine account password changes
option
Answer:C

Citrix   1Y0-A06 study guide   1Y0-A06 original questions   1Y0-A06 answers real questions   1Y0-A06

NO.12 An administrator changed the location of the database in a Provisioning Server environment. In order
to re-join the database to an existing Provisioning Server farm, the administrator must specify the
__________ in the Configuration Wizard. (Choose the correct phrase to complete the sentence.)
A.new location
B.administrator group
C.service user account
D.farm name, site name and collection name
Answer:A

Citrix   1Y0-A06   1Y0-A06   1Y0-A06   1Y0-A06   1Y0-A06 braindump

NO.13 An administrator is going through the Configuration Wizard for Provisioning Server and must now
specify the network card or cards that will be used by the Stream Service. When specifying the network
card, what is the minimum number of ports the administrator must remember to include in the range?
A.2
B.5
C.10
D.15
Answer:B

Citrix   1Y0-A06   1Y0-A06   1Y0-A06 braindump   1Y0-A06 braindump

NO.14 An administrator must use the __________ to change previous versions of vDisks to the new Virtual
Hard Disk format. (Choose the correct option to complete the sentence.)
A..PVP file
B.DATABASE.MDB
C.UPGRADEAGENT.EXE
D.VHDCONVERTER.EXE
Answer:D

Citrix demo   1Y0-A06 test questions   1Y0-A06 dumps   1Y0-A06 demo   1Y0-A06

NO.15 Scenario: Several branches of an organization are located throughout North America, each with its own
administrator. The farm administrator for Provisioning Server wants to delegate control to each branch
location administrator within the organization. How should the farm administrator organize the farm in
order to provide each branch office administrator with full administrative privileges within their branch?
A.Create a site for each branch office location
B.Create a view for each branch office location
C.Create a separate store for each branch office location
D.Create a device collection for each branch office location
Answer:A

Citrix   1Y0-A06   1Y0-A06   1Y0-A06 dumps

NO.16 Scenario: An administrator has created a dynamic vDisk and assigned it to a target device. When PXE
booting the target device, the following error message appears: vDisk is locked Why is the administrator
receiving this error message?
A.The vDisk is in standard image mode
B.The administrator failed to format the vDisk
C.The administrator failed to unmount the vDisk
D.The vDisk does NOT have enough space allocated
Answer:C

Citrix dumps   1Y0-A06 original questions   1Y0-A06

NO.17 An administrator must __________ a newly formatted vDisk before assigning it to a Master Target
Device for imaging. (Choose the correct phrase to complete the sentence.)
A.mount
B.unmount
C.release the lock on
D.designate a drive letter assignment for
Answer:B

Citrix   1Y0-A06 test answers   1Y0-A06 test questions

NO.18 Scenario: In the headquarters of a training delivery organization, multiple training rooms are located in
two separate buildings. The organization delivers different training classes each week and needs to
provide different base configurations depending on the class content. How can an administrator configure
the Provisioning Server farm so that the organization can re-purpose each classroom for a specific class?
A.Create two farms with sites for each training class offered
B.Create two stores with a vDisk pool for each training class offered
C.Create two device collections within a single site for each training class offered
D.Create two sites with device collections representing each training class offered
Answer:D

Citrix exam   1Y0-A06 certification training   1Y0-A06   1Y0-A06 certification   1Y0-A06

NO.19 Which step must an administrator take before configuring administrative roles within a Provisioning
Server environment?
A.Create an administrative service account
B.Create the administrative groups in Active Directory
C.Grant the farm administrator db_admin rights in SQL
D.Add the currently logged in user to the local administrator group
Answer:B

Citrix certification   1Y0-A06   1Y0-A06 original questions   1Y0-A06

NO.20 When preparing to build a vDisk image from a Master Target Device, which boot option should an
administrator select in the target device properties?
A.vDisk
B.Hard Disk
C.Floppy Disk
D.local HD as a boot device
Answer:B

Citrix   1Y0-A06 original questions   1Y0-A06

IT-Tests.com offer the latest 000-614 Questions & Answers and high-quality 000-501 PDF Practice Test. Our 70-342 VCE testing engine and VCPC510 study guide can help you pass the real exam. High-quality 642-874 Real Exam Questions can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.it-tests.com/1Y0-A06.html

The latest Citrix Certification 1Y0-740 exam training methods

About the 1Y0-740 exam certification, reliability can not be ignored. 1Y0-740 exam training materials of IT-Tests.com are specially designed. It can maximize the efficiency of your work. We are the best worldwide materials provider about this exam.

IT-Tests.com's Citrix 1Y0-740 exam training materials are the necessities of each of candidates who participating in the IT certification. With this training material, you can do a full exam preparation. So that you will have the confidence to win the exam. IT-Tests.com's Citrix 1Y0-740 exam training materials are highly targeted. Not every training materials on the Internet have such high quality. Only IT-Tests.com could be so perfect.

Exam Code: 1Y0-740
Exam Name: Citrix (Citrix WANScaler 4.2: Administration Exam)
Free One year updates to match real exam scenarios, 100% pass and refund Warranty.
Total Q&A: 95 Questions and Answers
Last Update: 2014-02-28

Only to find ways to success, do not make excuses for failure. To pass the Citrix 1Y0-740 exam, in fact, is not so difficult, the key is what method you use. IT-Tests.com's Citrix 1Y0-740 exam training materials is a good choice. It will help us to pass the exam successfully. This is the best shortcut to success. Everyone has the potential to succeed, the key is what kind of choice you have.

IT-Tests.com senior experts have developed exercises and answers about Citrix certification 1Y0-740 exam with their knowledge and experience, which have 95% similarity with the real exam. I believe that you will be very confident of our products. If you choose to use IT-Tests's products, IT-Tests.com can help you 100% pass your first time to attend Citrix certification 1Y0-740 exam. If you fail the exam, we will give a full refund to you.

1Y0-740 (Citrix WANScaler 4.2: Administration Exam) Free Demo Download: http://www.it-tests.com/1Y0-740.html

NO.1 When data is compressed before passing through a WANScaler appliance, it __________.
(Choose the correct phrase to complete the sentence.)
A.is not encrypted
B.is still compressed
C.is passed through as unaccelerated traffic
D.is decompressed and recompressed using proprietary algorithms
Answer:B

Citrix   1Y0-740 questions   1Y0-740   1Y0-740   1Y0-740 certification

NO.2 What should an administrator do to ensure that traffic is sent to the desired appliance when
configuring WANScaler appliances in group mode?
A.Turn one of the appliances off in the group mode.
B.Assign the virtual IP address to the primary appliance.
C.Create forwarding rules that use explicit IP addresses.
D.Create a service class policy to manage the distribution of traffic.
Answer:C

Citrix   1Y0-740 test   1Y0-740   1Y0-740 questions

NO.3 During the TCP handshake process, the Maximum Segment Size (MSS) of a packet is reduced
in order to __________. (Choose the correct phrase to complete the sentence.)
A.increase interactive performance
B.compress the traffic across the WAN
C.allow room in the packet header for custom WANScaler options
D.indicate the existence of a WANScaler appliance to other WANScaler appliances across the WAN
Answer:C

Citrix practice test   1Y0-740   1Y0-740   1Y0-740 test answers   1Y0-740 demo

NO.4 Which two statements are true regarding protocol acceleration? (Choose two.)
A.VoIP optimization is an indirect benefit of other optimizations of the WANScaler.
B.All HTTP traffic is enhanced by applying QoS on cascading style sheets and pages that use Java
scripts.
C.IPSec key exchange algorithms are adjusted with the Flow-Control Engine and their payloads are
compressed.
D.FTP traffic is enhanced by the ability of the WANScaler appliance to keep track of which files have been
previously transferred.
E.Any TCP information exchanged by two WANScaler appliances where the bit patterns exchanged
match previous traffic can be eligible for multi-level compression.
Answer:A E

Citrix   1Y0-740   1Y0-740   1Y0-740   1Y0-740 exam dumps   1Y0-740

NO.5 The __________ is where the set of rules that map accelerated subnets to appliances is created
and the __________ is what examines the rules. (Choose the correct option to complete the
sentence.)
A.Client; Controller
B.Client; Appliance
C.Controller; Client
D.Controller; Appliance
Answer:C

Citrix test questions   1Y0-740 demo   1Y0-740 certification training

NO.6 Scenario: An administrator is implementing a WANScaler appliance in an environment where the
majority of the traffic types are candidates for acceleration. There is an undetermined amount of
critical unaccelerated traffic that needs to be considered. Which two options should the
administrator implement to ensure that unaccelerated network traffic types are not suppressed in
this environment? (Choose two.)
A.Select hardboost.
B.Select partial bandwidth.
C.Fix the bandwidth limit to 50%.
D.Set the initial bandwidth to 90%.
Answer:B D

Citrix   1Y0-740   1Y0-740 test questions   1Y0-740 demo

NO.7 Which three operating parameters are defined in the TCP header of a packet and exchanged
during the autoconfiguration process? (Choose three.)
A.Bandwidth limits
B.Acceleration mode
C.Service class rules
D.Compression mode
E.Compression history
Answer:A B D

Citrix   1Y0-740   1Y0-740   1Y0-740 certification training   1Y0-740

NO.8 An administrator implementing WANScaler appliances in an appliance only environment has
been instructed by the IT Manager to not bring down the network while installing the WANScaler
appliances. In which two deployment modes could the administrator implement the WANScaler
appliances to meet the stated requirements? (Choose two.)
A.Inline
B.WCCP
C.Redirector
D.Virtual inline
Answer:B D

Citrix certification   1Y0-740 certification training   1Y0-740 exam dumps   1Y0-740

NO.9 Scenario: An administrator is instructed to implement two WANScaler appliances in high
availability mode for a virtual inline deployment. In this environment, the switches and routers are
already connected. What is the minimum number of Ethernet cables required to set up the
WANScaler appliances in a single LAN, single WAN deployment?
A.1
B.2
C.3
D.4
Answer:B

Citrix braindump   1Y0-740 test answers   1Y0-740

NO.10 Scenario: An administrator is implementing a WANScaler appliance in the branch office of a
telemarketing environment. Most of the traffic in this environment is voice over IP based. However,
the billing and collections team needs access to web servers in the corporate office. Users in this
environment have complained that it takes too long for them to access data in the morning,
between 9:00 AM and 10:30 AM. Coincidentally, this is when most of the billing and collections
employees begin their day. Which traffic type could the administrator accelerate in this
environment?
A.FTP
B.UDP
C.HTTP
D.Telnet
Answer:C

Citrix   1Y0-740 certification training   1Y0-740   1Y0-740 certification training

NO.11 Scenario: A system administrator deployed a WANScaler 8500 appliance at one branch office
and a WANScaler 8800 appliance at the headquarters office. Given the nature of the data transfers
that are routinely used between the two offices (including database replication, multiple file
transfers and directory synchronization), the administrator decides to use disk-based
compression. After several days of testing, the administrator could not explain why the
compression ratio was below the expected level. What are four possible reasons why the
compression ratio was below the expected level? (Choose four.)
A.Compression ratios are data-dependent.
B.The WANScaler is not suited for compressing CIFS traffic.
C.File types with little to no redundancy will not compress well.
D.WANScaler appliances must be deployed as matched pairs.
E.Encryption of the data has a negative effect on compressibility.
F.Compressibility of data is affected by the application protocol used.
G.The WANScaler 8500 appliance does not support disk-based compression.
Answer:A C E F

Citrix exam prep   1Y0-740 original questions   1Y0-740   1Y0-740   1Y0-740

NO.12 An administrator would like to implement a WANScaler appliance as depicted in the attached
diagram. Click the 'Exhibit' button to view the diagram. In which deployment mode will the
WANScaler appliance be implemented in this environment?
A.Inline
B.WCCP
C.Point-to-point
D.Virtual inline with policy-based routing
Answer:D

Citrix   1Y0-740   1Y0-740 pdf   1Y0-740 dumps

NO.13 Scenario: An administrator would like to implement five WANScaler appliances in an
environment. Four of the appliances are deployed in the branch offices and one in the data center.
Each office has a single circuit to the data center. All appliances will be implemented in inline
mode. The administrator wants to leverage the automatic bandwidth allocation feature. The
administrator has decided that WANScaler QoS will not be implemented in this environment.
Which physical WANScaler topology will be appropriate for this implementation?
A.Mesh
B.Full Mesh
C.Point-to-point
D.Hub-and-spoke
Answer:D

Citrix demo   1Y0-740   1Y0-740   1Y0-740   1Y0-740 certification training

NO.14 Scenario: An administrator designing a WANScaler implementation would like the
implementation to be set up based on the following considerations: 1.The data center supports
multiple branch offices, of which only one has a WANScaler appliance. 2.The branch office
WANScaler appliance should connect directly to the WAN router for the branch office. 3.The
headquarters WANScaler appliance should connect directly to the WAN router for the
headquarters. 4.All traffic from the branch office to servers at the headquarters should flow
through the branch office WANScaler appliance. Which WANScaler deployment topology should
be used in this type of implementation?
A.Star
B.Token Ring
C.Point-to-point
D.Hub-and-spoke
Answer:C

Citrix   1Y0-740 exam prep   1Y0-740   1Y0-740   1Y0-740 questions

NO.15 An administrator is implementing a WANScaler appliance in WCCP mode in a single LAN,
single WAN implementation. What is the minimum number of Ethernet cables required to set up
the WANScaler appliance on the local LAN?
A.1
B.2
C.3
D.4
Answer:A

Citrix demo   1Y0-740 test questions   1Y0-740 practice test   1Y0-740 demo

NO.16 Which two techniques are used to accelerate and optimize CIFS traffic across high latency
links in a WANScaler appliance implementation? (Choose two.)
A.Zero locking
B.File read ahead
C.History analysis
D.Recursive file opens
E.Pre-fetching metadata
Answer:B E

Citrix test answers   1Y0-740   1Y0-740 certification   1Y0-740 certification

NO.17 Which TCP variant would be appropriate in an environment where a site is connected to multiple
WAN links, each of which has no guaranteed bandwidth?
A.Inline
B.Variable
C.Softboost
D.Hardboost
E.Full bandwidth
Answer:C

Citrix   1Y0-740 braindump   1Y0-740   1Y0-740 dumps

NO.18 In a high availability pair, configuration changes should be made using which IP address?
A.Virtual IP address
B.Subnet IP address
C.WANScaler IP address
D.Management IP address
Answer:A

Citrix answers real questions   1Y0-740 study guide   1Y0-740 exam prep   1Y0-740   1Y0-740 test answers

NO.19 A WANScaler implementation of QoS __________. (Choose the correct phrase to complete the
sentence.)
A.should be used with softboost only
B.operates on accelerated traffic only
C.is incompatible with other QoS solutions
D.is a sender and receiver-side QoS system
Answer:B

Citrix   1Y0-740 exam dumps   1Y0-740   1Y0-740

NO.20 An administrator is implementing WANScaler appliances in an environment. The administrator
has been instructed to configure WANScaler appliances to accelerate traffic. What are three types
of traffic that can be accelerated by WANScaler appliances? (Choose three.)
A.SIP
B.FTP
C.NFS
D.CIFS
E.TFTP
Answer:B C D

Citrix certification training   1Y0-740   1Y0-740   1Y0-740

IT-Tests.com offer the latest ICBB Questions & Answers and high-quality 70-462 PDF Practice Test. Our SY0-301 VCE testing engine and 1Z1-061 study guide can help you pass the real exam. High-quality 70-481 Real Exam Questions can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.it-tests.com/1Y0-740.html

Citrix Certification 1Y0-A15 exam pdf

Don't need a lot of time and money, only 30 hours of special training, and you can easily pass your first time to attend Citrix certification 1Y0-A15 exam. IT-Tests.com are able to provide you with test exercises which are closely similar with real exam questions.

If you attend Citrix certification 1Y0-A15 exams, your choosing IT-Tests.com is to choose success! I wish you good luck.

Dear candidates, have you thought to participate in any Citrix 1Y0-A15 exam training courses? In fact, you can take steps to pass the certification. IT-Tests.com Citrix 1Y0-A15 exam training materials bear with a large number of the exam questions you need, which is a good choice. The training materials can help you pass the certification.

There a galaxy of talents in the 21st century, but professional IT talents not so many. Society need a large number of professional IT talents. Now IT certification exam is one of the methods to inspect the employees' ability, but it is not so easy to is one of the way to IT certification exams. Generally, people who participate in the IT certification exam should choose a specific training course, and so choosing a good training course is the guarantee of success. IT-Tests's training course has a high quality, which its practice questions have 95% similarity with real examination. If you use IT-Tests's product to do some simulation test, you can 100% pass your first time to attend IT certification exam.

IT-Tests.com's Citrix 1Y0-A15 exam training material is the best training materials on the Internet. It is the leader in all training materials. It not only can help you to pass the exam , you can also improve your knowledge and skills. Help you in your career in your advantage successfully. As long as you have the Citrix 1Y0-A15 certification, you will be treated equally by all countries.

Exam Code: 1Y0-A15
Exam Name: Citrix (Engineering a Citrix Virtualization Solution)
Free One year updates to match real exam scenarios, 100% pass and refund Warranty.
Total Q&A: 60 Questions and Answers
Last Update: 2014-02-28

1Y0-A15 (Engineering a Citrix Virtualization Solution) Free Demo Download: http://www.it-tests.com/1Y0-A15.html

NO.1 Scenario: The new design document for Nether Tech Inc. requires that the Citrix Engineer perform the
following:
1. Upgrade from Presentation Server 4.0 to XenApp 5.0 for Windows Server 2008.
2. Integrate the XenApp 5.0 environment with the existing XenDesktop solution, which includes
Provisioning Services.
The engineer has successfully completed the upgrade to XenApp 5.0 for Windows Server 2008 and must
now implement the second stage of the design by integrating the XenApp 5.0 farm into the XenDesktop
environment so that published applications can be accessed from within the XenDesktop virtual desktops.
The engineer has just created a XenApp Services Web Interface site that enumerates applications from
the XenApp 5.0 farm.
Which additional steps must the engineer take to integrate the existing XenApp 5.0 farm into the
XenDesktop environment?
Click the Task button to drag and drop the steps in the correct order. Click the Exhibit button for
instructions on how to complete a Drag and Drop item.
Answer:

NO.2 Scenario: The new design document for Nether Tech Inc.'s environment calls for the inclusion of
several new Citrix products in addition to XenApp. XenServer will be implemented as the virtualization
platform. Provisioning Services will be used to rapidly provision desktop and server images. XenOesktop
will be used to publish and manage client desktops. Nether Tech Inc.'s existing environment consists of a
OHCP server, a ONS server, a domain controller, several managed switches with spanning tree protocol
and several routers.
Which modification should the Citrix Engineer recommend from a networking standpoint in order for all of
the new Citrix products to be highly optimized?
A. Enable task offload on the virtual machine.
B. Place each Citrix component in its own subnet.
C. Configure the DHCP server to use ports 60 and 67.
D. Enable the spanning tree fast link (PortFast) option on all Provisioning Services switch ports.
Answer: D

Citrix   1Y0-A15 pdf   1Y0-A15   1Y0-A15 exam dumps   1Y0-A15

NO.3 Scenario: The engineer at Nether Tech Inc. is assigned an implementation of Provisioning Services for
delivery of images to its XenApp servers and XenDesktop workstations. The architect has created the
design for the Provisioning Services environment and took the following design decisions:
One Provisioning Services farm will be created: PVSFARM.
Two Provisioning Services servers will be configured with HA: PVS01 and PVS02. One site will be
configured: Nether Tech Inc.
Two device collections will be configured: one for XenApp servers and one for XenDesktop devices.
A central store will be defined and located on the SAN and all vDisks will be added to this store.
Online and offline applications will be used to minimize changes to the vDisk.
A specified user account will be used for Provisioning Services service account. The TFTP service
will be installed on PVS01.
DHCP will be configured with options 66 and 67 to point to PVS01.
An Active Directory group policy object will be configured and linked to the XenApp and XenDesktop
organizations units to disable Active Directory Machine Account Password Management.
What will be a risk for the new environment based on the design decisions from the architect?
A. There is only one store configured for both XenApp and XenDesktop.
B. TFTP via DHCP is being used and TFTP is only installed on PVSO 1.
C. The PXE service is NOT being used to provide boot information to target devices.
D. The target devices for XenApp and XenDesktop are in separate device collections.
Answer: B

Citrix   1Y0-A15   1Y0-A15 pdf

NO.4 Scenario: A Citrix Engineer implementing the new virtualization design for Nether Tech Inc. must
configure XenApp for dynamic delivery by using Provisioning Services. Provisioning Services already
exists in the environment; however, due to company policies, neither using OHCP nor modifying the
OHCP scope options to include options 66 and 67 or using PXE are possible.
Which configuration method should the engineer recommend in order for the virtual XenApp servers to
boot from their assigned vOisk?
A. TFTP Service
B. 800t from SAN
C. 800t Device Manager (80M)
D. Static IP Address Assignment
Answer: C

Citrix dumps   1Y0-A15 answers real questions   1Y0-A15 exam   1Y0-A15 dumps   1Y0-A15

NO.5 Which three items are risks that a Citrix Enterprise Engineer should be aware of during the
implementation phase ofaXenApp project? (Choose three.)
A. Improper load evaluator configuration
B. Inconsistent server naming convention
C. Improper terminal server profile design
D. Inconsistent user account naming convention
E. Mixed brands of user devices running XenApp Plugin
F. Inconsistent set of printer drivers across the environment
Answer: ACF

Citrix questions   1Y0-A15   1Y0-A15   1Y0-A15 braindump   1Y0-A15 demo

NO.6 Answer:

NO.7 Scenario: After gathering basic requirements from Nether Tech Inc. administrators and IT personnel, an
engineer must decide whether a virtual or physical implementation is best suited for the environment.
Several key requirements are listed below.
Peak time is gam; approximately 4,000-4,500 logon attempts will be made then.
Most users will have the same core applications such as Microsoft Office and Adobe Reader.
Some custom applications need to be updated quarterly.
Remote users and traveling field agents will need secure remote access to the environment.
Several applications in the environment CANNOT co-exist together.
Some applications will NOT run on an application server.
Based on these requirements, which kind of implementation should the engineer recommend?
A. A virtualized implementation that leverages XenOesktop Platinum
B. A physical server farm that leverages XenApp on physical servers
C. A physical server farm that leverages XenApp and Provisioning Services
D. A virtualized server implementation that leverages XenServer and XenApp
Answer: A

Citrix certification training   1Y0-A15 demo   1Y0-A15 dumps   1Y0-A15 dumps

NO.8 Scenario: Nether Tech Inc. is planning to implement Provisioning Services for deployment of images to
their XenApp servers and XenDesktop workstations. The architect has created the design for the
Provisioning Services environment, making the following design decisions for the Provisioning Services
environment:
One Provisioning Services farm will be created: PVSFARM.
Two Provisioning Services servers will be installed and configured for High Availability: PVS01 and
PVS02. One site will be created: Nether Tech Inc.
Two Device Collections will be configured: XenApp and XenDesktop.
A central store will be defined and located on the SAN; all vDisks will be added to this store. The local
hard drive of the XenApp servers will be used to store the write cache.
TCP Large Send Offload will be enabled on the NICs.
A specified user account will be used as Provisioning Services service account.
Each Provisioning Services server will have four NICs; two teamed and connected with the "General
use subnet" (per the design document) and the other two NICs, disabled.
An Active Directory group policy object (GPO) will be configured and linked to the XenApp and
XenDesktop organizational units to disable Active Directory Machine Account Password
Management.
Online and offline applications will be used to minimize changes to the vDisk.
Offline applications will be pre-deployed to desktops and XenApp servers for faster access to the
applications by users.
According to the design decisions from the architect, which decision does NOT follow best practices?
A. One site will be created.
B. TCP Large Send Offload will be enabled on the NICs.
C. The local hard drive of the XenApp servers is used to store the write cache.
D. Online and offline applications will be used to minimize changes to the vDisk.
E. Offline applications will be pre-deployed to desktops and XenApp servers for faster access to the
application by users.
Answer: B

Citrix   1Y0-A15   1Y0-A15   1Y0-A15

NO.9 Which two statements highlight risks that a Citrix Engineer should investigate and potentially resolve
when implementing a XenApp environment? (Choose two.)
A. A custom load evaluator is being used with several application silos.
B. A separate zone within the production farm is being used for testing.
C. XML traffic from the Web Interface to the XML Brokers is being encrypted.
D. A Citrix policy exists that effectively disables users from installing drivers over ICA sessions in the
environment.
E. Users in the Nether Tech Inc. environment have the ability to install printer drivers on the XenApp
servers through their ICA sessions.
Answer: BE

Citrix   1Y0-A15   1Y0-A15   1Y0-A15   1Y0-A15 original questions

NO.10 Scenario: A Citrix Enterprise engineer is tasked with deploying XenDesktop pooled desktops for an
insurance company with 10 remote users using Provisioning Services. The design document requires
write cache to use RAM for better performance. The engineer determines that the target device does NOT
have enough memory to support the write cache, but there is NO option to add more RAM.
The engineer's recommendation should be to change Provisioning Services vDisk . (Choose the correct
phrase to complete the sentence.)
A. access mode to Private Image
B. access mode to Difference Disk Image
C. cache type to Cache on device HD in Private Image Access Mode
D. cache type to Cache on device HD in Standard Image Access Mode
Answer: D

Citrix   1Y0-A15 test answers   1Y0-A15   1Y0-A15   1Y0-A15 demo

IT-Tests.com offer the latest JN0-730 Questions & Answers and high-quality 000-N38 PDF Practice Test. Our BAS-004 VCE testing engine and 000-820 study guide can help you pass the real exam. High-quality HP2-N40 Real Exam Questions can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.it-tests.com/1Y0-A15.html

The Best Citrix 1Y0-A22 Exam Training materials

Citrix certification 1Y0-A22 exam is a test of IT professional knowledge. IT-Tests.com is a website which can help you quickly pass Citrix certification 1Y0-A22 exams. In order to pass Citrix certification 1Y0-A22 exam, many people who attend Citrix certification 1Y0-A22 exam have spent a lot of time and effort, or spend a lot of money to participate in the cram school. IT-Tests.com is able to let you need to spend less time, money and effort to prepare for Citrix certification 1Y0-A22 exam, which will offer you a targeted training. You only need about 20 hours training to pass the exam successfully.

The site of IT-Tests.com is well-known on a global scale. Because the training materials it provides to the IT industry have no-limited applicability. This is the achievement made by IT experts in IT-Tests.com after a long period of time. They used their knowledge and experience as well as the ever-changing IT industry to produce the material. The effect of IT-Tests.com's Citrix 1Y0-A22 exam training materials is reflected particularly good by the use of the many candidates. If you participate in the IT exam, you should not hesitate to choose IT-Tests.com's Citrix 1Y0-A22 exam training materials. After you use, you will know that it is really good.

If you IT-Tests, IT-Tests.com can ensure you 100% pass Citrix certification 1Y0-A22 exam. If you fail to pass the exam, IT-Tests.com will full refund to you.

In order to protect the vital interests of each IT certification exams candidate, IT-Tests.com provides high-quality Citrix 1Y0-A22 exam training materials. This exam material is specially developed according to the needs of the candidates. It is researched by the IT experts of IT-Tests.com. Their struggle is not just to help you pass the exam, but also in order to let you have a better tomorrow.

IT-Tests.com not only provide the products which have high quality to each candidate, but also provides a comprehensive after-sales service. If you are using our products, we will let you enjoy one year of free updates. So that you can get the latest exam information in time. We will be use the greatest efficiency to service each candidate.

Exam Code: 1Y0-A22
Exam Name: Citrix (Citrix XenApp 6.5 Advanced Administration )
Free One year updates to match real exam scenarios, 100% pass and refund Warranty.
Total Q&A: 100 Questions and Answers
Last Update: 2014-02-28

1Y0-A22 (Citrix XenApp 6.5 Advanced Administration ) Free Demo Download: http://www.it-tests.com/1Y0-A22.html

NO.1 After repairing a XenApp Web site, an administrator notices that the customized footer text is missing.
Which file must the administrator restore from backup?
A.Default.ica
B.Web.config
C.Repair.SFO
D.WebInterface.conf
E.LoginMainFormFoot.inc
Answer: D

Citrix test   1Y0-A22 pdf   1Y0-A22

NO.2 Scenario: An administrator in a XenApp farm is in the process of replacing a couple of the failed
XenApp servers in the farm. The administrator has been instructed to execute the DSCHECK
command once the servers have been replaced.
What will be the outcome of executing the DSCHECK command?
A.Recover the local data store
B.Purge corrupt local host cache entries
C.Purge the data store of incorrect entries
D.Display information about servers in the farm
Answer: C

Citrix   1Y0-A22 demo   1Y0-A22   1Y0-A22 exam

NO.3 Which two methods can an administrator use to configure Web Interface in high availability mode?
(Choose two.)
A.Windows Cluster services
B.NetScaler Load Balancing feature
C.Windows Load Balancing services
D.NetScaler Access Gateway feature
Answer: BC

Citrix exam   1Y0-A22   1Y0-A22   1Y0-A22 test questions   1Y0-A22 braindump

NO.4 A XenApp Administrator plans to use Citrix NetScaler to load balance Web Interface servers.
Which persistence setting should the administrator choose to correctly configure high availability
for Web Interface?
A.NOCE
B.DESTIP
C.SOURCEIP
D.COOKIEINSERT
Answer: D

Citrix demo   1Y0-A22 test   1Y0-A22 questions   1Y0-A22 practice test

NO.5 An administrator needs to validate the data store in a XenApp farm.
The administrator should use the DSCHECK command with the /CLEAN parameter after _______.
(Choose the correct option to complete the sentence.)
A.restoring the data store
B.backing up the data store
C.restarting the XenApp server
D.restarting the IMA Service on the data collector
Answer: B

Citrix   1Y0-A22 certification training   1Y0-A22

NO.6 Scenario: A XenApp Administrator in an enterprise environment plans to use Access Gateway to
secure ICA connections from the external network. The Access Gateway is in the DMZ using ICA
proxy mode.
Which two locations for these components would be the most secure? (Choose two.)
A.Place the XML broker in the DMZ.
B.Place the Web Interface in the DMZ.
C.Place the XML broker in the internal network.
D.Place the Web Interface in the internal network.
Answer: CD

Citrix answers real questions   1Y0-A22 braindump   1Y0-A22 exam simulations   1Y0-A22   1Y0-A22 test questions   1Y0-A22

NO.7 Scenario: An administrator migrated the data store of a Citrix XenApp 6.5 server farm from
Microsoft SQL Server Express on XenApp server XAS01 to a separate Microsoft SQL Server 2008
cluster.
The administrator tested the move, noted that the cluster is running well and found no errors.
None of the XenApp 6.5 servers can connect to the new location of the data store.
In this scenario, when should the administrator use the DSCHECK command?
A.After restarting the data collector
B.After using the DSMAINT command
C.After running the QFARM command
D.After using the CHANGE CLIENT command
Answer: B

Citrix   1Y0-A22   1Y0-A22 pdf   1Y0-A22   1Y0-A22   1Y0-A22 exam dumps

NO.8 Scenario: An administrator has configured a XenApp Web site and customized the footer text of
the site to reflect the required customer-specific hyperlinks. The administrator now plans to back
up the site.
Which file must the administrator back up?
A.Default.ica
B.Web.config
C.Repair.SFO
D.WebInterface.conf
E.LoginMainFormFoot.inc
Answer: D

Citrix   1Y0-A22 original questions   1Y0-A22   1Y0-A22

NO.9 When should an administrator use the DSCHECK command line utility?
A.To fix errors on server entries in the data store
B.To fix errors related to configuring Proxy Authentication
C.To fix errors in the local host cache on each XenApp 6.5 server
D.To generate a report of logon/logoff activity for a XenApp 6.5 server
Answer: A

Citrix   1Y0-A22 certification training   1Y0-A22

NO.10 Scenario: A XenApp Administrator of a 100-server farm needs to apply Citrix and vendor hotfixes
on a monthly basis, and a server restart is always required. The administrator needs to automate
this process but does NOT have a third party tool available.
Which two tasks should the administrator complete to guarantee that updates will be applied
successfully? (Choose two.)
A.Prohibit logons and notify users.
B.Restart the server and install hotfixes.
C.Apply application load evaluators and notify users.
D.Log off all users from servers and schedule a .EXE setup file installation.
Answer: AB

Citrix   1Y0-A22   1Y0-A22   1Y0-A22 exam prep   1Y0-A22 questions   1Y0-A22

NO.11 In order for the Web Interface server to correctly work with the Access Gateway Enterprise Edition
configuration in the attached exhibit,
the administrator must configure the authentication point at __________. (Choose the correct
option to complete the sentence.)
Case Study Title (Case Study):
A.LDAP
B.RADIUS
C.the Web Interface
D.the Access Gateway
Answer: C

Citrix test questions   1Y0-A22   1Y0-A22 certification training   1Y0-A22

NO.12 Scenario: An administrator used the Server Configuration Tool to install a Microsoft SQL Server
Express data store database automatically as part of a XenApp 6.5 farm installation. The initial
configuration consisted of a single zone and servers in a single physical location.
The administrator added an equal number of servers and users to the farm at a second physical
location over a WAN.
Which new requirement would require the administrator to migrate the data store database from
Microsoft SQL Server Express to Microsoft SQL Server?
A.Implementing database mirroring
B.Adding an additional zone to the farm
C.Moving the database from local storage to SAN storage
D.Adding the configuration logging database to the same SQL server
Answer: A

Citrix original questions   1Y0-A22   1Y0-A22

NO.13 Scenario: A XenApp Administrator in a small environment plans to use Access Gateway to secure
ICA connections from an external network. The Access Gateway is in the DMZ in ICA proxy mode.
The environment requires minimum configuration to secure connections from the Web Interface
server to the XML broker server.
Where should the administrator place the Web Interface server and XML broker?
A.On one server and place the server in the DMZ
B.On separate servers and place the servers in the DMZ
C.On one server and place the server in the internal network
D.On separate servers and place the servers in the internal network
Answer: C

Citrix questions   1Y0-A22 pdf   1Y0-A22 questions

NO.14 Scenario: An administrator used the Server Configuration Tool to install a Microsoft SQL Server
Express data store database automatically as part of a XenApp 6.5 farm installation. The initial
configuration consisted of a single zone and servers in a single physical location.
The administrator added an equal number of servers and users to the farm at a second physical
location over a WAN.
Which action would require the administrator to migrate the data store database from Microsoft
SQL Server Express to Microsoft SQL Server?
A.Adding an additional zone to the farm
B.Mirroring the SQL database to a second SQL server
C.Moving the database from local storage to SAN storage
D.Adding the configuration logging database to the same SQL server
Answer: B

Citrix exam prep   1Y0-A22 certification training   1Y0-A22 certification training   1Y0-A22   1Y0-A22

NO.15 Scenario: An administrator used the Server Configuration Tool to install a Microsoft SQL Server
Express data store database automatically as part of a XenApp 6.5 farm installation. The initial
configuration consisted of a single zone and servers in a single physical location.
The administrator added an equal number of servers and users to the farm at a second physical
location over a WAN.
Which action would require the administrator to migrate the data store database from Microsoft
SQL Server Express to Microsoft SQL Server?
A.Adding an additional zone to the farm
B.Replicating the data store to a second database server
C.Moving the data store from local storage to SAN storage
D.Adding the configuration logging database to the same SQL server
Answer: B

Citrix   1Y0-A22   1Y0-A22   1Y0-A22   1Y0-A22 questions

IT-Tests.com offer the latest 642-997 Questions & Answers and high-quality VCAC510 PDF Practice Test. Our LOT-407 VCE testing engine and VCAW510 study guide can help you pass the real exam. High-quality HH0-380 Real Exam Questions can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.it-tests.com/1Y0-A22.html

CheckPoint 156-310 exam study materials

CheckPoint 156-310 certification exam is very important for every IT person. With this certification you will not be eliminated, and you will be a raise. Some people say that to pass the CheckPoint 156-310 exam certification is tantamount to success. Yes, this is true. You get what you want is one of the manifestations of success. IT-Tests.com of CheckPoint 156-310 exam materials is the source of your success. With this training materials, you will speed up the pace of success, and you will be more confident.

In order to pass the CheckPoint 156-310 exam, selecting the appropriate training tools is very necessary. And the study materials of CheckPoint 156-310 exam is a very important part. IT-Tests.com can provide valid materials to pass the CheckPoint 156-310 exam. The IT experts in IT-Tests.com are all have strength aned experience. Their research materials are very similar with the real exam questions . IT-Tests.com is a site that provide the exam materials to the people who want to take the exam. and we can help the candidates to pass the exam effectively.

IT-Tests's expert team has developed a latest short-term effective training scheme for CheckPoint certification 156-310 exam, which is a 20 hours of training for the candidates of CheckPoint certification 156-310 exam. After training they can not only quickly master a lot of knowledge, but also consolidate their original knowledge. So they can easily pass CheckPoint certification 156-310 exam and it is much more cost-effective for them than those who spend a lot of time and energy to prepare for the examination.

Exam Code: 156-310
Exam Name: CheckPoint (Check Point CCSE NG)
Free One year updates to match real exam scenarios, 100% pass and refund Warranty.
Total Q&A: 398 Questions and Answers
Last Update: 2014-02-28

If you are still struggling to get the CheckPoint 156-310 exam certification, IT-Tests.com will help you achieve your dream. IT-Tests.com's CheckPoint 156-310 exam training materials is the best training materials. We can provide you with a good learning platform. How do you prepare for this exam to ensure you pass the exam successfully? The answer is very simple. If you have the appropriate time to learn, then select IT-Tests.com's CheckPoint 156-310 exam training materials. With it, you will be happy and relaxed to prepare for the exam.

If you are sure that you want to pass CheckPoint certification 156-310 exam, then your selecting to purchase the training materials of IT-Tests.com is very cost-effective. Because this is a small investment in exchange for a great harvest. Using IT-Tests's test questions and exercises can ensure you pass CheckPoint certification 156-310 exam. IT-Tests.com is a website which have very high reputation and specifically provide simulation questions, practice questions and answers for IT professionals to participate in the CheckPoint certification 156-310 exam.

156-310 (Check Point CCSE NG) Free Demo Download: http://www.it-tests.com/156-310.html

NO.1 You are importing a URI specification file from the Match tab on the URI Resource Properties screen.
Where is the editable URI specification file stored?
A. Policy Server
B. SmartView Monitor
C. Enforcement Module
D. SmartCenter Server
E. Enterprise Log Module
Answer: D

CheckPoint   156-310 demo   156-310   156-310 braindump

NO.2 Diffie-Hellman uses which type of key exchange?
A. Static
B. Dynamic
C. Symmetric
D. Asymmetric
E. Adaptive
Answer: D

CheckPoint answers real questions   156-310 test questions   156-310   156-310   156-310 answers real questions

NO.3 When you upgrade VPN-1/FireWall-1, what components are carried over to the new
version? (Choose two)
A. Licenses
B. VPN-1/FireWall-1 database
C. OPSEC database
D. Backward Compatibility
E. Rule Base
Answer: A, B

CheckPoint certification   156-310 exam prep   156-310

NO.4 The
_______ algorithm determines the load of each physical server and requires a Load Measuring
Agent be installed on each server.
A. Server Load
B. Server Relay
C. Round Robin
D. Domain
E. Round Trip
Answer: A

CheckPoint test   156-310 practice test   156-310

NO.5 Which of the following statements BEST describes the difference between VPN Domains and VPN
Communities?
A. A VPN Domain is a network, or group of networks, protected by and Enforcement Module. A VPN
Community is a collection of VPN Domains and the VPN tunnels between them.
B.
A VPN Domain is a remote-access VPN, consisting of a group of SecureClients and their associated
Enforcement Module. A VPN Community is a collection of Enforcement Module-to-Enforcement Module
VPNSs.
C. VPN Domains are used in Microsoft environments, and allow VPN-1/FireWall1- to communicate with
Domain Controllers. VPN Communities are used in Unix environments, to allow VPN-1/FireWall-1 to
communicate with authentication servers.
D. VPN Domains specify encryption properties and access restrictions for users. VPN Communities detail
encryption properties and access restrictions, for machines and processes.
E. VPN Domains are used for Security Policies created in traditional mode. VPN Communities are used in
simplified mode. VPN Domains are not available, if simplified mode is used.
Answer: A

CheckPoint test   156-310 certification training   156-310 demo   156-310   156-310   156-310 pdf

NO.6 Which of the following is TRUE of the relationship between the RemoteAccess VPN
Community and the Security Policy Rule Base?
A. The RemoteAccess VPN Community defines VPN connection parameters for
SecuRemote connections. The Security Policy Rule Base is used to allow access to
protected resources.
B. The RemoteAccess VPN Community is used to allow access to protected resources.
The Security Policy Rule Base is used to define VPN connection parameters for
SecuRemote connections.
C. The Security Policy Rule Base is used to define VPN connection parameters for
SecuRemote connections and is used to allow access to protected resources. The
RemoteAccess VPN Community applies only SecureClient.
D. The RemoteAccess VPN Community defines VPN connection parameters for
SecuRemote connections and is used to allow access to protected resources. Security
Policy Rules are not defined for SecuRemote.
Answer: A

CheckPoint exam prep   156-310 study guide   156-310 test questions   156-310 certification training   156-310   156-310 certification

NO.7 Ann would like to deploy H.323 with a gatekeeper and gateway on her internal network. This network
is
behind a VPN-1/FireWall-1 Enforcement Module. Which of the following objects is NOT required to
configure VPN-1/FireWall-1 for H.323 in this scenario?
A. Address Range representing internal IP-addressed phones
B. Gatekeeper Node Object
C. Address range of external IP-addressed phones
D. Voice over IP (VoIP) Gateway Node Object
E. Voice over IP (VoIP) Domain Object
Answer: C

CheckPoint exam simulations   156-310   156-310   156-310 pdf   156-310

NO.8 Which of the following is NOT a method of Load Balancing with
VPN-1/FireWall-1?
A. Domain Load Balancing
B. Round Robin
C. Server Load
D. Round Trip
E. Quantum Load Balancing
Answer: E

CheckPoint   156-310   156-310 demo   156-310   156-310 dumps

NO.9 Which of the following is NOT a feature or quality of a hash function?
A. It is mathematically infeasible to derive the original message from the message digest.
B. The hash function is irreversible.
C. It is mathematically infeasible for two different messages to produce the same message digest.
D. The hash function forms a two-way, secure communication.
E. Encrypted with the sender's RSA private key, the hash function forms the digital signature.
Answer: D

CheckPoint pdf   156-310   156-310   156-310

NO.10 Ann is a VPN-1/FireWall-1 Security Administrator. Her organization's solution for remote-access
security is SecureClient. Ann's organization is undergoing a security audit. The auditor is concerned,
because static passwords, such as VPN-1 & FireWall-1 and operating system passwords are cached on
the desktop, and users are not required to re-authenticate. Which of the following explanations addresses
the auditor's concerns?
A. The auditor has incorrect information. SecureClient caches all passwords. A strong encryption
algorithm
protects the proprietary database used for password caching, so there is never a need to purge cached
passwords.
B. The auditor has incorrect information. SecureClient never cached passwords. SecureClient users are
forced
to re-authenticate for each new connection, regardless of the type of password used.
C. Cached passwords are purged when SecureClient receives Policy and Topology updates. Most
installation
update Security Policies frequently, so cached passwords are rarely stored for longer than six to eight
hours.
Renaming the userc.C file to userc.old will also purge the password cache.
D. Cached passwords are purged at an interval specified in the Desktop Security Policy. As long as the
user.C
file is encrypted, users cannot tamper with the interval setting. The interval time is in seconds from the
time to
SecureClient software is launched.
E. Cached passwords are purged when SecureClient is stopped, when a connect mode is disconnected,
and
when the computer is rebooted. SecureClient users can manually purge the cache, by choosing the Erase
Passwords option from the Passwords menu.
Answer: E

CheckPoint test answers   156-310   156-310   156-310   156-310 exam dumps   156-310 questions

NO.11 Ken us assisting a user whose SecurityClient password has expired. The SecureClient user can no
longer
access resources in the VPN Domain. Which of the following solutions is likely to resolve the issue?
A. Ken must ask the VPN-1/FireWall-1 Security Administrator to change the setting Password Expires to a
date
in the future. Users cannot adjust their SecureClient passwords.
B. Ken should as the user to change his password, using the New Password option on SecureClient's
Passwords
menu. The user can change his password, then stop and start SecureClient.
C. If the SecureClient password is allowed to expire, the software will no longer function. Ken should help
the
user uninstall and reinstall SecureClient. The user will be prompted to supply a new password during
installation.
D. When the SecureClient password expires while a session is in progress, the session will not exit
properly.
Ken should ask the user to shut down and restart his computer. The user will be prompted to supply a
new
password after login.
E. The user must edit the userc.C file, to change the expiration date on his password. Ken should help the
user
make the necessary modifications to the userc.C file, using a text editor that does not insert Unicode
characters.
Answer: A

CheckPoint   156-310   156-310   156-310 study guide   156-310

NO.12 When upgrading a configuration to NG with Application Intelligence: (Choose the
FALSE answer)
A. Upgrade the SmartConsole.
B. Upgrade each module's version in SmartDashboard manually.
C. Upgrade the VPN-1/Firewall-1 Enforcement Modules.
D. Copy $FWDIR/state from one version of VPN-1/FireWall-1 to another version of
VPN-1/FireWall-1.
E. Upgrade the SmartCenter server. The version is set during the upgrade.
Answer: D

CheckPoint   156-310   156-310   156-310 exam simulations   156-310 exam

NO.13 VPN-1/FireWall-1 can be configured to enable Voice over IP (VoIP) traffic in which
of the following environments? (Choose two)
A. SIP
B. Q.931
C. G.723
D. DiffServ QOS
E. H.323
Answer: A, E

CheckPoint   156-310 braindump   156-310 certification training   156-310

NO.14 Which of the following FTP Content Security settings prevents internal users from sending corporate
files to external FTP Servers, while allowing users to retrieve files?
A. Use an FTP resource, and enable the GET and PUT methods.
B. Use an FTP resource and enable the GET method.
C. Use an FTP resource and enable the PUT method.
D. Block FTP_PASV.
E. Block all FTP traffic.
Answer: B

CheckPoint   156-310 practice test   156-310

NO.15 All of the following are steps for implementing UFP, EXCEPT:
A. While the UFP Server is analyzing the requests, the Enforcement Module HTTP Proxy Server initiates
a
request to the destination. The HTTP Proxy server then waits for a response from the UFP Server before
allowing the request.
B. The client invokes a connection through the VPN-1/FireWall-1 Enforcement Module.
C. The Content Server inspects the URLs and returns the validation result message to the Enforcement
Module.
D. The Enforcement Module takes the action defined in the Rule Base for the resource.
E. The Security Server uses UFP to send the URL to a third-party UFP Server categorization.
Answer: A

CheckPoint   156-310   156-310   156-310 test questions   156-310 certification   156-310

NO.16 Which of the following statements BEST explains the difference between VPN-1/FireWall-1 logs and
alerts?
The difference between VPN-1/FireWall-1 logs and alerts is that:
A. Log entries contain detailed information about traffic. Alerts contain only brief descriptions of problems.
And links to the appropriate log entries.
B. Log entries are recorded in SmartView Tracker, and are persistent. Alerts appear only in SmartView
Status,
and are not persistent.
C. Logs are recorded sequentially, by date and time received. Alerts are arranged by priority and
magnitude.
D. Logging allows a Security Administrator to view historical connection information. Alerts are real-time
and
can be applied to a Security Policy's predefined tracking properties.
E. Logs are generated for explicit rules, defined by Security Administrators in the Security Policy. Alerts
are
automatically generated by implicit rules, created as a result of Global Properties settings.
Answer: D

CheckPoint   156-310 certification training   156-310 test   156-310 test   156-310 questions   156-310

NO.17 Mark is preparing to install VPN-1/FireWall-1 and has created the installation plan below.
1. Perform the following operations below in sequential order.
2. Install the operating system.
3. Configure routing and IP forwarding.
4. Configure name resolution.
5. Patch the operating system.
6. Set $FWDIR and $CPDIR environment variables.
7. Install VPN-1/FireWall-1.
8. Patch VPN-1/FireWall-1,
Which step in Mark's installation plan is NOT necessary?
A. Operating-system patches should not be applied, until after VPN-1/FireWall-1 is installed. Applying
operating-system patches before VPN-1/FireWall-1 is installed will result in an unsecured system.
B. VPN-1/FireWall-1 configures name resolution automatically. Name resolution should not be part of the
installation plan.
C. There is nothing wrong with Mark's installation plan.
D.
Routing and IP Forwarding should be configured after VPN-1/FireWall-1 is installed. Configuring routing
and
IP forwarding before VPN-1/FireWall-1 is installed will result in an unstable system.
E. VPN-1/FireWall-1 configures environment variables automatically. Configure environment variables
should
not be part of the installation plan.
Answer: E

CheckPoint test questions   156-310 test   156-310 pdf   156-310 practice test   156-310

NO.18 Which of the following statements about IKE Encryption are TRUE? (Choose three
)
A. The final packet size is increased after it is encrypted.
B. TCP and IP headers are encrypted, along with the payload.
C. IKE uses in-place encryption.
D. IKE can use the FWZ1 encryption algorithm.
E. IKE uses tunneling encryption.
Answer: A, B, E

CheckPoint exam simulations   156-310 answers real questions   156-310 test answers

NO.19 You are using Hybrid IKE for Client Authentication. SecureClient produces the error Certifcation is
badly signed. Which of the following is the MOST likely cause of the problem and the appropriate
solution?
A. Under the firewall object > VPN > IKE Properties > Support Authentication Methods, Hybrid Mode is
not
selected. Select the Hybrid Mode option, and stop and restart the Enforcement Module.
B. The Distinguished Name used is too long. Change it to a shorter name in the Manage Certificate
Properties screen.
C. The certificate created by the Internal Certificate Authority (ICA) is corrupt. Create a new certificate.
D. The SecureClient and VPN-1/FireWall-1 Enforcement Module to which it is attempting to connect are
running incompatible versions. Upgrade the SecureClient to NG with Application Intelligence.
E. The digital signature is missing. Add the digital signature to the certificate in the Manage Certificate
Properties screen.
Answer: A

CheckPoint   156-310   156-310 certification training

NO.20 Which of the following is NOT a valid VPN configuration option available in the
VPN Manager of the Simplified Rule Base?
A. Point-to-Point
B. Mesh
C. Remote Access
D. Star with Meshed Center
E. Star
Answer: A

CheckPoint   156-310   156-310   156-310 braindump   156-310

NO.21 Vered is a Security Administrator preparing to migrate her organization's IKE VPNs from pre-shared
secrets to PKI with certificates. Vered's organization has client-to-site VPNs between SecureClients and
Enforcement Modules, and site-to-site VPNs between Enforcement Modules. Vered will use the
VPN-1/FireWall-1 Internal Certificate Authority (ICA), to generate and maintain certificates. Which of
the following statements is TRUE?
Vered can:
A. Install and configure an OPSEC-certified Certificate Authority product. Vered cannot use the Internal
Certificate Authority (ICA) to accomplish this task.
B. Migrate the organization's site-to-site VPNs, but she cannot migrate the organization's client-to-site
VPNs.
C. Either migrate the PKI with certificates for her VPNs, or use the ICA for certificate generation and
maintenance. Vered cannot do both.
D. Migrate both the site-to-site VPNs and the client-to-site VPNs. She can use the ICA to generate and
maintain
certificates.
E. Migrate the organization's client-to-site VPNs, if she moves from SecureClient to SecuRemote. She
cannot
migrate the site-to-site VPNs.
Answer: D

CheckPoint exam prep   156-310 practice test   156-310 test answers   156-310

NO.22 Which of the following is NOT a method used to configure SIP?
A. With SIP Proxies.
B. With a SIP Gatekeeper to a network without a proxy.
C. From a network without a proxy to a network with a proxy.
D. With a proxy for internal communications.
E. Without SIP Proxies.
Answer: B

CheckPoint original questions   156-310 test   156-310   156-310

NO.23 Which of the following is NOT a function of the Internal Certificate Authority (ICA)?
A. Provides certificates for users and Security Administrators.
B. Generated certificates for HTTPS Web server.
C. Establishes SIC between OPSEC applications and Check Point products.
D. Authentications SecureClient traffic to Enforcement Modules for VPNs.
E. Establishes SIC between Check Point products.
Answer: B

CheckPoint study guide   156-310   156-310

NO.24 If you are using SIP or SIP_ANY, and the Source or Destination is Any, which of the following
statements are TRUE concerning SIP Services? (Choose two)
If the Service is:
A. SIP_Any, and the Source is Any, the object represented by Any (internal or external) is SIP Proxy.
B. SIP_Any, and the Destination is Any, the object represented by Any (external only) is not a SIP Proxy.
C. SIP, and the Source is Any, the object represented by Any is allowed to redirect the connection, unless
it is a
SIP Proxy.
D. SIP, and the Destination is ANY, the object represented by Any is allowed to redirect the connection, so
it
must be a SIP Proxy.
E. SIP_Any, and the Source or Destination is Any, the object represented by Any (internal or external) is
always a SIP Proxy.
Answer: B, C

CheckPoint pdf   156-310 certification   156-310 original questions   156-310

NO.25 If the Use Aggressive Mode check box in the IKE Properties dialogue box is
enabled:
A. The standard six-packet IKE Phase 1 exchange is replaced by a three-packet
exchange.
B. The standard three-packet IKE Phase 2 exchange is replaced by a six-packet
exchange.
C. The standard three-packet IKE Phase 1 exchange is replaced by a six-packet
exchange.
D. The standard six-packet IKE Phase 2 exchange is replaced by a three-packet
exchange.
E. The standard three-packet IKE Phase 3 exchange is replaced by a six-packet exchange.
Answer: A

CheckPoint   156-310 demo   156-310

NO.26 Dr Bill is setting up a new VPN-1/FireWall-1 Enforcement Module. The Rule Base
is configured to allow all traffic, and the Enforcement Module is set up as shown in
the screen capture below. Dr bill cannot get the new system to pass any traffic.
What is the MOST likely cause of the problem?
System specifications:
1. Processor: 2.2 GHz
2. RAM: 256 MB
3. Hard Disk: 10 GB
4. OS: Windows 2000 Server
Results of ipconfig/all
View the following exhibit for the results of ipconfig/all.
A. Routing is not properly configured.
B. The machine does not have enough RAM.
C. The processor is not fast enough.
D. The operating system is not supported.
E. The Rule Base is blocking traffic.
Answer: A

CheckPoint   156-310 test answers   156-310   156-310 practice test   156-310

NO.27 Static passwords such as VPN-1 & FirwWall-1 and operating system passwords are cached on the
desktop and users are not required to re-authenticate. Which of the following does NOT clear the
password cache?
A. Receives a policy update.
B. Perform a disconnect from a connect mode.
C. Selects the Stop VPN 1 SecuRemote option from the File menu.
D. Selects the Erase Passwords option from the Passwords menu.
E. Reboots the computer.
Answer: A

CheckPoint pdf   156-310 test questions   156-310 test   156-310 exam dumps

NO.28 Which of the following does NOT require definition for a Voice over IP (VoIP)
Domain SIP object?
A. SIP Proxy
B. IP Address Range
C. VoIP Gateway
D. Related Endpoint Domain
E. Name
Answer: A

CheckPoint study guide   156-310 pdf   156-310   156-310   156-310

NO.29 Exhibit
Jacob configured a meshed VPN Community, with VPN properties set as shown below. Which of the
following statements are TRUE? (Choose two)
A. Jacob is using the default VPN property settings for a VPN-1/FireWall-1 meshed VPN Community.
B. Jacob's community will perform IKE Phase 1 key-exchange encryption, using the longest key
VPN-1/FireWall-1 supports.
C. Jacob must change the data-integrity settings for this VPN Community. MD5 is incompatible with AES.
D. If Jacob changes the setting Perform IPsec data encryption with: from AES-128 to 3DES, he will
increase
the encryption overhead.
E. If Jacob changes the setting, Perform key exchange encryption with: from 3DES to DES, he will
enhance the
VPN Community's security and reduce encryption overhead.
Answer: A, B

CheckPoint   156-310 pdf   156-310   156-310 demo   156-310

NO.30 Which of the following encryption algorithms supports a key length from 128-bits to 256-bits and is
outlined in the new Federal Information Processing Standard publication?
A. AES (Ridndael)
B. CAST Cipher
C. 3DES
D. DES
E. Blowfish
Answer: A

CheckPoint   156-310 practice test   156-310 certification training   156-310   156-310

IT-Tests.com offer the latest EX0-101 Questions & Answers and high-quality 70-342 PDF Practice Test. Our BAS-004 VCE testing engine and 70-489 study guide can help you pass the real exam. High-quality C_TBIT44_73 Real Exam Questions can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.it-tests.com/156-310.html

Exam 156-315 questions and answers

Education degree does not equal strength, and it does not mean ability. Education degree just mean that you have this learning experience only. And the real ability is exercised in practice, it is not necessarily linked with the academic qualifications. Do not feel that you have no ability, and don't doubt yourself. When you choose to participate in the CheckPoint 156-315 exam, it is necessary to pass it. If you are concerned about the test, however, you can choose IT-Tests.com's CheckPoint 156-315 exam training materials. No matter how low your qualifications, you can easily understand the content of the training materials. And you can pass the exam successfully.

CheckPoint certification 156-315 exam is the first step for the IT employees to set foot on the road to improve their job. Passing CheckPoint certification 156-315 exam is the stepping stone towards your career peak. IT-Tests.com can help you pass CheckPoint certification 156-315 exam successfully.

IT-Tests.com free update our training materials, which means you will always get the latest 156-315 exam training materials. If 156-315 exam objectives change, The learning materials IT-Tests.com provided will follow the change. IT-Tests.com know the needs of each candidate, we will help you through your 156-315 exam certification. We help each candidate to pass the exam with best price and highest quality.

The site of IT-Tests.com is well-known on a global scale. Because the training materials it provides to the IT industry have no-limited applicability. This is the achievement made by IT experts in IT-Tests.com after a long period of time. They used their knowledge and experience as well as the ever-changing IT industry to produce the material. The effect of IT-Tests.com's CheckPoint 156-315 exam training materials is reflected particularly good by the use of the many candidates. If you participate in the IT exam, you should not hesitate to choose IT-Tests.com's CheckPoint 156-315 exam training materials. After you use, you will know that it is really good.

Exam Code: 156-315
Exam Name: CheckPoint (Check Point Security Administration NGX II (156-315.1)......)
Free One year updates to match real exam scenarios, 100% pass and refund Warranty.
Total Q&A: 205 Questions and Answers
Last Update: 2014-02-28

Each IT certification exam candidate know this certification related to the major shift in their lives. Certification exam training materials IT-Tests.com provided with ultra-low price and high quality immersive questions and answersdedication to the majority of candidates. Our products have a cost-effective, and provide one year free update . Our certification training materials are all readily available. Our website is a leading supplier of the answers to dump. We have the latest and most accurate certification exam training materials what you need.

156-315 (Check Point Security Administration NGX II (156-315.1)......) Free Demo Download: http://www.it-tests.com/156-315.html

NO.1 You want VPN traffic to match packets from internal interfaces. You also want the
traffic to exit the Security Gateway, bound for all site-to-site VPN Communities,
including Remote Access Communities.
How should you configure the VPN match rule
A. internal_clear>All-GwToGw
B. Communities>Communities
C. Internal_clear>External_Clear
D. Internal_clear>Communities
E. Internal_clear>All_communities
Answer: E

CheckPoint dumps   156-315   156-315 practice test   156-315

NO.2 You receive an alert indicating a suspicious FTP connection is trying to connect to
one of your internal hosts. How do you block the connection in real time and verify
the connection is successfully blocked?
A. Highlight the suspicious connection in SmartView Tracker>Active mode. Block the
connection using Tools>Block Intruder menu. Use the active mode to confirm that the
suspicious connection does not reappear.
B. Highlight the suspicious connection in SmartView Tracker>Log mode. Block the
connection using Tools>Block Intruder menu. Use the Log mode to confirm that the
suspicious connection does not reappear.
C. Highlight the suspicious connection in SmartView Tracker>Active mode. Block the
connection using Tools>Block Intruder menu. Use the active mode to confirm that the
suspicious connection is dropped.
D. Highlight the suspicious connection in SmartView Tracker>Log mode. Block the
connection using Tools>Block Intruder menu. Use the Log mode to confirm that the
suspicious connection is dropped.
Answer: C

CheckPoint exam dumps   156-315 exam   156-315   156-315   156-315

NO.3 KillTest is the Security Administrator for KillTest .com. KillTest .com FTP
servers have old hardware and software. Certain FTP commands cause the FTP
servers to malfunction. Upgrading the FTP Servers is not an option this time.
Which of the following options will allow KillTest to control which FTP
commands pass through the Security Gateway protecting the FTP servers?
A. Global Properties->Security Server ->Security Server->Allowed FTP Commands
B. SmartDefense->Application Intelligence->FTP Security Server
C. Rule Base->Action Field->Properties
D. Web Intelligence->Application Layer->FTP Settings
E. FTP Service Object->Advanced->Blocked FTP Commands
Answer: B

CheckPoint   156-315   156-315 practice test   156-315 pdf

NO.4 Which operating system is NOT supported by VPN-1 SecureClient?
A. IPSO 3.9
B. Windows XP SP2
C. Windows 2000 Professional
D. RedHat Linux 8.0
E. MacOS X
Answer: A

CheckPoint   156-315 questions   156-315 exam   156-315 braindump   156-315 answers real questions

NO.5 You work a network administrator for KillTest .com. You configure a Check Point QoS Rule Base with
two rules: an H.323 rule with a weight of 10, and the Default
Rule with a weight of 10. The H.323 rule includes a per-connection guarantee of 384
Kbps, and a per-connection limit of 512 Kbps. The per-connection guarantee is for
four connections, and no additional connections are allowed in the Action
properties. If traffic passing through the QoS Module matches both rules, which of
the following is true?
A. Neither rule will be allocated more than 10% of available bandwidth.
B. The H.323 rule will consume no more than 2048 Kbps of available bandwidth.
C. 50% of available bandwidth will be allocated to the H.323 rule.
D. 50% of available bandwidth will be allocated to the Default Rule
E. Each H.323 connection will receive at least 512 Kbps of bandwidth.
Answer: B

CheckPoint practice test   156-315   156-315

NO.6 Exhibit:
KillTest tries to configure Directional VPN Rule Match in the Rule Base. But the
Match column does not have the option to see the Directional Match. KillTest sees
the screen displayed in the exhibit.
What is the problem?
A. Jack must enable directional_match(true) in the object_5_0.c file on SmartCenter server.
B. Jack must enable Advanced Routing on each Security Gateway
C. Jack must enable VPN Directional Match on the VPN Advanced screen, in Global properties.
D. Jack must enable a dynamic-routing protocol, such as OSPF, on the Gateways.
E. Jack must enable VPN Directional Match on the gateway object's VPN tab.
Answer: C

CheckPoint   156-315   156-315   156-315 test answers

NO.7 You want only RAS signals to pass through H.323 Gatekeeper and other H.323
protocols, passing directly between end points. Which routing mode in the VoIP
Domain Gatekeeper do you select?
A. Direct
B. Direct and Call Setup
C. Call Setup
D. Call Setup and Call Control
Answer: A

CheckPoint   156-315 pdf   156-315   156-315 exam prep   156-315   156-315 practice test

NO.8 You want to upgrade a SecurePlatform NG with Application Intelligence (AI) R55
Gateway to SecurePlatform NGX R60 via SmartUpdate.
Which package is needed in the repository before upgrading?
A. SVN Foundation and VPN-1 Express/Pro
B. VNP-1 and FireWall-1
C. SecurePlatform NGX R60
D. SVN Founation
E. VPN-1 Pro/Express NGX R60
Answer: C

CheckPoint test questions   156-315   156-315

NO.9 You are preparing to configure your VoIP Domain Gatekeeper object. Which two other object should you
have created first?
A. An object to represent the IP phone network, AND an object to represent the host on
which the proxy is installed.
B. An object to represent the PSTN phone network, AND an object to represent the IP
phone network
C. An object to represent the IP phone network, AND an object to represent the host on
which the gatekeeper is installed.
D. An object to represent the Q.931 service origination host, AND an object to represent
the H.245 termination host
E. An object to represent the call manager, AND an object to represent the host on which
the transmission router is installed.
Answer: C

CheckPoint dumps   156-315   156-315   156-315

NO.10 Exhibit:
KillTest is using a mesh VPN Community to create a site-to-site VPN. The VPN
properties in this mesh Community is displayed in the exhibit.
Which of the following statements are true?
A. If Jack changes the settings, "Perform key exchange encryption with" from "3DES" to
"DES", she will enhance the VPN Community's security and reduce encryption overhead.
B. Mrs Bill must change the data-integrity settings for this VPN Community. MD5 is incompatible with
AES.
C. If KillTest changes the setting "Perform IPSec data encryption with" from
"AES-128" to "3DES", Jack will increase the encryption overhead.
D. Her VPN Community will perform IKE Phase 1 key-exchange encryption, using the
longest key VPN-1 NGX supports.
Answer: C

CheckPoint test answers   156-315 answers real questions   156-315   156-315 braindump   156-315

NO.11 Exhibit:
You are preparing computers for a new ClusterXL deployment. For your cluster,
you plan to use three machines with the configurations displayed in the exhibit.
Are these machines correctly configured for a ClusterXL deployment?
A. Yes, these machines are configured correctly for a ClusterXL deployment.
B. No, QuadCards are not supported with ClusterXL.
C. No, all machines in a cluster must be running on the same OS.
D. No, al cluster must have an even number of machines.
E. No, ClusterXL is not supported on Red Hat Linux.
Answer: C

CheckPoint certification   156-315 study guide   156-315   156-315 answers real questions   156-315 test answers

NO.12 KillTest .com has many VPN-1 Edge gateways at various branch offices, to allow
VPN-1 SecureClient users to access KillTest .com resources. For security reasons,
KillTest .com's Secure policy requires all Internet traffic initiated behind the
VPN-1 Edge gateways first be inspected by your headquarters' VPN-1 Pro Security
Gateway. How do you configure VPN routing in this star VPN Community?
A. To the Internet an other targets only
B. To the center and other satellites, through the center
C. To the center only
D. To the center, or through the center to other satellites, then to the Internet and other
VPN targets
Answer: D

CheckPoint   156-315 exam simulations   156-315 practice test

NO.13 KillTest is concerned that a denial-of-service (DoS) attack may affect her VPN
Communities. She decides to implement IKE DoS protection. Jack needs to
minimize the performance impact of implementing this new protectdion.
Which of the following configurations is MOST appropriate for Mrs. Bill?
A. Set Support IKE DoS protection from identified source to "Puzzles", and Support IKE
DoS protection from unidentified source to "Stateless"
B. Set Support IKE DoS protection from identified source, and Support IKE DoS
protection from unidentified soruce to "Puzzles"
C. Set Support IKE DoS protection from identified source to "Stateless", and Support
IKE DoS protection from unidentified source to "Puzzles".
D. Set Support IKE DoS protection from identified source, and "Support IKE DoS
protection" from unidentified source to "Stateless".
E. Set Support IKE DoS protection from identified source to "Stateless", and Support
IKE DoS protection from unidentified source to "None".
Answer: D

CheckPoint   156-315 certification training   156-315 test questions   156-315

NO.14 Which Check Point QoS feature is used to dynamically allocate relative portions of
available bandwidth?
A. Guarantees
B. Differentiated Services
C. Limits
D. Weighted Fair Queuing
E. Low Latency Queing
Answer: D

CheckPoint answers real questions   156-315 pdf   156-315

NO.15 Exhibit:
The exhibit displays the cphaprob state command output from a New Mode High
Availability cluster member.
Which machine has the highest priority?
A. 192.168.1.2, since its number is 2.
B. 192.168.1.1, because its number is 1.
C. This output does not indicate which machine has the highest priority.
D. 192.168.1.2, because its stats is active
Answer: B

CheckPoint exam dumps   156-315 study guide   156-315

NO.16 In a distributed VPN-1 Pro NGX environment, where is the Internal Certificate
Authority (ICA) installed?
A. On the Security Gateway
B. Certificate Manager Server
C. On the Policy Server
D. On the Smart View Monitor
E. On the primary SmartCenter Server
Answer: E

CheckPoint demo   156-315   156-315   156-315 test questions   156-315 exam dumps

NO.17 Where can a Security Administator adjust the unit of measurement (bps, Kbps or
Bps), for Check Point QoS bandwidth?
A. Global Properties
B. QoS Class objects
C. Check Point gateway object properties
D. $CPDIR/conf/qos_props.pf
E. Advanced Action options in each QoS rule.
Answer: A

CheckPoint   156-315   156-315 dumps   156-315 original questions   156-315

NO.18 You have a production implementation of Management High Availability, at
Version VPN-1 NG with application Intelligence R55.
You must upgrade two SmartCenter Servers to VPN-1.
What is the correct procedure?
A. 1. Synchronize the two SmartCenter Servers
2. Upgrade the secondary SmartCenter Server.
3. Upgrade the primary SmartCenter Server.
4. Configure both SmartCenter Server host objects version to VPN-1 NGX
5. Synchronize the Servers again.
B. 1. Synchronize the two SmartCenter Servers
2. Perform an advanced upgrade the primary SmartCenter Server.
3. Upgrade the secondary SmartCenter Server.
4. Configure both SmartCenter Server host objects to version VPN-1 NGX.
5. Synchronize the Servers again
C. 1. Perform an advanced upgrade on the primary SmartCenter Server.
2. Configure the primary SmartCenter Server host object to version VPN.1 NGX.
3. Synchronize the primary with the secondary SmartCenter Server.
4. Upgrade the secondary SmartCenter Server.
5. Configure the secondary SmartCenter Server host object to version VPN-1 NGX.
6. Synchronize the Servers again.
D. 1. Synchronize the two SmartCenter Servers.
2. Perform an advanced upgrade on the primary SmartCenter Server.
3. Configure the primary SmartCenter Server host object to version VPN-1 NGX.
4. Synchronize the two servers again.
5. Upgrade the secondary SmartCenter Server.
6. Configure the secondary SmartCenter Server host object to version VPN-1 NGX.
7. Synchronize the Servers again.
Answer: A

CheckPoint   156-315 test answers   156-315 practice test

NO.19 You set up a mesh VPN community, so your internal networks can access your
partner's network, and vice versa. Your Security Policy encrypts only FTP and
HTTP traffic through a VPN tunnel. All other traffic among your internal and
partner networks is sent in clear text. How do you configure the VPN community?
A. Disable "accept all encrypted traffic", and put FTP and HTTP in the Excluded services
in the Community object. Add a rule in the Security Policy for services FTP and http,
with the Community object in the VPN field.
B. Disable "accept all encrypted traffic" in the Community, and add FTP and HTTP
services to the Security Policy, with that Community object in the VPN field.
C. Enable "accept all encrypted traffic", but put FTP and HTTP in the Excluded services
in the Community. Add a rule in the Security Policy, with services FTP and http, and the
Community object in the VPN field.
D. Put FTP and HTTP in the Excluded services in the Community object. Then add a rule
in the Security Policy to allow Any as the service with the Community object in the VPN
field.
Answer: B

CheckPoint exam prep   156-315   156-315 questions   156-315 test questions

NO.20 Assume an intruder has compromised your current IKE Phase 1 and Phase 2 keys.
Which of the following options will end the intruder's access, after the next Phase 2
exchange occurs?
A. Phase 3 Key Revocation
B. Perfect Forward Secrecy
C. MD5 Hash Completion
D. SH1 Hash Completion
E. DES Key Reset
Answer: B

CheckPoint test answers   156-315 certification   156-315

IT-Tests.com offer the latest MSC-321 Questions & Answers and high-quality HH0-050 PDF Practice Test. Our C_TAW12_731 VCE testing engine and 700-104 study guide can help you pass the real exam. High-quality HP2-H28 Real Exam Questions can 100% guarantee you pass the exam faster and easier. Pass the exam to obtain certification is so simple.

Article Link: http://www.it-tests.com/156-315.html