Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Novell 050-650 Exam - Cheat-Test.com

Free 050-650 Sample Questions:

1. Which statement about the BorderManager 3.5 installation process is true?
A. NETBASIC.NLM must be loaded on the server prior to installation.
B. You must configure your servers and clients to use TCP/IP prior to installation.
C. Installation can be done remotely using RCONSOLE with the CD mounted on your local machine.
D. You can install on a remote server if you copy the contents of the CD to a mounted volume on that server.
Answer: D

2. Which file can you view to identify the default filter exceptions to the BorderManager filters?
A. FILT.TXT
B. ALLFILT.TXT
C. FILTEXCP.TXT
D. The file specified by the user when filters are saved to a text file.
Answer: D

3. What is the message content of a type 3 ICMP packet?
A. Echo Reply
B. Time Exceeded
C. Parameter Problem
D. Address Mask Reply
E. Destination Unreachable
Answer: E

4. You are trying to determine if NAT is working. Which server console command can you use to determine if filters are configured to deny outgoing IP packets?
A. PING
B. TCPCON
C. INETCFG
D. FILTCFG
E. NIASCFG
Answer: D

5. What are benefits of using BorderManager proxy acceleration? (Choose 2.)
A. Web server IP addresses are kept hidden from the Internet
B. Workstation IP addresses are kept hidden from the Internet
C. Cached web pages are delivered to your internal users 60% faster
D. Workstations can access the Internet without having full IP support installed
E. One proxy server can act as several web servers, providing some fault tolerance
Answer: AE

6. What are some BorderManager filter types? (Choose 4.)
A. WAN filters
B. Route filters
C. Bridge filters
D. Service filters
E. Route forwarding filters
F. Packet forwarding filters
Answer: BCDF

7. Which tasks are involved in defining a security policy? (Choose 3.)
A. Limit access
B. Identify the threats
C. Compare software solutions
D. Identify network resources
E. Analyze organizational performance
Answer: ABD

8. Which tasks are involved in defining a security policy? (Choose 3.)
A. Implement a VPN
B. Identify the threats
C. Compare software solutions
D. Identify network resources
E. Identify unauthorized access
Answer: BDE

9. Which firewall component is referred to as a screening router?
A. Domain router
B. Circuit gateway
C. IP gateway router
D. Application proxy
E. Packet filtering router
Answer: E

10. Which firewall component implements access control at the session layer of the OSI model?
A. Domain routers
B. Application proxies
C. IP filtering routers
D. Circuit-level gateways
E. Packet filtering routers
Answer: D

11. Which BorderManager component functions as an application-level gateway?
A. NAT
B. VAP
C. Novell IP gateway
D. Proxy cache services
Answer: D

12. Which BorderManager component provides application-level security?
A. NAT
B. VAP
C. Proxy services
D. Novell IP gateway
Answer: C

13. Which are components of firewall services? (Choose 3.)
A. NAT
B. X-Stop
C. CyberSitter
D. Access Control
E. Packet Filtering
F. Proxy Accelerator
Answer: ADE

14. Which are components of BorderManager caching services? (Choose 3.)
A. CyberPatrol
B. Packet Filtering
C. Proxy Accelerator
D. Transparent Proxy
E. Hierachical Caching
F. Distributed Caching
Answer: CDE

15. Which BorderManager services allow a company to control incoming and outgoing access to the Internet? (Choose 2.)
A. Caching
B. Firewall
C. Encryption
D. CyberSitter
E. Resource control
Answer: AB

16. You want to use proxy cache on your BorderManager server. As a minimum, how much additional disk space should you have on the volume used for cache?
A. 90 MB
B. 100 MB
C. 125 MB
D. 250 MB
E. 500 MB
Answer: E

17. With BorderManager on your Ethernet network, the maximum physical receive packet size is set to 1514. You need to change this setting to allow for a PPP header. What will the new maximum physical receive packet size be after you make this change?
A. 1521
B. 1524
C. 1614
D. 2514
E. 4202
Answer: B

18. With BorderManager on your token ring network, the maximum physical receive packet size is set to 4202. You need to change this setting to allow for a PPP header. What will the new maximum physical receive packet size be after you make this change?
A. 4207
B. 4210
C. 4212
D. 4302
E. 5202
Answer: C

19. Which information specific to your environment is required to complete the installation or upgrade to BorderManager 3.5? (Choose 3.)
A. Server name
B. NDS tree name
C. VPN configuration
D. Public and private interfaces and their IP addresses
E. IP addresses for up to 3 DNS servers on the network
Answer: CDE

20. BorderManager has been installed. You need to configure remote access services using PPP. Enter the command that launches the appropriate utility.
Answer: inetcfg

21. You are trying to install BorderManager 3.5 using the GUI screen but it is not running. What must you enter at the server console to start the GUI screen?
Answer: startx

22. What utilities can be used to install license certificates?
A. NetAdmin or LICINST
B. ConsoleOne or NetAdmin
C. NetWare Administrator or LICINST
D. NetAdmin or NetWare Adminstrator
E. NetWare Administrator or SETUPNLS
Answer: C

23. Which settings define a packet filtering rule? (Choose 3.)
A. Action
B. Status
C. Filters
D. Monitor
E. Exceptions
F. Server parameters
Answer: ACE

24. Which packet filtering list always takes precedence over other lists?
A. Action list
B. Filter list
C. Status list
D. Exception list
Answer: D

25. What must you do before IPX RIP filters will work? (Choose 2.)
A. Enable filtering support for IPX.
B. Enable filtering support for SAP.
C. Make sure your server is synchronized to the network.
D. Turn NLSP with RIP/SAP compatibility routing off and RIP/SAP routing on.
Answer: AD

26. Which is true of SAP filters? (Choose 2.)
A. They work only if RIP is enabled on the router.
B. They work only if RIP/SAP is enabled on the router.
C. They should be used to reduce the traffic transmitted over WAN links.
D. They work only if NLSP with RIP/SAP compatibility is enabled on the router.
Answer: BC

27. If you configure an exception to a TCP/IP packet forwarding filter to allow WWW-HTTP packets in the outbound direction, which packet type must you allow in the inbound direction?
A. WWW-HTTP
B. Dynamic/UDP
C. Dynamic/TCP
D. Dynamic/HTTP
Answer: C

28. If you configure an exception to a TCP/IP packet forwarding filter to allow DNS requests over UDP in the outbound direction, which packet type must you allow in the inbound direction?
A. WWW-UDP
B. Static/UDP
C. Dynamic/TCP
D. Dynamic/UDP
Answer: D

29. Which filter type supports only IPX and AppleTalk?
A. Route filter
B. Bridge filter
C. Service filter
D. Packet forwarding filter
Answer: C


© 2014 Cheat-Test.com, All Rights Reserved