Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Network Appliance NS0-910 Exam - Cheat-Test.com

Free NS0-910 Sample Questions:

Q: 1 Given the following entry from the Web Access log, with the default access log format, what does the entry "bob" signify?
1098830250.899 0.001 10.41.72.45 TCP_HIT_ACCESS_DENIED/407 496 GET http://www.cnn.com/bob -
""
A. the user making the request
B. the hostname of the appliance
C. the page on the CNN site
D. the client hostname making the request
Answer: A

Q: 2 What is the command to view the names and locations of the log files from the command line?
A. log -l
B. nclog -l
C. nclog -va
D. show config.admin.log
Answer: B

Q: 3 Given the following log entry from the Web Access log, with the default access log format, what does DIRECT mean?
1093891725.752 0.080 10.32.10.92 TCP_MISS/200 10177 GET http://www.sbgs.org/sbgs.htm -
DIRECT/209.68.147.66 "text/html"
A. The object must be retrieved from a parent cache.
B. The requested URL resides outside the firewall, and the URL maps to no parents or neighbors.
C. The URL was fetched from the source.
D. This NetCache has no valid parents or neighbors.
Answer: C

Q: 4 What is the difference between TCP_MISS/200 and TCP_HIT/200?
A. The "miss" means that the requested object could not be found and an error is returned to the client. The"hit" means that TCP is used.
B. The "miss" means...that the NetCache will use UDP instead. A "hit" means that TCP is used.
C. he "miss" means...retrieved by the NetCache appliance. The "hit" means that the NetCache appliance already.
D. The "miss" means that the object was in the cache but not available because either its TTL expired or the entry was flagged by a third party content filter such as a virus scanner. The "hit" means that the TTL was still current.
Answer: C

Q: 5 Given the following entry from the Web Access log, what is the first column?
1098830250.899 0.001 10.41.72.45 TCP_HIT_ACCESS_DENIED/407 496 GET http://www.cnn.com/bob -
""
A. the size in bits
B. the time stamp in Greenwich standard time
C. the ID of the request
D. the time stamp in UNIX epoch time
Answer: D

Q: 6 Which protocol entries are recorded in the Web access log file?
A. HTTP, FTP, RTSP
B. HTTP, FTP, Gopher
C. RTSP, NNTP
D. Telnet, SNMP, SSH
Answer: B

Q: 7 Of the following choices, which TWO are paths to configure logging? (Choose 2)
A. Setup > System > Logging
B. Setup > Maintenance > Logging
C. Setup > HTTP > Logging
D. Setup > Utilities > Logging
Answer: A, C

Q: 8 The NetCache appliance supports up to _____ SNMP communities.
A. 4
B. 8
C. 16
D. 32
Answer: B

Q: 9 Which FOUR cache control headers below are valid? (Choose 4)
A. Cache-Control: no-cache
B. Pragma: do-not-cache
C. Cache-Control: no-store
D. Cache-Control: private
E. Pragma: no-cache
Answer: A, C, D, E

Q: 10 A router performs which one of the following functions for NetCache proxies?
A. It fragments large packets into smaller chunks that the NetCache appliance can handle.
B. It tags Etherchannel packets for pre-processing.
C. It delivers inbound packets from other networks and sends outbound packets destined for other networks.
D. It strips virus packets out before they can infect the NetCache appliance.
Answer: C

Q: 11 Which ICAP vectoring method does the anti-virus scanning use?
A. RESPMOD_PRECACHE
B. REQMOD_PRECACHE
C. RESPMOD_POSTCACHE
D. REQMOD_POSTCACHE
Answer: A

Q: 12 Which TWO of the following can be performed by using a proxy.pac file? (Choose 2)
A. provide for failover protection
B. check web pages for worms or viruses
C. distribute requests to different NetCache proxy servers
D. shut down the computer if the user doesn't authenticate promptly
Answer: A, C

Q: 13 Given the following service farm configuration, which request will be directed to the ICAP application?
config.icapv1.farm3.attr = \\marketing_req_precache REQMOD_PRECACHE on rr on weak
A. Requests about to be initiated by NetCache to the server
B. Requests from the client before NetCache has initiated a request to the server
C. Requests from the client after NetCache has initiated a request to the server
D. Responses to requests initiated by NetCache after being cached on disk
E. Responses to requests initiated by NetCache before being cached on disk
Answer: B

Q: 14 Where is authentication server information logged?
A. Web Access log
B. Messages log
C. FTP log
D. client browser
E. SMB Instant Messaging
Answer: B

Q: 15 What is the advantage of using multiple authentication servers with a NetCache appliance?
A. NetCache will deny requests if authentication isn't provided within 200ms.
B. They ensure authenticated access if authentication server fails.
C. They ensure authenticated access across multiple domains.
D. Authentication uses encryption and is CPU-intensive.
Answer: B

Q: 16 Which FOUR are licensed protocols? (Choose 4)
A. DNS caching
B. ICAP
C. HTTPS Proxy
D. HTTP Proxy
E. GRM Server
Answer: B, C, D, E

Q: 17 Which FOUR are key steps in the authentication process? (Choose 4)
A. verify protocol authentication settings (authenticates the user)
B. verify ACL permission settings for the applicable group in the NetCache user database
C. verify whether SmartFilter or WebWasher DynaBLocator denies the request
D. verify connectivity to logging server
E. allow or deny the request, based on the results of the authentication process
Answer: A, B, C, E

Q: 18 Which FOUR will best prevent client disruption caused by hardware failure when using multiple proxies? (Choose 4)
A. load balancer
B. round-robin DNS
C. direct browser configuration
D. transparency utilizing WCCP
E. autoconfiguration using a proxy.pac file
Answer: A, B, D, E

Q: 19 Which TWO of the following server types can function as a logging target for NetCache? (Choose 2)
A. FTP
B. CIFS
C. HTTP
D. NFS
Answer: A, C

Q: 20 Which FOUR steps are necessary to test that authentication is working properly with NTLM? (Choose 4)
A. configure NTLM authentication
B. add the appropriate ACLs to use authentication
C. visit a Web site through the NetCache proxy
D. inspect the Web Access log files for authentication activity
E. enable packet tracing with pktt and analyze the results
Answer: A, B, C, D

Q: 21 _______ consistency should be used for service farms that run more than one version of a service, and differences in results are expected to be minor and not noticeable.
A. Strong
B. Weak
C. IBW
D. Mixed
Answer: B

Q: 22 Which TWO are most probable side-effects of authentication in a transparent deployment? (Choose 2)
A. In a Network Address Translation environment, users may obtain shared privileges, never be challenged, or both.
B. Its conformance with HTTP 1.1 specification is lost.
C. It reduces the number of authentication prompts to the end user.
D. It simplifies setup of the NetCache and authentication server.
Answer: A, B

Q: 23 Given the following service farm configuration, which requests will be scanned by the ICAP server? config.icapv1.farm0.attr = \\marketing_resp RESPMOD_PRECACHE on rr on weak
A. responses before being sent to NetCache
B. responses from NetCache
C. responses before being sent to the ICAP server
D. responses from the Internet
Answer: C

Q: 24 Which ACL action is used to send a REQMOD_PRECACHE request to an ICAP service without processing additional ACLs?
A. icap
B. icap_now
C. attribute
D. acl icap
Answer: B

Q: 25 In what TWO places do you enter License keys? (Choose2)
A. command line with the license command
B. the Appliance Manager
C. SNMP agents.
D. the admin host or domain controller
Answer: A, B

Q: 26 Which vector point is used to route an object to the ICAP server from NetCache, but before the data is requested from the Web server?
A. REQMOD_PRECACHE
B. REQMOD_POSTCACHE
C. RESPMOD_PRECACHE
D. RESPMOD_POSTCACHE
Answer: B

Q: 27 Which THREE are advantages of using NetCache as an accelerator? (Choose 3)
A. It can offload traffic from a Web server.
B. It shields a Web server from the Internet.
C. It reduces firewall workload.
D. It places content closer to the user.
Answer: A, B, C

Q: 28 Which authentication methods, used to receive client credentials, are performed once per connection instead of performed once per request?
A. NTLM and Kerberos
B. LDAP and Basic
C. FTP and NTP
D. RADIUS and challenge-response
Answer: A

Q: 29 Which THREE are access methods for the NetCache appliance? (Choose 3)
A. transparent (indirect) access
B. non-transparent (direct) access
C. request routing for content distribution networks
D. protocol routing for content distribution networks
Answer: A, B, C

Q: 30 When NetCache is implemented as a reverse proxy (accelerator), which FOUR of the following protocols can be accelerated? (Choose 4)
A. HTTP
B. NTP
C. MMS
D. RTSP
E. HTTPS
Answer: A, C, D, E


© 2014 Cheat-Test.com, All Rights Reserved