Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Network Appliance NS0-920 Exam -

Free NS0-920 Sample Questions:

Q: 1 What version(s) of SSH does NetCache support?
A. Versions 1 and 2
B. Version 2 only
C. Versions 2 and 3
D. Version 3 only
E. None
Answer: A

Q: 2 Which set of acceleration rules will best allow for acceleration of a Windows Media Server that uses MMS and HTTP for transport protocols?
NetCache IP:
Streaming Server IP:
A. streaming.acceleration.rules=\\ 1755 * * 1755 * 80 * * 80 m.server
B. config.streaming.acceleration.rules=\\ 1755 * * 1755 *
config.http.acceleration.rules=\\ 80 * * 80 *
C. config.acceleration.rules=\\
D. config.streaming.acceleration.rules=\\ 554 * * 554 * 80 * * 80 *
Answer: A

Q: 3 What happens if you assign a service group ID of 4 on one NetCache appliance, and you assign a service group ID of 2 on another NetCache appliance?
A. The two groups will load balance between each other.
B. The WCCP router will automatically group the two together.
C. Each NetCache appliance will join a different service group.
D. The NetCache appliances use only the ID assignment for internal information, so there is no effect.
Answer: C

Q: 4 Which three are true about WCCP? (Choose 3)
A. WCCP service groups must support a single protocol.
B. WCCP service groups can consist of one or more routers or proxy-cache servers.
C. WCCP service groups must be defined with the same settings.
D. Traffic redirection and distribution are based on logical WCCP service groups.
Answer: B, C, D

Q: 5 What is the purpose of the "Here I Am" message?
A. It identifies the NetCache appliance as the router.
B. It identifies the service group membership.
C. It announces that the NetCache appliance is available after a shutdown.
D. It identifies that the NetCache appliance has received a request.
Answer: B

Q: 6 When traffic is tunneled, the NetCache appliance can take which two actions? (Choose 2)
A. It can be used with manually configured browsers.
B. It passes specified types of nonstandard traffic through without caching it.
C. It examines the source and destination information, and caches the resulting objects.
D. It receives requests and allows or denies based on ACLs.
Answer: B, D

Q: 7 When is information recorded into the Streaming Access log?
A. When the client streaming connection is opened.
B. Within 500 ms of connect.
C. Throughout the streaming session.
D. When the client streaming connection is closed.
Answer: D

Q: 8 When you have a Digital Rights Management (DRM) streaming, authentication is performed between which two devices?
A. HTTP server and client player
B. streaming media server and client player
C. authentication server and router
D. domain controller and streaming media server
Answer: B

Q: 9 A list of HTTP headers returned to a client for a cache hit on a stream may be viewed using the __________.
A. smstats command
B. sysstat command
C. Streaming Details log
D. object command
Answer: D

Q: 10 Bandwidth allocation rules can be used to optimize streaming performance in which three ways? (Choose 3)
A. They can allocate bandwidth by user and group.
B. They can manage NetCache bandwidth utilization to ensure bandwidth for other uses.
C. They can allocate bandwidth based on CPU and memory usage.
D. They can restrict or deny connections.
Answer: A, B, D

Q: 11 Which statement about a Layer 4 switch is true? (Choose 3)
A. It can be configured to pass non-HTTP traffic directly to the Web.
B. It passes traffic based on the port number in a TCP/IP packet.
C. It passes traffic based on the URL of the client's request.
D. It uses MAC address rewriting to redirect packets.
Answer: A, B, D

Q: 12 Request forwarding is useful for doing which of the following?
A. To process URLs that are not cacheable, or for sites that use IP authentication.
B. To force all traffic through the NetCache appliance.
C. To create a load balancing scheme.
D. To allow the NetCache to send the URL request as if it is coming from the cache and not the client.
Answer: A

Q: 13 Why must a Layer 4 switch be on the same subnet as the NetCache appliance?
A. To use IP-GRE encapsulation.
B. To prevent IP spoofing.
C. To use MAC address rewriting.
D. To monitor the health of the NetCache appliance.
Answer: C

Q: 14 How will the following configuration command affect the factory default configuration?
set config.http.transparency on
A. NetCache starts listening promiscuously on port 80.
B. NetCache stops listening on port 3128 and restarts listening promiscuously on port 3128.
C. An error message is reported; no configuration change occurs.
D. An error message is reported; NetCache starts listening promiscuously on all TCP ports.
Answer: B

Q: 15 Which can be determined about an .ASF object by using the object command?
A. The playing time of the stream.
B. The amount of disk space used to store it on the cache.
C. The number of packets in the stream.
D. The author of the stream.
Answer: C

Q: 16 Which two apply to the caching of VOD streams? (Choose 2)
A. Individual VOD streams are stored as one file.
B. VOD streams are cached in separate chunks.
C. VOD streams are only cached when a client plays the entire stream.
D. VOD streams can be cached from HTTP servers.
Answer: B, D

Q: 17 Which three are characteristics of a unique stream? (Choose 3)
A. bandwidth speed
B. encoder used
C. media type (audio or video)
D. thinning parameters
Answer: A, C, D

Q: 18 Which three pieces of information can be found in the output of the smstats command? (Choose 3)
A. The IP address of client watching a stream.
B. The amount of stream left to watch.
C. The amount of data received from server.
D. The bit rate requested by the client.
Answer: A, C, D

Q: 19 HTTP encapsulation can be used to __________ .
A. send viruses across the network.
B. overcome blocked ports in a firewall.
C. split live streams.
D. change the bit rate of the stream
Answer: B

Q: 20 The streaming video encoded bit rate _______.
A. is the actual speed at which the content is delivered.
B. relates to live video only.
C. is used to adapt to Internet and client conditions.
D. is always the same as the delivery bit rate.
Answer: C

© 2014, All Rights Reserved