41: Your co-worker is not familiar with technical concepts. He asks you to explain Secure Shell (SSH) and the way it works. Which of the following is an appropriate and accurate explanation you can give to this non-technical person?
A.SSH uses RSA and public keys to authenticate and encrypt before you can defragment the hard drive.
B.SSH uses a Telnet-like interface, public keys or standard authentication methods, and then symmetric keys.
C.SSH allows you to gain secure access to a remote computer and then execute commands to control the system.
D.SSH uses DSA and RSA to protect authentication information, and asymmetric-key encryption to provide data confidentiality.
31: Which technology is used to create a table in a relational database?
21: Which of the following is the most efficient method for documenting and communicating a Web site plan?
A.Photocopying and faxing sketches
B.Sending a presentation slideshow via e-mail
C.Describing the plan orally on stakeholders’ voicemail
D.Posting a large diagram on the wall in a busy office hallway
11: Which choice lists the three image file formats that are universally supported by modern Web browsers?
A.BMP, TIFF and GIF
B.PNG, GIF and BMP
C.GIF, JPEG and BMP
D.GIF, JPEG and PNG
1: What is an intranet?
A.A searchable internal repository that stores an organization’s proprietary documents
B.A worldwide network available to anyone who has a TCP/IP connection on a computer
C.A TCP/IP-based network accessible only by an organization’s members and employees
D.A TCP/IP-based network accessible only by an organization’s internal employees and select external clients
With consideration to the exhibit, in which hardware component do you configure the IP address
150.122 44 210?
A. In the Media Gateway
B. In the Server administration port
C. In a CLAN board or Processor Ethernet port
D. In the Server services port
Communication Manager Backups are done through the system management interface (SMI).
Which three statements about the Communication Manager backup function are correct? (Choose three)
A. The backup function creates two complete files on the internal hardware drive.
B. The backup function can create a file on a network device using protocols: SCP, SFTP, or FTP.
C. The backup function can encrypt the file with a pass phrase.
D. The backup is done dynamically and cannot be scheduled in advance.
E. The full Backup option does not do Save Transaction Command Automatically before creating
the backup file.
In addition to protocol and function, which two other factors affect the choice of trunk type? (Choose two)
A. number of users
B. link bounce timer value
C. type of endpoints
E. type of gateways
When adding an IP Station type 96xx, which statement is true regarding the port field?
A. It is automatically populated by the system as “IP”.
B. It must be populated as “SOOOXX”
C. It must be populated with an available port on an MM712 or TN2214
D. It must be populated with an available port on the LAN switch.
Your customer wants to extend their office calls using the Extension to Cellular features.
Where will calls be redirected?
A. To another extension on the same system
B. To a hunt group
C. To an administered off-system number
D. To a call pickup group