Test4pass IBM 000-600 PDF exam
Testpassport最新 000-007题库 免费下载

TThe safer , easier way to help you pass any IT exams.Exam : 000-007Title : Version : DEMOIBM Tivoli Netcool/OMNIbusV7.3 Implementation1. A customer is migrating from IBM Tivoli Enterprise Console (Tivoli Enterprise Console) to IBM Tivoli Netcool/OMNIbus V7.3 (Tivoli Netcool/OMNIbus V7.3). This customer's environment has many custom applications sending postemsg events to Tivoli Enterprise Console server.How will the custom applications send events to Tivoli Netcool/OMNIbus V7.3 environment by making only minimal changes on the custom applications?A.Custom applications should be reconfigured to send postmsg events to Tivoli Netcool/OMNIbus V7.3 ObjectServer.B.Custom applications should be reconfigured to send postemsg events to Tivoli Netcool/OMNIbus V7.3 Tivoli EIF Probe.C.Custom applications should be reconfigured to send nco_sendmsg events to Tivoli Netcool/OMNIbus V7.3 ObjectServer.D.Custom applications should be reconfigured to send sendmsg events to Tivoli Netcool/OMNIbus V7.3 Probe for Tivoli Common Event Infrastructure.Answer: B2. Which IBM Tivoli Netcool/OMNIbus V7.3 feature must be installed before probe installation?Probe ControlAdministratorProbe SupportProcess ControlAnswer: C3. The customer is upgrading from Tivoli Integrated Portal (Webtop 2.2) to Web GUI.Which file should be restored to get all the filters?A.install_dir/profiles/TIPProfile/etc/WebGUI/WebGUI_22B.install_dir/profiles/TIPProfile/etc/WebGUI/WebGUI_21C.install_dir/profiles/TIPProfile/etc/WebGUI/deprecatedD.install_dir/profiles/TIPProfile/etc/WebGUI/migrated_dataAnswer: C4. Which statement is true regarding Accelerated Event Notification channels?A.Channels cannot be copied and pasted from one ObjectServer to another.B.Any authenticated ObjectServer user may create a channel through the Netcool admin client.C.ObjectServer channels only support the broadcast of data from alerts.status, alerts.journal, and alerts.details.D.Although channels in different ObjectServers may be named differently, all channels within a single ObjectServer must have the same name in order for the broadcast function to work correctly. Answer: A5. Which two options are true about configuring Probes to use failover Netcool Proxy Servers? (Choose two.)A.The Probe's "NetworkTimeout" property should be set to 0.B.The Probe's "IsOSConnection" property should be set to 0.C.The Probe's "IsProxyConnection" property should be set to 1.D.The Probe's "Server" property should be configured to point at the primary Proxy Server.E.The Probe's "ServerBackup" property should be configured to point at the backup Proxy Server. Answer: DE6. Which two components are used in the Tivoli Integrated Portal console to create custom screens for users? (Choose two.)A.WindowB.FoldersC.PortletsD.ViewpointsE.External URLsAnswer: BE7. What does nco_p_syntax do?A.It connects to the ObjectServer, tests the rules file, and corrects any syntax errors.B.It connects to the ObjectServer, tests the rules file, and removes lines with syntax errors.C.It connects to the ObjectServer, tests the rules file,and displays any errors to the screen.D.It connects to the ObjectServer, tests the rules file, and comments out lines with syntax errors. Answer: C8. All the processes in the current ObjectServer are functioning normally. The customer security requirements have changed and all the data in the network must be passed securely.Which change will be made at the ObjectServer level?A.Just run the Active Event List in the secure mode.B.Start all the processes under the process control agent.C.ObjectServer data is encrypted by default so that no change is required.e SSL communication port and run the ObjectServer by using -secure option.Answer: D9. A customer has a large, complex environment to monitor, with many sources of events, some at remote sites. The event volume from these sources is high. There are requirements to do advanced correlation and event enrichment, as well as providing browser access to event list views for many operators. Based on the scenario, which type of installation is recommended?A.Multi Tier Architecture with Web GUIB.Single Tier Architecture with Web GUIC.Individual failover server pair per siteD.Web GUI and OMNIbus installed in single systemAnswer: A10. Which probe will be required to integrate events from IBM Tivoli Enterprise Console with IBM Tivoli Netcool/OMNIbus?A.TEC probeB.Syslog probeC.MTTrapd probeD.Tivoli EIF probeAnswer: D11. The customer wants all the events to be archived to a file with the name NCOMS.txt.Which type of gateway should be installed?A.Reporter GatewayB.Archiving GatewayC.Flat File GatewayD.Event File GatewayAnswer: C12. In the probe's rules files, what does the getload() function do?A.Return the CPU percentage the probe is using.B.Return the number of events processed per minute.C.Return the number of events processed per second.D.Return the percentage of events processed by the probe.Answer: C13. The $NCHOME/omnibus/log/NCOMS_profiler_report.log file contains the following information:Thu Nov 20 14:02:50 2009: Individual user profiles:Thu Nov 20 14:02:50 2009: 'Administrator' (uid = 0) time on IBM-ADAF9B5BAFC: 0.020000sThu Nov 20 14:02:50 2009: 'PROBE' (uid = 0) time on server1: 55.050000sThu Nov 20 14:02:50 2009: 'GATEWAY' (uid = 0) time on server1: 0.000000sThu Nov 20 14:02:50 2009: Grouped user profiles:Thu Nov 20 14:02:50 2009: Execution time for all connections whose application name is 'Administrator': 0.020000sThu Nov 20 14:02:50 2009: Execution time for all connections whose application name is 'PROBE': 55.050000sThu Nov 20 14:02:50 2009: Execution time for all connections whose application name is 'GATEWAY': 0.000000sThu Nov 20 14:02:50 2008: Total time in the report period (59.989325s): 55.070000sWhat can be deduced from the log file?A.The gateway is not running.B.There is a high load of events inserted from the probe.C.The bi-directional ObjectServer gateway is in failover mode.D.There are too many clients connected to the ObjectServer.Answer: B14. What is the purpose of the flood.rules file?A.Insert flood-related events.B.Calculate event rates for detecting event floods.C.Parse the information of flood events for correlation.D.Delete flood events from IBM Tivoli Netcool/OMNIbus.Answer: BThe safer , easier way to help you pass any IT exams.15. What does the $NCHOME/omnibus/log/servername_profiler_report.log file contain?A.historical ObjectServer event reportsrmation of all the profile roles created in the ObjectServerC.historical information of changes made to the ObjectServer propertiesrmation about the amount of time spent running SQL queries for ObjectServer connections Answer: D16. Which three groups are identified when creating users for IBM Tivoli Netcool/OMNIbus? (Choose three.)A.OperatorsB.Root GroupC.Super UsersD.Support StaffE.Desktop UsersF.AdministratorsAnswer: ACF17. Which action is required to define groups, once the IBM Tivoli Netcool/OMNIbus is installed?A.Verify that each group has access to the system.B.Test each user for system access before adding them to a group.C.Identify which role each user is going to have and assign them into groups.D.Disable default user accounts for System Administration and default Operations accounts. Answer: C18. What is taken into consideration while calculating sizing for a server that will only run an IBM Tivoli Netcool/OMNIbus ObjectServer ?A.number of Web GUI maps configuredB.number of operator users configuredC.number of custom SQL triggers configuredD.number of Process Control agents configured within the solutionAnswer: C19. Which step is critical while calculating sizing for an IBM Tivoli Netcool/OMNIbus system?A.Determine the display resolution used by system users.B.Determine the number of calls managed by system users.C.Determine if network bandwidth will support event throughput.D.Determine if a Database Cluster is connected through an OMNIbus Gateway.Answer: C20. Which step is critical while calculating sizing for an IBM Tivoli Netcool/OMNIbus system?A.Determine the appropriate method for migration.B.Determine the number of events that will occur per hour.The safer , easier way to help you pass any IT exams.C.Determine the number of users configured within OMNIbus.D.Determine the number of probes attached to the ObjectServer.Answer: B。
Test4pass 70-451 exam dumps questions answers

Exam:Microsoft70-451Title:PRO:MS SQL Serv2008,Design&Optimizing DBAdmin Solution Version:DemoTop 3 Customers in Test4passs - Best IT certifications TeamHOT Certifications On Test4passCisco CertificationsCCNA CCDA CCNP CCDP CCVP CCSP CCIP CCIE CCDE Data Center Sales ExpertMicrosoft CertificationsMCP MCSE MCITP MCTS MCSE2003MCPD MCDST TS Exchange Server2007 MCSE2003 Security MCSE2003 Messaging Microsoft Business SolutionsIBM CertificationsCertified Administrator Certified Systems Expert Solutions Expert System AdministatorDB2Certified Advanced Technical Expert Certified Advanced System AdministratorLotus Certification WebSphere Cognos 8 BI Certified Associate Developer Tivoli SoftwareCompTIA CertificationsA+CDIA+CTT+e-Biz+CompTIA HTI+i-NET+ Linux+Network+Project+RFID+Security+ Server+PDI+Convergence+1.You work in an International company named TAKEEEN.And you're in charge of the database of your company.You use SQL Server2008to create a solution.You intend to import data from an external source into a table.You must make sure that the tasks below are achieved:The rows that fail the foreign key constraints during import are inserted into a separate table.Even if the import encounters rows that fail foreign key constraints,it is successfully completed.So what should you do?A.An AFTER trigger has to be usedB.CHECK constraints have to be usedC.An INSTEAD OF trigger has to be usedD.During the import process disable the foreign keys.Answer:C2.You work in an International company named TAKEEEN.And you're in charge of the database of your company.There is a SQL Server2008instance which hosts a third-party database.A database application is developed for the instance.You have no permissions to modify the database schema.The database contains two tables that are as shown in the diagram above.On the basis of FullTimeIndicator flag,you intend to extract address information about full-time employees.In order to simplify the extraction process,you have to design a data access layer.So what should you do?A.You should design an Entity Data Model.The EMPLOYEES and ADDRESS entities are contained in this ModelB.On the database,you should create a view.Full-time employees and their address details are included in itC.You should re-design the underlying database model.Employee and address information are included in one tableD.You should design a conceptual Entity Data Model.An entity named EMPLOYEE_ADDRESS is contained in the Model.Make sure that information about employees and their addresses is contained in this entityAnswer:D3.You work in an International company named TAKEEEN.And you're in charge of the database of your company.You intend to use SQL Server2008to create a database which will be use by a scheduling application.The following information is stored in this database:RoomsClassesStudentsTeachersYou have to consider the following facts in the design plan:Each room can host one or more classes;Each class can be in one or more rooms;Each teacher can teach one or more classes;Each student can register for one or more classes.Look at the entities below:Rooms;Classes;Students;Teachers;ClassesTeachers;ClassesStudentsYou identify these entities for the database design.In order to ensure normalization,you have to design the database.So what should you do?A.First,a new entity named ClassesRooms should be added.Then use this entity to establish a relationship between the Classes and Rooms entitiesB.First,a new entity named TeachersRooms should be added.Then use this entity to establish a relationship between the T eachers and Rooms entitiesC.First,a new entity named StudentsRooms should be created.Then use this entity to establish a relationship between the Students and Rooms entities.D.First,a new entity named TeachersStudents should be added.Then use this entity to establish a relationship between the T eachers and Students entitiesAnswer:A4.You work in an International company named TAKEEEN.And you're in charge of the database of your company.You intend to use SQL Server2008instance to create a database solution which has some requirements:mport data from various data sources such as Microsoft Office Excel,Microsoft SQL Server 2000,Microsoft SQL Server2005,and CSV files;Profile the source data before it is imported;Allow mobile users to use heterogeneous data stores;Provide mobile users with collaboration and offline capabilities.In order to achieve these requirements,you have to configure the suitable SQL Server components.When performing this,you have to use as little administrative effort as possible.So which SQL Server components should you use?(choose more than one)A.Reporting ServicesB.Integration ServicesC.Analysis ServicesD.Notification ServicesE.Microsoft Sync FrameworkAnswer:BE5.You work in an International company named TAKEEEN.And you're in charge of the database of your company.You intend to use SQL Server2008to create a database solution.The full-text search component is installed in the database which supports a Web site.Look at the exhibit below:You intend to create a table named Courses which has the structure above.On the basis of the CourseTitle field,users of the Web site will search for courses.When the search is launched for a course by a user,a full-text must be constructed to ensure the compliances below:when the exact search phrase is found,rows are returned;rows are in order of how well they match with the search phrase.So what should you specify in the full-text query?A.A CONTAINS predicateB.A FREETEXT predicateC.A CONTAINSTABLE functionD.A FREETEXTTABLE functionAnswer:C6.You work in an International company named TAKEEEN.And you're in charge of the database of your company.You intend to use SQL Server2008to create a database solution.You are creating a database to support the office manager.The exhibit below shows the structure of the database.The database you design must meet the requirements below:First,an employee can be given more than one task.Second,the task is deleted upon completion and when deleted,the associated assignment is deleted.Third,the employee link to the assignment is replaced with a NULL value when an employee is no longer available to complete a task.So what should you do to implement these requirements to maintain data integrity?A.On the Employee,Task,and Assignment entities,DDL INSERT triggers should be createdB.On the TaskID and EmployeeID attributes in the Assignment entity,CHECK constraints should be createdC.On the TaskID and EmployeeID attributes in the Task and Employee entities,foreign Keys constraints should be created respectively.You specify the appropriate On Delete action after the Assignment entity is referenced.D.On the TaskID and EmployeeID attributes in the Assignment entity,Foreign Keys constraints should be created.You specify the appropriate On Delete action.After the Task and Employee entities are referenced respectively.Answer:D7.You work in an International company named TAKEEEN.And you're in charge of the database of your company.You intend to use SQL Server2008to create a database.There's a table which is partitioned intofour geographic regions in the database.The table is named Selling.Items.Look at the stored procedures below:CREATE STORED PROCEDURE usp_Update@RegionID tinyintASUPDATE Sales.InventorySET Qty=T.CurrentQuantityFROM Sales.Inventory IJOIN Sales.T empData T ON I.ItemID=T.ItemIDAND I.RegionID=@RegionID;You use the stored procedure above,the UPDATE statement locks the Sales.Inventory table.So what should you do to prevent this from happening?A.You should run this Transact-SQL statement:ALTER TABLE Sales.Inventory SET LOCK_ESCALATION =AUTOB.You should run this Transact-SQL statement:ALTER TABLE Sales.Inventory SET LOCK_ESCALATION =TABLEC.The usp_Update stored procedure should be modified to use the NOLOCK table hint for the UPDATE statementD.The usp_Update stored procedure should be modified to use the SERIALIZABLE table hint for the UPDATE statementAnswer:A8.You work in an International company named TAKEEEN.And you're in charge of the database of your company.You intend to use SQL Server2008to create a database.A database includes a table named Selling.Client order summary information is contained in the Selling table.A stored procedure in created and it uses a SELECT statement and it must return a precise summation of the total sales for the current day when executing.When the stored procedure is being executed,you have to prevent any data modification in the Selling table by using a query hint.So which query hint should you use?A.TABLOCKXB.READPASTC.HOLDLOCKD.READCOMMITTEDAnswer:A9.You work in an International company named TAKEEEN.And you're in charge of the database of your company.You intend to use SQL Server2008to create a database solution.There's a stored procedure in a database.This stored procedure retrieve data from a table and produces aggregations by using a transaction.Now you have to design a solution and it must satisfy the requirements below:When the stored procedure is being executed,insert operations in the table can be performed.When the stored procedure is being executed,update operations cannot be performed on the retrieved data.You must make sure that the requirements can be met.So what isolation level should you use?A.SERIALIZABLEB.READ COMMITTEDC.REPEATABLE READD.READ UNCOMMITTEDAnswer:C10.You work in an International company named TAKEEEN.And you're in charge of the database of your company.You intend to use SQL Server2008to create a database solution.There's a query which is used very often.But you notice that this query executes quite slow.This query often uses full-table scans while not indexes.Because of this,other queries that modify the table are to be blocked.On the underlying tables, the indexing strategy that the query uses can change.Now you have to design a solution which removes full-table scans and allows the query optimizer to select the appropriate index.So what should you do?A.The INDEX table hint has to be usedB.The NOEXPAND table hint has to be usedC.The INDEX(0)table hint has to be used.D.The FORCESEEK table hint has to be usedAnswer:DC o n t a c t T e s t4p a s sWe are proud of our high-quality customer service, which serves you around the clock 24/7. To get your problem resolved instantly, live supportRead Our Frequently Asked Questions (FAQs)We have gathered the most frequently asked questions for you. Please read our list of FAQs. Contact us by Live MessengerSales:Test4pass(at)You can reach us at any of the email addresses listed below Please allow up to 24 hours for us to respond•MSN: Test4pass@。
Test4pass Sun 310-200 exam dumps test vce

Test4pass E xpert In IT Certification E xamsExam : Sun 310-200 ExamTitle : Sun Certified SystemAdministrator for Solaris 10OS.Part 1Version : Demo1. The print service under the control of SMF needs to be taken offline. Before the print service is taken offline, a check must be made to see what other services depend on this service.Which command will display these dependencies?Test4pass E xpert In IT Certification ExamsTop 3 Customers in Test4passs - Best IT certifications TeamHOT Certifications On Test4pass Cisco Certifications CCNA CCDA CCNP CCDP CCVP CCSP CCIP CCIE CCDE Data Center Sales ExpertMicrosoft CertificationsMCP MCSE MCITP MCTS MCSE2003 MCPD MCDST TS Exchange Server2007MCSE2003 Security MCSE2003 Messaging Microsoft Business SolutionsIBM Certifications Certified Administrator Certified Systems Expert Solutions Expert System Administator DB2 Certified Advanced Technical Expert Certified Advanced System Administrator Lotus Certification WebSphere Cognos 8 BI Certified Associate Developer Tivoli SoftwareCompTIA CertificationsA+ CDIA+ CTT+ e-Biz+ CompTIA HTI+ i-NET+ Linux+ Network+ Project+ RFID+ Security+ Server+ PDI+ Convergence+B. svcs -vC. svcs -aD. svcs -DAnswer: D2. Most files in the Solaris OS make use of data blocks. Which two do NOT use data blocks for storage? (Choose two.)A. Hard linkB. DirectoryC. Device fileD. Symbolic linkAnswer: AC3. You have installed a package called SUNWvts onto your system.Where is the information about every file and directory contained in this package stored?A. /var/sadm/messagesB. In your home directory.C. /var/spool/SUNWvtsD. /var/sadm/install/contentsE. /var/adm/installed/contentsF. /etc/default/installed/packages/informationAnswer: D4. You are installing Solaris 10 OS on a SPARC-based system with a graphical monitor and keyboard, but the installation starts up in CLI mode.Assuming you have typed the correct installation command, what is the cause?A. You used the DVD.B. The monitor is monochrome.C. Solaris OS is a text-only installation.E. The system has less than 128 megabytes of RAM.Answer: E5. Click the Exhibit button.You have a system with a single disk drive. You need to add a new 6GB file system for /data and can only add it on this disk. Given the information displayed in the exhibit, which describes the option for adding a 6GB slice to this disk without destroying any existing data on the disk or reloading the operating system?A. Increase slice 4 to 6GB.B. Combine slices 4 and 5.C. Reduce the slice 7 to 1GB. Change slice 4 to 6GB.D. Not enough contiguous space on the disk to make a new 6 GB file system.E. All of your slices are used. You cannot add a new slice for the /data file system without repartitioning and reloading the OS.Answer: A6. The print server on the network has one print spooler defined, called printer1. You have a requirement to modify the shell script that actually sends the jobs associated with printer1 to the printer.Which file should you modify?A. /etc/printers.confB. /etc/lp/interfaces/printer1C. /var/spool/lp/requests/printer1D. /usr/lib/lp/postscript/postprintAnswer: B7. Given:joe@dhcp-105# ftp dhcp-100Connected to .220 dhcp-100 FTP server ready.Name (dhcp-100:root): rootPassword: root530 Login incorrect.Login failed.ftp>Which two statements are always true? (Choose two.)A. The password for root on dhcp-105 is root.B. A user on dhcp-105 is not authorized to log in to dhcp-100.C. A user on dhcp-105 is trying use ftp to connect to dhcp-100.D. A user on dhcp-100 sucessfully logged in to dhcp-105.E. A user on dhcp-105 is trying to log in to dhcp-100 with the root id.Answer: CE8. You want to install the Sun Validation Test Suite software on your PC during the installation of the OS. The SUNWvts package is on the Solaris Extra Value software CD.On which CD is the Solaris Extra Value software located?A. Solaris Installation CD 1B. Solaris Installation CD 2C. Solaris Installation CD 3D. Solaris Installation CD 4Answer: D9. A server has not had any changes made to the configuration of the standard system login accounts. It has a number of tape devices attached to it. The server is the only system on the local network that has tape devices. A file must be configured to allow backups.Which file must be correctly configured on the system with the tape devices attached to enable the other system to successfully perform its backup?A. /.rhostsB. /etc/hosts.equivC. /etc/rmt/tape.confAnswer: A10. You want to monitor a failed login after five unsuccessful attempts.Which file contains this information?A. /var/adm/sulogB. /var/adm/lastlogC. /var/adm/loginlogD. /var/adm/failedloginlogAnswer: C11. Single User ShellYou check the BIOS settings on the server and the boot device priority is as follows:First Boot Device [FLOPPY]Second boot device [CDROM]Third Boot Device [HARD DISK]Fourth Boot Device [LAN]Which option can you use to fix the problem?A. The boot device priority is fine, your hard drive must be faulty or the boot block is missing. Boot to CDROM, open a shell and run fsck on the Hard Disk.B. Change the boot device priority so that the CDROM is the third boot device and the HARD DISK is second.C. Make the First boot device = LAN, Second boot device= CDROM, Third boot device = HARD DISK, remove the fourth boot device.D. You did not set the fdisk boot partition to ACTIVE and the system cannot boot to the hard disk. Boot from CDROM, open a shell and use fdisk to set the partition to ACTIVE.E. The GRUB menu is not correct and Solaris is not pointing to the hard disk that youve installed the Solaris OS on. Edit the GRUB menu and modify the default boot device so that it points to the correct boot drive. Answer: Bbackup is in progress, the file system used for the backing store runs out of space.What are the consequences?A. Nothing, the backup progresses.B. The backup is aborted and the snapshot is deleted.C. The backup is suspended until there is more space available for the snapshot.D. Nothing, the backup progresses, but processes updating the data to be backed up are suspended until there is more space available for the snapshot.Answer: B13. You just installed Solaris on your x86 server and you cannot get your system to boot to the Solaris 10 OS. When rebooting, you get three options in the GRUB menu:SolarisSolaris Serial Console ttyaSolaris Serial Console ttybYou select Solaris from the menu and another menu appears:1. Solaris Interactive2. Custom JumpStart3. Solaris Interactive Text (Desktop Session)4. Solaris Interactive Text (Console Session)5. Apply driver update6. Single User ShellYou check the BIOS settings on the server and the boot device priority is as follows:First Boot Device [FLOPPY]Second boot device [CDROM]Third Boot Device [HARD DISK]Fourth Boot Device [LAN]Which option can you use to fix the problem?A. The boot device priority is fine, your hard drive must be faulty or the boot block is missing. Boot to CDROM, open a shell and run fsck on the Hard Disk.second.C. Make the First boot device = LAN, Second boot device= CDROM, Third boot device = HARD DISK, remove the fourth boot device.D. You did not set the fdisk boot partition to ACTIVE and the system cannot boot to the hard disk. Boot from CDROM, open a shell and use fdisk to set the partition to ACTIVE.E. The GRUB menu is not correct and Solaris is not pointing to the hard disk that youve installed the Solaris OS on. Edit the GRUB menu and modify the default boot device so that it points to the correct boot drive. Answer: B14. A user's system does not contain all the parts of the Solaris OS that the user needs.Which file tells you what software cluster has been installed on the user's system?A. /etc/issueB. /var/adm/system/CLUSTERC. /var/sadm/system/admin/CLUSTERD. /var/sadm/install/package/contentAnswer: CTest4pass E xpert In IT Certification E xamsC o n t a c t T e s t4p a s sWe are proud of our high-quality customer service, which serves you around the clock 24/7.To get your problem resolved instantly, live supportRead Our Frequently Asked Questions (FAQs)We have gathered the most frequently asked questions for you. Please read our list of FAQs. Contact us by Live MessengerSales:Test4pass(at)You can reach us at any of the email addresses listed belowPlease allow up to 24 hours for us to respond•MSN: Test4pass@。
Exam1pass 000-966 exam braindumps free download

Exam:IBM000-966Title:XIV Storage SystemTechnical Solutions V2 Version:Demo1:Using the XCLI,which qualifiers are required to create a thin provisioned pool?A.pool,hard size,soft size,snapshot sizeB.pool,hard size,soft size,read block behaviorC.pool,resize allowed,maximum volumes,maximum snapshotsD.pool,read block behavior,maximum volumes,maximum snapshotsAnswer:A2:To improve system redundancy using its grid architecture,where in the XIV System can a partition be mirrored?A.on disks in other modulesB.on same disk in different modulesC.on different disks in the same moduleD.on same disk,in same module,and in different modulesAnswer:A3:Which two solutions,once installed and configured,can be used to move workloads without disruption?(Choose two)A.XIV partitionsB.XIV Data Mover(XDM)C.SAN Volume ControllerD.XIV Data Migration FunctionE.Tivoli Storage Productivity Center for Replication V4Answer:C D4:When defining a volume on a thin-provisioned pool on an XIV System,the size of the volume is limited byA.the hard capacity of the volumeB.the2TB maximum volume size on XIVC.the hard capacity of the storage poolD.the soft capacity of the storage poolAnswer:D5:On the XIV System,what is the approximate rebuild time for a1TB drive that is50%utilized?A.5minutesB.15minutesC.30minutesD.120minutesAnswer:B6:A customer has ordered a10module XIV System.How many interface modules are active in this configuration?A.3B.4C.5D.6Answer:B7:When using the SAN Volume Controller(SVC)as a host for a full15module XIV Storage System,how many ports are recommended to be connected to the SVC?A.8B.12C.16D.24Answer:B8:What helps ensure that the XIV System's cache does NOT become a bottleneck?A.central cache locking mechanisme of industry standard chip technologyC.each module is responsible for caching the data in that moduleD.having all modules understand what is held in cache at all timesAnswer:C9:What is a requirement to connect a V6R1IBM i host to an XIV Storage System?A.XIV firmware V10.0.8B.Host Attachment Kit V1.0.1C.SAN Volume Controller(SVC)V4.2D.Virtual I/O Server(VIOS)V2.1.1Answer:D10:What are benefits of the XIV Storage System's distribution compared to traditional mid-level striping distributions?A.no orphan space and optimal distribution over timeB.no orphan space and optimal distribution at time of creationC.minimal performance tuning and automatic capacity allocationD.consistent distribution and regular performance tuning requiredAnswer:A11:What is required for IBM System i multi-pathing when connecting to an IBM XIV System?e native multipath drivers supported by VIOSB.IBM i multi-pathing across two IBM Virtual I/O ServersC.logical volume connected to VIOS via multiple physical host portsD.two VIOS partitions provide redundant paths to the same set of LUNsAnswer:C12:Which XIV System feature helps to decrease total cost of ownership by simplification of the configuration process?A.ease of creating RAID groupsB.mapping volumes to physical drivesmon SDD/SDDPCM for multipathingD.easy to use Graphical User Interface(GUI)Answer:D13:An administrator is migrating data from legacy storage to an XIV System.What is the behavior of the host systems during this process?A.all volumes are transferred in parallel ensuring equal accessB.the same volumes are seen from both the XIV System and the legacy systemC.host I/O continues normally as long as the legacy system is not powered offD.performance is reduced as the XIV System duplicates1MB partitions across all drives Answer:C14:Which feature helps keep copies consistent during a re-sync or link failure while remote mirroring?A.MPIOB.snapshotC.thin provisioningD.redirect-on-writeAnswer:B15:What is the recommended release of SAN Volume Controller(SVC)firmware when connecting the XIV Storage System to SVC?A.4.2.0.5B.4.2.1.8C.4.3.0.1D.4.3.1.4Answer:D16:In an XIV System,what reduces the occurrence of double disk failure?A.quick rebuild times utilizing all drivesB.IBM XIV patented disk architecture combined with4x cooling fansC.continuous scrubbing that realigns the blocks for optimum data integrityD.SATA drives that are exclusively manufactured to meet IBM XIV requirementsAnswer:A17:An XIV System is regaining redundancy after a drive failure in a15module system.From how many drives is data being read?A.12B.72C.168D.180Answer:C18:An IBM Service Representative replaces a data module in an XIV System.What happens to the data when the new module is installed?A.a new data table is createdB.a new inode table is createdC.a new matrix table is createdD.a new distribution table is createdAnswer:D19:A customer wishes to purchase a storage controller for a mixed workload of random I/O and sequential backups.The customer has heard that SATA is good for sequential but has bad performance on random workloads,and is thus reluctant to purchase an XIV System.What should the technical specialist's response be?A.The XIV System excels at mixed workloads due to the distribution of partitions.B.The XIV System excels at mixed workloads due to the use of redundant Ethernet switches.C.The XIV System excels at mixed workloads due to the use of multi-processor interface modules.D.The XIV System excels at mixed workloads due to the mixture of fibre channel and iSCSI host connections.Answer:A20:In an XIV System,from where do the XIV modules boot?A.SSDs in Data Modulespact Flash in each moduleC.A hard drive internal to Data ModulesD.Hidden partition in Disk1of each moduleAnswer:B。
Exam1pass 000-894 exam braindumps free download

Exam:IBM000-894Title:IBM Tivoli Storage ManagerV5.4AdministrationVersion:Demo1.A colleague at a remote location sends the TSM storage administrator an e-mail displaying the contentsof a very useful multi-line server script.The local TSM server is running on AIX and the TSM storage administrator uses the administrative command line interface on a Windows desktop.How can the TSM storage administrator easily load this new server script into the TSM server that the administrator manages and ensure the script can be reused?A.run the script using the command lineB.copy the script to the windows clipboard and paste it into the command lineC.save the script in a text file and run the command:DEFINE SCRIPT COOLSCRIPT FILE=C:\script.txtD.save the script in a text file on the TSM server and run the command:DEFINE SCRIPT COOLSCRIPT FILE=/tmp/script.txtAnswer:C2.A TSM storage administrator has(2)1.8GHz CPU Windows file servers with4filesystems each on4 separate disk drives,a1Gb high-speed network connection to the TSM server and a6hour backup window during which no other applications are running.The management class in use is already configured to point to a tape stgpool and sufficient client sessions are available.Which two options/parameters must be configured in order to ensure that a multi-session backup will be performed where(2)sessions will send data to the TSM server tape stgpool simultaneously?(Choose two.)data to the TSM server?tape stgpool simultaneously?(Choose two.)A.The KEEPMP parameter for this client node must be enabled.B.RESOURCEUTILIZATION must be set to3or higher on the client.C.RESOURCEUTILIZATION must be set to2or higher on the client.D.The MAXNUMMP parameter for this client node must be set to2or higher.E.The MAXNUMMP parameter for this client node must be set to1or higher.Answer:BD3.Which of the following commands allows the allocation of space,and creation of a database volume,in a single command?A.dsmfmt dbv d:dbvol\size=100B.dsmfmt dbvol d:\dbvol\formatsize=100C.define dbvolume d:\dbvol\formatsize=100D.define volume d:\dbvol\type=db formatsize=100Answer:C4.When defining a TSM client schedule,what are the functions of DURATION and DURUNITS parameters?A.to specify how long the backup job can run.B.to specify the date after which the schedule is no longer usedC.to specify that the startup window can begin on any day of the weekD.to specify the length of time the startup window remains open to begin processing the schedule Answer:D5.Which command should you use to control the type of data transfer path a client uses for(LAN-Free and/or LAN)backups?A.UPDATE NODEB.UPDATE PATHC.UPDATE LANFREED.UPDATE DEVCLASSAnswer:A6.The TSM storage administrator notices that the size of the log that stores client processing errors keeps growing.Which option should be modified to prevent this from happening in the future?A.LOGPOOLSIZEB.ERRORLOGSIZEC.ERRORLOGRETENTIOND.LOGWARNFULLPERCENTAnswer:C7.A local backup set was created on a server.The data owner wants to use the table of contents to restorea specific file.How can the data owner use the table of contents feature?A.The table of contents only displays the directory level.B.The table of contents expands to show individual files.C.The table of contents is not supported for local backup set restore.D.The table of contents is only displayed for local backup sets after issuing the GENERATE BACKUPSETTOC command.Answer:C8.The TSM storage administrator is exporting node data of a critical application server.The export must be completed by the end of the business day.Currently several processes are running that may cause an incomplete export.Which three might cause unpredictable results?(Choose three.)A.backupB.archiveC.expirationD.collocationE.data interleavingF.database backupAnswer:ABC9.The StartTime parameter is changed to the value of01:00on a schedule named DEV1_SEL_WEEKDAY associated to the DEV1Windows node in the DEVELOPMENT domain.From the client machine,stopping and restarting the scheduler service on the node is done.What can be done to verify that a change has taken affect on the client?A.Query the activity logB.Wait for backup schedule notificationC.Verify the next scheduled backup in the dsmsched.logD.Select schedule from nodes where sched_name=EV1_SEL_WEEKDAY?Select schedule from nodes where sched_name=?EV1_SEL_WEEKDAYAnswer:C10.In response to a problem,IBM Tivoli Support Level2requests that system information from the TSM server be placed in a file and sent to them.What is the best way to create this file?A.Q SYS>system.outB.Q SYSTEMINFO>system.outC.Q SYS f=d-receiver=file-objectname=system.outD.SET SYSREPORT ON output=file filename=system.outAnswer:A11.There are two TSM storage administrators working different shifts to support the storage environment. The TSM storage administrator working the morning shift checks the nightly scheduled backup report from the day before and notices the report only shows events for the current date.What is the likely cause of this problem?A.The storage administrator working the night shift issued the command SET EVENTRETENTION0.B.The storage administrator working the night shift issued the command SET EVENTRETENTION1.C.The storage administrator working the night shift issued the command SET ACTLOGRETENTION0.D.The storage administrator working the night shift issued the command SET ACTLOGRETENTION1. Answer:A12.What should you use with the archive command to specify the available management class for your policy domain to which you want to bind your archived files and directories?A.-dirmcB.-archpdC.-bindmcD.-archmcAnswer:D13.Active-data pools can be collocated on sequential-access disk to optimized access to active data versions for fast restore.Select two methods data can be copied to active data pools.(Choose two).A.Active data is written to an active data pool using simultaneous write.B.Active data is copied to an active data pool using multi-threaded backups.C.Active data is copied to an active data pool using the COPY ACTIVEDATA command.D.Active data is moved to an active data pool using the MOVE ACTIVEDATA command.E.Active data is moved to an active data pool using the MOVE DATA TYPE=ACTIVE command. Answer:AC14.The RETMIN parameter in the archive copy group specifies:A.The minimum number of days an object is retained after an object is archived.B.The minimum number of retries that will occur before an archive operation fails.C.The minimum number of versions of an object that will be retained in server storage.D.The minimum number of days an object is retained after an event trigger is issued for files that are managed by event-based retention.Answer:A15.How much database space is required for each version of a file in the primary stgpool?A.200to400bytesB.400to600bytesC.300to400bytesD.100to300bytesAnswer:A16.The local Systems Engineer advises to mirror the TSM database.In order to find out how much space to allocate for mirroring,the current space used by the TSM database must be determined.What will accomplish this?A.Q DBB.DBSHOWC.SHOW DBFULLD.Q DB-ALLOCATEDAnswer:A17.The TSM server is not running.Based on the errors,the problem appears to be a full TSM log.This is the first time this has happened.You perform the necessary procedures to get the server running again. Which two queries help in identifying the root cause of the problem?(Choose two.)A.QUERY DRIVEB.QUERY ACTLOGC.QUERY LIBRARYD.QUERY FILESPACEE.QUERY CLIENT ERROR LOGAnswer:AB18.From the client machine,a TSM administrator with policy privilege needs to make a change to the daily schedule for backups and needs to ensure that is will take effect tonight.What is the first thing that this administrator must do in order for this change to take place?A.Log into the TSM Server and select Enhanced Scheduling in the ISC.B.Install or ensure that the Adminstrative Command line is on the client machine.ing the ISC,edit the Daily Schedule and then select take effect"Immediately".ing the BA Client GUI,edit the schedule and then restart the service or deamon.Answer:B19.To inform the server about a drive that can be used to access storage volumes,issue the DEFINE DRIVE command,followed by:A.the DEFINE PATH commandB.the DEFINE LIBRARY commandC.the DEFINE VOLUME commandD.the DEFINE ACCESS commandAnswer:A20.Files may be initially placed on different storage pools according to the desired storage management policy.What are two benefits of automatically moving data to other devices?(Choose two)A.Space utilization.B.Secondary storage pools are backed up faster.C.Recovery performs faster on removable media.D.Data is moved to less expensive device classes for cost savings.E.Secondary storage pools require less security than primary storage pools. Answer:AD。
Testpassport最新IBM 000-966题库免费下载

TThe safer , easier way to help you pass any IT exams.Exam . 000-966Title .Version . DemoXIV Storage System Technical Solutions Version2ing the XCLI, which qualifiers are required to create a thin provisioned pool?A.pool, hard size, soft size, snapshot sizeB.pool, hard size, soft size, read block behaviorC.pool, resize allowed, maximum volumes, maximum snapshotsD.pool, read block behavior, maximum volumes, maximum snapshotsAnswer:A2.To improve system redundancy using its grid architecture, where in the XIV System can a partition be mirrored?A.on disks in other modulesB.on same disk in different modulesC.on different disks in the same moduleD.on same disk, in same module, and in different modulesAnswer:A3.Which two solutions, once installed and configured, can be used to move workloads without disruption? (Choose two)A.XIV partitionsB.XIV Data Mover (XDM)C.SAN Volume ControllerD.XIV Data Migration FunctionE.Tivoli Storage Productivity Center for Replication V4Answer:C D4.When defining a volume on a thin-provisioned pool on an XIV System, the size of the volume is limited byA.the hard capacity of the volumeB.the 2 TB maximum volume size on XIVC.the hard capacity of the storage poolD.the soft capacity of the storage poolAnswer:D5.On the XIV System, what is the approximate rebuild time for a 1 TB drive that is 50% utilized?A.5 minutesB.15 minutesC.30 minutesD.120 minutesAnswer:B6.A customer has ordered a 10 module XIV System. How many interface modules are active in this configuration?A.3B.4C.5D.6Answer:B7.When using the SAN Volume Controller (SVC) as a host for a full 15 module XIV Storage System, how many ports are recommended to be connected to the SVC?A.8B.12C.16D.24Answer:B8.What helps ensure that the XIV System's cache does NOT become a bottleneck?A.central cache locking mechanisme of industry standard chip technologyC.each module is responsible for caching the data in that moduleD.having all modules understand what is held in cache at all timesAnswer:C9.What is a requirement to connect a V6R1 IBM i host to an XIV Storage System?A.XIV firmware V10.0.8B.Host Attachment Kit V1.0.1C.SAN Volume Controller (SVC) V4.2D.Virtual I/O Server (VIOS) V2.1.1Answer:D10.What are benefits of the XIV Storage System's distribution compared to traditional mid-level striping distributions?A.no orphan space and optimal distribution over timeB.no orphan space and optimal distribution at time of creationC.minimal performance tuning and automatic capacity allocationD.consistent distribution and regular performance tuning requiredAnswer:A11.What is required for IBM System i multi-pathing when connecting to an IBM XIV System?e native multipath drivers supported by VIOSB.IBM i multi-pathing across two IBM Virtual I/O ServersC.logical volume connected to VIOS via multiple physical host portsD.two VIOS partitions provide redundant paths to the same set of LUNsAnswer:C12.Which XIV System feature helps to decrease total cost of ownership by simplification of the configuration process?A.ease of creating RAID groupsB.mapping volumes to physical drivesmon SDD / SDDPCM for multipathingD.easy to use Graphical User Interface (GUI)Answer:D13.An administrator is migrating data from legacy storage to an XIV System. What is the behavior of the host systems during this process?A.all volumes are transferred in parallel ensuring equal accessB.the same volumes are seen from both the XIV System and the legacy systemC.host I/O continues normally as long as the legacy system is not powered offD.performance is reduced as the XIV System duplicates 1 MB partitions across all drivesAnswer:C14.Which feature helps keep copies consistent during a re-sync or link failure while remote mirroring?A.MPIOB.snapshotC.thin provisioningD.redirect-on-writeAnswer:B15.What is the recommended release of SAN Volume Controller (SVC) firmware when connecting the XIV Storage System to SVC?A.4.2.0.5B.4.2.1.8C.4.3.0.1D.4.3.1.4Answer:D16.In an XIV System, what reduces the occurrence of double disk failure?A.quick rebuild times utilizing all drivesB.IBM XIV patented disk architecture combined with 4x cooling fansC.continuous scrubbing that realigns the blocks for optimum data integrityD.SATA drives that are exclusively manufactured to meet IBM XIV requirementsAnswer:A17.An XIV System is regaining redundancy after a drive failure in a 15 module system. From how many drives is data being read?A.12B.72C.168D.180Answer:C18.An IBM Service Representative replaces a data module in an XIV System. What happens to the data when the new module is installed?A.a new data table is createdB.a new inode table is createdC.a new matrix table is createdD.a new distribution table is createdAnswer:D19.A customer wishes to purchase a storage controller for a mixed workload of random I/O and sequential backups. The customer has heard that SATA is good for sequential but has bad performance on random workloads, and is thus reluctant to purchase an XIV System. What should the technical specialist's response be?A.The XIV System excels at mixed workloads due to the distribution of partitions.B.The XIV System excels at mixed workloads due to the use of redundant Ethernet switches.C.The XIV System excels at mixed workloads due to the use of multi-processor interface modules.D.The XIV System excels at mixed workloads due to the mixture of fibre channel and iSCSI host connections.Answer:A20.In an XIV System, from where do the XIV modules boot?A.SSDs in Data Modulespact Flash in each moduleC.A hard drive internal to Data ModulesD.Hidden partition in Disk 1 of each moduleAnswer:B。
free download Test4pass 642-243 pdf exam dumps

Exam:Cisco642-243Title:Unified Contact CenterEnterprise Support Exam Version:Demo1.In a Cisco Unified Contact Center Enterprise system,a new agent and phone have been added to the system;however,the agent is unable to log in to the system.The agent is using the same type of phone and and has the same CTI OS desktop setup as other agents who are able to log in without issue.What are two possible causes for this issue?(Choose two.)A.The incorrect CTIOS Server IP and Port are configured on the new agent's CTI desktop.B.The new phone used by the agent is not associated with IVRJtapiUser.C.A new Device Target needs to be added for the phone in the Config(for example,/devtype ipphone/DN 12345).D.The phone has call forwarding and call waiting enabled.E.The new phone used by the agent is not associated with PGJtapiUser.Answer:CE2.Refer to the exhibit.In the Cisco Unified Contact Center Enterprise solution,there are a number of different log files that are generated by different components and processes in the solution.Identify the specific process that generated the log file.A.CTI OS(Server)B.CTI OS(Client)C.JTAPI Gateway(jgw)D.UC Manager PIM(Enterprise Agent PIM)E.ICM Call Router(rtr)Answer:D3.Refer to the exhibit.In a Cisco Unified Contact Center Enterprise deployment,the call flow allows the caller to opt out and leave a voice-mail message for an agent team while in queue.The Cisco Unified IP IVR application"Script1.aef"is called to prompt the caller and transfer the call to voice mail.What impact does the script shown in the exhibit have on the system?A.Calls that are sent to voice mail from the Cisco Unified IP IVR script will appear as"Abandoned"in the Cisco Unified CCE Call Type reporting.B.Calls that are sent to voice mail from the Cisco Unified IP IVR script will appear as"Transferred Out"in the Cisco Unified CCE Call Type reporting.C.Calls that are sent to voice mail from the Cisco Unified IP IVR script will appear as"Handled"in the Cisco Unified CCE Call Type reporting.D.All calls that are sent to this script will be sent to the vmEXT using the Call Redirect step.E.Callers will remain in queue after they leave the voice-mail message.Answer:A4.In addition to enabling tracing in the Cisco Unified IP IVR,what additional trace files would be helpful in troubleshooting calls that are being dropped in the Cisco Unified IP IVR for the Cisco Unified Contact Center Enterprise solution?(Choose two.)A.Cisco Unified Communications Manager>CM Services>CM Services>Cisco CallManager>Debug Trace Level set to DetailedB.Cisco Unified Communications Manager>CM Services>CM Services>Cisco CallManager>Debug Trace Level set to ErrorC.Cisco Unified Communications Manager>CTI Services>SDI>Debug Trace Level set to ErrorD.Cisco Unified Communications Manager>CTI Services>Cisco CTIManager>Debug Trace Level set to DetailedE.Cisco Unified Communications Manager>CM Services>Cisco CTIManager>Debug Trace Level set to DetailedAnswer:AE5.In a Cisco Unified Contact Center Enterprise system,external callers being queued on the Cisco Unified IP IVR are reporting voice quality issues with the Cisco Unified IP IVR prompts as being"choppy."Which two actions would be helpful in finding the problem?(Choose two.)A.Check that the codec configuration matches between the voice gateway configuration on the Cisco Unified Communications Manager,and the codec configured on the Cisco Unified IP IVR/CRS server.B.Trace the voice path of a problem call through the network,collecting and analyzing traffic from the voice gateway and Cisco Unified IP IVR/CRS server.C.Enable Performance Monitor counters on the Cisco Unified IP IVR/CRS server to monitor CPU and memory usage.D.Collect JTAPI logs from the Cisco Unified IP IVR to investigate any errors with the call control messages.E.Verify the MTP resources that are available in Cisco Unified Communications Manager for this call flow. Answer:BC。
Testpassport最新IBM 000-371 题库免费下载

TThe safer , easier way to help you pass any IT exams.Exam : 000-371Title : Version : DEMOWeb Services Developmentfor IBM WebSphereApplication Server V7.0The safer , easier way to help you pass any IT exams.1. Refer to the message in the exhibit.Replace the ??? in the message with the appropriate namespace.A. /2003/05/soap-envelopeB. /soap/envelope/C. /soap12/envelope/D. /soap11/envelope/Answer: A2. A company has a high business value JAX-WS provider Web Service and cannot afford to lose any messages.What kind of quality of service should be used in conjunction with WS-ReliableMessaging?A. Managed persistentB. Managed non-persistentC. Unmanaged non-persistentD. Managed persistent and Transaction (enableTransactionalOneWay)E. Managed non-persistent and Transaction (enableTransactionalOneWay)F. Unmanaged non-persistent and Transaction (enableTransactionalOneWay)Answer: D3. The TCP/IP Monitor can be used to check the following:A. SOAP/JMSB. HTTP HeaderC. WSDL documentD. SOAP messagesE. WS-I ComplianceAnswer: BDE4. A developer used wsimport to generate the skeleton code for a Web service implementation.What is the purpose of the generated ObjectFactory class?A. The ObjectFactory class is the generated Service Endpoint Interface classB. The ObjectFactory class is the generated service provider class that is used by the JAX-WS client.C. The ObjectFactory class takes the targetNamespace value and creates the directory structure.D. The ObjectFactory class allows you to programatically construct new instances of the Java representation for XML content.Answer: D5. Which of the following is used to invoke a Web service from an unmanaged client?A. JAX-WS dispatch APIB. Deployment descriptorC. @Resource annotationD. @WebServiceRef annotationE. Service and Interface classesAnswer: AE6. A company is migrating their current JAX-WS Web service running on IBM WebSphere Application Server V6.1 with the Feature Pack for Web Services to V7.0. The company wants to continue to support V6.1 service consumers.If the Web service has WS-AtomicTransaction enabled, what settings should be configured to support the widest range of clients?A. Set the WS-AtomicTransaction to "Never" in WS-Transaction policy of the policy setB. Set the WS-AtomicTransaction to "Supports" in WS-Transaction policy of the policy setC. Set the WS-AtomicTransaction to "Mandatory" in WS-Transaction policy of the policy setD. Set the "Default WS-Tx specification level" to "1.0" in application policy set bindingsE. Set the "Default WS-Tx specification level" to "1.1" in application policy set bindings Answer: BD7. Why would a developer prefer to use SOAP Web services over REST Web services?A. To provide message level securityB. To allow integration with Web 2.0 applicationsC. To be able to use XML to format response messagesD. To be able to use the HTTP or HTTPS transport protocolsAnswer: A8. Which of the following business scenarios is the LEAST appropriate for Web services?A. Expanding the reach of your company information.B. Providing transactional services such as credit card payment processing.C. Making existing services available to a business process to orchestrate services.D. Enabling interoperability between heterogeneous services to create time-critical solutions. Answer: D9. What is the LEAST appropriate scenario for Web services?A. To integrate legacy systemsB. To propagate security contextC. To expose fine grained operationsD. To use with process choreographyE. For B2B (business to business) applicationsAnswer: C10. What is the biggest advantage of using Web services to create SOA solutions?A. They are implemented using Java and XMLB. They support a client-server programming modelC. They are used to create tightly coupled applicationsD. They are implemented using standardized technologiesAnswer: D11. The following methods are to be published as Web services to be invoked via SOAP messages and validated with a schema:public void myMethod(int x, float y);public void myMethod(int x);public void someOtherMethod(int x, float y);Which WSDL style should be used?A. RPC/literalB. RPC/encodedC. Document/encodedD. Document/literalE. Document/literal wrappedAnswer: A12. Which WSDL style is suited to sending binary tree nodes as part of a SOAP message?A. RPC/literalB. RPC/encodedC. Document/encodedD. Document/literalE. Document/literal wrappedAnswer: B13. A customer requires a Web service which ensures message delivery.Which transport should be proposed?A. SOAP/TCPB. SOAP/JMSC. SOAP/HTTPD. SOAP/SMTPE. SOAP/HTTPSAnswer: B14. When creating a Web service which requires reliable delivery of SOAP messages, which transport should be used?A. SOAP/TCPB. SOAP/JMSC. SOAP/HTTPD. SOAP/SMTPE. SOAP/HTTPSAnswer: B15. The WS-I Simple SOAP Binding Profile V1.0 mandates that a message must serialize the envelope according to which specification?A. XML 1.0B. WSDL 1.1C. SOAP 1.1D. HTTP 1.0Answer: A16. Which specification provides recommendations on the use of encodings to maximize interoperability?A. SAAJ V1.2B. JAX-RPC V1.0C. WS-CoordinationD. WS-I Basic Profile (BP) V1.1Answer: D17. Which of the following is MOST likely to improve the performance of SOAP-based Web services?A. Use message level securityB. Use fine-grained Web servicesC. Use document/literal instead of RPC/encodedD. Avoid stale data in the UDDI registry by turning off cachingAnswer: C18. An RPC/encoded Web service experiences poor performance at high message volumes.What can a developer do to improve this performance?A. Turn off marshallingB. Use binary encodingC. Use RPC/literal encodingD. Use document/literal encodingE. Redesign to use more granular messagingAnswer: CD19. How can a developer ensure that a fault will occur if the service does not recognize a SOAP header entry containing a transaction number?A. Set the faultCode value to soap:TransactionB. Include a Fault element in the SOAP messageC. Include a mustUnderstand attribute in the header entryD. Include a detail element containing application-specific elements according to the XML Schema Answer: C20. What must be included in a SOAP fault message when an error occurs due to a value in the message Body element?A. A detail elementB. A Body fault codeC. An application-specific fault codeD. A fault string element with a value of "Body"Answer: A。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Exam:IBM000-600Title:System z Solution Sales V4 Version:DEMO1.The Solution edition for Data Warehousing includes which of the following components?A.Foundational z/OS and DB2for z/OS software to deploy a warehousing database on z/OSB.DB2for Linux on System z with Partitioning featurermation Management software and OPTIM Data Privacy SolutionD.A pre-defined hardware configuration of2general processors and2zIIPs with16GByte of memory for LPAR definitionWArialZAnswer:A2.When discussing the flexibility of System z family of servers with a prospective customer,which of the following is a key aspect?A.Binary compatibility between serversB.Hot pluggable processor and memory boardsC.Consistent CoD features with entire familyD.Ability to interchange features between systems WArialZAnswer:A3.A prospective manufacturing customer with an existing complex environment is requesting a proposal fora TSM data management solution.What should be the first step taken to validate the customer's project?A.Perform a TSM benchmarkB.Verify fundingC.Contact the IBM Software Sales ProfessionalD.Survey customer's current environmentWArialZAnswer:C4.A customer has a defined policy of deploying new applications on distributed platforms.The customer feels these platforms are"good enough"and less costly than their mainframe.A new,WebSphere-based, mission-critical core application is under development and the customer has asked for price quotes on the infrastructure for its deployment.Which of the following meets these needs?A.System z Solution Edition for WebSphereB.System z Solution Edition for DB2and System z Solution Edition for WebSphereC.System z Solution Edition for Cloud Computing and System z Solution Edition for Application DevelopmentD.System z Solution Edition for DB2and POWER6servers for the application tierWArialZAnswer:A5.What determines whether a special bid is eligible for Solution Edition pricing?A.The bid includes incremental new workload representing growth on the platform and the business situation requires a bottom line price.B.The bid requires a bundled solution including hardware,software,maintenance and education.C.The competitive context demands a bottom line price which can be met by adding the solution to an existing LPAR.D.The bid includes incremental new workload on a shared outsourced machine providing a lower TCA.WArialZAnswer:A6.The Solution Edition for Security with the System z mainframe and Centralized Identity and Access Management provides significant benefits.Which of the following describes those benefits?A.Avoid the risks and exposures on System z platform and on other platforms in a business computing environmentB.Avoid the risks and exposures on only the System z platform in a business computing environmentC.Avoid the risks and exposures on IBM servers only in a business computing environmentD.Avoid security risks for all customer installed servers in a business computing environmentAnswer:A7.A prospect with a large number of Windows servers distributed across the globe is considering migrating to single System z.The customer is very concerned with the rapid growth of his Windows support staff,and the space used by the servers in the various locations.Which of the following is likely to provide long term justification in this scenario?A.Reduced Footprint size at the central locationB.Technical skill requirementsC.Power requirementsD.High AvailabilityWArialZAnswer:B8.A System z10retail customer with home written Cobol applications is considering replacement of their older z/OS server with new technology.They do not believe a replacement would be less costly than keeping their current server.Which of the following factors in z10are relevant in convincing them otherwise?A.Application costs,z/OS maintenance,and floor spaceB.MSU software savings,hardware maintenance,software efficiencyC.z/OS administration,hardware maintenance,and database costsD.Floor space,power and cooling,z/OS maintenance,and hardware maintenanceWArialZAnswer:B9.A customer has selected the functionality from System z Solution Edition for Application Development but is concerned about the financial impact of ordering the Solution Edition compared with the same functionality as individual components.Which of the following best describes the financial impact of System z Solution Editions for a customer?A.Lower TCA and lower TCOB.Lower TCA but no impact on TCOC.Lower TCO but no impact on TCAD.Lower TCA but higher TCOWArialZAnswer:A10.What factors contribute to providing the lowest TCO for Java workloads deployed on z/OS?A.Ease of useB.Virtualized hardware and softwareC.Availability of ISV solution softwareD.IFL ICFWArialZ Answer:B。