Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "FN0-240" Exam

Got it from ITCertkeys it is amazing site

 Question 1.
A scripted health check can only contain searches for:

A. ASCII content
B. Status codes
C. Status codes and ASCII content
D. Status codes, ASCII content and keep alives

Answer: C

Question 2.
Port profiles are used to define:

A. Port types
B. Status of ports
C. Well known ports
D. HTTP health checks

Answer: A

Question 3.
An HTTP health check can return:

A. A keepalive
B. Status code
C. Content verification
D. A value to increment the Reassign-Threshold

Answer: B, C

Question 4.
Which of the following Health Check types are performed at Layer 7?

A. Arp Request
B. TCP
C. HTTP
D. IMAP4
E. UDP
F. LDAP
G. MMS
H. RSTP

Answer: C, D, F, G

Question 5.
A UDP application is considered down if the server returns:

A. No packet
B. A garbage packet
C. An UDP probe packet
D. An ICMP unreachable packet

Answer: D

Question 6.
sFlow is supported on the:

A. Server Iron XL
B. Server Iron 100
C. Server Iron 400
D. Server Iron 800
E. Server Iron 450
F. Server Iron 850
G. Server Iron GT-E

Answer: E, F, G

Question 7.
SYN-Guard and SYN-Defense can be configured on:

A. Server Iron XL
B. Server Iron 100
C. Server Iron 400
D. Server Iron 800
E. Server Iron 450
F. Server Iron 850
G. Server Iron GT-E

Answer: B, C, D, E, F, G

Question 8.
An HTTP health check can return:

A. A keep alive
B. Status code
C. Content verification
D. A value to increment the Reassign-Threshold

Answer: B, C

Question 9.
Which of the following Health Check types are performed at Layer 7?

A. Arp Request
B. TCP
C. HTTP
D. IMAP4
E. UDP
F. LDAP
G. MMS
H. RSTP

Answer: C, D, F, G

Question 10.
How many simultaneous levels of health checks can be configured on the Server Iron to health check the same real server

A. Layer 3, Layer4
B. Layer4, Layer7
C. Layer3, Layer4, Layer7, content match
D. Layer 4, Layer7, content match
Answer: B

Question 11.
What will be the corresponding Virtual MAC Address belonging to a configured VIP 175.30.15.10 (AF:1E:0F:0A)

A. VMACs have to be manually configured
B. AF:1E:0F:0A:FF:FF
C. 02:0C:DB:1E:0F:0A
D. 02:0C:AF:1E:0F:0A

Answer: C

Question 12.
What must be done before a Health-Check Policy will take effect?

A. The Health-Check Policy must be bound to the VIP
B. The Health-Check Policy intervals and reset must be define
C. The Health-Check Policy must be attached to an application port on a real server
D. The Health-Check Policy must be configured to use 3-way handshaking

Answer: C

Question 13.
A Matching List can contain:

A. Log
B. URL
C. Down simple
D. Status codes
E. Up Compound

Answer: A, C, E

Question 14.
When health checking is enabled, a server response time consists of the combination of its response to client requests and its response to Layer 4 or Layer 7 health checks from the Server Iron.

A. True
B. False

Answer: B

Question 15.
When using a scripted health check, the default health check is disabled.

A. True
B. False

Answer: A

Question 16.
A scripted health check can only contain searches for:

A. ASCII content
B. Status codes
C. Status codes and ASCII content
D. Status codes, ASCII content and keep alive

Answer: C

Question 17.
Port profiles are used to define:

A. Port types
B. Status of ports
C. Well known ports
D. HTTP health checks

Answer: A

Question 18.
The Foundry Server Iron can perform Layer 7 health checks on the following TCP applications (select all that applies)?

A. FTP (port 21)
B. POP3 (port 110)
C. LDAP (port 389)
D. SNMP

Answer: A, B, C

Question 19.
Health checks to port 443 can be:

A. Secure
B. Simple
C. Simple and Secure
D. Simple, Secure and Boolean

Answer: A, B

Question 20.
A Port Profile is a set of attributes that defines a TCP/UDP port. Which of the following are valid Port Profile Attributes?

A. l4-healthck
B. Keep alive interval and retries
C. TCP or UDP age
D. Keep alive state

Answer: B, C, D

Question 21.
Disabling layer 4 health checks will automatically disable layer 7 health checks 

A. True
B. False

Answer: A

Question 22.
Each Matching List must have a name

A. True
B. False

Answer: A

Question 23.
On the Server Irons 400/800, the Health Checks are performed by what section of the hardware?

A. The Management processor
B. The Barrel processors
C. The IPC processors
D. WSM processor

Answer: A

Question 24.
If a string that meets the selection criteria is a subset of another:

A. The longer string takes precedence
B. The shorter string takes precedence
C. The string that is read last takes precedence
D. The string that is read first takes precedence

Answer: A

Question 25.
What is the command syntax for setting up a layer 7 heath check for HTTP 1.1?

A. port http url "GET /www.abc.com HTTP1.1\r\n\r\n"
B. port url http "http 1.1/"
C. port http url "GET / HTTP/1.0\r\nHost: www.domain1.com\r\n\r\n"
D. port http url "GET / HTTP/1.0\r\
E. port http url "GET / HTTP/1.1\r\nHost: www.domain1.com\r\n\r\n"

Answer: E

Question 26.
For any application port, the "sticky" command is used to:

A. bind real servers
B. configure persistence
C. create sessions
D. cookie switching

Answer: B


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for TB0-107 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "TB0-107" Exam

Business Works 5 Certification Exam

 Question 1.
Which two installation modes prompt the user for information during the install process? (Choose two.)

A. GUI mode
B. Silent mode
C. Console mode
D. Unattended mode
E. Remote administration mode

Answer: A, C

Question 2.
What are the three benefits of Business Works Process Engines using HTTP(S) for run-time initialization? (Choose three.)

A. HTTP(S) does not use multicast for failover.
B. The Process Engine advertises state over HTTP(S).
C. HTTP(S) may be used in conjunction with firewall security.
D. HTTP(S) allows direct, point-to-point access to the administration server.
E. HTTP(S) does not span network segments automatically and is therefore more secure.
F. HTTP(S) does not require additional network bridging software, making it simpler to set up.

Answer: C, D, F

Question 3.
What, if any, are the restrictions of using the TIBCO Administrator GUI via a secondary server?

A. There are no restrictions.
B. The only restriction is that you cannot deploy applications from a secondary server.
C. You cannot perform any monitoring or management functions using the GUI until the 
    secondary server is changed to READ_WRITE.
D. You cannot perform user management, deploy applications, or perform any other activity for 
    which READ_WRITE access is required.

Answer: D

Question 4.
What are four options for creating a TIBCO team building environment? (Choose four.)

A. Perforce
B. file sharing/locking
C. Visual SourceSafe
D. TIBCO XML Canon
E. TIBCO SmartMapper
F. TIBCO Adapter cross referencing

Answer: A, B, C, D

Question 5.
A Business Works application you are developing uses JMS messaging where the messages only reside on the local campus. 

How should you implement conversation level security?

A. You can define the connection used by the message producers and consumers to use SSL. 
    You also need to provide the appropriate certificates.
B. You can define the message producers and consumers to use PGM which encrypts all 
    message content. You must also provide the appropriate certificates.
C. You can define the connection used by the message producers and consumers to use a VPN. 
    The network security administrator must configure this for you.
D. You need to write a Java code activity to perform encryption (decryption) of the data before 
    giving it to the message producer (or after getting from the message consumer).

Answer: A

Question 6.
A new integration initiative in your department requires that both a test domain and a production domain be set up for your system integration staff. Due to heightened security, it is essential that all aspects of the environments be completely segregated. 

Which three actions must you take to achieve this? (Choose three.)

A. install test and production TIBCO Administrator servers on machine A
B. ensure that all Message Service Bus components are installed on a single network subnet
C. ensure that each TIBCO Business Works component belongs to only one appropriate domain
D. ensure the TIBCO Runtime Agent network traffic for each domain is limited to a single network 
    subnet
E. install a test TIBCO Administrator server on machine A and a production TIBCO Administrator 
    server on machine B
F. ensure that the Message Service Bus naming conventions and settings are separate for test 
    and production domains

Answer: C, E, F

Question 7.
You want to use a host system to run deployed Business Works process engines. 

Which two products must be installed on this host? (Choose two.)

A. Sun Java JRE
B. TIBCO Designer
C. TIBCO Administrator
D. TIBCO Runtime Agent
E. TIBCO Business Works

Answer: D, E

Question 8.
What is a restriction on the consumption of JMS queue messages?

A. The JMS queue message consumers cannot use selectors.
B. There can only be one active consuming client per JMS queue.
C. A single JMS queue message can only be consumed by one client.
D. The limit of how many clients can consume a single JMS queue message is determined by the 
    prefect configuration.

Answer: C

Question 9.
What is used to add a host machine to a TIBCO Administrative Domain?

A. corporate LDAP
B. TIBCO Domain Utility
C. TIBCO Administrator GUI
D. TIBCO Administrator Installer

Answer: B

Question 10.
Which is a valid technique for preventing unauthorized users from triggering a process flow?

A. lock down all process flows using transport specific security mechanisms
B. lock down the Starter activity at the transport level via transport specific security
C. supply a User ID and password when logging into a Business Works Process Engine
D. prevent each Business Works process flow from unauthorized access by assigning a role to it

Answer: B


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.