Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "190-823" Exam

Lucky Dump for me

 Question 1.
The Privileged User, Delegator, or Security Administrator roles provide what functionality in Document Manager?

A. They provide no functionality
B. They control access to edit Document Libraries
C. They control who can delegate access to Document Libraries
D. They control access to view Document Libraries

Answer: A

Question 2.
IBM Workplace Web conferences are being deleted automatically based on what policy setting?

A. They are marked for archive
B. They are older than a specified number of days
C. They have the option enabled inside the meeting to delete all records when meeting has 
     ended
D. They are not eligible for archiving

Answer: B

Question 3.
The SIP proxy component of the SIP server performs which of these functions:?

A. Receives SIP connections from the Java connect client and passes SIP data from the Java 
     connect client to the SIP container for further processing
B. Receives SIP data from the Chat Links service and passes SIP data from this service to the 
     SIP container
C. Maintains and monitors chat logs between SIP containers and their clients
D. Removes the client connection handling load from the SIP container

Answer: D

Question 4.
The Document Manager search feature is restricted from performing what operation?

A. Searching based on metadata
B. Searching while the user is logged in as anything but anonymous
C. Searching based on document text
D. Searching across multiple libraries

Answer: D

Question 5.
To configure WebSphere Member Manager to work with an LDAP directory, you enable security between WebSphere Portal and the LDAP directory. 

When is this step performed?

A. This step is done after you install WebSphere Portal and before you install Lotus Workplace
B. This step is done after you install WebSphere Application Server and before you install 
     WebSphere Portal
C. This step is done after you install WebSphere Portal and before you install WebSphere 
     Application Server
D. This step is done after you install Lotus Workplace and before you install WebSphere Portal 
     Server

Answer: A

Question 6.
Users that will be part of a draft and review process must have which of the following rights?

A. Users must have access to the Productivity Components and be in the wpsDocDraftReview 
     group
B. Users must have access to the document library and be in the wpsDoc Reviewer group
C. Users must have access to the Draft Portlet and be able to enable workflow for the rejected 
    document
D. Users must have access to the WebSphere Control page and the Manage Document Libraries 
     portlet

Answer: B

Question 7.
Susan is troubleshooting missing users from groups in presence awareness. The Presence server retrieves public group information and updates from which of the following?

A. WebSphere Member Manager
B. Awareness Group Cache
C. Local LDAP server
D. Presence Group Cache

Answer: A

Question 8.
When the rich client is uninstalled from a user's local machine, it leaves behind the rich client Workplace data for a default installation in what format?

A. A numbered data file in the user's home directory
B. A file with the user's LDAP cn name on the root of the drive the rich client was installed
C. A standard text file with the name 'Workplace desktop' in the user's shared directory
D. An archived file under IBM\Workplace\rc with the filename xx_archive where xx is the user's 
    initials

Answer: A

Question 9.
To start and stop Workplace Collaboration Services, you could manually access built-in scripts found in what directory?

A. \Workplace\bin
B. \Websphere\scripts
C. \Workplace\launch
D. \PortalServer\rootscripts

Answer: D

Question 10.
The Light Meeting protocol is used for which of the following?

A. Connects SIP server to SIP server for Presence Awareness
B. Connects browsers to the SIP server for Web Conferencing
C. Connects SIP server to SIP server for Web Conferencing
D. Connects browsers to the SIP server for Instant Messaging

Answer: B

Question 11.
If during installation you choose to install the database management system (DBMS) on a server by itself, what must be installed on each IBM Workplace server?

A. The IBM Workplace DBMS Synchronizing Server
B. The DBMS integrator
C. The DBMS client
D. The IBM Workplace DBMS client

Answer: C

Question 12.
IBM Workplace requires which underlying components?

A. WebSphere Application Server and WebSphere Portal
B. WebSphere Portal and IBM HTTP server
C. WebSphere Portal and Oracle
D. WebSphere Application Server and Lotus Domino Enterprise Server

Answer: A

Question 13.
Wanda wants to control the tools that users have to edit and create documents in IBM Workplace Documents. 

What should she do to control this functionality?

A. Edit the properties for each document to show only the allowed tools
B. Apply the appropriate policies to users
C. Uninstall all tools not needed for document management
D. Enable the 'tool' attribute in WebSphere Member Manager

Answer: B

Question 14.
Holly has configured multiple Document Managers to display on one page. 

How are Document Libraries accessed from that page?

A. Each Document Manager on the page can use a separate Document Library
B. Each Document Manager must be a subset of a single Document Library
C. Each Document Manager must contain the same user access to all Document Libraries
D. Each Document Manager must use the same Document Library because they are on the 
     same page

Answer: A

Question 15.
In addition to having a browser or rich client, what must users have that allows them to participate in instant messaging and Web conferences?

A. A LDAP attribute
B. An Instant Messaging alias
C. An Internet password
D. A user policy

Answer: D

Question 16.
What functionality does the Presence server provide in IBM Workplace?

A. It offers persistent Presence notifications to users on demand
B. It interacts with the Presence sip let to provide the Presence functionality
C. It adjusts Presence applets to list alias user names for awareness
D. It verifies the user identity when logging in and matches that to an online name

Answer: B


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 646-588 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "646-588" Exam

Advanced Wireless LAN for Account Managers

 Question 1.
Which security protocol is both an inherently flawed, one-way, device-centric form of authentication and a 40-bit encryption key?

A. Secure Socket Layer
B. Hypertext Transfer Protocol over Secure Socket Layer
C. Secure Shell Protocol
D. Wired Equivalent Privacy

Answer: D

Question 2.
When building an IT case for ITCertKeys .com, you must address security in addition to which three other customer needs? (Choose three.)

A. cost-effective network
B. easy installation
C. flexibility
D. increased productivity
E. interoperability
F. scalability

Answer: B, C, E

Question 3.
What is the best description of the Cisco Unified Wireless Network?

A. It enables public sector agencies to deploy a secure, scalable, broadband network that 
    integrates wired and wireless IP infrastructures, delivering network intelligence and 
    applications for mobile users across a city.
B. It is a powerful solution for enterprises that want to combine the best elements of wireless and 
    wired networking to deliver scalable, manageable, and secure wireless LANs with a low total 
    cost of ownership.
C. It uses a single network infrastructure for the transmission of data, voice, and video traffic, 
    delivering the business benefits of a converged, wireless network to enterprise-level 
    organizations.
D. It is the only unified wired and wireless solution for service providers in the industry. It is cost-
    effective and addresses the WLAN security, deployment, management, and control issues 
    facing service providers today.

Answer: B

Question 4.
What are the three best responses to a director of a healthcare facility whose primary concern is mitigating risks, such as medical record errors, malpractice suits, and poor bedside care? (Choose three.)

A. A Cisco WLAN enables real-time tracking of important equipment, supplies, and key 
    personnel.
B. A Cisco WLAN minimizes the risk of errors by automating tracking of medications, supplies, 
    and personnel.
C. A Cisco WLAN can extend to each patient room, allowing tracking of patient information at the 
    bedside at all times.
D. A Cisco WLAN enables patient medication to be tracked at the bedside, which minimizes the 
    risk of errors in dosage or identification.
E. A Cisco WLAN can be used to monitor vital signs in each patient room. This would reduce the 
    cost and time of manual tracking.
F. A Cisco WLAN can ensure secure intrusion protection throughout the hospital campus.

Answer: B, C, D

Question 5.
Which Cisco technology can be used to create a detailed wireless LAN design, including access point placement, configuration, and performance estimates?

A. Cisco Network Admission Control Appliance
B. Cisco wireless location appliance
C. Cisco wireless LAN controller
D. Cisco Wireless Control System

Answer: D

Question 6.
What are three capabilities of a wireless LAN? (Choose three.)

A. provides wireline equivalent security
B. makes cabling obsolete
C. interacts with wired LAN systems that are already in place
D. communicates with repeater access points
E. requires little to no centralized management
F. boosts productivity by up to 10 percent

Answer: A, C, D

Question 7.
Cisco offers a variety of options for installing or improving network security on the WLAN. 

Which two recommendations should be made to a customer who wants a Cisco WLAN security solution? (Choose two.)

A. enable Wi-Fi Protected Access functionality for encryption
B. enable Triple Data Encryption Standard functionality for encryption
C. deploy 802.1x for 802.11 standards for authentication
D. deploy a Service Set Identifier for authentication
E. deploy a Wireless Equivalent Privacy for authentication

Answer: A, C

Question 8.
Which two vertical segments actively use the adoption of 802.11 technology as a competitive differentiator? (Choose two.)

A. Education uses the adoption of 802.11 technology to attract more students. Wireless 
    networking creates a competitive advantage over schools and colleges that cannot provide 
    access anytime, anywhere.
B. Government uses the adoption of 802.11 technology to attract more residents to individual 
    localities. Wireless networking creates a competitive advantage over municipalities that cannot 
    provide access anytime, anywhere.
C. Healthcare uses the adoption of 802.11 technology to attract more patients. Wireless 
    networking creates a competitive advantage over hospitals that cannot provide ready access to 
    patient data.
D. Hospitality uses the adoption of 802.11 technology to attract more guests. A wireless network 
    attracts tradeshow exhibitors and conference coordinators, and it increases customer loyalty 
    for hospitality and hotel establishments.
E. Retail uses the adoption of 802.11 technology to attract more customers. Wireless networking 
    creates a competitive advantage over stores that cannot provide accuracy of inventory and 
    pricing.

Answer: A, D

Question 9.
Which method was devised to mitigate the 802.11 security issues and requires the next-generation Advanced Encryption Standard?

A. Temporal Key Integrity Protocol
B. Wired Equivalent Privacy
C. Extensible Authentication Protocol
D. Wi-Fi Protected Access 2

Answer: D

Question 10.
Which three facts can be used to correctly describe the proven customer track record of Cisco Systems? (Choose three.)

A. Cisco has more than 70,000 Cisco wireless LAN customers worldwide.
B. Cisco has deployed more than 2.1 million Cisco access points worldwide.
C. Cisco has deployed the second-largest wireless network, with 5,000 dual-band access points.
D. Cisco has been ranked as one of the top global providers of wireless LAN solutions by 
    InformationWeek 500.
E. Cisco has received two IEEE Corporate Innovation Recognition awards.
F. Cisco has developed products that are used by 95 percent of Fortune 500 companies.

Answer: A, B, F



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.