Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "000-294" Exam

IBM Web Sphere MQ V5.3 System Administration

 Question 1.
When is it NOT necessary to use the REFRESH SECURITY command in Web Sphere MQ for z/OS?

A. When RACF SETROPTS RACLIST(class name) REFRESH has been issued
B. When RACF auditing for the class you are refreshing is turned off
C. When RACF auditing for the class you are refreshing is turned on
D. When there are RACF generic profiles in the Web Sphere MQ classes

Answer: C

Question 2.
In Web Sphere MQ for z/OS, which classes are NOT affected by the REFRESH SECURITY command?

A. MQPROC
B. MQNLIST
C. MQCONN
D. MQQUEUE
E. MQCMDS

Answer: C, E

Question 3.
An IMS application receives request messages from a number of Java clients. A decision is made to introduce message privacy because the network is not trusted. 

Which of the following facilities can be used to achieve this?

A. Channel security exit
B. Channel compression exit
C. Channel send exit
D. Channel receive exit
E. Secure Sockets Layer

Answer: C, E

Question 4.
Which version of SSL is supported by Web Sphere MQ version 5.3?

A. Version 2.0
B. Version 2.5
C. Version 3.0
D. Version 4.0

Answer: C

Question 5.
Web Sphere MQ can access SSL Certificate Revocation Lists stored in:

A. LDAP servers
B. DCE
C. the Windows registry
D. the OAM

Answer: A

Question 6.
Which SSL functions are NOT supported by Web Sphere MQ version 5.3?

A. Certificate Revocation Lists
B. Cipher Spec negotiation
C. Client Certificate Authentication
D. Cipher Suites
E. SSL session re-use

Answer: B, E

Question 7.
In Web Sphere MQ for UNIX, how is the location of the SSL key repository specified?

A. In the SSL Security stanza of qm.ini
B. In the SSL Security stanza of mqs.ini
C. In /etc/ikeyman.cnf
D. Use the MQSC command ALTER QMGR

Answer: D

Question 8.
In a Web Sphere for Sun Solaris client, where is the location of the SSL key repository stored?

A. In the client channel definition file
B. In /etc/ikeyman.cnf
C. In the SVRCONN channel definition
D. In the MQSSLKEYR environment variable

Answer: D

Question 9.
To enable SSL encryption on a server to server channel, which channel parameter(s) is/are mandatory?

A. SSLCIPH
B. SSLPEER
C. SSLCAUTH
D. SSLCIPH and SSLCAUTH

Answer: A

Question 10.
A sender channel from a queue manager on HP-UX to a receiver channel on AIX is to be modified to make use of SSL encryption. 

Both channel partners must supply a certificate for authentication when:

A. The sender channel definition includes SSLCAUTH(REQUIRED)
B. The receiver channel definition includes SSLCAUTH(REQUIRED)
C. The sender and receiver channel definitions both include SSLCAUTH(REQUIRED)
D. Advanced crypto hardware is not installed

Answer: B

Question 11.
What Web Sphere MQ mechanism can be used to send a large amount of data without placing the data on a queue?

A. Reference messages
B. Message segmentation
C. Non-persistent messages
D. Partial Put/Get

Answer: A

Question 12.
Which of the following functions are supported on a z/OS system that only has the Web Sphere
MQ base product installed?

A. z/OS client connections
B. IMS Bridge
C. Java Message Service
D. DOS, AIX and Windows client connections
E. Batch Trigger Monitor

Answer: B, C

Question 13.
Which of the following is the MOST appropriate environment for the use of Java in Web Sphere MQ?"

A. A small business that wants to send transactions between two legacy applications
B. A medium or large enterprise that is introducing intranet-based client/server solutions
C. A large enterprise whose legacy applications are written in a procedural programming 
    language
D. When API exit is used

Answer: B

Question 14.
Which of the following platforms uses an operating system feature known as journaling to store persistent messages?

A. Compaq NSK
B. z/OS
C. iSeries
D. Sun Solaris

Answer: C

Question 15.
On which of the following platforms is the Web Sphere MQ Extended Transactional Client available?

A. Linux for Intel®
B. iSeries
C. Windows XP
D. Sun Solaris
E. z/OS
F. VM/ESA

Answer: A, C, D

Question 16.
Web Sphere MQ will be used to connect a Sun Solaris system to AIX. 

Which of the following Manuals provides a worksheet for creating this configuration?

A. Application Programming Guide
B. Script (MQSC) Command Reference
C. System Administration Guide
D. Intercommunications

Answer: D

Question 17.
Corrective action must be taken when the threshold limit for the number of messages on a specific queue is reached. 

Which of the following manuals explains how to know when this has happened?

A. System Administration Guide
B. Application Programming Guide
C. Event Monitoring
D. Script (MQSC) Command Reference

Answer: C

Question 18.
In which of the following manuals will the initial values and language declarations for the message descriptor be found?

A. Application Programming Reference
B. Application Programming Guide
C. Script (MQSC) Command Reference
D. Intercommunications

Answer: A

Question 19.
Which of the following manuals contains a discussion about digital signatures?

A. Web Sphere MQ System Administration
B. Web Sphere MQ Security
C. Web Sphere MQ Secure Sockets Layer (SSL) Implementation
D. Web Sphere MQ Intercommunications

Answer: B

Question 20.
Which of the following protocols is NOT directly supported by Web Sphere MQ?

A. Decent
B. LU 2.0
C. TCP/IP
D. NetBIOS

Answer: B



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for PW0-070 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "PW0-070" Exam

Certified Wireless Technology Specialist

 Question 1.
Which of the following security policies will you implement to keep safe your data when you connect your Laptop to the office network over IEEE 802.11 WLANs? Each correct answer represents a complete solution. Choose two.

A. Usingportscanner like nmap in your network.
B. Using personal firewall software on your Laptop.
C. Using an IPSec enabled VPN for remote connectivity.
D. Using a protocol analyzer on your Laptop to monitor for risks.

Answer: B, C

Question 2.
You work as a Network Administrator for ABC LTD. The company has an 802.11b wireless network. You have configured an internal antenna with the wireless access point (WAP). You want to increase the range of the WAP. 

Which of the following steps will you take to accomplish the task?

A. Install a wireless bridge on the network.
B. Install an external antenna.
C. Install a router on the network.
D. Install one more internal antenna.

Answer: B

Question 3.
You work as a Network Administrator for McRoberts Inc. You are configuring a wireless network for the company. You decide to use 802.11b wireless access points (WAPs) for the network.

Which of the following could affect the range of the network? Each correct answer represents a complete solution. Choose all that apply.

A. The 5-500GHz interference
B. The 2.4GHz interference
C. A long length of antenna extension cable
D. A very high number of wireless users

Answer: B, C

Question 4.
Which of the following is an advantage of using wireless IEEE 802.11g over IEEE 802.11b?

A. Wireless standard 802.11g has a greater range of distance than 802.11b
B. Wireless standard 802.11g is easier to implement than 802.11b
C. Wireless standard 802.11g is faster than 802.11b.
D. Wireless standard 802.11g supports Windows XP and 802.11b does not.

Answer: C

Question 5.
You work as a Network Administrator for ABC LTD. The company has a Windows-based network. You have to configure a wireless LAN on your network. Two separate buildings in front of each other are to be connected wirelessly. 

Which of the following steps will you choose to accomplish the task?

A. Lay underground fiber optic cable backbone between the two buildings.
    Configure Ethernet network including network of both building.
B. Configure one Wireless Access Point (WAP) in each building.
    Place one outdoor Yagi-Uda antenna in each building facing towards each other.
C. Configure one WAP in each building.
    Place one outdoor Omni antenna in each building.
D. Configure one WAP in each building.
    Place one outdoor Yagi-Uda antenna in one building.
    Place one outdoor Omni antenna in the other building.

Answer: B

Question 6.
You work as a Network Administrator for WebTech Inc. The company has a TCP/IP-based wireless network. The company's management tells you to implement multiple-input multipleoutput (MIMO) transmission technology for wireless communication. 

Which of the following standards supports MIMO technology?

A. 802.11a
B. 802.11b
C. 802.11n
D. 802.11

Answer: C

Question 7.
Which of the following organizations provides a seal of approval to interoperable devices?

A. IEEE
B. FCC
C. ETSI
D. Wi-FiAlliance

Answer: D

Question 8. CORRECT TEXT
Fill in the blank with the correct value.
The 802.11g wireless standard applies to wireless LANs and provides transmission speeds of up to _Mbps.

Answer: 54

Question 9.
Which of the following units measure relative RF power?
Each correct answer represents a complete solution. Choose all that apply.

A. Decibel Relative to aMilliwatt (dBm) .
B. Decibel (dB)
C. Milliwatt (mW)
D. Decibel isotropic (dBi)
E. Decibel dipole (dBd)
F. Watt (W)

Answer: B, D, E

Question 10. DRAG DROP
Place the characteristics under their corresponding types of antenna used in Wireless LAN (WLAN)?
 

Answer:
 

Explanation:
 



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.