|
Question 1. Which two installation modes prompt the user for information during the install process? (Choose two.) A. GUI mode B. Silent mode C. Console mode D. Unattended mode E. Remote administration mode Answer: A, C Question 2. What are the three benefits of Business Works Process Engines using HTTP(S) for run-time initialization? (Choose three.) A. HTTP(S) does not use multicast for failover. B. The Process Engine advertises state over HTTP(S). C. HTTP(S) may be used in conjunction with firewall security. D. HTTP(S) allows direct, point-to-point access to the administration server. E. HTTP(S) does not span network segments automatically and is therefore more secure. F. HTTP(S) does not require additional network bridging software, making it simpler to set up. Answer: C, D, F Question 3. What, if any, are the restrictions of using the TIBCO Administrator GUI via a secondary server? A. There are no restrictions. B. The only restriction is that you cannot deploy applications from a secondary server. C. You cannot perform any monitoring or management functions using the GUI until the secondary server is changed to READ_WRITE. D. You cannot perform user management, deploy applications, or perform any other activity for which READ_WRITE access is required. Answer: D Question 4. What are four options for creating a TIBCO team building environment? (Choose four.) A. Perforce B. file sharing/locking C. Visual SourceSafe D. TIBCO XML Canon E. TIBCO SmartMapper F. TIBCO Adapter cross referencing Answer: A, B, C, D Question 5. A Business Works application you are developing uses JMS messaging where the messages only reside on the local campus. How should you implement conversation level security? A. You can define the connection used by the message producers and consumers to use SSL. You also need to provide the appropriate certificates. B. You can define the message producers and consumers to use PGM which encrypts all message content. You must also provide the appropriate certificates. C. You can define the connection used by the message producers and consumers to use a VPN. The network security administrator must configure this for you. D. You need to write a Java code activity to perform encryption (decryption) of the data before giving it to the message producer (or after getting from the message consumer). Answer: A Question 6. A new integration initiative in your department requires that both a test domain and a production domain be set up for your system integration staff. Due to heightened security, it is essential that all aspects of the environments be completely segregated. Which three actions must you take to achieve this? (Choose three.) A. install test and production TIBCO Administrator servers on machine A B. ensure that all Message Service Bus components are installed on a single network subnet C. ensure that each TIBCO Business Works component belongs to only one appropriate domain D. ensure the TIBCO Runtime Agent network traffic for each domain is limited to a single network subnet E. install a test TIBCO Administrator server on machine A and a production TIBCO Administrator server on machine B F. ensure that the Message Service Bus naming conventions and settings are separate for test and production domains Answer: C, E, F Question 7. You want to use a host system to run deployed Business Works process engines. Which two products must be installed on this host? (Choose two.) A. Sun Java JRE B. TIBCO Designer C. TIBCO Administrator D. TIBCO Runtime Agent E. TIBCO Business Works Answer: D, E Question 8. What is a restriction on the consumption of JMS queue messages? A. The JMS queue message consumers cannot use selectors. B. There can only be one active consuming client per JMS queue. C. A single JMS queue message can only be consumed by one client. D. The limit of how many clients can consume a single JMS queue message is determined by the prefect configuration. Answer: C Question 9. What is used to add a host machine to a TIBCO Administrative Domain? A. corporate LDAP B. TIBCO Domain Utility C. TIBCO Administrator GUI D. TIBCO Administrator Installer Answer: B Question 10. Which is a valid technique for preventing unauthorized users from triggering a process flow? A. lock down all process flows using transport specific security mechanisms B. lock down the Starter activity at the transport level via transport specific security C. supply a User ID and password when logging into a Business Works Process Engine D. prevent each Business Works process flow from unauthorized access by assigning a role to it Answer: B
|
Question 1. What are two indicators that a customer should consider the installation of a Wireless LAN Controller? (Choose two.) A. want to provide employee wireless access B. want to provide unsecured wireless access C. need between two and three access points D. need one access point E. need more than four access points F. want to provide guest wireless access Answer: E, F Question 2. What resource would you recommend to a new Cisco partner for a variety of tools? A. Channel Incentive program B. Unified Communications for SMB C. Partner Central D. Steps to Success E. Instructions: Number of answers: 1 Answer: C Question 3. Which statement best describes what Cisco Smart Care Service provides? A. bundled, unlimited support with the purchase of any Cisco product B. bundled technical support and maintenance for Cisco networks C. fee-based add-on support and tech-to-tech assistance for Cisco products D. technical support, maintenance, and monitoring to Cisco networks Answer: D Question 4. Which two functions does Cisco Configuration Assistant provide? (Choose two.) A. call forwarding B. command line configuration C. wireless connectivity D. device discovery E. call routing configuration Answer: D, E Question 5. Increased productivity, minimized legal risks, and improvements in "green" operation can be easily linked to Cisco solutions in which technology area? A. on the destination network, between the server and a router B. security C. voice D. routing and switching E. eCommerce F. web collaboration Answer: E Question 6. For which of the following campus LAN areas is the Cisco Catalyst Express 500 Series Switch most suitable? A. backbone area B. distribution area C. core area D. access area Answer: D Question 7. Which Cisco support service product targets customers with up to 48 users on a network where voice communication is mission-critical to business operation? A. SMARTnet Partner Service B. Cisco Smart Foundation Service C. Cisco Technical Assistance Center D. Cisco SMARTnet for SBCS E. Cisco Smart Care Service Answer: D Question 8. In which areas do SMBs tend to require better products than found in retail stores? A. voice, intranet, and security B. security, voice, and wide-area networking C. wireless, intranet, and wide-area networking D. wireless, security, and voice Answer: D Question 9. What are three of the attributes sought in a target customer for Cisco Smart Foundation services? (Choose three.) A. 50 or fewer network devices B. comprehensive network-wide support requirements C. fewer than 250 network users D. network is not mission-critical to business E. network is considered mission-critical F. skilled on-site customer IT staff Answer: A, C, D Question 10. Which three characteristics are true of the ProtectLink Gateway product? (Choose three.) A. provides encryption between a browser and a web server B. provides web server content filtering C. is bundled in the SPS platform D. provides content filtering for e-mail E. blocks 97% of SPAM F. protects from spyware and phishing attacks Answer: B, D, F
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.