Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "EX0-100" Exam

Good dump from ITCertkeys

 Question 1.
Which ITIL process has responsibility in preventing unauthorized access to data?

A. Availability Management
B. IT Service Continuity Management
C. Release Management
D. Security Management

Answer: D

Question 2.
Where are agreements regarding Security Management recorded?

A. in a Configuration Management Database (CMDB)
B. in a Service Level Agreement (SLA)
C. in a Definitive Software Library (DSL)
D. in a Capacity Plan

Answer: B

Question 3.
Which ITIL process handles the implementation of the policy for access management and access to information systems?

A. Availability Management
B. Incident Management
C. Release Management
D. Security Management

Answer: D

Question 4.
Which ITIL process ensures that the information that has been made available satisfies the specified information security requirements?

A. Availability Management
B. IT Service Continuity Management
C. Security Management
D. Service Level Management

Answer: C

Question 5.
Which of the following describes the basic concept of Integrity in the Security Management process?

A. the capacity to verify the correctness of the data
B. the correctness of the data
C. protection of the data against unauthorized access and use
D. access to the data at any moment

Answer: B

Question 6.
Security Management includes a number of sub-processes.

Which activity of Security Management leads to a security sub-clause in the Service Level Agreement (SLA)?

A. Implement
B. Maintenance
C. Plan
D. Control

Answer: C

Question 7.
The Deming quality circle is a model for control based on quality.

Which step in this model must be taken first?

A. adjustment
B. measurement
C. planning
D. implementation

Answer: C

Question 8.
A process is a logically coherent series of activities for a pre-defined goal.

What is the process owner responsible for?

A. setting up the process
B. implementing the process
C. describing the process
D. the result of the process

Answer: D

Question 9.
What is the difference between a process and a project?

A. A process is continuous and has no end date, whereas a project has a finite lifespan.
B. A project is continuous and has no end date, whereas a process has a finite lifespan.
C. A process stops when the objective has been achieved, whereas a project does not stop when 
    the objective is met.
D. In a project the focus is not on the result, whereas with a process the result is important.

Answer: A

Question 10.
What is the basis of the ITIL approach to Service Management?

A. departments
B. IT resources
C. officials
D. interrelated activities

Answer: D

Question 11.
Which of the following is a benefit of using ITIL?

A. that the users can influence the IT organization providing the IT services
B. that the quality and the costs of the IT services can be controlled more efficiently
C. that the organization around the IT services can be set up faster
D. that it is finally possible to charge for IT services

Answer: B

Question 12.
Which activity takes place immediately after recording and registering an incident?

A. analysis and diagnosis
B. classification
C. matching
D. solving and restoring

Answer: B

Question 13.
In an organization, the purchasing department has relocated internally - not just the people, but also their IT resources. A Service Desk employee has been commissioned to relocate this department's workstations.

In which ITIL process is this employee now playing a role?

A. Change Management
B. Incident Management
C. Problem Management
D. Configuration Management

Answer: A

Question 14.
Information is regularly exchanged between Problem Management and Change Management.

What information is this?

A. Known Errors from Problem Management, on the basis of which Change Management can 
     generate Requests for Change (RFCs)
B. RFCs resulting from Known Errors
C. RFCs from the users that Problem Management passes on to Change Management
D. RFCs from the Service Desk that Problem Management passes on to Change Management

Answer: B

Question 15.
In IT Service Continuity Management various precautionary measures are taken, for example using an emergency power provision.

Which of the following ITIL processes could also initiate this kind of measure?

A. Availability Management
B. Capacity management
C. Change Management
D. Incident Management

Answer: A


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 000-864 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "000-864" Exam

Sys i IT Simplification: Intg. BladeCntr+System x Tech V5R4

 Question 1.
A System i customer has an iSCSI attached BladeCenter with 14 blades. The BladeCenter has Ethernet switches installed in Bay 1 and Bay 3. They would like to use a second initiator port on one of their blades. 

What parts are needed?

A. 1 Ethernet switch in Bay 2
B. 1 Ethernet switch in Bay 4
C. 1 Ethernet switch in Bay 2 and a second initiator HBA on the blade
D. 1 Ethernet switch in Bay 4 and a second initiator HBA on the blade

Answer: B

Question 2.
When adding an IXS/IXA to a System i, what changes need to be considered for the i5/OS memory pools?

A. The *MACHINE pool must use expert cache.
B. The *MACHINE pool will need more memory.
C. A private pool for the virtual LAN should be established.
D. A shared pool for the Integration for Windows Server Licensed Program Product (LPP) is 
    required.

Answer: B

Question 3.
A customer has a System i5 520 1/2-way with five 70 GB RAID protected disk drives that are at 50% capacity. The current i5/OS applications are very I/O intensive. A performance-critical SQL server application that requires 100 GB of storage is going to be installed on a uni-processor integrated server. 

Which of the following solutions meets the performance requirement of the SQL application?

A. Add 2 GB of System i memory.
B. Activate an on-demand processor.
C. Add three drives to the current RAID set.
D. Create a new user ASP to contain the application storage spaces.

Answer: C

Question 4.
If six blade servers are installed in a BladeCenter, which I/O BAY supports the second port of the initiator iSCSI HBAs of all installed blade servers?

A. Bay 1
B. Bay 2
C. Bay 3
D. Bay 4

Answer: D

Question 5.
A customer has an i825, running V5R3, with an x360 IXA attached server. They are upgrading to an i520 and migrating their IXA to iSCSI. 

In addition to purchasing new System i hardware, which of the following steps are required to deliver a working solution?

A. Replace IXA in the x360 with iSCSI initiator HB

A. Migrate i825 onto i520 at V5R3M5. Follow iSCSI install read me first to complete the iSCSI 
    configuration and installation.
B. Replace x360 with x3850. Add iSCSI initiator HBA to x3850. Migrate i825 onto i520 at 
    V5R3M5. Follow iSCSI install read me first to complete the iSCSI configuration and installation.
C. Upgrade the i5/OS on i825 to V5R4. Replace IXA in the x360 with iSCSI initiator HB

A. Migrate i825 onto i520. Follow iSCSI install read me first to complete the iSCSI configuration 
    and installation.
D. Upgrade the i5/OS on i825 to V5R4. Replace x360 with x3850. Add iSCSI initiator HBA to 
    x3850. Migrate i825 onto i520. Follow iSCSI install read me first to complete the Iscsi 
    configuration and installation.

Answer: D

Question 6.
A customer that wants to install multiple iSCSI servers needs to ensure which of the following software products are required to be installed on their System i?

A. 5722-TC1 *BASE TCP/IP Connectivity Utilities 5722-WSV iSeries Integration for Windows
    Server 5722-DG1 IBM HTTP Server for i5/OS
B. 5722-TC1 *BASE TCP/IP Connectivity Utilities 5722-DR1 IBM Director 5.10 5722-DG1 IBM
    HTTP Server for i5/OS
C. 5722-TC1 *BASE TCP/IP Connectivity Utilities 5722-DR1 IBM Director 5.10 5722-WSV iSeries
    Integration for Windows Server
D. 5722-TC1 *BASE TCP/IP Connectivity Utilities 5722-SS1 option 12: Host Servers 5722-DG1
    IBM HTTP Server for i5/OS

Answer: B

Question 7.
A customer with a System i model 520 with two 5095 expansion units wants to add two IXA attached integrated servers. 

What HSL configuration is recommended?

A. Add a separate loop for the IXAs.
B. Alternate the towers and the IXAs, one by one, in the loop.
C. Place the IXAs in the center of the loop, leaving the towers adjacent to the 520 unit.
D. Place the towers in the center of the loop, leaving the IXAs adjacent to the 520 unit.

Answer: C

Question 8.
A customer has two System x servers attached via iSCSI to a System i5 520. The application to be run on each server requires two initiator HBAs. 

What is the minimum number of target HBAs required?

A. 1
B. 2
C. 3
D. 4

Answer: B

Question 9.
A customer has a System i 520, seven standalone IBM x336 servers, and three standalone Dell PowerEdge servers. All of the Windows applications running on these servers have very low I/O. They would like to integrate all the Intel servers to the 520 with one target iSCSI HBA, while reusing existing hardware. 

How many of these servers can be integrated?

A. Seven IBM servers
B. Seven IBM servers and one Dell server
C. Seven IBM servers and one Dell server using iSCSI software initiator
D. Seven IBM servers and three Dell servers using iSCSI software initiator

Answer: A

Question 10.
A customer with a System i model 550 wants to implement 14 integrated servers on a BladeCenter. Two of the blade servers will be running SQL server, drive large amounts of I/O, and require dedicated target HBAs for their data drives. The other blade servers run typical workloads without excessive I/O, but the customer does not know the amount of disk I/O that their servers currently drive. 

What is the recommended minimum number of HBAs needed?

A. Two target HBAs, plus one for redundancy
B. Five target HBAs, plus one for redundancy
C. Seven target HBAs, plus one for redundancy
D. Eight target HBAs, plus one for redundancy

Answer: C


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.