|
Question 1. Which two installation modes prompt the user for information during the install process? (Choose two.) A. GUI mode B. Silent mode C. Console mode D. Unattended mode E. Remote administration mode Answer: A, C Question 2. What are the three benefits of Business Works Process Engines using HTTP(S) for run-time initialization? (Choose three.) A. HTTP(S) does not use multicast for failover. B. The Process Engine advertises state over HTTP(S). C. HTTP(S) may be used in conjunction with firewall security. D. HTTP(S) allows direct, point-to-point access to the administration server. E. HTTP(S) does not span network segments automatically and is therefore more secure. F. HTTP(S) does not require additional network bridging software, making it simpler to set up. Answer: C, D, F Question 3. What, if any, are the restrictions of using the TIBCO Administrator GUI via a secondary server? A. There are no restrictions. B. The only restriction is that you cannot deploy applications from a secondary server. C. You cannot perform any monitoring or management functions using the GUI until the secondary server is changed to READ_WRITE. D. You cannot perform user management, deploy applications, or perform any other activity for which READ_WRITE access is required. Answer: D Question 4. What are four options for creating a TIBCO team building environment? (Choose four.) A. Perforce B. file sharing/locking C. Visual SourceSafe D. TIBCO XML Canon E. TIBCO SmartMapper F. TIBCO Adapter cross referencing Answer: A, B, C, D Question 5. A Business Works application you are developing uses JMS messaging where the messages only reside on the local campus. How should you implement conversation level security? A. You can define the connection used by the message producers and consumers to use SSL. You also need to provide the appropriate certificates. B. You can define the message producers and consumers to use PGM which encrypts all message content. You must also provide the appropriate certificates. C. You can define the connection used by the message producers and consumers to use a VPN. The network security administrator must configure this for you. D. You need to write a Java code activity to perform encryption (decryption) of the data before giving it to the message producer (or after getting from the message consumer). Answer: A Question 6. A new integration initiative in your department requires that both a test domain and a production domain be set up for your system integration staff. Due to heightened security, it is essential that all aspects of the environments be completely segregated. Which three actions must you take to achieve this? (Choose three.) A. install test and production TIBCO Administrator servers on machine A B. ensure that all Message Service Bus components are installed on a single network subnet C. ensure that each TIBCO Business Works component belongs to only one appropriate domain D. ensure the TIBCO Runtime Agent network traffic for each domain is limited to a single network subnet E. install a test TIBCO Administrator server on machine A and a production TIBCO Administrator server on machine B F. ensure that the Message Service Bus naming conventions and settings are separate for test and production domains Answer: C, E, F Question 7. You want to use a host system to run deployed Business Works process engines. Which two products must be installed on this host? (Choose two.) A. Sun Java JRE B. TIBCO Designer C. TIBCO Administrator D. TIBCO Runtime Agent E. TIBCO Business Works Answer: D, E Question 8. What is a restriction on the consumption of JMS queue messages? A. The JMS queue message consumers cannot use selectors. B. There can only be one active consuming client per JMS queue. C. A single JMS queue message can only be consumed by one client. D. The limit of how many clients can consume a single JMS queue message is determined by the prefect configuration. Answer: C Question 9. What is used to add a host machine to a TIBCO Administrative Domain? A. corporate LDAP B. TIBCO Domain Utility C. TIBCO Administrator GUI D. TIBCO Administrator Installer Answer: B Question 10. Which is a valid technique for preventing unauthorized users from triggering a process flow? A. lock down all process flows using transport specific security mechanisms B. lock down the Starter activity at the transport level via transport specific security C. supply a User ID and password when logging into a Business Works Process Engine D. prevent each Business Works process flow from unauthorized access by assigning a role to it Answer: B Question 11. Your organization has created a standard for organizing TIBCO Business Works projects. Which is most suited to this task? A. TIBCO Adapters B. TIBCO PortalBuilder C. TIBCO Domain Utility D. TIBCO Designer templates Answer: D Question 12. Which two messaging protocols can be used to communicate between a Business Works process and a TIBCO Adapter? (Choose two.) A. SOAP B. RosettaNet C. Rendezvous D. Message Queues E. Java Message Service Answer: C, E Question 13. Which statement is true about JRE requirements for installing TIBCO Business Works components? A. A JRE must be installed prior to installing TIBCO Business Works components. B. No JRE is needed or used during the installation of TIBCO Business Works components. C. All installed JREs must be uninstalled prior to installing TIBCO Business Works components. D. All TIBCO Business Works component installers can use a preinstalled JRE or its own embedded JVM. Answer: D Question 14. You need to perform data conversion on a sequence of elements in a business event schema, but it is not part of the TIBCO XPATH implementation. How do you solve this problem in the most efficient manner? A. TIBCO Business Works does not support the feature. B. You implement an adapter to expand the function set. C. You write a Java Custom activity to handle the business event data. D. You create a Java Custom function to handle the business event data. Answer: D Question 15. How does Business Works support the External Transformation Model? A. Business Works requires users to create their own XSD transformation engine. B. Business Works allows XML transformation to take place as part of every activity. C. Business Works allows users to visually express multi-pass document transformations as transitions. D. Business Works allows XSLT templates to be imported and executed as part of a process flow's definition. Answer: D
|
Question 1. A small business currently has a server room with a large cooling system that is appropriate for its size. The location of the server room is the top level of a building. The server room is filled with incandescent lighting that needs to continuously stay on for security purposes. Which of the following would be the MOST cost-effective way for the company to reduce the server rooms energy footprint? A. Replace all incandescent lighting with energy saving neon lighting. B. Set an auto-shutoff policy for all the lights in the room to reduce energy consumption after hours. C. Replace all incandescent lighting with energy saving fluorescent lighting. D. Consolidate server systems into a lower number of racks, centralizing airflow and cooling in the room. Answer: C Question 2. Which of the following methods effectively removes data from a hard drive prior to disposal? (Select TWO). A. Use the remove hardware OS feature B. Formatting the hard drive C. Physical destruction D. Degauss the drive E. Overwriting data with 1s and 0s by utilizing software Answer: C, E Question 3. Which of the following terms is used when printing data on both the front and the back of paper? A. Scaling B. Copying C. Duplex D. Simplex Answer: C Question 4. Which of the following can conserve energy in a server room? A. Sealing all potential cold air leaks B. Installing additional cooling fans C. Setting the temperature lower D. Replacing the UPS with a generator Answer: A Question 5. A user reports that their cell phone battery is dead and cannot hold a charge. Which of the following should be done when disposing of the old battery? A. Recycle the battery. B. Store the battery. C. Place battery in a sealed plastic bag. D. Disassemble the battery. Answer: A Question 6. Which of the following needs to be recycled due to dangerous amounts of gas contained inside its housing? A. CRT B. Toner C. Surge suppressor D. LCD Answer: A Question 7. Which of the following technologies allows a single piece of hardware to host multiple operating systems simultaneously? A. Virtualization B. SMTP servers C. ThinNet clients D. Terminal servers Answer: A Question 8. A company would like to dispose of old toner units. Which of the following would be the MOST appropriate course of action to take? A. Use an approved recycling program either through a vendor or local government agency. B. Old toner disposal is the responsibility of the manufacturer. Call the appropriate number at the respective company. C. Toss the units into the trash. Toner cartridges are biodegradable. D. Clean out the toner cartridges with warm water and place the clean units into the recycling collection. Answer: A Question 9. A large company has over 500 computers that currently stay powered on indefinitely. None of the systems are used after the company closes at 5 p.m. Which of the following would be the MOST effective way for the company to save on electricity usage? A. Set the computers for automatic log-off after one hour of inactivity. B. Institute a policy of either shutdown or sleep mode an hour after close. C. Turn on the Wake on LAN functionality for all computers. D. Schedule all patching to be done during work hours. Answer: B Question 10. A small business currently has four separate servers, three of which perform low-overhead tasks with small memory footprints. How could the company BEST reduce power consumption among these four servers, while not sacrificing functionality? A. Enable each server's Cool 'n' Quiet and/orSpeedStep functionality so that processing power is conserved. B. Enforce auto-shutdown routines on all four servers for after-hours power saving while the office is closed. C. Consolidate the four servers onto the best two, combining them logically by tasks and memory consumption. D. Consolidate the four servers onto the most powerful machine using virtualization. Answer: D
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.