|
Question 1. Text Search Folder fields can be used to search for words or phrases in a document that are not stored in the database. To maximize performance when using Text Search Folder fields, the administrator should do which of the following? A. Disable the option to allow the end user to use a wild card in the Text Search Folder field. B. Set the Note Search option to Hit List. C. Check the Required option for another field in the Folder to reduce the number of documents being searched for the word or phrase. D. Make sure the sort number of the Text Search field is higher than any other sorted fields in the Folder. Answer: C Question 2. Which of the following options must be included when running an arsdoc query command? A. -G ... the name of the application group being queried B. -x ... the load id being queried C. -A ... the name of the application being queried D. -f ... the name of the folder being queried Answer: D Question 3. Use the following information to answer the question: Application Group and Application "Invoices" have been created. The OnDemand instance is "Archive". The data to be loaded reside in the following file: d:\ondemand\invoices_032880 The OnDemand library server is located on system OD1. The OnDemand object server is located on system OD2. The following command is run on OD2: arsload -g Invoices –nv -c d:\ondemand\tmp d:\ondemand\invoices_032880 Which of the following options best describes why this command will fail? A. arsload cannot be run from an OnDemand object server if the -n parameter is specified in order to retain input files after loading. B. The -j parmfile parameter is required if the -c parameter is included. C. arsload cannot be run from an OnDemand object server. D. The -h option was not included to specify the name of the library server. Answer: D Question 4. ITCertKeys.com is looking for broader integration for Web applications, business intelligence and relational databases. Which of the following is designed to solve the customer's requirement? A. IBM CommonStore for SAP B. IBM Content Manager for Lotus Domino C. IBM Information Integrator Content Edition D. IBM Content Manager OnDemand Answer: C Question 5. Where would a System Administrator look to verify that Login/Logout messages are being stored in the System Log? A. The Trace Parameters dialog box B. The Folder options tab C. The System Parameters dialog box D. The Application options tab Answer: C Question 6. Given the load id: 2575-25-0-13FAA-9577-9582, which of the following can be determined? A. The Application Group being loaded, which storage node is being loaded, and the earliest date of the data being loaded B. The expiration date of the data and the earliest date of the data being loaded C. The Application Group being loaded, which storage node is being loaded, and the Application used for indexing the data D. The storage set being loaded and the earliest date of the data being loaded Answer: A Question 7. To add a second optical library system to an existing OnDemand implementation and provide user access to data on both optical systems, an OnDemand administrator should add which of the following nodes? A. A primary storage node to an existing storage set B. A secondary storage node to an existing storage set C. A primary storage node to a new storage set D. A primary and secondary storage node to a new storage set Answer: A Question 8. To add more than one application to an application group, which of the following must be defined when creating an application group? A. A Segment date field B. An Application ID field C. Permission to update D. Permission to add Answer: B Question 9. ITCertKeys.com has a security requirement that users be logged off of the OnDemand system after 1 hour of inactivity. The 'Inactivity Time Out' value on the System Parameters dialog is set to 'Time Out In 60 Minutes' but not all users are being logged off after 60 minutes of inactivity has passed. What is preventing some users from being logged off as expected? A. The users not being logged out have System Administrator authority. B. The 'Inactivity Time Out' option for some users is not set to 'Use System Value'. C. The 'Inactivity Time Out' option for some users is set to 'Time Out in 30 Minutes'. D. The 'Logoff' option is not selected in the System Logging section of the System Parameters dialog. Answer: B Question 10. In order to create a default date-range search option for a report to specify the last six months, which of the following tasks would have to be completed? A. Change both the Folder and the Application default date-range intervals B. Change the Application - Load Information default date-range interval C. Change the Application Group default date-range interval D. Change the Folder - Field Information default date-range interval Answer: D
|
Question 1. What is fading? A. Another signal source is producing energy on the channel in which you are trying to operate. B. The desired signal reaches the receiving antenna via multiple paths, each of which has a different propagation delay and path loss. C. A time-varying change in the path loss of a link with the time variance governed by the movement of objects in the environment, including the transmitter and receiver themselves. D. A function of the frequency and should be provided in the cable specification by the vendor. E. The minimum signal level for the receiver to be able to acceptably decode the information. F. The time delay from the reception of the first instance of the signal until the last instance. Answer: C Explanation: Question 2. Which limitation applies to the use of the Cisco WLAN Solution Management over Wireless feature? A. Controllers must be managed using only secure protocols (that is, SSH and HTTPS), not no secure protocols (that is, HTTP and Telnet). B. Read-write access is not available; only read-only access is supported. C. Uploads and downloads from the controller are not allowed. D. Wireless clients can manage other controllers however not the same controller and AP to which the client is associated. Answer: C Explanation: Question 3. Up to how many Cisco WiSMs are supported in a single mobility group operating under v5.0 code? A. 5 B. 12 C. 16 D. 24 E. 150 F. 300 Answer: B Explanation: Question 4. The existing Cisco Unified Wireless Controller is running v5.0 code for both the controllers and the Cisco WCS. A controller has been configured with an appropriate rogue rule condition to report discovered APs to the Cisco WCS. What default alarm level is used to display all rogue APs in the Alarm Summary? A. Critical B. Flash C. Major D. Minor E. Urgent Answer: D Explanation: Question 5. Cisco Client Management Frame Protection is running on a mobility group with two controllers. Which two MFP requirements protect the network? (Choose two.) A. forces clients to authenticate, using a secure EAP method only B. implements the validation of wireless management frames C. requires CCXv5 D. requires the use of a nonbroadcast SSID E. requires CCXv4 Answer: B, C Explanation: Question 6. What is the result when client exclusion is enabled with a timeout value of zero? A. Clients are excluded indefinitely. B. Clients are never excluded. C. Client exclusion is disabled. D. Clients must be explicitly included by specifying the MAC address. E. Exclusion and inclusion is determined by access list. Answer: A Explanation: Question 7. The central office is currently using a combination of 4400 and 2100 series WLAN controllers running v4.2 and a variety of LWAPP-enabled access points servicing both 2.4 GHz and 5 GHz. The WLAN deployment has been extended to each remote office by implementing a 526 WLAN controller running v4.1 and several 521 access points. Wireless client deployment uses EAP-TLS authentication using a centralized RADIUS server plus 802.11n for performance. After the first remote office deployment, remote office users complain that they are not connecting via 802.11n. What is the most likely cause of this problem? A. The 526 WLAN controller does not support external authentication via RADIUS, prohibiting authentication. B. The 521 AP does not support 5 GHz, which prohibits 802.11n. C. The 521 AP and 526 WLAN controllers do not support AES, which prohibits 802.11n. D. The 526 WLAN controller does not support 802.11n with v4.1 and must be upgraded to v4.2. E. The 526 WLAN controller does not support 802.11n with either v4.1 or v4.2. Answer: E Explanation: Question 8. How do the features that are available on the Cisco WCS for Linux version differ from those of the Cisco WCS for Windows version? A. Assuming that there are no differences in hardware, a Cisco WCS for Linux can support up to 750 wireless LAN controllers. A Cisco WCS for Windows can support up to 250 wireless LAN controllers. B. Cisco WCS for Windows includes support for Cisco Spectrum Expert clients. Cisco WCS for Linux does not support Cisco Spectrum Expert clients. C. Cisco WCS for Linux is required for deployments. D. There are no differences in features between the Linux and Windows versions of Cisco WCS. Answer: D Explanation: Question 9. Which CLI command shows the controller configuration in a way that is similar to the way that it is displayed on Cisco IOS routers? A. show config B. show run config C. show run-config D. show running config E. show running-config Answer: E Explanation: Question 10. Which two attacks does Management Frame Protection help to mitigate? (Choose two.) A. Eavesdropping B. Denial of Service C. War Driving D. Man-in-the-Middle Answer: B, D Explanation:
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.