pass ibm c2150-537 exam ·  · 2015-08-20pass ibm c2150-537 exam number : c2150-537 passing score...

33
Pass IBM C2150-537 Exam Number : C2150-537 Passing Score : 800 Time Limit : 120 min File Version : 47.5 http://www.gratisexam.com/ Exam Code: C2150-537 Exam Name: IBM Tivoli Directory Server V6.3 Implementation

Upload: truongquynh

Post on 11-May-2018

218 views

Category:

Documents


2 download

TRANSCRIPT

Pass IBM C2150-537 Exam

Number: C2150-537Passing Score: 800Time Limit: 120 minFile Version: 47.5

http://www.gratisexam.com/

Exam Code: C2150-537

Exam Name: IBM Tivoli Directory Server V6.3 Implementation

Exactquestions

QUESTION 1The customer wants to deploy IBM Tivoli Directory Server V6.3 (ITDS) in a Solaris environment. On which twoSolaris platforms can ITDS be deployed? (Choose two.)

A. PowerPCB. Solaris 32-bitC. SUNW, Ultra-1D. Solaris SPARC 64-bitE. Solaris Global Zone on Solaris 10

Correct Answer: DESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 2The customer must deploy a component of IBM Tivoli Directory Server V6.3 (ITDS) 32-bit on AIX.Which component can be deployed in this manner?

A. ITDS ClientB. ITDS ServerC. ITDS Proxy ServerD. ITDS Web Administration Tool

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 3The customer has a requirement to secure LDAP communications. Which statement is true for serverauthentication?

A. LDAP client must have a public key and associated client certificate in the client's key database file.B. LDAP server must have a public key and associated client certificate in the client's key database file.C. LDAP client must have a private key and associated server certificate in the client's key database file.D. LDAP server must have a private key and associated server certificate in the server's key database file.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 4Given the security requirements for securing passwords in an IBM Tivoli Directory Server V6.3 environment,which three encryption algorithms are available? (Choose three.)

A. desB. md7C. aes512D. aes256E. ssha384F. ssha512

Correct Answer: DEFSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 5In the IBM Tivoli Directory Server V6.3 (ITDS) requirements document for a customer project there is arequirement for a proxy server for distributed data. What planning for the proxy server is necessary?

http://www.gratisexam.com/

A. to act as a front-end server to distribute requests to multiple ITDS serversB. to act as a back-end server to distribute requests to multiple ITDS serversC. to set up logical connections between ITDS and Active Directory for distributed dataD. to set up logical connections between ITDS and SunOne Directory for distributed data

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 6The customer has a requirement to send updates through a proxy server. What authority should be planned?

A. Anonymous UserB. System AdministratorC. Local Administration Group MemberD. Global Administration Group Member

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 7Which two attribute types are available on an objectclass definition? (Choose two.)

A. nominalB. requiredC. optionalD. unrestrictedE. generalized date syntax

Correct Answer: BCSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 8Which file format is used to load customer data?

A. DSMLfilesfrom a Web Application ServerB. MS Word document of department entriesC. an XML extract from a department spreadsheetD. LDIFfilesextract from a Human Resources system

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 9Which versions of IBM Tivoli Directory Server (ITDS) can be directly migrated to ITDS V6.3?

A. only ITDS V6.2B. all ITDS V6.x versionsC. all previous ITDS versionsD. all ITDS V5.x and V6.x versions

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 10The customer would like an automated backup of their entire directory server instance configuration, schemaand data with minimal downtime. Which IBM Tivoli Directory Server (ITDS) backup methodology would beappropriate?

A. perform the db2 backup utlityB. perform the idsdb2ldif utilityC. configure online backup using the idsxcfg utlityD. schedule online backup using the ITDS Web Administration Tool

Correct Answer: D

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 11The customer must replicate LDAP data. What is a valid replication topology for an IBM Tivoli Directory ServerV6.3 environment?

A. replication of subtrees of the Directory Information Tree to specific serversB. replication of cn=localhost of the Directory Information Tree to specific serversC. replication of cn=changelog of the Directory Information Tree to specific serversD. replication of cn=configuration of the Directory Information Tree to specific servers

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 12What is the method for installing IBM Tivoli Directory Server V6.3 on a UNIX system without a graphical userinterface?

A. run a Java programB. use InstallShield MultiPlatformC. use utilities provided by the operating systemD. extract install files using unzip/untar commands

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 13Which operating system requires tuning kernel parameters to configure IBM Tivoli Directory Server V6.3?

A. Solaris 10B. IBM AIX V5.3C. IBM AIX V6.1D. Windows Server 2003

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 14What type of information does this file contain: ldapdb.properties?

A. unsupported IBM DB2 installations available on the systemB. all supported IBM DB2 installations available on the systemC. a single supported IBM DB2 installation available on the systemD. the database location for the IBM Tivoli Directory Server instance

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 15What are two methods used to uninstall IBM Tivoli Directory Server V6.3 (ITDS) packages? (Choose two.)

A. use InstallShield GUIB. mark ITDS folders as deletedC. use operating system utilitiesD. removesITDS and related foldersE. use ITDS provided utilities to unconfigure software

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 16Which IBM Tivoli Directory Server V6.3 (ITDS) command adds ITDS instance users?

A. mkuserB. useraddC. idsldapaddD. idsadduser

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 17What is the first step when creating an IBM Tivoli Directory Server (ITDS) instance?

A. create an ITDS databaseB. create an IBM DB2 instanceC. create an ITDS instance ownerD. create an ITDS administrator group

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 18Which section of IBM Tivoli Directory Server instance information enforces minimum required ulimits on UNIXoperating systems?

A. cn=schemaB. cn=localhostC. cn=ibmpoliciesD. cn=configuration

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 19What search can be used to validate the number of allowable connections to an IBM Tivoli Directory Server?

A. cn=monitorB. cn=workersC. cn=openfilesD. cn=connections

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 20Which IBM Tivoli Directory Server V6.3 (ITDS) key stash file is used for encrypting passwords in theibmslapd.conf file?

A. idsslapddir.ksfB. idsldapkey.ksfC. idsslapdcfg.ksfD. ibmslapdcfg.ksf

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 21Which two parameters are needed in order to cryptographically synchronize a new IBM Tivoli Directory Server(ITDS) instance with an existing ITDS instance? (Choose two.)

A. encryption salt

B. encryption seedC. encryption syncD. encryption cryptoE. encryption pass phrase

Correct Answer: ABSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 22What is the default instance Admin Server Secure Port for the first instance?

A. 389B. 636C. 3539D. 12101

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 23Which tool can be used to create an IBM DB2 database for use with an IBM Tivoli Directory Server (ITDS)instance?

A. ITDS Control CenterB. ITDS Instance Creation ToolC. ITDS Web Administration ToolD. ITDS Instance Configuration Tool

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 24What does the IBM Tivoli Directory Server V6.3 (ITDS) idsicrt command do?

A. creates an instance userB. creates an IBM DB2 instanceC. creates an IBM DB2 databaseD. creates an instance administrator

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 25Which IBM Tivoli Directory Server (ITDS) utility configures a database for online backups?

A. idsicrtB. idscfgdbC. idsadcfgD. idsdbback

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 26When can table space extension size be specified and used?

A. only for SMS file table spaceB. only for DMS file table spaceC. only for SMS raw table spaceD. only for DMS raw table space

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 27What is the output of the command idscfgdb -I <InstanceName> -c -n?

A. It configures an IBM Tivoli Directory Server database for online backup.B. It changes the character set for the IBM Tivoli Directory Server database.C. It changes the existing code page of the IBM Tivoli Directory Server database to local.D. It removes the online backup configuration setup of the IBM Tivoli Directory Server database.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 28Which tool configures the Changelog database with an IBM Tivoli Directory Server (ITDS) instance?

A. ITDS Control CenterB. ITDS Instance Creation ToolC. ITDS Web Administration ToolD. ITDS Instance Configuration Tool

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 29Where is the IBM Tivoli Directory Server (ITDS) Changelog database created?

A. ITDS instance locationB. ITDS database locationC. ITDS instance user homeD. Changelog database owner home

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 30How are suffixes deleted if LDAP data is already loaded in the configured IBM Tivoli Directory Server suffix?

A. Use the idsucfgsuf command with -r option.B. Use the idsucfgsuf command with -d option.C. Use idsucfgsuf to unconfigure suffix and then delete complete Directory Information Tree from RDBM back-

end.D. Delete complete Directory Information Tree from the RDBM back-end and then use idsucfgsuf to

unconfigure suffix.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 31Which tool configures IBM Tivoli Directory Server (ITDS) instance suffix?

A. idsldapaddB. idsldapexopC. ITDS Control CenterD. ITDS Instance Configuration Tool

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 32

Which IBM Tivoli Directory Server (ITDS) tool splits an LDIF file into separate LDIF files that can be loaded ontoindividual directory servers while configuring the proxy server?

A. ITDS Control CenterB. ITDS Web Administration ToolC. ITDS Instance Administration ToolD. ITDS Distributed Directory Setup Tool

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 33What does the Health Check Feature identify in IBM Tivoli Directory Server (ITDS) proxy?

A. It determines the state of the ITDS proxy server.B. It determines the state of the ITDS proxy server database.C. It determines the state of the ITDS proxy server backend(s).D. It determines whether ITDS proxy can process pass through authentication requests.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:

QUESTION 34Which servers can be placed in one server group in a distributed directory environment?

A. Backend server with the same backend server role.B. Backend server with the same backend server type.C. Backend server with the same split of the directory database.D. Backend server with the same partition of the directory database.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 35How does IBM Tivoli Directory Server proxy locate and distribute data based on default settings?

A. based on hash on DNB. based on hash on RDNC. based on hash on unique attributeD. based on hash on the ibm-entryuuid attribute

Correct Answer: BSection: (none)

Explanation

Explanation/Reference:Explanation:

QUESTION 36Which tool configures an IBM Tivoli Directory Server (ITDS) proxy server?

A. ITDS Control CenterB. ITDS Instance Creation ToolC. ITDS Web Administration ToolD. ITDS Instance Administration Tool

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 37Which value cannot be retrieved from the IBM Tivoli Directory Server instance after it has been created andconfigured?

A. encryption keyB. encryption saltC. encryption seedD. encryption seed-salt

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 38What is an example of when it is recommended to have cryptographically synchronized instances?

A. When SSL is configured.B. When referrals are configured.C. When replication is configured with a two-way encryption scheme.D. When replication is configured with a one-way encryption scheme.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 39Which IBM Tivoli Directory Server log file contains errors about replication conflicts?

A. audit.log

B. ibmslapd.logC. idschange.logD. lostandfound.log

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 40Which two statements are true about the format of the GLPRPL022W error string based on the standard formatfor error messages? (Choose two.)

A. This message is a warning.B. This message is printed by the referral process.C. This message is printed by the replication process.D. This message is printed by the gateway component.E. This message indicates the data is resynchronized in the directory.

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 41Which statement is true about replication administrator and directory data administrator roles?

A. They have equivalent rights.B. They have nothing in common.C. The administrator rights of directory data administrator are a subset of the replication administrator.D. The administrator rights of directory data administrator are a superset of the replication administrator.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 42Which subtree must be configured for replication if an IBM Tivoli Directory Server administrator wants schemachanges to be replicated?

A. cn=schemaB. cn=localhostC. cn=replicationD. cn=ibmpolicies

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 43A customer is configuring replication between a supplier and a consumer in the IBM Tivoli Directory ServerWeb Administration Tool and it fails.Which two logs will help resolve this error? (Choose two.)

A. audit.log from the supplierB. ibmrepl.log from the supplierC. ibmslapd.log from the supplierD. ibmslapd.log from the targeted consumerE. lostandfound.log from the targeted consumer

Correct Answer: CDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 44Which command stops a remote instance of an IBM Tivoli Directory Server?

A. killB. db2stopC. idsslapdD. idsdirctl

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 45There is a small amount of data changes to make to multiple servers in a replication topology, including customschemas. Which command accomplishes this with the least impact to running systems?

A. idsldif2dbB. idsbulkloadC. idsldapexopD. idsldapmodify

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 46A customer is preparing to bulkload a large LDIF file to a server. The size of the LDIF file is 500 MB. Whatshould the minimum amount of disk space available be in the ldapimport (-L parameter) directory?

A. 250 MBB. 500 MBC. 1 GBD. 1.5 GB

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 47An IBM Tivoli Directory Server (ITDS) administrator has been tasked with configuring an ITDS V6.3 server forSSL communications. The following tasks have been performed: A CMS key database has been created. Apersonal certificate has been created and stored in the CMS key database. The certificate has been extractedand distributed to the client application. The server configuration has been updated with the required SSLparameters via an idsldapmodify command. What must happen next in order for this configuration to takeeffect?

A. The ibmdiradm process must be restarted.B. The server must be started in configuration only mode.C. Nothing; the environment is ready for SSL communication.D. The ibmslapd and ibmdiradm processes must be restarted.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 48What does the GSKCapiCmd tool do?

A. It creates only PKCS11 key databases.B. It creates only PKCS12 key databases.C. It manages keys, certificates, and certificate requests within a JKS key database.D. It manages keys, certificates, and certificate requests within a CMS key database.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 49Click the Exhibit button.

The exhibit contains a stanza from an IBM Tivoli Directory Server V6.3 (ITDS) server ibmslapd.conf file. Whatcan be observed about the SSL configuration?

A. This server has a key stash file.B. This server can receive only SSL traffic.C. This server can receive both SSL and non-SSL traffic.D. This server is required to perform a two-way handshake in order to establish an SSL communication.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 50Which method can be used for pass-through authentication when attribute mapping is not specified in IBMTivoli Directory Server (ITDS)?

A. ITDS creates its own attribute mapping logic.B. Pass-through authentication is not supported in this situation.C. ITDS searches for a mapping entry on the pass-through LDAP server.D. The entry on the actual ITDS maps explicitly to some entry on the pass-through LDAP server.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

Explanation:

QUESTION 51A client attempts to bind to a directory server and the user credential is not available locally. Then the serverattempts to verify the credential from another external directory server on behalf of the client.What is this called?

A. Referral authenticationB. Kerberos authenticationC. Credential authenticationD. Pass-through authentication

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 52What is the most important consideration when configuring IBM DB2 for online backups?

A. amount of disk spaceB. amount of physical memoryC. number of DB2 connectionsD. number of DB2 tablespaces

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 53Which command displays backup status in IBM Tivoli Directory Server?

A. idsdirctl -h <hostname> -D cn=root -w <password> backupstatusB. idsldapexop -h <hostname> -D cn=root -w <password> -op backupstatusC. idsldapsearch -h <hostname> -D cn=root -w <password> -s base -b cn=backup,cn=monitor objectclass=*D. idsldapdisplay -h <hostname> -D cn=root -w <password> -s base -b cn=backup,cn=monitor objectclass=*

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 54Why is it necessary to have online backup enabled on the source instance when the idsideploy command isbeing used?

A. It improves performance.B. It performs circular logging.

C. It allows the database copy to be created when the server is up and running.D. It allows the database copy to be created with more security than an offline backup.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 55An administrator has decided to use the AES256 method for password encryption but does not have access toIBM Tivoli Directory Server (ITDS) Web Administration Tool. Which section of the ITDS instance informationmust be modified using idsldapmodify to achieve this?

A. cn=schemaB. cn=configurationC. cn=crypto,cn=localhostD. cn=pwdpolicy,cn=ibmpolicies

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 56An administrator has modified the password encryption method using the command idsldapmodify. Assumingthe adminDN is cn=root and the adminPW is secret, which command is required to make the change takeeffect without having to restart the server?

A. idsldapexop -D cn=root -w secret -op readconfig -scope single "cn=configuration" ibm- slapdPWEncryptionB. idsldapexop -D cn=root -w secret -op updateconfig -scope single "cn=configuration" ibm-

slapdPWEncryptionC. idsldapexop -D cn=root -w secret -op readconfig -scope single "cn=SSL,configuration" ibm-

slapdsslcipherspecD. idsldapexop -D cn=root -w secret -op updateconfig -scope entire "cn=SSL,configuration" ibm-

slapdsslcipherspec

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 57Which statement about Access Control Lists (ACL) is correct?

A. the aclInherit attribute is only used for non-Filtered ACLs.B. The aclPropagate attribute is only used for non-Filtered ACLs.C. Filtered ACLs and non-Filtered ACLs propagate in a similar manner.D. A single entry may have both Filtered and not-Filtered ACLs as long as they do not propagate.

Correct Answer: B

Section: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 58Click the Exhibit button.

Based upon the exhibit, what is the resulting ACL on cn=Bob Jones?

A. aclEntry: group:cn=Dept XYZ,o=sample:normal:grant:rscB. aclEntry: group:cn=Dept XYZ,o=sample:normal:grant:rscaclEntry: group:cn=Dept

ABC,o=sample:at.attribute1:grant:rscC. aclEntry: group:cn=Dept ABC,o=sample:at.attribute1:grant:rscD. aclEntry: group:cn=Dept XYZ,o=sample:at attribute1:normal:grant:rsc

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 59Which attribute can be used when analyzing the current ACL set on a server?

A. ibm-aclentryB. ibm-effectiveAclC. ibm-filterAclEntryD. ibm-AllAclEntries

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 60Where in the IBM Tivoli Directory Server Web Administration Tool are Administrative Groups enabled?

A. Expand the Users and Groups category in the navigation area. Click Manage Groups.B. Expand the Server Administration category in the navigation area. Click Manage Groups.C. Expand the Users and Groups in the navigation area. Click Manage Administrative Group.

D. Expand the Server Administration category in the navigation area. Click Manage Administrative Group.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 61What are the default ports for the first IBM Tivoli Directory Server instance on a system?

A. Port: 389, Secure Port: 636, Administrative Port: 338, Secure Administrative Port: 339B. Port: 389, Secure Port: 636, Administrative Port: 3538, Secure Administrative Port: 3539C. Port: 389, Secure Port: 1389, Administrative Port: 3528, Secure Administrative Port: 3530D. Port: 1389, Secure Port: 1636, Administrative Port: 3540, Secure Administrative Port: 3541

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 62Which set of LDIF statements will turn on auditing for all logins and attribute modifications?

A. dn: cn=Audit, cn=Log Management, cn=Configurationchangetype: modifyreplace: ibm-auditibm- audit: true-replace: ibm-auditbind-unbindibm-auditbind-unbind: TRUE-replace: ibm- auditfailedoponlyibm-auditfailedoponly: FALSE-replace: ibm-auditmodifyibm-auditmodify: TRUE

B. dn: cn=Audit, cn=Log Management, cn=Configurationchangetype: modifyreplace: ibm-auditibm- audit: true-replace: ibm-auditbindibm-auditbind: TRUE-replace: ibm-auditfailedoponlyibm- auditfailedoponly: FALSE-replace: ibm-auditmodifyibm-auditmodify: TRUE

C. dn: cn=Audit, cn=Log Management, cn=Configurationchangetype: modifyreplace: ibm-auditibm- audit: true-replace: ibm-auditbindibm-auditbind: TRUE-replace: ibm-auditfailedoponlyibm- auditfailedoponly: TRUE-replace: ibm-auditmodifyibm-auditmodify: TRUE

D. dn: cn=Audit, cn=Configurationchangetype: modifyreplace: ibm-auditibm-audit: true-replace: ibm-auditbindibm-auditbind: TRUE-replace: ibm-auditfailedoponlyibm-auditfailedoponly: FALSE-replace:ibm-auditmodifyibm-auditmodify: TRUE

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/

QUESTION 63

Click the Exhibit button.

Which statement is true given the audit log configuration in the Exhibit?

A. All failed operations are logged.B. Only searches, adds, binds and unbinds are logged.C. All successful and failed enabled operations are logged.D. Only failed searches, adds, binds and unbinds are logged.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 64Which two commands export all of the data in a particular subtree in LDIF format? (Choose two.)

A. db2dumpB. idsexportC. idsdb2ldifD. idsldapexopE. idsldapsearch

Correct Answer: CESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 65

Which command exports all inetOrgPerson entries from the o=acme subtree on the idsInst instance?

A. idsldif2db -I idsInst -s o=acme -f objectclass=inetorgperson -o /tmp/data.ldifB. idsdb2ldif -D cn=root -w ? o=acme -f objectclass=inetorgperson -o /tmp/data.ldifC. idsldapsearch -I idsInst -b o=acme -L objectclass=inetOrgPerson > /tmp/data.ldifD. idsldapsearch -D cn=root -w ? -b o=acme -L objectclass=inetOrgPerson > /tmp/data.ldif

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 66Which set of commands and LDIF files will enable Tombstone and set a lifetime of two days?

A. Assuming the Admin DN is cn=root.idsldapmodify -D cn=root -w ? -f <file>idsldapexop -D cn=root -w ? -opreadconfig -scope entirewhere <file> contains:dn: cn=Directory, cn=RDBM Backends, cn=IBM Directory,cn=Schemas, cn=Configurationibm-slapdTombstoneEnabled:TRUEibm-slapdTombstoneLifeTimeInHours: 48

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 67Which command creates a list of the distinguished names (DN) for all objects that have been deleted,assuming Tombstone has been enabled and the Admin DN is cn=root?

A. idsldapsearch -b "" -r -D cn=root -w ? objectclass="Tombstone" dnB. idsldapsearch -b "cn=localhost" -r -D cn=root -w ? objectclass=* dnC. idsldapsearch -b "cn=Tombstones" -r -D cn=root -w ? objectclass=* dnD. idsldapsearch -b "cn=Deleted Objects" -r -D cn=root -w ? objectclass=* dn

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 68What is the correct objectclass for creating a default referral?

A. refB. referralC. ibm-slapdReferralD. ibm-serverReferral

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 69Which statement about referrals is correct?

A. Referrals can only be used with replication.B. In a proxy environment, the proxy server will return referrals.C. The server will automatically connect to a referred to server.D. Referrals provide a way for servers to refer clients to additional directory servers.

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 70In order to configure Active Directory Synchronization, what must be installed in the environment?

A. IBM Tivoli Access ManagerB. IBM Tivoli Directory IntegratorC. IBM WebSphere Application ServerD. IBM Tivoli Directory Server White Pages

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 71How is the synchronization performed when Active Directory Synchronization is configured for an IBM TivoliDirectory Server V6.3 (ITDS) environment?

A. Synchronization is one-way, from ITDS to Active Directory only.B. Synchronization is one-way, from Active Directory to ITDS only.C. Synchronization is two-way, from Active Directory to ITDS and from ITDS to Active Directory.D. Synchronization is two-way, from ITDS to any LDAP server and from any LDAP server to ITDS.

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 72What does the idsadsrun command do?

A. It performs synchronization from any LDAP server to an IBM Tivoli Directory Server.B. It performs synchronization from an IBM Tivoli Directory Server to any LDAP server.

C. It performs Active Directory Synchronization from an Active Directory Server to an IBM Tivoli DirectoryServer.

D. It performs Active Directory Synchronization from an IBM Tivoli Directory Server to an Active DirectoryServer.

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 73Which operational attributes return all password policy attributes for a given entry?

A. +ibmpwdpolicyB. ibm-pwdPolicyC. ++idspwdpolicyD. +passwordMinAlphaChars

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 74Which command line tool is used to unconfigure the IBM DB2 database?

A. idscfgdbB. idsucfgdbC. idscfgchlgD. idsucfgchlg

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 75Which utility confirms that IBM Tivoli Directory Server instance, DB2 instance, and DB2 database areunconfigured?

A. idsilistB. db2ilistC. idsishowD. db2ishow

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 76What is the purpose of the migbkup utility?

A. to backup LDIF dataB. to backup an IBM DB2 databaseC. to migrate instance and its databaseD. to backup instance configuration and schema

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 77Which GUI tool performs a migration to IBM Tivoli Directory Server V6.3?

A. ITDS Control CenterB. ITDS Web Administration ToolC. ITDS Instance Configuration ToolD. ITDS Instance Administration Tool

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 78What provides a method to monitor the replication status?

A. ldapsearch on cn=monitorB. ldapsearch on cn=connections,cn=monitorC. Web Administration Tool > Replication Management > Manage QueuesD. Web Administration Tool > Replication Management >Manage Replication Topology

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 79Which IBM Tivoli Directory Server V6.3 (ITDS) document describes the server and client utilities?

A. Command ReferenceB. Programming ReferenceC. System Requirements DocumentD. Installation and Configuration Guide

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 80Which command starts the IBM Tivoli Directory Server V6.3 LDAP server remotely using LDAP protocol?

A. ibmslapdB. ibmdirctlC. idsdiradmD. idsldapstart

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 81An administrator uses this sequence of commands:

What is the result?

A. connection from a system with ip address 10.9.8.43 is closedB. connection from a system with ip address 10.9.8.43 is restartedC. connection from a system with ip address 10.9.8.43 is refreshedD. connection from a system with ip address 10.9.8.43 is not modified

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 82What is the purpose of a persistent LDAP search in IBM Tivoli Directory Server V6.3?

A. to provide paged search resultsB. to provide sorted search results

C. to provide updated search resultsD. to provide replicated search results

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 83In an IBM Tivoli Directory Server V6.3 environment, user and group-based password policies are enabled inaddition to the global password policy. What method evaluates the resulting password policy on a given user?

A. ldapexop on the user with an extended operation getattributesB. ldapexop on the user with an extended operation effectpwdpolicyC. ldapsearch on the user with an operational attribute class ++ibmentryD. ldapsearch on the user with an operational attribute class ++ibmpwdpolicy

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 84What provides a way to work with realms and templates in an IBM Tivoli Directory Server V6.3 (ITDS)instance?

A. ITDS Control CenterB. ITDS Web Administration ToolC. ITDS Instance Configuration ToolD. ITDS Instance Administration Tool

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 85Which tool copies a directory server instance of the same version in IBM Tivoli Directory Server V6.3 (ITDS)?

A. ITDS Control CenterB. ITDS Web Administration ToolC. ITDS Instance Configuration ToolD. ITDS Instance Administration Tool

Correct Answer: DSection: (none)Explanation

Explanation/Reference:

Explanation:

QUESTION 86Which three tasks can be performed by the IBM Tivoli Directory Server Web Administration Tool on a fullyconfigured instance? (Choose three.)

A. export LDIF dataB. configure a suffixC. configure replication topologyD. work with access control listsE. copy a remote server instanceF. optimize the server database

Correct Answer: BCDSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 87Which two backup methods are available with the IBM Tivoli Directory Server Instance Configuration Tool?(Choose two.)

A. idsdbback methodB. idsldif2db to import LDIF dataC. idsdb2ldif to export LDIF dataD. idsbulkload to export LDIF dataE. idsldapsearch method to export LDIF data

Correct Answer: ACSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 88Which IBM Tivoli Directory Server V6.3 (ITDS) command performs IBM DB2 maintenance to ensure the healthand performance of an ITDS?

A. idsxcfgB. idsmigrC. idsrunstatsD. idsideploy

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 89Which IBM Tivoli Directory Server V6.3 utility can be used to update statistical information used by the query

optimizer?

A. idsdbmaintB. idslogmaintC. idsperftuneD. idsrunstats

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 90Which IBM Tivoli Directory Server V6.3 utility is used to apply fixpacks?

A. idsxcfgB. ldapexopC. idssupportD. idsinstall

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 91Which IBM Tivoli Directory Server V6.3 command monitors performance?

A. idsldapsearch -h ldaphost -s base -b cn=threads objectclass=*B. idsldapsearch -h ldaphost -s base -b cn=monitor objectclass=*C. idsldapsearch -h ldaphost -s base -b cn=replication objectclass=*D. isdldapsearch -h ldaphost -s base -b cn=performance objectclass=*

Correct Answer: BSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 92Given a fully configured IBM Tivoli Directory Server V6.3 environment, which cache stores member anduniquemember attribute values with their entries?

A. ACL cacheB. Entry cacheC. Attribute cacheD. Group members' cache

Correct Answer: DSection: (none)

Explanation

Explanation/Reference:Explanation:

QUESTION 93Which method of performance tuning can be performed using the IBM Tivoli Directory Server (ITDS) WebAdministration Tool?

A. tuning ITDS filter cacheB. enabling IBM DB2 monitorsC. tuning database buffer poolsD. tuning operating system kernel parameters

Correct Answer: ASection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 94Which three actions can be performed using IBM Tivoli Directory Server V6.3 Database Maintenance Tool(idsdbmaint)? (Choose three.)

A. IBM DB2 row compressionB. IBM DB2 index reorganizationC. IBM DB2 buffer pool expansionD. IBM DB2 transaction log maintenanceE. tablespace conversion from SMS to DMSF. converting entries from changelog into the main database

Correct Answer: ABESection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 95Which log file provides useful information about which attributes need to be indexed?

A. db2cli.logB. idstools.logC. ibmslapd.logD. lostandfound.log

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 96

What additional information is added to an audit record when performance auditing is enabled?

A. PREOP identifier onlyB. PREOP identifier, POST OP indentifier, thread IDC. indexPresent, indexNeeded, networkDelay, serverWaitTimeD. operationResponseTime, timeOnWorkQ, rdbmLockWaitTime, clientIOTime

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 97An IBM Tivoli Directory Server V6.3 administrator was given the task of enabling auditing for performance.Auditing is currently enabled for searches, binds, unbinds, and adds. Performance auditing is then enabled byperforming this task:

What must happen next to ensure performance auditing is in effect?

A. restart the ibmslapd process onlyB. restart the ibmdiradm process onlyC. restart both the ibmslapd and ibmdiradm processesD. Nothing; performance auditing is dynamically enabled and should be in effect immediately.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 98If conflict resolution is enabled in a replication topology and a conflict occurs, what can be done to find moreinformation about the conflict?

A. enable audit loggingB. review the db2cli.logC. review the lostandfound.logD. collect an ascii server trace

Correct Answer: CSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 99Given this replication agreement only, what can be identified about server1?

A. It is a supplier.B. It is a gateway.C. It is a forwarder.D. It is a consumer.

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 100An IBM Tivoli Directory Server V6.3 server was recently configured for SSL communication. To test the serverconfiguration the administrator performs this search from the local client using the server's keyfile andencounters the following error:

What should the administrator do to correct or learn more about the failure?

A. enable audit loggingB. review the ibmslapd.logC. change the keyfile passwordD. verify the location and permissions of the keyfile

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

QUESTION 101An IBM Tivoli Directory Server (ITDS) administrator recently configured an ITDS V6.3 server for SSLcommunication. When an SSL search is performed from the local client using the servers keyfile, this error isobserved.

==> idsldapsearch -Z -p 636 -D cn=root -w secret -K /home/ssl/serverkey.kdb -s base -b "o=sample"objectclass=*ldap_ssl_client_init failed! rc == 113, failureReasonCode == 408Bad keyfile password

What should the administrator do to correct or learn more about the error?

A. enable Audit loggingB. collect a GSKit traceC. collect a dynamic ascii server traceD. check to see if a keystash file is present in the keyfiles home directory

Correct Answer: DSection: (none)Explanation

Explanation/Reference:Explanation:

http://www.gratisexam.com/