C2040-406 C2040-402 exam study guide

C2040-406 C2040-402 exam study guide

  • Code:C2040-406 C2040-402
  • Click Here: more information
  • Exam Demo:
  • C2040-402 Question And Answer
    QUESTION NO: 1
    Bill must perform on-line backups. Of the following, which should be the first step?
    A. He must backup the database before the file system.
    B. He must tell the wiki IBM WebSphere Application Server to quit.
    C. He must stop the IBM HTTP Server.
    D. He should open the WebSphere Application Server administration client and select on-line backup modeling.
    Answer: A
    QUESTION NO: 2
    What is the default Connections DB2 username used to access Connections DB2 tables?
    A. wsadmin
    B. lcuser
    C. lcadmin
    D. dbadmin
    Answer: B
    QUESTION NO: 3
    What is the purpose of the dsx-admin role?
    A. It is used by all applications to control which user IDs can query for seedlist information.
    B. It is used by all applications that make widgets available within Communities.
    C. It is used by Profiles and Communities to retrieve user or community data.
    D. It is used as a system-level user for application-to-application communications.
    Answer: C
    QUESTION NO: 4
    Which of the following statements describes the role of IBM Tivoli Directory Integrator in an IBM Connections 4.0 environment?
    A. It provides a mechanism for the underlying IBM WebSphere Application Server to authenticate against an LDAP directory.
    B. It provides a mechanism to populate the Profiles database with LDAP user information and to keep the same synchronized.
    C. It provides Connectors that allow IBM WebSphere Portal server to access various file-system directories on different systems.
    D. It provides a ready-made solution to keep multiple,supported LDAP directories synchronized.
    Answer: B
    QUESTION NO: 5
    Kevin, the IBM Connections administrator, wants to enable IBM WebSphere Application Server administrative security. Which of the following statements about federated repositories is true?
    A. Connections 4.0 supports federated repositories,however the default file-based user registry must be deleted.
    B. Connections 4.0 supports federated repositories,and the default file based registry can coexist with as many additional LDAP user registriesas required.
    C. Connections 4.0 does not require a federated repository configuration as it supports a
    standalone LDAP repository.
    D. Connections 4.0 support for federated repositories provides the flexibility of allowing multiple users with the same user ID and distinguishedname (DN).
    Answer: B
    C2040-406 Question And Answer
    QUESTION NO: 1
    What type of Web Site rule can be used to provide user-friendly aliases for complex URLs?
    A. Rewrite
    B. Directory
    C. Redirection
    D. Substitution
    Answer: D
    QUESTION NO: 2
    Which statement is true for the IBM Notes 9.0 Basic client?
    A. The Notes 9.0 Basic client is available for Windows only.
    B. The Notes 9.0 Basic client is available for Windows and Mac only.
    C. The Notes 9.0 Basic client is available for Windows and Linux only.
    D. The Notes 9.0 Basic client is available for Windows, Mac, and Linux.
    Answer: A
    QUESTION NO: 3
    Which hidden view in the Domain Catalog can an administrator use to find which databases are included in the domain index?
    A. $MultiDbIndex
    B. $DbCategories
    C. $DocumentContent
    D. $DomainRepository
    Answer: A
    QUESTION NO: 4
    Kaitlin has had DAOS running for a few months on her server, but now wishes to change where the files are stored. How can she do this?
    A. This is not possible. Once the DAOS service is configured the location of the repository cannot be moved.
    B. Update the “DAOS base path” field in the Server document to the new location. Restart the server. The files will automatically be copied to the new location.
    C. Update the “DAOS base path” field in the Server document to the new location. Stop the server. Copy the files from the old directory to the new location at the operating-system level. Restart the server.
    D. Stop the server. Create a linked folder in the current DAOS repository location pointing at the new destination. Copy the files from the old directory to the new location at the operating-system level. Restart the server.
    Answer: C
    QUESTION NO: 5
    When a user tries to access a database on a server that is unavailable, IBM Domino will attempt to redirect the user to a replica of the database on another server in the cluster. Which Domino server task determines the availability on each cluster server?
    A. Server Balancer
    B. Cluster Manager
    C. Failover Manager
    D. Workload Balancer
    Answer: B

C2040-951 C2040-407 exam online

C2040-951 C2040-407 exam online

  • Code:C2040-951 C2040-407
  • Click Here: more information
  • Exam Demo:
  • C2040-407 Question And Answer
    QUESTION NO: 1
    An administrator is not able to access a database on an IBM Domino server as he/she receivesthe error “You are not authorized to access that database”. What can the administrator do toaccess that database?
    A. Switch IDs to the server ID then try to access the database.
    B. Turn on “Full Access Administration” then try to access the database.
    C. Run maintenance (fixup, compact, updall) against the database in question.
    D. Try to modify the Access Control List of the database by selecting the database in the Files tab of the administrator client.
    Answer: B
    QUESTION NO: 2
    What is a requirement for implementing the IBM Notes password expiration of Notes users?
    A. Notes shared login must be enabled.
    B. Users must have their ID in the Notes ID vault.
    C. Password checking must be enabled on the IBM Domino server.
    D. Password expiration must be configured via a Policy and Person document.
    Answer: C
    QUESTION NO: 3
    What encryption standard has been introduced in IBM Domino 9.0 Social Edition?
    A. Secure Hash Algorithm (SHA-2)
    B. Wired Equivalent Privacy (WEP)
    C. Advanced Encryption Standard (AES)
    D. Federal Information Processing Standard (FIPS)
    Answer: A
    QUESTION NO: 4
    Where is an X.509 certificate, which is used to sign and encrypt SMTP mail, stored?
    A. in the notes.ini
    B. in the IBM Notes ID file
    C. in the Personal Names and Address Book of a user
    D. in the Person document in the IBM Domino Directory
    Answer: B
    QUESTION NO: 5
    What is used to determine the level of access users and servers have to a database?
    A. Policy settings
    B. Server document
    C. Access Control List
    D. Execution Control List
    Answer: C
    C2040-951 Question And Answer
    QUESTION NO: 1
    Darren is working with the Outline view on a new XPage. He drags a button control so that it is above an edit box control. What effect does this have on the XPage in the Design editor?
    A. The button control will move above and to the left of edit box control.
    B. There will be no effect until Darren saves the Xpage, then the button control will move above and to the left of edit box control.
    C. There will be no effect until Darren clicks the Synchronize Navigator with Editor tab in the application navigator, then the button control willmove above and to the left of edit box control.
    D. There will be no effect until Darren clicks the Synchronize Navigator with Editor tab in the Outline view, then the button control will moveabove and to the left of edit box control.
    Answer: A
    QUESTION NO: 2
    Abbas has imported the screen.css stylesheet into his application. He has discovered that he needs to edit the properties of some of the classes in the CSS. What steps can he follow to make the needed changes and save the CSS changes within the application?
    A. From the application navigator in Designer, expand Resources and expand Style Sheets.
    Double-click screen.css to use the built-in CSSeditor.
    B. From the application navigator in Designer, expand Resources and expand Style Sheets. Click screen.css and in the Outline view select aclass to use the built-in CSS editor.
    C. From the application navigator in Designer, expand Resources and double-click Style Sheets.
    Select screen.css in the Design pane. Fromthe Design tab of the Properties view, double-click a CSS class to edit its properties.
    D. From the application navigator in Designer, expand Resources and double-click Style Sheets.
    Select screen.css in the Design pane. Fromthe Web Properties tab of the Properties view, doubleclick a CSS class to edit its properties.
    Answer: A
    QUESTION NO: 3
    Janet uses Domino Designer’s Dynamic Help feature to clarify something. What kind of help will she get?
    A. An animated, talking icon that offers to assist her.
    B. A wizard that follows a support tree to narrow down the answer to her question.
    C. A personalized search interface that remembers all of her previous searches and their results.
    D. A context-sensitive help view that constantly updates a list of possible relevant topics based on what she’s doing.
    Answer: D
    QUESTION NO: 4
    Joshua would like to have a cookie set on his Movie Rental XPage before it loads on the browser.
    Which view would Joshua use to add this functionality?
    A. Events view
    B. Controls view
    C. Properties view
    D. Applications view
    Answer: A
    QUESTION NO: 5
    Carlos added an edit box control to his registration XPage. He wants to make the field a required field with a message displaying to the user if the field is left blank. Where would he add these additional features to the edit box control?
    A. Editor
    B. Events view
    C. Properties view
    D. Controls palette
    Answer: C

C2040-917 C2040-404 question and answer

C2040-917 C2040-404 question and answer

  • Code:C2040-917 C2040-404
  • Click Here: more information
  • Exam Demo:
  • C2040-404 Question And Answer
    QUESTION NO: 1
    What functionality does the IBM Worklight Server provide when Worklight and IBM WebSphere Portal are used together?
    A. The Worklight Server is not used in the architecture.
    B. The Worklight Server provides push notifications for the application.
    C. The Worklight Server handles all data connections for the application.
    D. The Worklight Server must be installed on the same server as WebSphere Portal.
    Answer: B
    QUESTION NO: 2
    Which is a true statement regarding Responsive Web Design (RWD) and IBM WebSphere Portal?
    A. A web application using RWD can be published to all supported appstores.
    B. A hybrid or native application is needed in order to be able to support RWD concepts.
    C. RWD itself is a practical solution to the shifting landscape of devices and screen sizes.
    D. Accessing native features of a device is not possible when using RWD with WebSphere Portal.
    Answer: C
    QUESTION NO: 3
    Which event listener is used in an IBM WebSphere Portal theme to detect if a page is loaded on a mobile device?
    A. isWebView
    B. isMobileDevice
    C. onDeviceReady
    D. onMobileDevice
    Answer: C
    QUESTION NO: 4
    Which three needs can be met with an IBM Worklight-only application approach? (Choose three.)
    A. offline use
    B. app store presence
    C. authentication management
    D. access to mobile native features
    E. use of existing IBM WebSphere Portal environment
    F. personalization driven by IBM Web Content Manager content
    Answer: A,B,D
    QUESTION NO: 5
    IBM WorkLight Studio is supported and can be installed on which operating systems?
    A. Windows
    B. Windows, Mac OS, Linux
    C. Microsoft Windows, Linux
    D. Linux, Mac OS, Windows, Android
    Answer: B
    C2040-917 Question And Answer
    QUESTION NO: 1
    Juan is preparing Tivoli Directory Integrator to populate and maintain Profiles records, and he must configure the environment so that the Connections and Tivoli Directory Integrator solution tasks can connect to the database hosting the Profiles database. How does he configure the database drivers so that they are available to the solution?
    A. He copies the database JDBC drivers to the jvm/jre/lib/ext subdirectory of the Tivoli Directory Integrator installation.
    B. No driver configuration is necessary, because all database connections are managed by the database client software.
    C. He updates the Tivoli Directory Integrator solution’s profiles_tdi.properties file, and sets the dbrepos_jdbc_driver property to a local directory
    path containing the database JDBC drivers.
    D. He updates the ibmdisrv file in the Tivoli Directory Integrator installation directory and adds a the local directory path containing the database JDBC drivers using the “-driverpath” parameter on the Java invocation command.
    Answer: D
    QUESTION NO: 2
    Bob needs to configure federated repositories using LDAP over SSL. Identify which of the
    following tasks is not required to enable SSL communication over LDAP?
    A. Change the port number to the SSL port of the LDAP server.
    B. Select the SSL alias defined by Bob in the trust store in the federated repositories configuration.
    C. Add a signer certificate to the trust store in WebSphere Application Server by retrieving the certificate from the LDAP port.
    D. Generate a self-signed certificate with an alias using the ikey manager utility and add it to the Websphere Application Server certificate store.
    Answer: D
    QUESTION NO: 3
    Joe has installed and enabled the mobile feature. He has been using the self-signed SSL
    certificate produced by WebSphere Application Server, rather than having a trusted certificate.
    What must he do to allow iPhone and iPod Touch users to access secure pages from their devices without receiving warnings about the untrusted certificate?
    A. The mobile feature does not support authenticated access or HTTPS communication.
    B. The mobile feature does not support authenticated access or HTTPS communication.
    C. Nothing. The iPhone and iPod Touch devices automatically trust the self-signed certificate and allow the user to access Connections information without warnings being shown.
    D. Send an email to his users with the certificate as an attachment, ask them to open the
    attachment from the device. When they do, the device recognizes it, and installs the certificate.
    Answer: D
    QUESTION NO: 4
    Baxter just installed the Search application on multiple nodes. What configuration does Baxter need to perform to initialize the search index on all nodes?
    A. Set SEARCH_INDEX_DIR on all nodes to the same network share
    B. Copy the search index to the same place on each node
    C. Build the search index on each node
    D. Nothing; the index is automatically created across all the nodes
    Answer: B
    QUESTION NO: 5
    Patrick has defined an IBM HTTP Server and mapped his installed features to it. However, he still sees that the port numbers are in the URL when he uses a link from the navigation bar. What is the most likely reason this is happening?
    A. The host alias has not been defined for his features.
    B. The feature’s port numbers have not been removed from the serverindex.xml file.
    C. The feature’s port numbers must be removed from the IBM HTTP Servers httpd.conf file.
    D. The feature’s port numbers have not been removed from the LotusConnections-config.xml file.
    Answer: D

C2040-988 C2040-925 exam study guide

C2040-988 C2040-925 exam study guide

  • Code:C2040-988 C2040-925
  • Click Here: more information
  • Exam Demo:
  • C2040-925 Question And Answer
    QUESTION 1
    Which of the following are optional advanced services that must be enabled manually when first configuring and installing the Domino server?
    A.    SMTP server
    B.    Agent Manager
    C.    Calendar Connector
    D.    DOLS (Domino Off-Line Services)
    Answer: A
    QUESTION 2
    In order to create a Domino cluster, which rights are required for you to have to the Domino Directory?
    A.    Editor access rights and ClusterModifier role
    B.    Reader access rights and ServerWriter and ServerManager roles
    C.    Designer access rights and ClusterCreator and ClusterModifier roles
    D.    Author access and Delete Documents rights and the ServerModifier and ServerCreator roles
    Answer: D
    QUESTION 3
    Jose set up Web authentication using primary and secondary directories. Which one of the following describes the order in which he set up directories to be searched?
    A.    Domino primary directory, then Domino secondary directories. This is the only option available.
    B.    Domino primary directory, then either Domino or LDAP secondary directories. The administrator can specify the order of secondary searches.
    C.    LDAP primary directory, then LDAP secondary directory, and then Domino secondary directories. This is the order in which secondary searches must be made.
    D.    Domino primary directory, then Domino secondary directory, and then LDAP secondary directories. This is the order in which secondary searches must be made.
    Answer: B
    QUESTION 4
    A Notes mail message is sent by Miguel to an Internet address through an adjacent Domino domain over NRPC that then sends mail to the Internet over SMTP. Miguel is now attempting to recall the mail message. Which of the following will be the result of his attempt?
    A.    He will receive an email that he cannot recall the email message
    B.    He will immediately receive a prompt that the message is not enabled for message recall
    C.    He will receive a message from the Internet recipients mail server that the message cannot be recalled
    D.    He will successfully recall the message if it is allowed in the server configuration and enabled in his user policy
    Answer: A
    QUESTION 5
    In order for Peggy to establish alternate message recall settings on a per server basis, which of the following is the best solution?
    A.    Configure the message recall settings in an organization level policy
    B.    Configure the message recall settings in each server’s notes.ini file
    C.    Configure the message recall settings in each server configuration document
    D.    Configure the message recall settings in explicit policies and manually apply to users
    Answer: C
    C2040-988 Question And Answer
    QUESTION NO: 1
    You are planning to upgrade your Sametime community server to version 8.5 but do not want to use the Sametime System Console to upgrade your server. Which of the following is correct?
    A. You can manually run a guided activity without the System Console.
    B. The Sametime System Console is required for you to upgrade your Sametime Community server to 8.5.
    C. You can configure the LotusSametime Community Server to directly access the Lotus Domino Directory if you do not plan to use the Lotus Sametime System Console.
    D. If you are not previously using LDAP forSametime authentication, it is a required you use LDAP authentication to authenticate to a Sametime 8.5 Community server.
    Answer: C
    QUESTION NO: 2
    Carol is planning to deploy Sametime 8.5 in her company and is looking to create a vertical cluster of the Sametime Meeting Server, the Sametime Media Manager and the Sametime Proxy Server.
    How many nodes does she need to deploy?
    A. 2 nodes
    B. 3 nodes
    C. 4 nodes
    D. 6 nodes
    Answer: B
    QUESTION NO: 3
    In Sametime 8.5, which best describes where can you configure the Sametime Community Clusters documents?
    A. In the stconfig.nsf
    B. In the sametime.ini
    C. In theSametime System Console
    D. In the stconfig.nsf andSametime System Console
    Answer: A
    QUESTION NO: 4
    Which of the following is NOT required in an LDAP directory used for Sametime?
    A. the base entries do not overlap
    B. SSL is enabled on the LDAP server
    C. each entry has a uniquely defined DN
    D. the LDAP directory contains the mail attribute
    Answer: B
    QUESTION NO: 5
    Which one of the following components is NOT part of the Sametime Media Manager
    A. Packet Switcher
    B. Conference Manager
    C. Sametime Reflector
    D. SIP Proxy/Registrar
    Answer: C

C2040-412 C2040-913 exam dumps

C2040-412 C2040-913 exam dumps

  • Code:C2040-412 C2040-913
  • Click Here: more information
  • Exam Demo:
  • C2040-913 Question And Answer
    QUESTION NO: 1
    Parker is a Lotus Web Content Management administrator. Sadie is a content contributor who creates and manages content. When looking through versions of a content item, which of the following functionality is available only to Parker?
    A. Delete
    B. Preview
    C. Label
    D. Restore as published
    Answer: D
    QUESTION NO: 2
    Which option best describes how you remove content items from site areas that it is linked to?
    A. Delete the linked content to remove all the links.
    B. Using the Remove Links button, select a site area and click Remove Links. Then, select the content items that you would like to remove.
    C. Using the Link To button, select the content items to remove links from, then click Link To. Select the site area that you would like to remove a link from and then click Remove.
    D. Either B or C
    Answer: D
    QUESTION NO: 3
    Marcel is the administrator for a web content management server. The Marketing department wants to version all content that they create. What must Marcel do to allow the Marketing department to version content?
    A. Nothing, versioning is automatically enabled.
    B. Marcel must enter this URL in a browser:
    http://[HOST]:[PORT]/wps/wcm/connect/?MOD=VersioningEnablement
    C. An administrator must modify the wpconfig.properties file and add the following line:
    WcmVersioning=true
    D. Marcel must enter this URL in a browser:
    http://[HOST]:[PORT]/wps/wcm/connect/?MOD=AJPEResourceChecker&fix=true
    Answer: A
    QUESTION NO: 4
    Eve is the Public Relations Manager for AT Corporation. She needs to post a new Event content object to their website. At some point in the future, the Event must be removed from the live website, however it should not be deleted from the repository. Who can accomplish this task, and how can the task be accomplished?
    A. An editor can click the Restart Workflow button.
    B. An approver can click the Restart Workflow button.
    C. An editor can click the Next Stage button to move the document to the next stage in the
    Workflow. The next stage would need to have an Expire
    action.
    D. An approver can click the Next Stage button to move the document to the next stage in the Workflow. The next stage would need to have an Expire action.
    Answer: D
    QUESTION NO: 5
    Kellan is a content creator. He is creating Job Posting content items. The content items should only be published on the live website until the end of the current month. Kellan specifies an expiry date on the content items for the end of the current month. What also must be done to ensure that the content is removed from the live website on that date?
    A. An administrator must delete the content item from the library on that date.
    B. The expiry date must be set in a Date Component that should be added to the content item.
    C. The content item’s selected workflow must include an expire action.
    D. Specify the expiry date in the icm.properties file.
    Answer: C
    C2040-412 Question And Answer
    QUESTION NO: 1
    Which option describes how a load balancer is used for an IBM Notes Traveler High Availability (HA) implementation?
    A. secures connections between Notes Traveler servers and IBM Domino mail servers
    B. spreads the user to server connections across multiple Notes Traveler HA Pool members
    C. balances mail server traffic between Notes Traveler servers and clustered Domino mail servers
    D. spreads large amounts of data across multiple Notes Traveler servers when users are
    synchronizing a large attachment to a device
    Answer: B
    QUESTION NO: 2
    Once IBM Notes Traveler servers are put into production, what average percentage should the CPU be below?
    A. 65
    B. 75
    C. 85
    D. 95
    Answer: B
    QUESTION NO: 3
    What is the minimum number of servers recommended for an IBM Notes Traveler 9.0 Service Pool, IBM Domino mail and database server with high availability for all components on Microsoft Windows or Linux platforms?
    A. 5
    B. 6
    C. 7
    D. 11
    Answer: C
    QUESTION NO: 4
    IBM Notes Traveler mobile client to server traffic is secured over which protocol?
    A. Secure Socket Layer (SSL)
    B. Post Office Protocol 3 (POP3)
    C. HyperText Transfer Protocol (HTTP)
    D. Notes Remote Procedure Call (NRPC)
    Answer: A
    QUESTION NO: 5
    How can an administrator ensure that the network communication between the IBM Notes
    Traveler server and the mail servers is optimized?
    A. A different port other than the default RPC port of 1352 should be used.
    B. The network connection should enforce secure socket layer encryption.
    C. The network connection should not enforce secure socket layer encryption.
    D. The Notes Traveler and mail servers should both reside in the same data center.
    Answer: D

C2040-403 C2040-440 exam testing engine

C2040-403 C2040-440 exam testing engine

  • Code:C2040-403 C2040-440
  • Click Here: more information
  • Exam Demo:
  • C2040-440 Question And Answer
    QUESTION: 1
    What component enables Facebook, Google, or Yahoo users (OpenID/OAuth) to
    authenticate to IBM WebSphere Portal?
    A. LTPA
    B. IBM Tivoli Access Manager
    C. trust association interceptor
    D. Client Certificate Authentication
    Answer: C
    QUESTION: 2
    What step is necessary when configuring a remote search service in IBM
    WebSphere Portal 8.0?
    A. adding the modified dmgr01 parameter CONFIG_FOLDER_PATH to the Portal
    Search service
    B. deleting the modified dmgr01 parameter CONFIG_FOLDER_PATH to the Portal
    Search service
    C. adding the modified DefaultCollectionsDirectory parameter
    CONFIG_FOLDER_PATH to the Portal
    Search service
    D. deleting the modified DefaultCollectionsDirectory parameter
    CONFIG_FOLDER_PATH to the Portal Search service
    Answer: C
    QUESTION: 3
    What special considerations exist for logging out users authenticated by an
    external security manager (ESM)?
    A. whether and how to expire the ESM’s cookies
    B. what role mappings to assign the default login portlet
    C. how to clear the authorization context in the ESM’s session
    D. how to bypass the trust association interceptor during the logout
    Answer: A
    QUESTION: 4
    The first tier in a clustered topology consists of a web server. What are the web
    server’s plug-ins necessary for?
    A. to expand the JVM heap size
    B. to balance the load between servers
    C. to enable a single sign on environment
    D. to be able to successfully interact with LDAP
    Answer: B
    QUESTION: 5
    What is the difference between enabling tracing through the IBM WebSphere
    Integrated Solutions Console and the IBM WebSphere Portal Enable Tracing
    portlet?
    A. Any traces enabled through the Enable Tracing portlet are lost after a restart.
    B. The Enable Tracing portlet only allows a user to set traces that take effect after a
    restart.
    C. A user cannot trace WebSphere Portal packages through the WebSphere
    Integrated Solutions Console.
    D. If a user enables the traces through the Enable Tracing portlet it will write the
    trace to a separate log file.
    Answer: A
    C2040-403 Question And Answer
    QUESTION NO: 1
    Which of the following statements about XML schemas is TRUE?
    A. A .xsd file defines an XML schema.
    B. A .schema file defines an XML schema.
    C. A XML schema is used to define the fields in a database.
    D. A XML schema is used to control the layout of an IBM Form.
    Answer: A
    QUESTION NO: 2
    Which of the following statements regarding the benefits of using XML is FALSE?
    A. XML is extensible. Since there are no fixed set of tags, new tags can be created as they are needed.
    B. XML is based on a W3C standard, and is endorsed by software industry market leaders.
    Therefore, you are locked into using their technology.
    C. XML is self-describing. XML documents can be stored without schema definitions, because they contain meta data in the form of tags andattributes.
    D. XML facilitates the comparison and aggregation of data. The tree structure of XML documents allows documents to be compared andaggregated efficiently element by element.
    E. XML is simple to use. Information coded in XML is easy to read and understand. It lets you identify your information in an accurate, flexible andadaptable way, allowing for easier integration with other systems.
    Answer: B
    QUESTION NO: 3
    All of the following are syntactically valid XML statements using XML namespace, EXCEPT for which one?
    A. <root xmlns: f=”http://www.diy.com/furniture”>
    <f:table>
    <f:name>Dining Table</f:name>
    <f:width>80</f:width>
    <f:length>120</f:length>
    </f:table>
    </root>
    B. <root>
    <furniture:table xmlns: furniture=”http://www.diy.com/furniture”>
    <furniture:name>DiningTable</furniture:name>
    <furniture:width>80</furniture:width>
    <furniture:length>120</furniture:length>
    </furniture:table>
    </root>
    C. <root>
    <table xmlns=”http://www.diy.com/furniture”>
    <table:name>Dining Table</table:name>
    <table:width>80</table:width>
    <table:length>120</table:length>
    </table>
    </root>
    D. <root>
    <table xmlns=”http://www.diy.com/furniture”>
    <name>Dining Table</name>
    <width>80</width>
    <length>120</length>
    </table>
    </root>
    Answer: C
    QUESTION NO: 4
    Jane is creating a form in the IBM Forms Designer for FileNet. If she marks certain data as
    “public”, what should she specify?
    A. She should specify the data type using an XFDL compute.
    B. She should specify the data type using the corresponding XFDL object’s format.datatype property.
    C. She should specify the data type using a Model Item property.
    D. She does not need to specify any data type.
    Answer: C
    QUESTION NO: 5
    Complete the following statement. The artifact created in the IBM Forms Designer is:
    A. A dynamic PDF document.
    B. An XML document that conforms to the XFDL schema.
    C. An XML document with embedded Javascript if HTML extensions were used.
    D. An XML document or an HTML document depending on the rendering mode that was defined.
    Answer: B

C2040-927 C2040-918 exam dumps

C2040-927 C2040-918 exam dumps

  • Code:C2040-927 C2040-918
  • Click Here: more information
  • Exam Demo:
  • C2040-918 Question And Answer
    QUESTION NO: 1
    Anna has been testing a model and is concerned about the time certain actions seem to be taking.
    Her development environment is a high-end system, and other portlets she has developed have not exhibited the kind of response time lag that she and her testers perceive. She suspects one of the data services builders is experiencing network latency, but is unsure where the real problem lies. What actions can she take to help isolate the performance issue?
    A. Add counters to the builder calls that are suspect.
    B. Consult the performance log, which is created by default with each model run.
    C. Enable system tracing in the run configuration tab to log the execution time for each action (page or method).
    D. Dedicate a larger Java HEAP_SIZE to the main method associated with the model that is suspect.
    Answer: C
    QUESTION NO: 2
    Tim has a web application that accesses a database through a provider model containing SQL Call builders. He thinks there might be a performance problem with one or more of the database calls. How can he get WebSphere Portlet Factory to log detailed performance information about all aspects of the database access?
    A. He needs to use a SQL Override builder; this builder provides several fields that enable
    detailed logging of performance information for database access.
    B. He must enable DEBUG-level database performance tracing in the Log4J properties file and redeploy the WAR file.
    C. He must enable the Log Server Stats field in each SQL Call builder.
    D. No changes are required; WebSphere Portlet Factory automatically logs performance statistics for all executed actions, such as database access calls.
    Answer: C
    QUESTION NO: 3
    Pat wants to know how many web service calls are being made in a given time frame, how long on average each web service call is taking, and how many web service calls are failing. How can Pat obtain such performance information?
    A. That information is not yet available from the WebSphere Portlet Factory web service support, but the application can be built to log this information itself, if desired.
    B. WebSphere Portlet Factory logs all requests, average latency and faults, in the deployed applications WEB-INF/logs/event.log file.
    C. WebSphere Portlet Factory logs web service requests, average latency and faults, in the deployed applications WEB-INF/logs/serverStats.txt log file.
    D. Enable this logging using the Performance field in the Web Service Call builder, and the
    information comes back with the web service call results to the consumer model.
    Answer: C
    QUESTION NO: 4
    Emma is not satisfied with her codeveloper Jakob’s description of system tracing events and times, and wants to check the system logs herself. Where can she find and view them?
    A. Log files are created in the base WEB-INF directory.
    B. Log files are stored in the WEB-INF/logs directory in the deployed WAR file.
    C. All WebSphere Portlet Factory logging output is intertwined with WebSphere Portal logging; users must open the application server’s log files on the server to view them.
    D. The location of log files is variable depending on selections made in the run configuration; users must inspect the run configuration to discover the path to the log files.
    Answer: B
    QUESTION NO: 5
    The primary use for the WebSphere Portlet Factory server configuration is?
    A. To deliver your application to a production server.
    B. To deploy, run, and test your application on a development server.
    C. To create a WAR file for manual deployment to a production or development server.
    D. To give your application access to APIs that are specific to the target server.
    Answer: B
    C2040-927 Question And Answer
    QUESTION NO: 1
    Tim has a web application that accesses a database through a provider model containing SQL Call builders. He thinks there might be a performance problem with one or more of the database calls. How can he get IBM Web Experience Factory to log detailed performance information about all aspects of the database access?
    A. He needs to use a SQL Override builder. This builder provides several fields that enable detailed logging of performance information for database access.
    B. He must enable DEBUG-level database performance tracing in the Log4J properties file and redeploy the WAR file.
    C. He must enable the Log Server Stats input in each SQL Call builder.
    D. No changes are required. Web Experience Factory automatically logs performance statistics for all executed actions, such as database access calls.
    Answer: C
    QUESTION NO: 2
    Jane wants to debug the Java code in one or more of the Method builders in her model. How can she leverage the Eclipse Java debugger to do so?
    A. She must purchase full rights to the IBM Web Experience Factory source to debug generated Java.
    B. This feature is not yet supported.
    C. Right-click a method in the Application Tree view to set/toggle a breakpoint. Start the
    application server in debug mode and run the model with a remote Java debug configuration, as documented in the Web Experience Factory help.
    D. System.out.println is the only way to debug Java associated with Method builders.
    Answer: C
    QUESTION NO: 3
    Sean wants to trace the value of a variable as a model he is running to help track down a problem somewhere in a computation later in the model. How can he trace the value of the variable?
    A. Use the enable Debug Tracing field on the Variable builder.
    B. Add an entry to the log4j.properties file indicating the model and action to trace.
    C. Inspect the logging.properties file for variable values because all changes are reflected in this file at run time.
    D. Add a Debug Tracing builder to the model specifying whether to trace all actions or naming a specific action to trace.
    Answer: D
    QUESTION NO: 4
    Dave wants to see information about web service parameters, URL endpoint, and SOAP
    envelope. What must he do to obtain this data for a particular Web Service Call builder?
    A. There is no way for him to get this information other than contacting customer support.
    B. He must use a Java debugger to get this information.
    C. He must set the Logging field to All in the Web Service builder to log this information to the WEB-INF/logs/debugTracing.txt file.
    D. This information is always printed to the standard output console log without any developer intervention required.
    Answer: C
    QUESTION NO: 5
    Which of the following is the ideal development configuration for building and testing portlets?
    A. No publish is necessary. It all runs out of the project.
    B. Manually publish the portlet WAR file and let the designer discover its location.
    C. Publish the project two times, once to an application server, and once to an IBM WebSphere Portal server for development and testing.
    D. Publish the application once to a WebSphere Portal server. IBM Web Experience Factory development applications run stand-alone and as portlets with one configuration.
    Answer: D

C2040-911 C2040-916 question and answer

C2040-911 C2040-916 question and answer

  • Code:C2040-911 C2040-916
  • Click Here: more information
  • Exam Demo:
  • C2040-916 Question And Answer
    QUESTION NO: 1
    Which of the following statements regarding XML is TRUE?
    A. All XML elements must be properly closed.
    B. XML documents must have a DTD (Document Type Definition) file.
    C. All XML elements must be lower case.
    D. XML tags are not case sensitive.
    Answer: A
    QUESTION NO: 2
    Complete the following statement. The artifact created in the IBM Forms Designer is:
    A. A dynamic PDF document.
    B. An XML document that conforms to the XFDL schema.
    C. An XML document with embedded Javascript if HTML extensions were used.
    D. An XML document or an HTML document depending on the rendering mode that was defined.
    Answer: B
    QUESTION NO: 3
    Jane is given an XML schema by her company’s IT department, and is asked to build an IBM Form that captures data according to that schema. How can Jane build the form?
    A. IBM Forms does not support schemas, so this is not possible.
    B. Using IBM Forms Designer, Jane can drag and drop the schema onto her form page. The Designer automatically creates the appropriate UIitems according to what was specified in the schema.
    C. Using IBM Forms Designer, Jane embeds the schema into her form, creates an instance of that schema, then drags and drops from theinstance onto the form. The Designer then creates the appropriate UI items according to what was specified in the schema.
    D. Jane has to use another tool to create an XML instance of the schema. She adds the XML instance to her form using IBM Forms Designer, thendrags and drops from the instance onto the form. The Designer then creates the appropriate UI items according to what was specified in theschema.
    Answer: C
    QUESTION NO: 4
    How are the build order and tab order related?
    A. The tab order is always the same as the build order.
    B. The build order defines the default tab order.
    C. They are not related.
    D. The tab order is never the same as the build order.
    Answer: B
    QUESTION NO: 5
    Which of the following components must be installed when using IBM Forms with Workflow?
    A. IBM Forms Server
    B. Tivoli Access Manager
    C. Lotus Quickr
    D. WebSphere Portal
    Answer: A
    C2040-911 Question And Answer
    QUESTION NO: 1
    The IBM Lotus Connections portlets provide access to collaboration and social networking
    features from Lotus Connections, such as Activities and Blogs. Which portlets are available from the built-in Lotus Connections portlets package?
    A. Activities, Blogs, Bookmarks, Connections, Profiles
    B. Activities, Blogs, Bookmarks, Connections, Profiles, Ratings
    C. Activities, Blogs, Bookmarks, Tag cloud, Profiles
    D. Activities, Blogs, Bookmarks, Profiles, Ratings
    Answer: C
    QUESTION NO: 2
    Aside from normal steps for deploying portlets to a page, what additional step, if any, is necessary to configure a portlet using the Struts MVC framework and a portlet using the JavaServer Faces framework to the same portal page?
    A. Server-side aggregation must be forced on a page
    B. Both portlets must comply with the JSR286 Portlet Specification
    C. No additional steps are required
    D. Framework JAR files must be added to WebSphere Application Server shared libraries
    Answer: C
    QUESTION NO: 3
    A customer has requirements to remotely search user profiles based on attributes of the profile using web services. How can this task be accomplished in WebSphere Portal?
    A. By means of the remote portal search service
    B. By means of the remote PUMA SPI REST service
    C. By means of the remote virtual member manager service
    D. By means of the user repository APIs and wrap web services around API calls.
    Answer: B
    QUESTION NO: 4
    Which option best describes how JSR 286-compliant portlets and widgets interact with each other?
    A. Portlets and widgets cannot interact with each other.
    B. Widgets and portlets can interact by using shared render parameters and events.
    C. Widgets and portlets can interact by using shared render parameters.
    D. widgets and portlets can interact by using events.
    Answer: B
    QUESTION NO: 5
    John has developed a custom step-up handler. He has implemented the two methods init() and establishAuthLevel() of the StepUpAuthHandler interface. What is the outcome of the method establishAuthLevel() returning null?
    A. A null pointer exception is thrown.
    B. The browser is redirected to the portal login page.
    C. The browser displays the HTTP error 403 Forbidden.
    D. The authentication level is assumed to be successfully established.
    Answer: D

C2040-926 C2040-921 practice test

C2040-926 C2040-921 practice test

  • Code:C2040-926 C2040-921
  • Click Here: more information
  • Exam Demo:
  • C2040-921 Question And Answer
    QUESTION NO: 1
    You have taken a position with a new company that has a large WebSphere Portal deployment that is active. While reviewing the topology of web content libraries, you discover that users have greater rights than necessary to a few components of the entire Human Resource library. You need to restrict access to these few components while leaving the remainder of the Human Resource web content library with the same security that is in place. Which of the following types of security methodologies should you utilize to best achieve this goal?
    A. Divided
    B. Accrued
    C. Additive
    D. Subtractive
    Answer: D
    QUESTION NO: 2
    Security in WCM can be set at different levels – Content root, Library, Item Type, and at a more granular security at the item level such as in a specific Site Area, Workflow Stage, etc. What is the minimum access needed for a user at a library level to be able to select it under preferences in the WCM authoring portlet?
    A. User role
    B. Privileged user role
    C. Contributor role
    D. Manager role
    Answer: C
    QUESTION NO: 3
    How do you enable the personalization resource cache for a specific resource collection?
    A. Add rulesEngine.cache.enabled.collectionName to the PersonalizationService.properties file where collectionName is name of the resource collection and set it to true.
    B. Set rulesEngine.cache.enabled to true in the PersonalizationService.properties file.
    C. You cannot enable or disable caching for a specific collection.
    D. Set rulesEngine.collection.cache.enabled to collectionName in PersonalizationService.properties file where collectionName is name of the resource collection and set to true.
    Answer: A
    QUESTION NO: 4
    A personalization campaign can best be used to implement which of the following website
    features?
    A. User’s session cookies need to be stored in a persistent data store.
    B. Logged in users are able to modify their profiles for personalized content.
    C. All users see specific website content for a predefined interval of time.
    D. Logged in users see different website content based on their personal profiles.
    Answer: C
    QUESTION NO: 5
    Which of the following statements are correct for Web Content Management authoring portlet search behavior?
    A. Only exact matches to the text entered in the basic search and advanced search fields is searched for by default. You need to update the WCM WCMConfigService service to change the behavior.
    B. A wildcard character is added to the end-of-text entered in the basic search and advanced search fields by default. For example, searching for Span automatically searches for Span* and shows search results that have a title, description or keywords that begin with Span, such as Spanish. You need to update the WCM WCMConfigService service to change the behavior.
    C. An advanced search does not automatically execute if there is existing text in the basic search field by default. You need to update the WCM WCMConfigService service to change the behavior.
    D. A and C
    E. B and C
    Answer: D
    C2040-926 Question And Answer
    QUESTION NO: 1
    Domino Domain Monitoring (DDM) allows for a central server to collect information from other servers. What are servers called that the central server collects from?
    A. Probe servers
    B. Node servers
    C. Event Servers
    D. Collection servers
    Answer: B
    QUESTION NO: 2
    Lotus Notes Traveler server maintains a database with information pertaining to the cluster replicas of the mail files which are being synchronized with a Lotus Notes Traveler client. The file name of this database is which of the following?
    A. travcldir.nsf
    B. mduserdir.nsf
    C. ntsclcache.nsf
    D. Lntravcache.ndk
    Answer: C
    QUESTION NO: 3
    Charlie is preparing an upgrade of the Notes clients and is testing the Smart Upgrade Tracking feature. When he tries to manually initiate a Smart Upgrade he receives the error “File Does Not Exist”. What could be the cause of this error?
    A. A Desktop Policy is not configured
    B. The id file is missing from the person document
    C. The Smart Upgrade Tracking database is not named “Smart Upgrade Tracking”
    D. The Smart Upgrade Tracking database name is incorrect in the Desktop Policy
    Answer: D
    QUESTION NO: 4
    Carl, the Domino administrator, wishes to migrate users to dynamic policies in his Domino
    environment. Which of the following will occur when he completes this task?
    A. Groups with each policy name are create and users are assigned to the new group policies
    B. Users are added to policy documents and applied policies are removed from their person document
    C. Policies are added to the necessary person documents and document links are assigned to the policy documents
    D. Policies are removed from the users entirely until they reauthenticate and the new dynamic policies are applied
    Answer: B
    QUESTION NO: 5
    After DAOS is enabled and functioning on your Domino server, which of the following occurs when a recipient opens a document with an attachment that is in the DAOS repository?
    A. Attachment icons display with a link icon over the attachment icon
    B. Attachment icons display a doclink to the attachment stored in DAOS
    C. Attachment icons display the same as it would on a server without DAOS enabled
    D. Attachment icons do not show and they are replaced with text that describes the attachment and is linked to the attachment
    Answer: C

C2040-956 C2040-923 test online

C2040-956 C2040-923 test online

  • Code:C2040-956 C2040-923
  • Click Here: more information
  • Exam Demo:
  • C2040-923 Question And Answer
    QUESTION NO: 1
    Bob is building a site that is displayed using either IBM Web Content Manager or a web server. It is not using any IBM WebSphere Portal features such as portlets. The content is static and is only updated periodically. What delivery mechanism is best suited for this scenario?
    A. Servlet delivery
    B. Pre-rendered delivery
    C. Local, web-content, viewer delivery
    D. Remote, web-content, viewer delivery
    Answer: B
    QUESTION NO: 2
    Which of the following direct migration paths to IBM WebSphere Portal 8.0 are supported?
    A. WebSphere Portal 5.1.0.x and 6.1.0.x.
    B. WebSphere Portal 6.0.0.x and 7.0.0.x.
    C. WebSphere Portal 6.1.5.x and 7.0.0.x.
    D. All of the above.
    Answer: C
    QUESTION NO: 3
    George is gathering requirements for an IBM WebSphere Portal implementation. Among the requirements is that the portal remembers the names of the most recently logged in users from a particular browser, so that they are not required to log in each time they visit the site. How would George best implement this requirement?
    A. George has to create a custom login portlet that reads and writes from a cookie that he has to define.
    B. George has to develop a trust association interceptor that bypasses the portal login.
    C. George has to implement a third-party authentication mechanism.
    D. George can use the built-in Remember Me functionality.
    Answer: D
    QUESTION NO: 4
    IBM has confirmed that a single IBM WebSphere Portal installation can support __________ Virtual Portals.
    A. 65
    B. 115
    C. 300
    D. 215
    E. All of the above.
    Answer: E
    QUESTION NO: 5
    When setting up security for a stand-alone IBM WebSphere Portal profile that will become part of a cluster, which of the following statements is correct?
    A. Security should be set up on the stand-alone node prior to joining the deployment manager cell.
    B. Security should be set up on the deployment manager cell after the node is added.
    C. It makes no difference whether security is set up before or after the WebSphere Portal node joins the deployment manager cell.
    D. The IBM WebSphere Integrated Solutions console, not WebSphere Portal security tasks, should be used to configure security.
    Answer: B
    C2040-956 Question And Answer
    QUESTION NO: 1
    While creating the ID vault, you must configure the organizations that trust the vault for ID storage.
    Which of the following does this create?
    A. User policy configurations
    B. ID vault administrator accounts
    C. Vault trust certificates in the Domino Directory
    D. Certifier ID files of the organizations or organizational units with vault trust certificates
    Answer: C
    QUESTION NO: 2
    Terry is working on a document in a database on a server that is DAOSenabled. While in the document, Terry replaces the attachment with a new version. Which of the following occurs to the attachment in the DAOS store?
    A. The server adjusts references to the attachment in DAOS
    B. The server removes the reference from all mail files that pointed to that original file reference
    C. The server removes the previous attachment entirely from DAOS and inserts the link to the new attachment
    D. The server sends the full previous attachment to all user mail files that pointed to that original file reference
    Answer: A
    QUESTION NO: 3
    To remove an ID vault from a Domino server, you must be a vault administrator, have Editor Access to the Domino Directory, and which of the following?
    A. Have access to the vault ID file and password
    B. Have Manager rights to the Administration Process database
    C. Have the ability to delete user policy documents from the Domino Directory
    D. Have physical access to the operating system to complete the removal process
    Answer: A
    QUESTION NO: 4
    You are attempting to utilize the widget catalog to provision features from your central update site for your Standard Notes clients. You have populated the widget catalog on the server. When will the client receive the new feature?
    A. When the user’s local widgets catalog is updated
    B. When the user next synchronizes the locally stored policies
    C. When the administrator adds the proper role to users in the widget catalog
    D. When the user’s desktop policy is refreshed with the new widget information
    Answer: A
    QUESTION NO: 5
    To utilize Domino Configuration Tuner, the person running the tool must have which of the
    following rights?
    A. At least Designer access to the Domino Directory as well as Read access to the Domino server log files
    B. At least Read access to the Domino Directory as well as “View console access” as defined in the server documents
    C. At least Read access to the Domino Directory as well as “View only administrators” access as defined in server documents
    D. At least Editoraccess to the Domino Directory as well as “Full access administrators” access as defined in server documents
    Answer: C