-
Your customer has converted from traditional servers to BladeCenter technology and has a requirement for an RSA adapter on a new BladeCenter server. Which of the following options would you use? ()
A . Remote Supervisor Adapter II (RSA II Slimline)
B . Management Module, which comes standard on the BladeCenter
C . Acoustic Attenuation Module
D . Ethernet NIC
-
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
A . Virtual Gateway
B . Real-IP Gateway
C . NAT Gateway
D . Central Gateway
-
Your customer wants to build a network for a financial trading floor that has a requirement for multiple high-value transactions, which are also vital to the customer. What are the two most critical requirements? ()(Choose two.)
A . no single point of failure
B . trading database server location
C . redundant application servers location
D . deterministic response to all failures
E . determine which protocol to use
-
Your end user customer has not requested a ServicePac to cover the base unit and options they have purchased. What is a compelling reason to offer service? ()
A . IBM ServicePacs remove a liability from you the reseller in the event of fire
B . IBM ServicePacs remove a liability from you the reseller in the event of flooding
C . IBM ServicePacs provide improved warranty coverage
D . Service just adds a layer of cost you do not need
E . all of the above
-
An AIX 5.3 customer has a Power 780 in a 2-meter (T42) rack. This rack needs to be moved six inches (15cm) to allow under-floor access. What preparation for moving the rack will result in the least disruption to end-users?()
A . Initiate LPAR fallover to backup systems.
B . Use Live Partition Mobility to move the LPARs to other systems.
C . Use Live Application Mobility to move critical applications to alternate systems.
D . Back up all LPARS to a NIM server and restore them to other LPARs on other systems.
-
A customer has been working with your company to purchase an iDataPlex cluster. They have a configuration from IBM and are getting ready to place an order. Which should be done of the following?()
A . A solution sizing questionnaire
B . Verify the customer has the proper racks
C . A Technical Delivery Assessment
D . Verify the customer has enough cooling in the computer room
-
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
A . Virtual Gateway
B . Real-IP Gateway
C . NAT Gateway
D . Central Gateway
-
Which of the following WebSphere Commerce user roles can create new customer care queues?()
A . Account Representative
B . Customer Service Representative
C . Logistics Manager
D . Customer Service Supervisor
-
Your company has users who connect remotely to the main office though a Windows Server 2008 VPN server. You need to ensure that users cannot access the VPN server remotely from 22:00 to 05:00. What should you do()?
A . Create a network policy for VPN connections. modify the Day and time restrictions.
B . Create a network policy for VPN connections. apply an ip filter to deny access to the corporate network.
C . Modify the Logon hours for all users objects to specify only the VPN server otn he computer restrictions option
D . Modify the Logon hours for the default domain policy to enable the Force logoff when logon hours expire option.
-
Your company has client computers that run Windows 7 Enterprise. You need to provide 10 users with an additional operating system boot option. What should you do?()
A . Use Bootcfg to modify the boot parameters.
B . Use the DiskPart tool in Windows PE to attach a Virtual Hard Drive (VHD).
C . Use BCDedit to add a native-boot Virtual Hard Drive (VHD) entry to the boot menu.
D . Use BCDboot to modify the system partition.
-
Your company has an Active Directory forest that contains client computers that run Windows Vista and Windows XP. You need to ensure that users are able to install approved application updates on their computers. Which two actions should you perform()
A . Set up Automatic Updates through Control Panel on the client computers.
B . Create a GPO and link it to the Domain Controllers organizational unit. Configure the GPO to automatically search for updates on the Microsoft Update site.
C . Create a GPO and link it to the domain. Configure the GPO to direct the client computers to the Windows Server Update Services (WSUS) server for approved updates.
D . Install the Windows Server Update Services (WSUS). Configure the server to search for new updates on the Internet. Approve all required updates.
-
Your company has an active directory forest that has five domains. All DNS servers are domain controllers. You need to ensure that users from all domains are able to access a web server named App1 by browsing http://App1. What should you do?()
A . Configure and enable DFS-R on the App1 Web Server.
B . Create a host (AAAA) record for the App1 Web server in the DNS zone for the forest root domain.
C . Create a zone named GlobalNames on a DNS server. Replicate the GloballNames zone to all domain controllers in the forest. Create a host (A) record for the App1 Web server in the zone.
D . Create a zone named LegacyWNS on a DNS server. Replicate the LegacyWNS zone to all domain controllers in the forest. Create a host (A) record for the App1 Web server in the zone.
-
Your organization has Exchange Server 2010.You need to ensure that users in the organization are notified before they send e-mail messages to external recipients. Which cmdlet should you run?()
A . set-Mailbox
B . set-OrganizationConfig
C . set-TransportAgent
D . set-TransportConfig
-
A customer needs to add three JS22 blade servers. The customer currently has three HS21 Blade servers and one LS41 4-socket Blade Server. Based upon this information, what additional items does the customer need to purchase? ()
A . An IBM BladeCenter H chassis for the JS22 Blade servers
B . A concurrent KVM daughter card
C . A pair of IBM BladeCenter Power Supplies
D . A second Management Module
-
A customer needs to implement a Highly Available solution for JMS that has a primary data center and a backup. Which three steps would you perform when designing your solution?()
A . Store Transaction Logs in a database and use Database stores for JMS to make replication between sites easier.
B . Use file based Transaction Logs and JMS stores and implement a separate replication solution for files in addition to database in case database replication fails.
C . Implement Oracle RAC at each site to provide a highly available solution within each datacenter.
D . Configure Whole Server Migration to migrate WebLogic Managed Servers from the primary to the secondary site.
E . Configure Automatic Service Migration for JMS high availability within a datacenter.
-
Your network has client computers that run Windows 7. A custom Web-based application requires specific security settings. You need to prevent users from permanently modifying their Internet Explorer browser’s security settings. What should you do?()
A . Use Windows Internet Explorer Maintenance (IEM) extension settings in Preference mode.
B . Use Windows Internet Explorer Maintenance (IEM) extension settings in Normal mode.
C . Reset the Internet Explorer settings.
D . Restore the advanced settings in Internet Explorer.
-
You need to design a remote access strategy for the customer support users when they work from home. Your solution must meet security requirements. What should you do?()
A . Deploy an L2TP/IPsec VPN server in each call center. Configure the portable computers as L2TP VPN clients
B . Create IPSec tunnel mode connections between the customer support users home and the company’s Internet-facing routers
C . Create IP packet filters on the company’s Internet-facing routers to allow the Remote Desktop Protocol (RDP).Create IPSec filters on the terminal servers to allow only connections that use RDP
D . Create IP packet filters on the company’s Internet-facing routers to allow the IPSec protocols. Assign the Secure Server (Require Security) IPSec policy to the terminal servers. Assign the Client (Respond only) IPSec policy to the portable computer
-
A customer has received a quotation from Dell for Intel-based 1U servers. What is the first step in submitting your quotation? ()
A . Try to sell IBM X-Architecture technology to the customer and explain its benefits.
B . Take the customer to the Dell Web site for determining a similar server configuration.
C . Submit a special bid to receive additional discount on 1U servers.
D . Design a comparable solution while highlighting IBM advantages.
-
One of your customer has six sites, three of which process a large amount of traffic among them.He plans to grow the number of sites in the future. Which is the most appropriate design topology?()
A . full mesh
B . peer-to-peer
C . partial mesh
D . hub and spoke
-
A medical customer has an installed HS21 blade with no local disk. They are attempting to set up boot from SAN using a Windows 2003 CD. Which sequence is correct for this procedure? ()
A . Install Windows from the CD using the QLogic driver provided on the CD, configure the LUN and zone for the target server, and then configure the blade UEFI to boot from SAN.
B . Configure the LUN and zone for the target server, install Windows from the CD and press F6 when prompted to supply the driver, and then configure the QLogic adapter BIOS to boot from SAN.
C . Configure the LUN and zone for the target server, configure the QLogic adapter BIOS to boot from SAN, install Windows from the CD, and then press F6 when prompted to supply the driver.
D . Configure the blade UEFI to boot from SAN, configure the LUN and zone for the target server, and then install Windows from the CD using the QLogic driver provided on the CD
-
Your network contains a domain-based namespace named DFS1. DFS1 has Windows 2008 Server mode enabled. You need to ensure that only files and folders in DFS1 that users have permissions to access are displayed. What should you do?()
A . Disable referrals.
B . Modify the system access control list.
C . Enable access-based enumeration (ABE).
D . Modify the discretionary access control list.
-
A customer has multiple application servers which create one process for each connected user. All users share the same AIX environment. What is a benefit of using WPARs in this environment?()
A . WPARs give more controls for resource management than the traditional AIX operating system tools.
B . WPARs support Live Application Mobility which can be used to balance user processes acrosssystems.
C . WPARs each have a copy of the AIX kernel, offering better availability than a system without WPARs.
D . WPARs provide the ability to apply fixes specific for each environment, enabling the customer to create specialized application servers.
-
Your network consists of a single Active Directory domain. All servers run Windows Server 2003 ServicePack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3).You have a user account named User1.You need to identify which permissions User1 has on a file.What should you do?()
A. At a command prompt, run Net file.
B. At a command prompt, run Attrib.exe.
C. From the file properties, view the Summary settings.
D. From the file properties, view the Advanced Security settings.
-
Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP.When the users try to connect to the VPN server, they receive the following error message: °Error 721:The remote computer is not responding.You need to ensure that users can establish a VPN connection.What should you do?()
A. Open port 1423 on the firewall.
B. Open port 1723 on the firewall.
C. Open port 3389 on the firewall.
D. Open port 6000 on the firewall.