IT資格を学ぶ、killtestブログ

killtestブログは世界最も最新のITテスト問題集を提供いたします!

BI0-150

2010-07-01 12:31:34 | 日記
COGNOS Cognos Buiness Intelligence Certifications BI0-150

1. Are you an:
A. IBM Customer
B. IBM Partner
C. IBM Employee
Answer: A

2. If you are successful with this exam, do you agree to have your name made available to relevent IBM
personnel for project staffing?.
A. Yes
B. No
Answer:A

3. Which of the following is true when Cognos 8 gateway receives a request?
A. Requests are passed directly to the Cognos content manager.
B. A connection is created to the database server.
C. The requests are directed to Access Manager.
D. Passwords are encrypted to ensure security.
Answer: D

4. Which of the following is true about Cognos 8 dispatchers?
A. Requests can be routed to specific dispatchers based on packages or user group requirements.
B. Each Java Virtual Machine (JVM) can have multiple dispatchers.
C. The administrator must register a new dispatcher manually.
D. Dispatchers cannot be managed as part of a folder set.
Answer: A

5. What is a portlet?
A. The routing subsection of a listener port.
B. A mechanism for displaying web content as part of a portal page.
C. A credential that is stored on the Web server.
D. A credential that is stored for the session only.
Answer: B

0B0-410試験

2010-07-01 10:45:00 | 日記
BEA BEA8.1 Certified Architect Certification 0B0-410

1. When configuration changes are being made to a domain by an administrative user after acquiring a
lock, which of the following statement is true?
A.The lock expires in 30 minutes by default after which the changes are rolled back
B.The lock can be acquired by another other administrative user in which case the changes currently
pending will be rolled back
C.The lock can be acquired by another other user of the administrative category in which case the
changes currently not committed will be inherited by the user who acquired the lock
D.The lock cannot be acquired by others which an administrative user is holding the lock.
ANSWER: C
2. If there is problem with one of the transactions started by an EJB application, which one of the following
would be a starting point for troubleshooting this scenario?
A.Use a text editor to view the transaction log file for information about the failed transaction.
B.Use WebLogic Server log file for the respective server to gain more information about the failed
transaction.
C.Use Smart Update GUI to update the failed transaction and commit it.
D.Use the HTTP log file for the respective sever to gain more information about the failed transaction.
ANSWER: B
3. Poison message in JMS occurs when:
A.a JMS Message was sent to wrong queue with AUTO_ACKNOWLEDGE option set
B.a standalone receiver with client acknowledgment, does NOT call session.acknowledgement()
C.a javax.jms.JMSSecurityException was thrown while sending a message to a queue/topic
D.a MDB with option set to Auto-acknowledge receives a message
ANSWER: B
4. When diagnosing a native out of memory issue with one of the managed servers in a cluster, which of
the following recommendations will not be useful in collecting appropriate information?
A.Use '-verbosegc' JVM arugment to collect heap usage information.
B.Record the process virtual memory size periodically using OS tools.
C.Check whether your application uses some JNI code or third party native modules.
D.All of the above
E.None of the above
ANSWER: D
5. Which two of the following statements are true about developing a Java web service? (Choose two)
A.Must have a private constructor
B.Must include at a minimum, a @WebService JWS annotation
C.May reference a service endpoint interface
D.All of the above
ANSWER: BC
6. Users are reporting that they cannot access an application on the server using virtual host names. To
debug this issue; the traffic received by each virtual host can be viewed by
A.Configuring and enabling Domain Log Filters
B.Configuring audit logs for logging HTTP requests
C.Enabling HTTP access log for each virtual host
D.Configuring and assigning network channels for each user
ANSWER: C
7. Smart Update is used for
A.updating an existing version of application with a new version in production
B.installing maintenance patches and service packs for WebLogic Server
C.updating the DTD based deployment descriptor(s) of a J2EE Application or Module to schema based
deployment descriptor(s)
D.updating the JDBC driver used by DataSources in a JDBC System Module automatically
ANSWER: B
8. When using WLDF to perform diagnostics tasks with WebLogic Server 9.x, which one of the following is
true?
A.WLDF configuration can only be done on the server-level
B.WLDF configuration can only be done on the application-level
C.WLDF configuration can be done both on the server-level and on the application-level
D.WLDF configuration can only be done on the domain-level
ANSWER: C
9. Which of the following version of Node Manager runs with a larger footprint when compared with the
others?
A.Java Version with SSL
B.Java Version without SSL (plain)
C.RSH Version
D.SSH Version
ANSWER: A
10. What is the order in which the upgrade should be run when upgrading to 9.x?
A.Security providers, node manager, managed server
B.Node manager, security providers, managed server
C.Managed server, security providers, node manager
D.Security providers, managed server, node manager
ANSWER: A