goo blog サービス終了のお知らせ 

killtestのIT問題集ブログ

killtestの最新試験参考書を提供し、合格することが保証できます!

000-378テストはkilltest提供いたします 000-378問題集を無料ダウンロート

2010-02-24 11:59:29 | 日記
killtestのIBM certifications I の問題は経験のある専門家が000-378試験問題の研究に力を尽くして出したの問題集でございます、000-378は100%合格することはkilltesが提要いたします、IBM WebSphere DataPower SOA Appliances, Firmware V3.7.3試験はIT分野で重要な資格認証になっています、英語版を提供いたします。

000-378

1. A customer is receiving binary packed EDI using S/MIME over HTTP and S/MIME over FTP. They
currently use WebSphere Partner Gateway and WebSphere Transformation Extender to send functional
acknowledgements, convert the message, and send a correlated response. They are interested in
improving performance and scaling this architecture to remove some of the processing overhead.
How could DataPower SOA Appliances provide a benefit to the customer in this scenario?
A. Add XS40 appliances in the DMZ to provide WS-Security decryption of the secure payload
B. Add XI50 appliances to convert the EDI to XML and send functional acknowledgements
C. Add XI50 appliances to parse the attachments on the request messages and deposit the result on a
WebSphere MQ queue
D. Add XB60 appliances to move the security functionality to the DMZ and send MDN acknowledgements
E. Add XM70 appliances to send unicast UDP responses to the clients
Answer: D

2. Which is NOT a feature of Configuration Checkpoint Management?
A. The administrator can limit the number of Checkpoint configurations maintained.
B. Configuration objects can be imported from Checkpoint configurations.
C. Checkpoint configurations can be deleted from file system.
D. Checkpoint configurations may be compared against the running configuration.
E. Checkpoint configurations may be compared against the persisted configuration.
Answer: B

3. A company requires syncpoint on each message extracted from a Request Queue. The Message is
processed via HTTP by a backend system. If the DataPower device does not successfully process the
message, it should not be removed from the Request Queue. They have created a Multi-Protocol
Gateway Service which uses an MQ Front Side Handler and an MQ Queue Manager to facilitate this.
How can they implement syncpoint?
A. Set the Queue Manager objects Units Of Work property to 1
B. Set the Queue Manager objects Total Connection Limit property to 1
C. The DataPower device utilizes an MQ Client, syncpoint cannot be implemented
D. The DataPower device utilizes an MQ Client, syncpoint is implemented by default
E. Create two Queue Manager objects, assign the Request Queue to one Queue Manager and the Reply
Queue to the other then add them both to a single MQ Queue Manager Group
Answer: A

4. Which method finds a host's hardware address when only its IP address is known?
A. DNS (Domain Name Service)
B. ARP (Address Resolution Protocol)
C. HSRP (Hot Standby Routing Protocol)
D. DHCP (Dynamic Host Configuration Protocol)
Answer: B

5. Which statement is true about the TCP protocol?
A. TCP is unreliable since it does not support checksum.
B. TCP has no capability to sequence transmitted packets.
C. TCP sends back an ACK packet if the transfer was successful.
D. TCP is usually faster than UDP and is required for any multicasting transmission.
Answer: C

6. Regarding asymmetric keys and certificates, a certificate contains a subject's:
A. private key and the encrypted data.
B. private key and the identification of the issuer of the certificate.
C. public key and private key.
D. public key and the encrypted data.
E. public key and the identification of the issuer of the certificate.
Answer: E

7. Which statement is true about SSL security?
A. SSL is located above the HTTP protocol layer so the HTTP headers are still in plaintext.
B. SSL provides message level security so that intermediary nodes cannot see the message contents.
C. SSL provides transport layer security such that data is secure between the endpoints of a connection.
D. SSL sits below the TCP/IP layer such that the TCP functions (error control, packet marshalling, etc.)
are secure.
Answer: C

8. Which statement is true about SSL endpoint authentication?
A. SSL always authenticates the client since the client certificate is always sent to the server.
B. SSL always authenticates the server since the server certificate is always sent to the client.
C. SSL guarantees the identities of the endpoints since certificates are required to flow both ways.
D. SSL is optional; it depends on the cipher suite requested by the client.
Answer: B