Test4pass IBM 000-641 real exam questions and answers
- 格式:pdf
- 大小:188.58 KB
- 文档页数:7
TThe safer , easier way to help you pass any IT exams.Exam : 000-101Title :Version : DemoVirtualization Technical Support for Aix and LinuxThe safer , easier way to help you pass any IT exams.1. Which of the following statements is true regarding implementing Live Partition Mobility on two existing POWER6 based systems?A.The systems must use internal storage for boot purposes.B.All virtualized ethernet adapters must be numbered below 10.C.The mobile partition's network and disk access must be virtualized.D.Each system must be controlled by a different Hardware Management Console (HMC). WArialCourier NewZANSWER: C2. Which of the following statements is true regarding virtual Ethernet redundancy?A.Specifying an IP Address to ping is optional with Network Interface Backup (NIB) and is optional with Shared Ethernet Adapter (SEA) failover.B.Specifying an IP Address to ping is optional with Network Interface Backup (NIB) and is required with Shared Ethernet Adapter (SEA) failover.C.Specifying an IP Address to ping is required with Network Interface Backup (NIB) and is required with Shared Ethernet Adapter (SEA) Failover.D.Specifying an IP Address to ping is required with Network Interface Backup (NIB) and is optional with Shared Ethernet Adapter (SEA) failover.WArialCourier NewZANSWER: D3. Which of the following can be used to re-deploy a system configuration in a disaster recovery scenario?A.System planB.System profileC.Critical console dataD.VIO server partition profileWArialCourier NewZANSWER: A4. A customer has 5 older POWER5 systems and they want to consolidate them onto a POWER6 system. What information is important to analyze when deciding how to design the new machine using the System Planning Tool?A.vmstat and iostat data from the older machinesB.The number of CPUs that were installed in the original machinesC.Data from Workload Estimator (WLE) and IBM Performance Management (PM)D.Performance data that is collected from the new system after it has been put into production WArialCourier NewZANSWER: CThe safer , easier way to help you pass any IT exams.5. The system administrator for a company plans to consolidate the workload of several ageing servers onto a new Power server. The administrator's intention is to virtualize all network and disk resources for each LPAR in the new system using VIOS 1.x.Which of the following is correct regarding MAC addresses and World Wide Port Names (WWPN) in a client partition?A.Each client LPAR will have its own MAC address and WWPN.B.Each client LPAR will have no unique MAC address or WWPN.C.Each client LPAR will have its own MAC address, but no unique WWPN.D.Each client LPAR will have no unique MAC address, but will have its own WWPN.WArialCourier NewZANSWER: C6. An administrator has a Power 570 in default configuration with a 4 port 1 Gbps Integrated Virtual Ethernet (IVE) adapter. A new application requires that the MCS value for the first port group of the IVE adapter be set to 1.If this change is made, what is the maximum number of logical ports, across both port groups, that the IVE adapter can provide?A.4B.16C.20D.32WArialCourier NewZANSWER: C7. A company has a new Power 570. They will install 2 LPARs and 1 VIO server. All networking will be virtualized.Their application requires a large amount of bandwidth, and Link Aggregation on the VIO server will be utilized.They have 4 dual port gigabit Ethernet cards. The network infrastructure team has advised the implementation team that they are able to allocate 8 ports split between two switches, SwitchA and SwitchB.How can Link Aggregation (LA) be configured for maximum possible bandwidth available for the LPARs?A.Configure 2 LA devices, each containing 2 ports from SwitchA and 2 ports from SwitchB, no backup interfaces.B.Configure 2 LA devices, each containing any 4 of the 8 available gigabit Ethernet interfaces and 1 backup interface.C.Configure 1 LA device with all 8 gigabit Ethernet interfaces split between the two switches, and no backup interface.D.Configure 2 LA devices, each containing 4 gigabit Ethernet interfaces connected to the same switch, no backup interfaces.WArialCourier NewZANSWER: D8. Which functionality would a customer use to share available CPU resources between AIX and Linux partitions on a Power system?A.Dynamic LPARB.Micro PartitionsC.Entitled capacityD.Multiple Shared Processor PoolsWArialCourier NewZANSWER: B9. A customer is interested in server consolidation of their AIX and POWER Linux (SLES 10) environments and sees virtualization as an important component of this.Which of the following options provides the required virtualization and optimizes the use of the hardware?A.A VIO server can provide virtualization capabilities of network and disk for both AIX and Linux clients.B.A VIO server partition with the PowerVM Lx86 for x86 installed can provide virtualization capabilities of network and disk for both AIX and Linux clients.C.A VIO Server partition can provide virtualization of network and disk for AIX clients. A separate Linux partition can provide virtualization of network and disk to Linux clients.D.A VIO Server can provide virtualization of network and disk for AIX clients. A separate Linux partition running PowerVM Lx86 for x86 can provide virtualization capabilities of network and disk to Linux clients. WArialCourier NewZANSWER: A10. A customer has a requirement to provide VLAN tagging and a highly available network infrastructure for the logical partitions. A dual VIO server environment with Shared Ethernet Adapters (SEAs) is in place. How can the customer support these requirements?A.Create a SEA failover infrastructure with each having a Virtual Ethernet with a unique PVID mapping to a Virtual Ethernet on the LPAR with unique PVID.B.Create a SEA failover infrastructure with each having a Virtual Ethernet with the same PVID mapping to a Virtual Ethernet on the LPAR with the same PVID.C.Create a Network Interface Backup (NIB) infrastructure with each SEA having a Virtual Ethernet with the same PVID mapped to a Virtual Ethernet with the corresponding PVID on the LPAR.D.Create a Network Interface Backup (NIB) infrastructure with each SEA having a Virtual Ethernet with a different PVID. Map one to a Virtual Ethernet with the corresponding PVID on the client LPAR. WArialCourier NewZANSWER: B。
IBM认证考试题库IBM认证考试题库IBM仍然是当今世界极具声望的计算机公司之一。
IBM根据其产品分类设置了相应的专业认证项目,那么IBM认证是什么呢?IBM认证的考试题库是什么?下面一起来看看吧!Exam : Microsoft 70-293Title : Plan. and Maint. a MSWin Srvr2003 Net. Infrastructure1. You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 50 application servers that run Windows Server 2003.The security configuration of the application servers is not uniform. The application servers were deployed by local administrators who configured the settings for each of the application servers differently based on their knowledge and skills. The application servers are configured with different authentication methods, audit settings, and account policy settings.The security team recently completed a new network security design. The design includes a baseline configuration for security settings on all servers. The baseline security settings use the Hisecws.inf predefined security template. The design also requires modified settings for servers in an application role. These settings include system service startup requirements, renaming the administrator account, and more stringent account lockout policies. The security team created a security template named Application.inf that contains the modified settings.You need to plan the deployment of the new security design.You need to ensure that all security settings for theapplication servers are standardized, and that after the deployment, the security settings on all application servers meet the design requirements.What should you do?A. Apply the Setup security.inf template first, the Hisecws.inf template next, and then the Application.inf template.B. Apply the Application.inf template and then the Hisecws.inf template.C. Apply the Application.inf template first, the Setup security.inf template next, and then the Hisecws.inf template.D. Apply the Setup security.inf template and then the Application.inf template.Answer: A2. You are the network administrator for your company. The network consists of a single Active Directory domain. All domain controllers run Windows Server 2003. All client computers run Windows XP Professional.The company has legacy applications that run on UNIX servers. The legacy applications use the LDAP protocol to query Active Directory for employee information.The domain controllers are currently configured with the default security settings. You need to configure enhanced security for the domain controllers. In particular, you want to configure stronger password settings, audit settings, and lockout settings. You want to minimize interference with the proper functioning of the legacy applications.You decide to use the predefined security templates. You need to choose the appropriate predefined securitytemplate to apply to the domain controllers.What should you do?A. Apply the Setup security.inf template to the domain controllers.B. Apply the DC security.inf template to the domain controllers.C. Apply the Securedc.inf template to the domain controllers.D. Apply the Rootsec.inf template to the domain controllers.Answer: C3. You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 10 domain controllers and 50 servers in application server roles. All servers run Windows Server 2003.The application servers are configured with custom security settings that are specific to their roles as applicationservers. Application servers are required to audit account logon events, object access events, and system events.Application servers are required to have passwords that meet complexity requirements, to enforce password history, and to enforce password aging. Application servers must also be protected against man-in-the-middle attacks during authentication.You need to deploy and refresh the custom security settings on a routine basis. You also need to be able to verify the custom security settings during audits.What should you do?A. Create a custom security template and apply it by using Group Policy.B. Create a custom IPSec policy and assign it by using Group Policy.C. Create and apply a custom Administrative Template.D. Create a custom application server image and deploy it by using RIS.Answer: A4. You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains two Windows Server 2003 domain controllers, two Windows 2000 Server domain controllers, and two Windows NT Server 4.0 domain controllers.All file servers for the finance department are located in an organizational unit (OU) named Finance Servers. All file servers for the payroll department are located in an OU named Payroll Servers. The Payroll Servers OU is a child OU of the Finance Servers OU.The company’s written security policy for the finance department states that departmental servers must have security settings that are enhanced from the default settings. The written security policy for the payroll department states that departmental servers must have enhanced security settings from the default settings, and auditing must be enabled for file or folder deletion.You need to plan the security policy settings for the finance and payroll departments.What should you do?A. Create a Group Policy object (GPO) to apply the Compatws.inf security template to computer objects, and link it to the Finance Servers OU.Create a second GPO to enable the Audit object access audit policy on computer objects, and link it to the PayrollServers OU.B. Create a Group Policy object (GPO) to apply the Securews.inf security template to computer objects, and link it to the Finance Servers OU.Create a second GPO to enable the Audit object access audit policy on computer objects, and link it to the PayrollServers OU.C. Create a Group Policy object (GPO) to apply the Compatws.inf security template to computer objects, and link it to the Finance Servers OU.Create a second GPO to apply the Hisecws.inf security template to computer objects, and link it to the Payroll Servers OU.D. Create a Group Policy object (GPO) to apply the Securews.inf security template to computer objects, and link it to the Finance Servers and to the Payroll Servers OUs.Create a second GPO to enable the Audit object access audit policy on computer objects, and link it to the PayrollServers OU.Answer: B5. You are a network administrator for your company. The network consists of a single Active Directory domain. The network contains 80 Web servers that run Windows 2000 Server. The IIS Lockdown Wizard is run on all Web servers as they are deployed.Your company is planning to upgrade its Web servers to Windows Server 2003. You move all Web servers into an organizational unit (OU) named Web Servers.You are planning a baseline security configuration for the Web servers. The company’s written security policy states that all unnecessary services must be disabled on servers.Testing shows that the server upgrade process leaves the following unnecessary services enabled:* SMTP* TelnetYour plan for the baseline security configuration for Web servers must comply with the written security policy.You need to ensure that unnecessary services are always disabled on the Web servers.What should you do?A. Create a Group Policy object (GPO) to apply a logon script that disables the unnecessary services. Link the GPO to the Web Servers OU.B. Create a Group Policy object (GPO) and import the Hisecws.inf security template. Link the GPO to the Web Servers OU.C. Create a Group Policy object (GPO) to set the startup type of the unnecessary services to Disabled. Link the GPO to the Web Servers OU.D. Create a Group Policy object (GPO) to apply a startup script to stop the unnecessary services. Link the GPO to the Web Servers OU.Answer: C6. You are the network administrator for your company. The network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003. The domain contains an organizational unit (OU) namedServers that contains all of the company’s Windows Server 2003 resource servers. The domain also contains an OU named Workstations that contains all of the company’s Windows XP Professional client computers.You configure a baseline security template for resource servers named Server.inf and a baseline security template for client computers named Workstation.inf. The Server.inf template contains hundreds of settings, including file and registry permission settings that have inheritance propagation enabled. The Workstation.inf template contains 20 security settings, none of which contain file or registry permissions settings.The resource servers operate at near capacity during business hours.You need to apply the baseline security templates so that the settings will be periodically enforced. You need toaccomplish this task by using the minimum amount of administrative effort and while minimizing the performance impact on the resource servers.What should you do?A. Create a Group Policy object (GPO) and link it to the domain. Import both the Server.inf and the Workstation.inf templates into the GPO.B. Import both the Server.inf and the Workstation.inf templates into the Default Domain Policy Group Policy object (GPO).C. On each resource server, create a weekly scheduled task to apply the Server.inf settings during off-peak hours by using the secedit command. Create a Group Policy object (GPO) and link it to the Workstations OU. Import the Workstation.inf template into the GPO.D. On each resource server, create a weekly scheduled task to apply the Server.inf settings during off-peak hours by using the secedit command. Import the Workstation.inftemplate into the Default Domain Policy Group Policy object (GPO).Answer: C7. You are the network administrator for your company. The network consists of a single Active Directory domain.The company’s written security policy requires that computers in a file server role must have a minimum file size for event log settings. In the past, logged events were lost because the size of the event log files was too small. You want to ensure that the event log files are large enough to hold history. You also want the security event log to be cleared manually to ensure that no security information is lost. The application log must clear events as needed.You create a security template named Fileserver.inf to meet the requirements. You need to test each file server and take the appropriate corrective action if needed. You audit a file server by using Fileserver.inf and receive the results shown in the exhibit. (Click the Exhibit button.)You want to make only the changes that are required to meet the requirements.Which two actions should you take? (Each correct answer presents part of the solution. Choose two.)A. Correct the Maximum application log size setting on the file server.B. Correct the Maximum security log size setting on the file server.C. Correct the Maximum system log size setting on the file server.D. Correct the Retention method for application log setting on the file server.E. Correct the Retention method for security log setting on the file server.F. Correct the Retention method for system log setting for the file server.Answer: BE8. You are a network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.The Active Directory domain contains three organizational units (OUs): Payroll Users, Payroll Servers, and Finance Servers. The Windows XP Professional computers used by the users in the payroll department are in the Payroll Users OU. The Windows Server 2003 computers used by the payroll department are in the Payroll Servers OU. The Windows Server 2003 computers used by the finance department are in the Finance Servers OU.You are planning the baseline security configuration for the payroll department. The company’s written security policy requires that all network communications with servers in the Payroll Servers OU must be secured by using IPsec. The written security policy states that IPSec must not be used on any other servers in the company.You need to ensure that the baseline security configuration for the payroll department complies with the written security policy. You also need to ensure that members of the Payroll Users OU can access resources in the PayrollServers OU and in the Finance Servers OU.What should you do?A. Create a Group Policy object (GPO) and assign the SecureServer (Require Security) IPSec policy setting. Linkthe GPO to only the Payroll Servers OU.Create a second GPO and assign the Client (Respond Only) IPSec policy setting. Link the second GPO to thePayroll Users OU.B. Create a Group Policy object (GPO) and assign the Secure Server (Require Security) IPSec policy setting. Linkthe GPO to the Payroll Servers OU and to the Finance Servers OU.Create a second GPO and assign the Client (Respond Only) IPSec policy setting. Link the second GPO to thePayroll Users OU.C. Create a Group Policy object (GPO) and assign the Server (Request Security) IPSec policy setting. Link the GPO to only the Payroll Servers OU.Create a second GPO and assign the Client (Respond Only) IPSec policy setting. Link the second GPO to thePayroll Users OU.D. Create a Group Policy object (GPO) and assign the Server (Request Security) IPSec policy setting. Link the GPO to the Payroll Servers OU and to the Finance Servers OU.Create a second GPO and assign the Client (Respond Only) IPSec policy setting. Link the second GPO to thePayroll Users OU.Answer: A9. You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.The network contains servers that have Terminal Server enabled. The terminal servers host legacy applications thatcurrently require users to be members of the Power Users group.A new requirement in the company’s written security policy states that the Power Users group must be empty on all resource servers.You need to maintain the ability to run the legacy applications on the terminal servers when the new security requirement is implemented.What should you do?A. Add the Domain Users global group to the Remote Desktop Users built-in group in the domain.B. Add the Domain Users global group to the Remote Desktop Users local group on each terminal server.C. Modify the Compatws.inf security template settings to allow members of the local Users group to run theapplications. Import the security template into the Default Domain Controllers Policy Group Policy object (GPO).D. Modify the Compatws.inf security template settings to allow members of the local Users group to run theapplications. Apply the modified template to each terminal server.Answer: D10. You are the network administrator for your company. All servers run Windows Server 2003.You configure a baseline security template named Baseline.inf. Several operations groups are responsible for creatingtemplates containing settings that satisfy operational requirements. You receive the templates shown in the following table.Operations groupTemplate nameApplies toFile and PrintFile.infFile serversDatabaseDb.infDatabase serversSecuritySec.infAll resource serversThe operations groups agree that in the case of conflicting settings, the priority order listed in the following table establishes the resultant setting.TemplatePrioritySec.inf1Baseline.inf2Specific server role template3You need to create one or more Group Policy objects (GPOs) to implement the security settings. You want tominimize the amount of administrative effort required when changes are requested by the various operations groups.What should you do?A. Create a GPO and import the following templates in the following order: Baseline.inf, Sec.inf. Create a GPO foreach server role and import only the specific template for that role into each respective GPO.B. Create a GPO and import the following templates in the following order: Sec.inf, Baseline.inf. Create a GPO for each server role and import only the specific template for that role into each respective GPO.C. Create a GPO for each server role and import the following templates in the following order: Baseline.inf, specific server role template, Sec.inf.D. Create a GPO and import the following templates in the following order: Sec.inf, Db.inf, File.inf, Baseline.inf.Answer: A【IBM认证考试题库】。
IBM笔试题(一)IBM笔试题第一部分:IPA T (IPA T 的全称是Information Processing Aptitude Test)。
PartI 15min 15Ques 矩阵排列PartII 4min 20Ques 数列猜测PartIII 5min (不记得多少题)Ques 数学计算PartIV 15min 15Ques 矩阵排列每部分单独发卷,卷子第一页是样板题。
没说开始考试,不让翻页。
时间到了就收走卷子,但是IPA T的答题卡是在最后所有答完再收。
答题方法,选哪个就在哪个地方画叉,一共有ABCDE五个选项。
题型和网上历年的题目一样,稍后做了一个总结。
记分方法:I和IV打错不扣分,II和III打错倒扣分第二部分:技术卷,答题时间是一个小时,有ABC三套卷子。
熟悉JA V A的选做AC,熟悉C++的选做BC。
题型为单选和多选,每题分值不同,做错不扣分,多选选不全得一半分。
我答的是BC卷,B卷全考C++,多为读程序选结果,类,字符串,指针之类的。
C卷什么都考,很细,UML、数据结构。
IPA T总结1:E D C B AC ADE BA DBC EB E D A CD C AE BStart at the fourth letter of Column 5 and follow the letters around the outside of the pattern in a clockwise direction. What is the second letter between the second E and the second B you come to?答案:C解析:根据题意,从第5列第4个字母开始,在矩阵元素外沿顺时针方向走,在第2个E 字母和第2个B字母之间的第二个字母应该为C,如图所示:2:A B 2 C 31 1 B 3 DA 1BC 45 A 5 2 BE 5 D 2 CIn the row that has more letters than numbers, in which the numbers are separated by only one letter, and in which the numbers sum to less than the sum of the numbers in the second column, which letter comes just before the second number, counting from right to left?答案:C解析:根据题意:(1)字母比数字多的行有第1行、第3行、第5行;(2)数字只被1个字母隔开的行只有第1行;(3)在第1行中,从右往左数,在第2个数字(即2)之前的字母应该为C。
TThe safer , easier way to help you pass any IT exams.Exam . 000-966Title .Version . DemoXIV Storage System Technical Solutions Version2ing the XCLI, which qualifiers are required to create a thin provisioned pool?A.pool, hard size, soft size, snapshot sizeB.pool, hard size, soft size, read block behaviorC.pool, resize allowed, maximum volumes, maximum snapshotsD.pool, read block behavior, maximum volumes, maximum snapshotsAnswer:A2.To improve system redundancy using its grid architecture, where in the XIV System can a partition be mirrored?A.on disks in other modulesB.on same disk in different modulesC.on different disks in the same moduleD.on same disk, in same module, and in different modulesAnswer:A3.Which two solutions, once installed and configured, can be used to move workloads without disruption? (Choose two)A.XIV partitionsB.XIV Data Mover (XDM)C.SAN Volume ControllerD.XIV Data Migration FunctionE.Tivoli Storage Productivity Center for Replication V4Answer:C D4.When defining a volume on a thin-provisioned pool on an XIV System, the size of the volume is limited byA.the hard capacity of the volumeB.the 2 TB maximum volume size on XIVC.the hard capacity of the storage poolD.the soft capacity of the storage poolAnswer:D5.On the XIV System, what is the approximate rebuild time for a 1 TB drive that is 50% utilized?A.5 minutesB.15 minutesC.30 minutesD.120 minutesAnswer:B6.A customer has ordered a 10 module XIV System. How many interface modules are active in this configuration?A.3B.4C.5D.6Answer:B7.When using the SAN Volume Controller (SVC) as a host for a full 15 module XIV Storage System, how many ports are recommended to be connected to the SVC?A.8B.12C.16D.24Answer:B8.What helps ensure that the XIV System's cache does NOT become a bottleneck?A.central cache locking mechanisme of industry standard chip technologyC.each module is responsible for caching the data in that moduleD.having all modules understand what is held in cache at all timesAnswer:C9.What is a requirement to connect a V6R1 IBM i host to an XIV Storage System?A.XIV firmware V10.0.8B.Host Attachment Kit V1.0.1C.SAN Volume Controller (SVC) V4.2D.Virtual I/O Server (VIOS) V2.1.1Answer:D10.What are benefits of the XIV Storage System's distribution compared to traditional mid-level striping distributions?A.no orphan space and optimal distribution over timeB.no orphan space and optimal distribution at time of creationC.minimal performance tuning and automatic capacity allocationD.consistent distribution and regular performance tuning requiredAnswer:A11.What is required for IBM System i multi-pathing when connecting to an IBM XIV System?e native multipath drivers supported by VIOSB.IBM i multi-pathing across two IBM Virtual I/O ServersC.logical volume connected to VIOS via multiple physical host portsD.two VIOS partitions provide redundant paths to the same set of LUNsAnswer:C12.Which XIV System feature helps to decrease total cost of ownership by simplification of the configuration process?A.ease of creating RAID groupsB.mapping volumes to physical drivesmon SDD / SDDPCM for multipathingD.easy to use Graphical User Interface (GUI)Answer:D13.An administrator is migrating data from legacy storage to an XIV System. What is the behavior of the host systems during this process?A.all volumes are transferred in parallel ensuring equal accessB.the same volumes are seen from both the XIV System and the legacy systemC.host I/O continues normally as long as the legacy system is not powered offD.performance is reduced as the XIV System duplicates 1 MB partitions across all drivesAnswer:C14.Which feature helps keep copies consistent during a re-sync or link failure while remote mirroring?A.MPIOB.snapshotC.thin provisioningD.redirect-on-writeAnswer:B15.What is the recommended release of SAN Volume Controller (SVC) firmware when connecting the XIV Storage System to SVC?A.4.2.0.5B.4.2.1.8C.4.3.0.1D.4.3.1.4Answer:D16.In an XIV System, what reduces the occurrence of double disk failure?A.quick rebuild times utilizing all drivesB.IBM XIV patented disk architecture combined with 4x cooling fansC.continuous scrubbing that realigns the blocks for optimum data integrityD.SATA drives that are exclusively manufactured to meet IBM XIV requirementsAnswer:A17.An XIV System is regaining redundancy after a drive failure in a 15 module system. From how many drives is data being read?A.12B.72C.168D.180Answer:C18.An IBM Service Representative replaces a data module in an XIV System. What happens to the data when the new module is installed?A.a new data table is createdB.a new inode table is createdC.a new matrix table is createdD.a new distribution table is createdAnswer:D19.A customer wishes to purchase a storage controller for a mixed workload of random I/O and sequential backups. The customer has heard that SATA is good for sequential but has bad performance on random workloads, and is thus reluctant to purchase an XIV System. What should the technical specialist's response be?A.The XIV System excels at mixed workloads due to the distribution of partitions.B.The XIV System excels at mixed workloads due to the use of redundant Ethernet switches.C.The XIV System excels at mixed workloads due to the use of multi-processor interface modules.D.The XIV System excels at mixed workloads due to the mixture of fibre channel and iSCSI host connections.Answer:A20.In an XIV System, from where do the XIV modules boot?A.SSDs in Data Modulespact Flash in each moduleC.A hard drive internal to Data ModulesD.Hidden partition in Disk 1 of each moduleAnswer:B。
Exam:Cisco642-243Title:Unified Contact CenterEnterprise Support Exam Version:Demo1.In a Cisco Unified Contact Center Enterprise system,a new agent and phone have been added to the system;however,the agent is unable to log in to the system.The agent is using the same type of phone and and has the same CTI OS desktop setup as other agents who are able to log in without issue.What are two possible causes for this issue?(Choose two.)A.The incorrect CTIOS Server IP and Port are configured on the new agent's CTI desktop.B.The new phone used by the agent is not associated with IVRJtapiUser.C.A new Device Target needs to be added for the phone in the Config(for example,/devtype ipphone/DN 12345).D.The phone has call forwarding and call waiting enabled.E.The new phone used by the agent is not associated with PGJtapiUser.Answer:CE2.Refer to the exhibit.In the Cisco Unified Contact Center Enterprise solution,there are a number of different log files that are generated by different components and processes in the solution.Identify the specific process that generated the log file.A.CTI OS(Server)B.CTI OS(Client)C.JTAPI Gateway(jgw)D.UC Manager PIM(Enterprise Agent PIM)E.ICM Call Router(rtr)Answer:D3.Refer to the exhibit.In a Cisco Unified Contact Center Enterprise deployment,the call flow allows the caller to opt out and leave a voice-mail message for an agent team while in queue.The Cisco Unified IP IVR application"Script1.aef"is called to prompt the caller and transfer the call to voice mail.What impact does the script shown in the exhibit have on the system?A.Calls that are sent to voice mail from the Cisco Unified IP IVR script will appear as"Abandoned"in the Cisco Unified CCE Call Type reporting.B.Calls that are sent to voice mail from the Cisco Unified IP IVR script will appear as"Transferred Out"in the Cisco Unified CCE Call Type reporting.C.Calls that are sent to voice mail from the Cisco Unified IP IVR script will appear as"Handled"in the Cisco Unified CCE Call Type reporting.D.All calls that are sent to this script will be sent to the vmEXT using the Call Redirect step.E.Callers will remain in queue after they leave the voice-mail message.Answer:A4.In addition to enabling tracing in the Cisco Unified IP IVR,what additional trace files would be helpful in troubleshooting calls that are being dropped in the Cisco Unified IP IVR for the Cisco Unified Contact Center Enterprise solution?(Choose two.)A.Cisco Unified Communications Manager>CM Services>CM Services>Cisco CallManager>Debug Trace Level set to DetailedB.Cisco Unified Communications Manager>CM Services>CM Services>Cisco CallManager>Debug Trace Level set to ErrorC.Cisco Unified Communications Manager>CTI Services>SDI>Debug Trace Level set to ErrorD.Cisco Unified Communications Manager>CTI Services>Cisco CTIManager>Debug Trace Level set to DetailedE.Cisco Unified Communications Manager>CM Services>Cisco CTIManager>Debug Trace Level set to DetailedAnswer:AE5.In a Cisco Unified Contact Center Enterprise system,external callers being queued on the Cisco Unified IP IVR are reporting voice quality issues with the Cisco Unified IP IVR prompts as being"choppy."Which two actions would be helpful in finding the problem?(Choose two.)A.Check that the codec configuration matches between the voice gateway configuration on the Cisco Unified Communications Manager,and the codec configured on the Cisco Unified IP IVR/CRS server.B.Trace the voice path of a problem call through the network,collecting and analyzing traffic from the voice gateway and Cisco Unified IP IVR/CRS server.C.Enable Performance Monitor counters on the Cisco Unified IP IVR/CRS server to monitor CPU and memory usage.D.Collect JTAPI logs from the Cisco Unified IP IVR to investigate any errors with the call control messages.E.Verify the MTP resources that are available in Cisco Unified Communications Manager for this call flow. Answer:BC。
IBM笔记本错误代码开机错误代码检查范围及解决方法10X101:(中断故障)102:(计时器故障)103:(计时器中断故障)104:(保护模式故障)105: Last 8042 command not accepted;107:(NMI 测试失败)108: Timer bus test failure.109:(主板问题)110 :(内存奇偶校验出错)111: (I/O parity.)1101:(A串行口测试失败)1201:(B 串行口、红外线口测试失败)158 :(超级用户密码已设,但硬盘密码没有设置)159 :(硬盘密码与超级用户密码不一样)161:(CMOS 电池不行)163:(系统时间没有设好或混乱)173:(CMOS 设备配置信息丢失)175、178: EEPROM CRC #1 error.177: Supervisor password check sum error.178: EEPROM is not functional. 1. System board. (检查主板)1701:(硬盘控制器故障)1780, 1790:(主硬盘有问题)1781, 1791:(从硬盘有问题)183 :(超级用户开机密码不对)184:(Power-on 密码有误)password in Easy-Setup.(重设Power-on 密码)185:(系统启动顺序无效,怀疑是更新启动顺序时电源关掉)186 :(检查主板)190:(开机时,机内笔记本电池已快耗尽了)191XX: (PM 初始化错误,检查主板)192:(CPU 散热风扇故障,检查CMOS 备份电池的电压,电压不行时更换电池或要更换CPU风扇最后就是主板问题)195:(系统配置信息与实际配置不同,检查配置是否改动,内存有无增加等)196:(从硬盘的休眠区域中读写时,发生错误,检查硬盘、内存)201: Memory data error.202: Memory line error 00-15.203: Memory line error 16-23.205: Memory test failure on on-boardmemory.221: ROM to RAM remap error. 1. Go to Memory Checkout.2. DIMM card.3. System board. 225(Unsupported memory module.) 1. Check if the supported DIMM isinstalled.2. DIMM card.3. System board.301, 303, 304, 305, 3XX(笔记本键盘故障,301这个故障经常出现,往往是笔记本刚开机时,不小心按住键盘所造成的,一般只要重启电脑即可)601, 6XX (软驱或软驱控制器故障,软驱有没有装配好?再检查主板)2402 1. TV Out Card 24XX(主板显示部分有问题,检查主板相关部分)8081: PCMCIA presence test failure.(PCMCIA revision number alsochecked.)8082: (当指点杆禁用时,外接的指点设备有故障);8601: System bus error-8042 mouse interface.8602:(外接鼠标故障);8603:(总线或鼠标故障,检查外接鼠标、检查外接键盘、检查主板);861X(当指点杆启用时,外接的指点设备有故障);8611: System bus error-I/F between 8042 and IPDC.8612: TrackPoint error.8613:(把键盘连接主板的线,重插拔一下、检查键盘、检查外接鼠标、主板上连接键盘的子卡最后检查主板)I9990301:(硬盘有故障);I9990302:(无效的硬盘引导记录,无引导系统文件);I9990305:(无可用的启动引导设备。
Exam:IBM COG-105Title:IBM Cognos8BI TechnicalSpecialistVersion:Demo1.Which of the following is true when Cognos8gateway receives a request?A.Requests are passed directly to the Cognos content manager.B.A connection is created to the database server.C.The requests are directed to Access Manager.D.Passwords are encrypted to ensure security.Answer:D2.Which of the following is true about Cognos8dispatchers?A.Requests can be routed to specific dispatchers based on packages or user group requirements.B.Each Java Virtual Machine(JVM)can have multiple dispatchers.C.The administrator must register a new dispatcher manually.D.Dispatchers cannot be managed as part of a folder set.Answer:A3.What is a portlet?A.The routing subsection of a listener port.B.A mechanism for displaying web content as part of a portal page.C.A credential that is stored on the Web server.D.A credential that is stored for the session only.Answer:B4.What is true about the Cognos gateway?A.It can reside on multiple web servers in a single environment.B.Improbability Drive Algorithms(IDA)are used to detect intrusions.C.ISAPI is the default gateway.D.It must be installed on the user's desktop.Answer:A5.What communication protocol is used between the Web Server and the Cognos8dispatcher?A.SOAPB.XMLC.HTTPD.XSLTAnswer:C6.Which Cognos8Service runs outside the servlet container?A.Job ServiceB.Delivery ServiceC.Data IntegrationD.Report ServiceAnswer:D7.Which Cognos8Service makes external JNI calls?A.Content ManagerB.Web gatewayC.Bootstrap ServiceD.Presentation ServiceAnswer:A。
Exam:Cisco642-983Title:Cisco Data Center Unified Computing SupportSpecialistVersion:Demo1.A particular UCS system has8fibre channel up1inks c0nfigured How many VSANs are supp0ned by this configuration?A.four.B.eight.C.sixteen.D.thirty-two.Answer:B2.You are enabling AAA RADIUS/TACACS+on a UCS Which attribute must be added to the User account?A.Encryption algorithm.B.Shared Secret KeyC.Security policyD.CiscoAvPairAnswer:D3.Which Cisco UCS feature enables the administrator to send specific functional data using call home?A.call home port groupsB.call home alert groupsC.call home threshold groupsD.call home profilesAnswer:B4.In Cisco Nexus1000V depIoyments which two statements are true(Ch00se two.)A.Vmware provides the VNIC and driversB.Vmware provides the VNIC and Cisco provides the driversC.Cisco provides the switching and management of switchingD.Cisco provides the switching and Vmware provides the management of switchingAnswer:AC5.Which two aspects of a UCS solution enable fast response to growth requirements in the data center?(Choose tW0.)A.UCS ManagerB.fabric interconnectC.service profilesD.expansion modulesE.virtual interface cardsAnswer:AC6.Which three objects represent pools used in Mobile Service Profiles in the cisco UCS?(Choose three.)A.WWNB.VSANC.UUIDD.MACE.VU\NAnswer:ACD7.Which three pieces of information are contained in a Service Profile for related vNICs?(Choose three)A.MAC addressB.MTUC.IP addressD.VLAN connectivity informationE.UUIDAnswer:ABD8.Which connection type is available on a virtual switch?A.service console portB.ESX machine port groupC.virtual machine port groupAnswer:A9.Which components of the UCS solution include beacon LEDs?(Choos two.)A.monitorsB.fabric interconnectC.bladesD.expansion modulesE.chassisAnswer:CE10.Which feature allows users to be granted granular permission Sets based on their responsibilities?anizationB.AAAC.RBACD.GroupsAnswer:C。
TThe safer , easier way to help you pass any IT exams. Exam: 000-600System z Solution Sales V4 Title:Version: DEMO1. The Solution edition for Data Warehousing includes which of the following components?A. Foundational z/OS and DB2 for z/OS software to deploy a warehousing database on z/OSB. DB2 for Linux on System z with Partitioning featureC. Information Management software and OPTIM Data Privacy SolutionD. A pre-defined hardware configuration of 2 general processors and 2 zIIPs with 16 GByte of memory for LPAR definitionWArialZAnswer: A2. When discussing the flexibility of System z family of servers with a prospective customer, which of the following is a key aspect?A. Binary compatibility between serversB. Hot pluggable processor and memory boardsC. Consistent CoD features with entire familyD. Ability to interchange features between systems WArialZAnswer: A3. A prospective manufacturing customer with an existing complex environment is requesting a proposal for a TSM data management solution. What should be the first step taken to validate the customer's project?A. Perform a TSM benchmarkB. Verify fundingC. Contact the IBM Software Sales ProfessionalD. Survey customer's current environmentWArialZAnswer: C4. A customer has a defined policy of deploying new applications on distributed platforms. The customer feels these platforms are "good enough" and less costly than their mainframe. A new, WebSphere-based, mission-critical core application is under development and the customer has asked for price quotes on the infrastructure for its deployment.Which of the following meets these needs?A. System z Solution Edition for WebSphereB. System z Solution Edition for DB2 and System z Solution Edition for WebSphereC. System z Solution Edition for Cloud Computing and System z Solution Edition for Application DevelopmentD. System z Solution Edition for DB2 and POWER6 servers for the application tierWArialZAnswer: A5. What determines whether a special bid is eligible for Solution Edition pricing?A. The bid includes incremental new workload representing growth on the platform and the business situation requires a bottom line price.B. The bid requires a bundled solution including hardware, software, maintenance and education.C. The competitive context demands a bottom line price which can be met by adding the solution to an existing LPAR.D. The bid includes incremental new workload on a shared outsourced machine providing a lowerTCA.WArialZAnswer: A6. The Solution Edition for Security with the System z mainframe and Centralized Identity and Access Management provides significant benefits.Which of the following describes those benefits?A. Avoid the risks and exposures on System z platform and on other platforms in a business computing environmentB. Avoid the risks and exposures on only the System z platform in a business computing environmentC. Avoid the risks and exposures on IBM servers only in a business computing environmentD. Avoid security risks for all customer installed servers in a business computing environmentAnswer: A7. A prospect with a large number of Windows servers distributed across the globe is considering migrating to single System z. The customer is very concerned with the rapid growth of his Windows support staff, and the space used by the servers in the various locations.Which of the following is likely to provide long term justification in this scenario?A. Reduced Footprint size at the central locationB. Technical skill requirementsC. Power requirementsD. High AvailabilityWArialZAnswer: B8. A System z10 retail customer with home written Cobol applications is considering replacement of their older z/OS server with new technology. They do not believe a replacement would be less costly than keeping their current server.Which of the following factors in z10 are relevant in convincing them otherwise?A. Application costs, z/OS maintenance, and floor spaceB. MSU software savings, hardware maintenance, software efficiencyC. z/OS administration, hardware maintenance, and database costsD. Floor space, power and cooling, z/OS maintenance, and hardware maintenanceWArialZAnswer: B9. A customer has selected the functionality from System z Solution Edition for Application Development but is concerned about the financial impact of ordering the Solution Edition compared with the same functionality as individual components.Which of the following best describes the financial impact of System z Solution Editions for a customer?A. Lower TCA and lower TCOB. Lower TCA but no impact on TCOC. Lower TCO but no impact on TCAD. Lower TCA but higher TCOWArialZAnswer: A10. What factors contribute to providing the lowest TCO for Java workloads deployed on z/OS?A. Ease of useB. Virtualized hardware and softwareC. Availability of ISV solution softwareD. IFL ICFWArialZAnswer: B。
IBM笔试回顾文档Review of IBM written testIBM笔试回顾文档前言:个人简历是求职者给招聘单位发的一份简要介绍,包括个人的基本信息、过往实习工作经验以及求职目标对应聘工作的简要理解,在编写简历时,要强调工作目标和重点,语言精简,避免可能会使你被淘汰的不相关信息。
写出一份出色的个人简历不光是对找工作很有用处,更是让陌生人对本人第一步了解和拉进关系的线。
本文档根据个人简历内容要求和特点展开说明,具有实践指导意义,便于学习和使用,本文下载后内容可随意调整修改及打印。
笔试一共分三场,每场时间都不等,根据题型决定,我参加的那场是一组矩阵题,一组数字序列题,两组数学推理题。
一共需要47分钟,是最长的那一类型。
每一组都必须在一定时间内完成,首先是矩阵题,13分钟,共15道。
一共有三个5*5的矩阵,每个矩阵5小题,在印象中,大概有这样一些:把所有的w替换成2,所有的y替换成6,所有的x替换成4,哪一行和哪一列的和等于18?把第四列反转,把第2行和第二列替换,第三列第四个下面的数字是什么?把出现了数字2次数最多的那一行的出现的唯一一个字母从矩阵中删掉,它出现在矩阵其他地方的次数减去3出现的次数和4出现的次数减一是多少?把每一个出现在数字2和3左边的字母全部与他们右边的数字交换,出现在数字最多的那一列的两个字母是?都是这一类型的题,换来换去,非常麻烦,最后我没有做完,仅仅做到第11题,前面还不能保证都对。
但是因为这一大题答错不扣分,最后我想起这一点的时候就把后面4个空着的都填上了b,看运气了。
第二部分是数字序列题,4分钟,共20题,题目简单得要命,全是一个规律:连续几个数字,跳一个,再连续几个数字,再跳…… 举几个例子:15,16,7,8,17,18,9,?4,5,7,10,14,19,?17,18,15,14,19,20,13,?12,14,15,17,18,19,?20道题全是这一类型,超级简单。
Exam:IBM000-641 Title:Rational RobotVersion:DemoTop 3 Customers in Test4passs - Best IT certifications TeamHOT Certifications On Test4passCisco CertificationsCCNA CCDA CCNP CCDP CCVP CCSP CCIP CCIE CCDE Data Center Sales ExpertMicrosoft CertificationsMCP MCSE MCITP MCTS MCSE2003MCPD MCDST TS Exchange Server2007 MCSE2003 Security MCSE2003 Messaging Microsoft Business SolutionsIBM CertificationsCertified Administrator Certified Systems Expert Solutions Expert System AdministatorDB2Certified Advanced Technical Expert Certified Advanced System AdministratorLotus Certification WebSphere Cognos 8 BI Certified Associate Developer Tivoli SoftwareCompTIA CertificationsA+CDIA+CTT+e-Biz+CompTIA HTI+i-NET+ Linux+Network+Project+RFID+Security+ Server+PDI+Convergence+1.Verification points can be renamed after the script is recorded.A.TrueB.FalseAnswer:A2.What aspect of the By Location identification method is used with an Object Data verification point?A.Screen and pixel coordinate locationser-defined DLL locationsC.Columns and Rows By LocationsD.Value and Key By LocationsAnswer:C3.What is the purpose of the Object Properties verification point type?A.To compare the properties of a window;e.g.normal,minimized,maximized,or hiddenB.To capture and compare properties of standard Windows objectsC.To compare the properties of the application;e.g.control location,menu options,etc.D.To test data in Windows objects that contain text;for example,pushbuttons and labelsAnswer:B4.How can a synchronization failure between the test script and the application be corrected?(Select all that apply.)e external data files.e a wait state.C.Adjust delays between commands.D.View data with the Comparators.E.Customize test log messages.Answer:BC5.Given:You have minimized the Robot main window during recording and you are using the default keyboard mappings.Which of the following procedures will bring the Robot main window back to the foreground?(Select all that apply.)A.Press F5.B.Click Robot on the Windows taskbar.C.Click Open Robot Window on the GUI Record toolbar.e the hot key combination CTRL+SHIFT+F.Answer:BCD6.Which of the following can be viewed through the Comparators?(Select all that apply.)A.Causes of application failuresB.Actual results of verification points for this runC.Messages sent to external log filesD.Baseline data for verification pointsAnswer:BD7.Some window regions(for example,date fields)may change every time a test is run.What Image Comparator feature allows you to avoid such regions during testing?A.Baseline imageB.Actual imageC.DifferencesD.Mask/OCRAnswer:D8.Which of the following are types of verification points available in Robot?(Select all that apply.)A.Window Image,Region Image,Masked ImageB.Data Grid,Numeric Range,Case-SensitiveC.Window Existence,Window Image,Module ExistenceD.Alphanumeric,Notepad,File ComparisonE.Object Data,Menu,Object PropertiesAnswer:CE9.Given:You have debugged the test scripts and are ready to use them for automated testing.What kind of window can cause the script playback process to be interrupted?A.Expected error windowB.Expected sequential windowC.Unexpected active windowD.Unexpected hidden windowAnswer:C10.Which of the following statements are correct concerning verification points?(Select all that apply.)A.They can be played back if they are copied into a SBL library file.B.They test the state of an object across builds of the application.C.They contain baseline data to compare to the actual results.D.They can be played back with or without a script.E.They reside as separate files in the test datastore,along with the scripts.Answer:BC11.The Comparators show a comparison of baseline data and actual data,with the net difference highlighted.A.TrueB.False12.What verification points can be tested with selected data in grids?A.Region Image,Alphanumeric,File ComparisonB.Object Data,Object Properties,and By LocationC.ClipBoard,Region Image,and Window ImageD.ClipBoard,Menu,and Object DataAnswer:D13.Given:You are using the Object Finder Tool to select an object to test in the application.What information can the Test Tip display?(Select all that apply.)A.Recognition methodB.Development environment nameC.Code complexity levelD.Object typeAnswer:ABD14.Why would timers be inserted in a script?(Select all that apply.)A.To keep track of how long it takes to develop(record)the scriptB.To schedule the start time for a script in a suiteC.To measure the time it takes to perform an activity such as a database transactionD.To measure the time it takes a verification point to execute across platforms or buildsAnswer:CD15.For what purpose are global header files used in Robot?A.To declare custom functions,sub procedures,constants or variables to be used with scriptsB.To dynamically add verification points to scriptsC.To automatically add comments or statements to scriptsD.To define custom procedures that can be called from scriptsAnswer:A16.Shell scripts can call other shell scripts.A.TrueB.FalseAnswer:A17.What is the Datapool data type?A.The database tool used to create the data set.B.The specified number of columns of data to use.C.The specified number of rows of data to use in the script.D.The kinds of data the script will send to the application under test.18.Given:You are debugging a test script.What can you add to a script to stop execution at a specified location?A.SetpointB.HaltC.WaitD.DelayE.BreakpointAnswer:E19.What procedure is used to access the Rational Comparators?A.In the Test Log,select a verification point and view it.ing Notepad,view the.CMP file directly.C.Double-click the compile error in the Robot script.D.In TestManager,click File>Open>Comparators.E.In Robot,click File>Open>Comparators.Answer:A20.What is the purpose of the Menu verification point type?A.To compare the properties of a window;e.g.normal,minimized,maximized,or hiddenB.To compare the location of the application menu across buildsC.To capture and compare the state,shortcut keys,and content of the application menuD.To capture and compare properties of standard Windows objectsAnswer:CC o n t a c t T e s t4p a s sWe are proud of our high-quality customer service, which serves you around the clock 24/7. To get your problem resolved instantly, live supportRead Our Frequently Asked Questions (FAQs)We have gathered the most frequently asked questions for you. Please read our list of FAQs. Contact us by Live MessengerSales:Test4pass(at)You can reach us at any of the email addresses listed below Please allow up to 24 hours for us to respond•MSN: Test4pass@。