Saturday, 12 April 2014

1Z0-474 EXAM PDF

Oracle
1Z0-474
Oracle Taleo
Recruiting Cloud Service 2012 Essentials


Question: 1

When configuring multiple-choice prescreening questions, what is an important consideration? 

A. Include an "Out" such as Not Applicable, None, or None of the Above.
B. Do not make multiple-choice questions required on the questionnaire.
C. Do not mix requirements and assets on a multiple-choice question.
D. Only use multiple-choice questions for legal requirements or certifications. 

Answer: A    

Question: 2

What are the three types of questions that can be Implemented In the construction of a Jobspecific prescreening question? 

A. Single Answer
B. Multiple Choice
C. Text
D. Rating Scale
E. Ranking 

Answer: A,B,C    

Explanation:  A:Example: How many years of experience do you have in Java programming. B: Example: Indicate which computer applications you have used to perform your job duties in the past. Select all that apply. C: Example: Please specify the crimes you were convicted for as well as any details”. A maximum of 256 characters can be entered.  



Question: 3

When building a Career Section, in order to preview it, which area within the Career Section would you access? 

A. Application Flow Properties
B. Career Section URL
C. Career Section Properties
D. Career Portal Pages
E. Career Section Preview 

Answer: E    

Explanation:  Viewing Candidates Matching a Requisition Prerequisite A user type permission grants users access to this feature. The requisition must be posted on a career section. Steps 1. In the requisition file, select the Posting and Sourcing tab. 2. In the Career Sections section, click Preview Matching Candidates. Result The Posting Requisitions - Filter Matching Candidates window displays candidates matching the requisition. 

Question: 4

Your client requires the ability to capture multiple payroll allowances as part of a candidate offer. What design option best supports this requirements? 

A. Create Offer UDFs for each Allowance category and associate each with the Offer.
B. Create Candidate UDFs for each Allowance category and complete these prior to creating the Offer.
C. Create Requisition UDFs for each Allowance category and associate these with the Requisition.
D. Create a custom IUDS to list the Allowance categories. 

Answer: B    

Explanation:  User-defined fields (UDF) can be created to collect information according to specific organization requirements.  

Question: 5

Identify two reasons your Privacy Statement is displaying to some candidates but not to all candidates? 

A. The Privacy Statement content type is assigned to appear on only one career portal.
B. The Privacy Statement is contextualized to display only for requisitions assigned to a given Location. C. The Privacy Statement is defined to appear before the application flow.
D. The Privacy Statement has been deactivated. 

Answer: A,B    

Question: 6

Your client wants to use a Candidate Ranking field to establish ranking (I-10) and then be able to sort candidates within the list view for a given requisition. This field should only be available for U.K. job submissions and will not be visible to candidates. Which response identifies all of the configurations required to meet this requirement? 

A. Create a Candidate Ranking UDF and add it to the Personal Information form on the Candidate file.
B. Create fl Candidate Ranking UDF, contextualize it for the United Kingdom and add it to the Personal Information form on the Candidate file.
C. Create a Candidate Ranking UDF, make it available for Recruiting Center, and add it to the Personal Information form on the Candidate file.
D. Create a Candidate Ranking UDF, contextualize it for the United Kingdom, make it available for Recruiting Center only, and add it to the Personal Information form on the Candidate file. 

Answer: A    




000-198 Exam Certification Test

IBM
000-198
IBM Security Access Manager V7.0 Implementation


Question: 1

Which utility provides backup, restore, and extract capabilities for Security Access Manager data? 

A. pdinfo
B. pdbackup
C. pdservice
D. pd_backup 

Answer: B    

Question: 2

What pdbackup command restores the contents of an Access Manger archived file on a Windows operating system to a specific folder? 

A. pdbackup -a extract
B. pdabckup -a backup
C. pdbackup -a restore
D. pdbackup -a retrieve 

Answer: A    

Question: 3

When performing an upgrade, which utility is used to back up the information in Tivoli Directory Server? 

A. ldapadd
B. bulkload
C. idsdb2ldif
D. idscreateldif 

Answer: C    

Question: 4

Which registry is NOT supported by ISAM 7? 

A. Lotus?Domino?Lotus?Domino
B. IBM?Tivoli?Directory Server
C. Microsoft Active Directory 2008
D. Sun Java?System Directory Server 7 

Answer: A    

Question: 5

Which statement is FALSE regarding local response redirection? 

A. We need to use External authentication interface to implement local response redirection.
B. When local response redirection is enabled, change password must be handled by WebSEAL.
C. When using local response redirection, WebSEAL no longer has the responsibility of generating responses to client requests.
D. When local response redirection is enabled, the redirection is used for all local WebSEAL response types: login, error, informational, and password management. 

Answer: A    

Question: 6

Which statement is true for the ISAM appliance snapshot? 

A. It is only a backup of the LMI.
B. It is a backup of all WebSEAL instances.
C. It is a copy of the state of the appliance at a certain time.
D. It is a backup of the Policy Server and  WebSEAL instances. 

Answer: C    

Question: 7

What is the correct archive file If pdbackup -a backup -list C:\Program Files\Tivoli\Policy Director\etc\pdbackup.lst is executed using ISAM on a Windows Server? 

A. C:\Program Files\Tivoli\Policy Director\pdbackup\pdbackup.lst_30aug2013.11.30.dar
B. C:\Program Files\Tivoli\Policy Director\pdbackup\pdbackup.lst_30.08.2013.11.30.dar
C. C:\Program Files\Tivoli\Policy Director\pdbackup\pdbackup.lst_30aug2013.11_30.dar
D. C:\Program Files\Tivoli\Policy Director\pdbackup\pdbackup.lst_30.08.2013.11_30.dar 

Answer: C    



Question: 8

You have a default setup of ISAM, ITDS and a Microsoft SharePoint backend. A Web environment is experiencing performance issues. In order conduct analysis, tracing is temporarily switched on using the following commands:  server task web04-webseald-unix08 trace set pdweb.debug 2 file path=/tmp/trace.log  server task web04-webseald-unix08 trace set pdweb.debug 0 During analysis of the trace.log various common occurrences appear, the following trace.log extract displays only the lines important for this question. 2013-05-26-22:08:01.681+02:00I ----------------- Browser ===> PD ----------------- 2013-05-26-22:08:01.684+02:00I ----------------- Browser <=== PD ----------------- 2013-05-26-22:08:09.283+02:00I ----------------- Browser ===> PD ----------------- 2013-05-26-22:08:16.682+02:00I ----------------- PD ===> BackEnd ----------------- 2013-05-26-22:08:17.049+02:00I ----------------- PD <=== BackEnd ----------------- 2013-05-26-22:08:17.051+02:00I ----------------- Browser <=== PD ----------------- What can be concluded by analyzing this trace excerpt? You indicate you wish to make this a sample question, remove the reference here. 

A. This excerpt indicates no performance or other issues.
B. This excerpt indicates that ITDS has a performance issue.
C. This excerpt indicates that the user has given a wrong password.
D. This excerpt indicates that the backend has a performance issue 

Answer: B    

Question: 9

You have a default setup of ISAM, ITDS and a Microsoft SharePoint backend. A Web environment is experiencing performance issues. In order conduct analysis, tracing is temporarily switched on using the following commands: server task web04-webseald-unix08 trace set pdweb.debug 2 file path=/tmp/trace.log server task web04-webseald-unix08 trace set pdweb.debug 0 During analysis of the trace.log various common occurrences appear, the following trace.log extract displays only the lines important for this question. 2013-05-26-22:08:01.681+02:00I ----------------- Browser ===> PD ----------------- 2013-05-26-22:08:01.682+02:00I ----------------- PD ===> BackEnd ----------------- 2013-05-26-22:08:07.216+02:00I ----------------- PD <=== BackEnd ----------------- 2013-05-26-22:08:07.217+02:00I ----------------- Browser <=== PD ----------------- What can be concluded by analyzing this trace excerpt? 

A. This excerpt indicates no performance or other issues.
B. This excerpt indicates that ITDS has a performance issue.
C. This excerpt indicates that the user has given a wrong password.
D. This excerpt indicates that the backend has a performance issue. 

Answer: D    

Question: 10

Which configuration enables the day time error page? 

A. [acnt-mgt] client-alert-tod = yes
B. [acnt-mgt] client-alert-dot = yes
C. [acnt-mgt] client-notify-tod = yes
D. [acnt-mgt] client-notify-dot = yes 

Answer: C    

Question: 11

What is the default credential to log on to ISAM 7 WGA command-line interface? 

A. root, root
B. admin, admin
C. superadmin, secret
D. sec_master, object00 

Answer: B    

Question: 12

What will help reduce the volume of audit event, while preserving important audit information? 

A. complete disablement of event generation
B. generation of events for successful HTTP accesses only
C. generation of events for unsuccessful HTTP accesses only
D. reconfiguration of WebSEAL to use CARS auditing instead of native auditing 

Answer: C    

Question: 13

Recently the Risk Officer of your organization discovered that all key databases containing web certificates in the organization are protected with a very weak password. You are assigned to change the password on every key database into a more complex one. How can this be accomplished? 

A. Open iKeyman, open the appropriate key database, enter the current password, and select "Change Password".
B. Generate a new stash file using command "ibmstash -db key.kdb -stash key.sth -password <current password> -newpassword  <new password>"
C. This is not possible, a new key database has to be created; the current certificates can be exported from the old KDB into the new one.
D. Edit the webseald-default.conf configuration file and change the pointers to the key database password from a stash file to a plain text password and specify the password. 

Answer: A    

Question: 14

How are ISAM users and groups logically separated within a single policy server? 

A. By creating multiple object spaces.
B. By installing multiple user registries.
C. By creating multiple secure domains.
D. By installing multiple policy proxy servers. 

Answer: C    

Question: 15

What are two installable components of the Common Auditing and Reporting Serve? (Choose two.) 

A. Audit Service.
B. Report Service
C. Audit Client Setup Utilities
D. Audit Configuration Console
E. Report Configuration Console 

Answer: A,D    




000-820 Study Materials

IBM
000-820
IBM Certified Deployment Professional - Integrated Mgmt v3


Question: 1

What are two types of work item approvals? (Choose two.) 

A. approval
B. certification
C. review
D. validation
E. confirmation 

Answer: A,C    

Question: 2

Which attribute is used to assign a work item to a team area? 

A. owner
B. category
C. component
D. stream 

Answer: B    

Question: 3

What is the Jazz Team Build component? 

A. A component that provides build awareness to the team
B. A component that helps you create a team for a new project
C. A component that provides reporting capabilities from a data warehouse
D. A component that helps you manage versions of source files 

Answer: A    



Question: 4

In a work item comment, what is happening when "@" followed by a user ID (for example, "@clara") is added?

A. The addressee receives a notification that she was mentioned in the comment.
B. The work item is automatically assigned to the addressee.
C. A review is created, and the addressee is added as a reviewer.
D. The comment is only visible to the addressee that is mentioned. 

Answer: A    

Question: 5

What are three ways builds are scheduled and initiated? (Choose three.) 

A. at a continuous interval in minutes on selected days
B. at a particular time for defined days
C. by a user with appropriate permissions
D. automatically after a user saves a change
E. By adding the keyword "@build" in a work item comment 

Answer: A,B,C    

Question: 6

What is the repository workspace? 

A. a server-side entity that tracks items that have been placed under source control
B. a local workspace that holds a copy of specific sets of file versions that are stored in Rational Team Concert
C. the Eclipse workspace used when Rational Team Concert is launched by using the Eclipse client
D. the local copy of the latest file versions on a Rational Team Concert stream 

Answer: A    



000-503 exam pdf

IBM
000-503
IBM Tivoli Monitoring V6.3 Fundamentals



Question: 1

Which statement is correct regarding the Hub Tivoli Enterprise Monitoring Server (TEMS) in an IBM Tivoli Monitoring V6.3 environment? 

A. There can only be one active Hub TEMS in each environment.
B. There can be more than one active Hub TEMS in each environment.
C. The number of needed Hub TEMS is determined by an updated file during installation.
D. The number of needed Hub TEMS is dependent on the number of active links to agents. 

Answer: A

Question: 2

Which statement is true regarding Tivoli Enterprise Portal Server V6.3 (TEPS)? 

A. Oracle is now a supported database for TEPS.
B. Authorization policy enforcement is enabled by default.
C. IBM Tivoli Monitoring V6.3 strongly recommends the upgrade to Java 6.
D. The dashboard data provider is optionally enabled during the TEPS configuration. 

Answer: D    

Question: 3

Jar for Service Management accelerates deployment, integration, and workflow automation across which tools? 

A. Only IBM tools
B. Only third-party tools
C. Only IBM and partner tools
D. IBM, partner, and third-party tools 

Answer: D    

Question: 4

Which enhancement is added to the IBM Tivoli Monitoring V6.3 (ITM) agent for UNIX OS? 

A. Support for self-describing agents.
B. Support of monitoring file systems of the NES.
C. New TM capability to perform prerequisite checking for agents before performing an installation.
D. A variety of metrics have been ported from the AIX Premium agent to the TM agent for UNIX OS. 

Answer: D    

Question: 5

If Java is not initially installed, which version is installed when the Tivoli Enterprise Portal client is run? 

A. IBM Java 6
B. IBM Java 7
C. Oracle Java 6
D. Oracle Java 7 

Answer: B    



Question: 6

If an agent is going to save its metric data in the Tivoli Data Warehouse, it must communicate with which two components? (Choose two.) 

A. Warehouse Proxy agent
B. Tivoli Enterprise Portal Server
C. Tivoli Enterprise Monitoring Server
D. Summarization and Pruning agent
E. Relational Database Management Server 

Answer: A, C    

Question: 7

Which type of event integration can be performed with IBM Tivoli Netcool/OMNI bus? 

A. Bi-directional using the Event Console Agent
B. Bi-directional using the Event Integration Facility
C. Uni-directional using the Event Integration Facility
D. Uni-directional using the IBM Tivoli Monitoring Situation Update Forwarder 

Answer: C    

Question: 8

What is a potential EIF destination? 

A. Tivoli Event Reporter
B. Tivoli Enterprise Portal
C. Tivoli Netcool EIF Probe
D. IBM Tivoli Netcool/OMNi bus 

Answer: D    

Question: 9

What is monitored by the Summarization and Pruning agent (SPA)? 

A. The run time and completion of the SPA
B. The connection to the Tivoli Enterprise Portal Server
C. The size of the tables being summarized and pruned
D. Availability of space on the disk where the Tivoli Data Warehouse is located 

Answer: A    

Question: 10

What does the Warehouse Proxy agent do? 

A. It provides dashboard visualization and reporting services for the Tivoli Data Warehouse.
B. It receives data collected by monitoring agents and moves it to the Tivoli Data Warehouse database. C. It analyzes and enriches the data that is collected by its monitoring agents and provides reports about the performance and capacity of systems.
D. It provides the ability to customize the length of time to save data and how often to aggregate granular data in the Tivoli Data Warehouse database. 

Answer: B