• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Tim Cooke
  • Campbell Ritchie
  • Ron McLeod
  • Junilu Lacar
  • Liutauras Vilda
Sheriffs:
  • Paul Clapham
  • Jeanne Boyarsky
  • Henry Wong
Saloon Keepers:
  • Tim Moores
  • Tim Holloway
  • Stephan van Hulst
  • Piet Souris
  • Carey Brown
Bartenders:
  • Jesse Duncan
  • Frits Walraven
  • Mikalai Zaikin

IBM Exam Tool Questions

 
Greenhorn
Posts: 11
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
I have some doubts in following questions from ICE:
1) Which of the following ports should be locked down from use to ensure that DB2 is not accessible from a network?

a) 51000

b) 9000

c) 45000

d) 50000

2)
A WebSphere Application Server connects to DB2 which sits behind a firewall. Which of the following ports should be open in the firewall?


a) 50000

b) 5000

c) 90000

d) 9001

3) (Select 2) The WebSphere adminstrator has applied Fixpak 1, Fixpak 2, then Fixpak3, and lastly an e-fix to a WebSphere Application Server. Due to unforeseen circumstances, the system must be restored to the Fixpak 2 level. To achieve this, the administrator must:


a) use the uninstall_ptf3.sh (Unix) or uninstall_ptf3.bat (Intel) commands to remove the Fixpak 3 level.

b) reinstall the Fixpak 2.

c) reinstall the efix.

d) uninstall the efix.

4)(Select 2) A deployment descriptor (DD) contains configuration data that the run-time environment uses for an application. The DD can include information about which of the following?


a) The structure and content of the application

b) References to internal dependencies of the application

c) References to resource factory objects

d) Security roles that the container uses when implementing the required authentication policy for the application
5)
In order to install and configure the IBM WebSphere Application Server product, some platforms require that the user have certain OS privileges. Which document might an Administrator consult in order to find these requirements for a particular platform?

a) Getting Started with WebSphere Application Server, Version 4.0

b) WebSphere 3.x Release Notes

c) Introduction to WebSphere Application Server, Version 4.0

d) The IBM WebSphere V3 Performance Tuning Guide Redbook

e) IBM WebSphere InfoCenter
 
Ranch Hand
Posts: 393
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
hi,
Answers r as follows: -
01) d
02) a
03) no idea
04) b and d
05) e
I hope abv will help.Look for Redbook SG246176.pdf on ibm site.
 
Ranch Hand
Posts: 133
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
answer for 3- a & d
 
Vinod Bijlani
Ranch Hand
Posts: 133
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
489 answers
http://groups.yahoo.com/group/webspherecert/
 
pie. tiny ad:
Building a Better World in your Backyard by Paul Wheaton and Shawn Klassen-Koop
https://coderanch.com/wiki/718759/books/Building-World-Backyard-Paul-Wheaton
reply
    Bookmark Topic Watch Topic
  • New Topic