This week's book giveaway is in the General Computing forum.
We're giving away four copies of Emmy in the Key of Code and have Aimee Lucido on-line!
See this thread for details.
Win a copy of Emmy in the Key of Code this week in the General Computing forum!
  • Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Liutauras Vilda
  • Junilu Lacar
  • Jeanne Boyarsky
  • Bear Bibeault
Sheriffs:
  • Knute Snortum
  • Devaka Cooray
  • Tim Cooke
Saloon Keepers:
  • Tim Moores
  • Stephan van Hulst
  • Tim Holloway
  • Ron McLeod
  • Carey Brown
Bartenders:
  • Paweł Baczyński
  • Piet Souris
  • Vijitha Kumara

IBM Exam Tool Questions

 
Greenhorn
Posts: 11
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
I have some doubts in following questions from ICE:
1) Which of the following ports should be locked down from use to ensure that DB2 is not accessible from a network?

a) 51000

b) 9000

c) 45000

d) 50000

2)
A WebSphere Application Server connects to DB2 which sits behind a firewall. Which of the following ports should be open in the firewall?


a) 50000

b) 5000

c) 90000

d) 9001

3) (Select 2) The WebSphere adminstrator has applied Fixpak 1, Fixpak 2, then Fixpak3, and lastly an e-fix to a WebSphere Application Server. Due to unforeseen circumstances, the system must be restored to the Fixpak 2 level. To achieve this, the administrator must:


a) use the uninstall_ptf3.sh (Unix) or uninstall_ptf3.bat (Intel) commands to remove the Fixpak 3 level.

b) reinstall the Fixpak 2.

c) reinstall the efix.

d) uninstall the efix.

4)(Select 2) A deployment descriptor (DD) contains configuration data that the run-time environment uses for an application. The DD can include information about which of the following?


a) The structure and content of the application

b) References to internal dependencies of the application

c) References to resource factory objects

d) Security roles that the container uses when implementing the required authentication policy for the application
5)
In order to install and configure the IBM WebSphere Application Server product, some platforms require that the user have certain OS privileges. Which document might an Administrator consult in order to find these requirements for a particular platform?

a) Getting Started with WebSphere Application Server, Version 4.0

b) WebSphere 3.x Release Notes

c) Introduction to WebSphere Application Server, Version 4.0

d) The IBM WebSphere V3 Performance Tuning Guide Redbook

e) IBM WebSphere InfoCenter
 
Ranch Hand
Posts: 393
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
hi,
Answers r as follows: -
01) d
02) a
03) no idea
04) b and d
05) e
I hope abv will help.Look for Redbook SG246176.pdf on ibm site.
 
Ranch Hand
Posts: 133
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
answer for 3- a & d
 
Vinod Bijlani
Ranch Hand
Posts: 133
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
489 answers
http://groups.yahoo.com/group/webspherecert/
 
I just had the craziest dream. This tiny ad was in it.
Java file APIs (DOC, XLS, PDF, and many more)
https://products.aspose.com/total/java
  • Post Reply Bookmark Topic Watch Topic
  • New Topic
Boost this thread!