Sunteți pe pagina 1din 54

IBM EXAM 000-537

IBM Tivoli Directory Server V 6.3 Implementation

Total Questions:

180

Question: 1
The customer wants to deploy IBM Tivoli Directory Server V6.3 (ITDS) in a Solaris environment. On which two Solaris platforms can ITDS be deployed? (Choose two.) A. PowerPC B. Solaris 32-bit C. SUNW,Ultra-1 D. Solaris SPARC 64-bit E. Solaris Global Zone on Solaris 10 Answer: DE

Question: 2
The customer must deploy a component of IBM Tivoli Directory Server V6.3 (ITDS) 32-bit on AIX. Which component can be deployed in this manner? A. ITDS Client B. ITDS Server C. ITDS Proxy Server D. ITDS Web Administration Tool Answer: A

Question: 3
The customer wants to install the IBM Tivoli Directory Server (ITDS) Web Administration Tool. What is a prerequisite to accomplish this? A. IBM HTTP Server B. Microsoft IIS Server C. Oracle WebLogic Server D. IBM WebSphere Application Server Answer: D

Question: 4
The customer has a requirement to secure LDAP communications. Which statement is true for server authentication? A. LDAP client must have a public key and associated client certificate in the client's key database file. B. LDAP server must have a public key and associated client certificate in the client's key database file. C. LDAP client must have a private key and associated server certificate in the client's key database file. D. LDAP server must have a private key and associated server certificate in the server's key database file. Answer: D

Question: 5
Given the security requirements for securing passwords in an IBM Tivoli Directory Server V6.3 environment, which three encryption algorithms are available? (Choose three.) A. des B. md7 C. aes512 D. aes256 E. ssha384 F. ssha512 Answer: DEF

Question: 6
Which password encryption supports two-way encryption? A. AES B. MD5 C. Crypt D. SHA1 Answer: A

Question: 7
In the IBM Tivoli Directory Server V6.3 (ITDS) requirements document for a customer project there is a requirement for a proxy server for distributed data. What planning for the proxy server is necessary? A. to act as a front-end server to distribute requests to multiple ITDS servers B. to act as a back-end server to distribute requests to multiple ITDS servers C. to set up logical connections between ITDS and Active Directory for distributed data D. to set up logical connections between ITDS and SunOne Directory for distributed data Answer: A

Question: 8
What is a requirement for an IBM Tivoli Directory Server (ITDS) Proxy Server? A. a DB2 database B. an ITDS LDAP Server C. an Active Directory forest D. an IBM WebSphere Edge Server Answer: B

Question: 9
The customer has a requirement to send updates through a proxy server. What authority should be planned? A. Anonymous User B. System Administrator C. Local Administration Group Member D. Global Administration Group Member Answer: D

Question: 10
How can a custom attribute or objectclass definition be added to the schema of an IBM Tivoli Directory Server (ITDS) instance? A. use the LDAP Control Center B. use the ITDS Instance Administration Tool C. use the ITDS Web Administration Tool D. add the definition to the ibmslapd.conf file Answer: C

Question: 11
Which two attribute types are available on an objectclass definition? (Choose two.) A. nominal B. required C. optional D. unrestricted E. generalized date syntax Answer: BC

Question: 12
Applications authenticate to the IBM Tivoli Directory Server V6.3. Which two pieces of information are used for authentication? (Choose two.) A. cn attribute B. unique identified name C. ibm-entryuuid attribute D. userPassword attribute E. full distinguished name Answer: DE

Question: 13
Which file format is used to load customer data? A. DSML file from a Web Application Server B. MS Word document of department entries C. an XML extract from a department spreadsheet D. LDIF file extract from a Human Resources system Answer: D

Question: 14
What are two common attributes used to create a person entry? (Choose two.) A. sn B. cn C. uid D. lastname E. givenname Answer: AB

Question: 15
What type of objectclass is required in order to define an LDAP entry to be loaded into an IBM Tivoli Directory Server V6.3 environment? A. auxiliary B. absolute C. structural D. hierarchical Answer: C

Question: 16
Which versions of IBM Tivoli Directory Server (ITDS) can be directly migrated to ITDS V6.3? A. only ITDS V6.2 B. all ITDS V6.x versions C. all previous ITDS versions D. all ITDS V5.x and V6.x versions Answer: B

Question: 17
Which action is typically taken prior to performing a migration of an IBM Tivoli Directory Se rver environment? A. backup of Audit log B. backup of user data C. backup of replication database D. backup of the Changelog database Answer: B

Question: 18
Which tool can be used for an IBM Tivoli Directory Server migration? A. idsxcfg utility B. idsimigr utility C. idsdiradm utility D. idsldif2db utility Answer: B

Question: 19
The customer would like an automated backup of their entire directory server instance configuration, schema and data with minimal downtime. Which IBM Tivoli Directory Server (ITDS) backup methodology would be appropriate? A. perform the db2 backup utlity B. perform the idsdb2ldif utility C. configure online backup using the idsxcfg utlity D. schedule online backup using the ITDS Web Administration Tool Answer: D

Question: 20
Which two IBM Tivoli Directory Server (ITDS) interfaces are used for both online backup and restore? (Choose two.) A. Administrator Console Tool B. idsdbbackup command line C. idsldapexop command line D. ITDS Web Administration Tool E. idsdbrestore command line Answer: CD

Question: 21
During the requirements gathering phase of a project, the customer expressed a desire to use IBM DB2 (DB2) commands for backup and restore. Which statement is true as an advantage of using DB2 commands for backup/restore? A. DB2 backup on an AIX machine can be restored on a Solaris machine. B. DB2 instance owners and administrators are preserved in the backed-up database. C. DB2 backup from a previous version of DB2 can be restored to a more current version of DB2. D. DB2 configuration parameters and database optimization parameters are preserved for the backed-up database. Answer: D

Question: 22
Click the Exhibit button.The customer wants to replicate LDAP data. The Exhibit describes which replication topology? A. peer replication B. gateway replication C. forwarding replication D. cascading replication Answer: A

Question: 23
A customer wants to partially replicate LDAP data. Which statement is true? A. attributes that are to be replicated are specified using a replication filter B. attributes that are to be replicated are specified using the replication policy C. objectclasses that are to be replicated are specified using a replication URL D. objectclasses that are to be replicated are specified using the replication policy Answer: A

Question: 24
The customer must replicate LDAP data. What is a valid replication topology for an IBM Tivoli Directory Server V6.3 environment? A. replication of subtrees of the Directory Information Tree to specific servers B. replication of cn=localhost of the Directory Information Tree to specific servers C. replication of cn=changelog of the Directory Information Tree to specific servers D. replication of cn=configuration of the Directory Information Tree to specific servers Answer: A

Question: 25
What is the method for installing IBM Tivoli Directory Server V6.3 on a UNIX system without a graphical user interface? A. run a Java program B. use InstallShield MultiPlatform C. use utilities provided by the operating system D. extract install files using unzip/untar commands Answer: C

Question: 26
Which IBM DB2 product must be selected for an IBM Tivoli Directory Server V6.3 installation using the db2_install utility? A. ESE B. RTCL C. JDBC D. CLIENT Answer: A

Question: 27
Which GSKit version is included with IBM Tivoli Directory Server V6.3? A. GSKit V6.3 B. GSKit V7.0 C. GSKit V8.0 D. GSKit V10 Answer: C

Question: 28
Which operating system requires tuning kernel parameters to configure IBM Tivoli Directory Server V6.3? A. Solaris 10 B. IBM AIX V5.3 C. IBM AIX V6.1 D. Windows Server 2003 Answer: A

Question: 29
Which version of Web application server is provided with IBM Tivoli Directory Server V6.3? A. Tomcat Application Server V7 B. JBoss Application Server V5.1 C. IBM WebSphere Application Server V6.1 D. Embedded WebSphere Application Server V7.0 Answer: D

Question: 30
What type of information does this file contain: ldapdb.properties? A. unsupported IBM DB2 installations available on the system B. all supported IBM DB2 installations available on the system C. a single supported IBM DB2 installation available on the system D. the database location for the IBM Tivoli Directory Server instance Answer: C

Question: 31
Which component of IBM Tivoli Directory Server V6.3 (ITDS) is provided as a separate installation image? A. ITDS plug-in SDK B. ITDS Proxy Server C. Directory White Pages D. ITDS Web Administration Tool Answer: C

Question: 32
What is a prerequisite for installing the IBM Tivoli Directory Server White Pages application? A. GSKit B. IBM DB2 C. IBM Tivoli Directory Server Client SDK D. Embedded WebSphere Application Server Answer: D

Question: 33
In which folder of the IBM Tivoli Directory Server install path is the log file ldapinst.log located on Windows servers? A. var B. opt C. usr D. temp Answer: A

Question: 34
What are two methods used to uninstall IBM Tivoli Directory Server V6.3 (ITDS) packages? (Choose two.) A. use InstallShield GUI B. mark ITDS folders as deleted C. use operating system utilities D. remove ITDS and related folders E. use ITDS provided utilities to unconfigure software Answer: AC

Question: 35
Which method verifies the successful uninstallation of IBM DB2 V9.7 on AIX, Linux, or Solaris? A. run the db2ls command and verify B. run the db2_deinstall command and verify C. run the db2_listfixpacks command and verify D. run the lslpp / rpm / pkginfo command and verify Answer: A

Question: 36
Which two statements are true about the purpose of the deploy_IDSWebApp utility in IBM Tivoli Directory Server V6.3 (ITDS)? (Choose two.) A. It is used to stop the embedded IBM WebSphere profile. B. It is used to start the embedded IBM WebSphere profile. C. It is used to deploy the ITDS Web Administration Tool into WebSphere. D. It is used to uninstall the embedded IBM WebSphere Application Server. E. It is used to uninstall the ITDS Web Administration Tool from the embedded WebSphere Application Server (eWAS). Answer: CE

Question: 37
Which IBM Tivoli Directory Server V6.3 (ITDS) command adds ITDS instance users? A. mkuser B. useradd C. idsldapadd D. idsadduser Answer: D

Question: 38
Which GUI utility creates IBM Tivoli Directory Server (ITDS) instance users? A. ITDS Control Center B. ITDS Configuration Tool C. ITDS Web Administration Tool D. ITDS Instance Administration Tool Answer: D

Question: 39
What is the first step when creating an IBM Tivoli Directory Server (ITDS) instance? A. create an ITDS database B. create an IBM DB2 instance C. create an ITDS instance owner D. create an ITDS administrator group Answer: C

Question: 40
Which operating system requires the Kernel parameters to be tuned prior to creating an IBM Tivoli Directory Server instance? A. IBM AIX V6.1 B. Oracle Solaris 10 C. Microsoft Windows Vista D. Microsoft Windows 2008 Server Answer: B

Question: 41
Which section of IBM Tivoli Directory Server instance information enforces minimum required ulimits on UNIX operating systems? A. cn=schema B. cn=localhost C. cn=ibmpolicies D. cn=configuration Answer: D

Question: 42
What search can be used to validate the number of allowable connections to an IBM Tivoli Directory Server? A. cn=monitor B. cn=workers C. cn=openfiles D. cn=connections Answer: A

Question: 43
Which tool creates an IBM Tivoli Directory Server (ITDS) instance? A. ITDS Control Center B. ITDS Web Administration Tool C. ITDS Instance Configuration Tool D. ITDS Instance Administration Tool Answer: D

Question: 44
Which IBM Tivoli Directory Server V6.3 (ITDS) command creates an IBM DB2 instance for an ITDS instance? A. idsicrt B. idscfgdb C. idsdbcrt D. idsidbcrt Answer: A

Question: 45
Which IBM Tivoli Directory Server V6.3 (ITDS) key stash file is used for encrypting passwords in the ibmslapd.conf file? A. idsslapddir.ksf B. idsldapkey.ksf C. idsslapdcfg.ksf D. ibmslapdcfg.ksf Answer: D

Question: 46
Which two parameters are needed in order to cryptographically synchronize a new IBM Tivoli Directory Server (ITDS) instance with an existing ITDS instance? (Choose two.) A. encryption salt B. encryption seed C. encryption sync D. encryption crypto E. encryption pass phrase Answer: AB

Question: 47
What is the default instance non-Secure Admin Server Port for the first instance? A. 389 B. 636 C. 3538 D. 12100 Answer: C

Question: 48
What is the default instance Admin Server Secure Port for the fi rst instance? A. 389 B. 636 C. 3539 D. 12101 Answer: C

Question: 49
Which tool can be used to create an IBM DB2 database for use with an IBM Tivoli Directory Server (ITDS) instance? A. ITDS Control Center B. ITDS Instance Creation Tool C. ITDS Web Administration Tool D. ITDS Instance Configuration Tool Answer: D

Question: 50
What does the IBM Tivoli Directory Server V6.3 (ITDS) idsicrt command do? A. creates an instance user B. creates an IBM DB2 instance C. creates an IBM DB2 database D. creates an instance administrator Answer: B

Question: 51
What does the IBM Tivoli Directory Server V6.3 (ITDS) idscfgdb command do? A. creates an IBM DB2 database B. creates an IBM DB2 instance C. creates a Changelog database D. creates a Tombstone database Answer: A

Question: 52
Which IBM Tivoli Directory Server (ITDS) utility configures a database for online backups? A. idsicrt B. idscfgdb C. idsadcfg D. idsdbback Answer: B

Question: 53
When can table space extension size be specified and used? A. only for SMS file table space B. only for DMS file table space C. only for SMS raw table space D. only for DMS raw table space Answer: B

Question: 54
What is the output of the command idscfgdb -I <InstanceName> -c -n? A. It configures an IBM Tivoli Directory Server database for online backup. B. It changes the character set for the IBM Tivoli Directory Server database. C. It changes the existing code page of the IBM Tivoli Directory Server database to local. D. It removes the online backup configuration setup of the IBM Tivoli Directory Server database. Answer: D

Question: 55
What is the result of running the idscfgchglg command? A. configures the lostandfound.log B. configures the Changelog database C. configures the Tombstone database D. changes the configuration log file location Answer: B

Question: 56
Which tool configures the Changelog database with an IBM Tivoli Directory Server (ITDS) ins tance? A. ITDS Control Center B. ITDS Instance Creation Tool C. ITDS Web Administration Tool D. ITDS Instance Configuration Tool Answer: D

Question: 57
Where is the IBM Tivoli Directory Server (ITDS) Changelog database created? A. ITDS instance location B. ITDS database location C. ITDS instance user home D. Changelog database owner home Answer: B

Question: 58
Where does the IBM Tivoli Directory Server V6.3 (ITDS) suffix configuration utilities configure a suffix? A. ITDS database B. ITDS Changelog C. ITDS schema file D. ITDS configuration file Answer: D

Question: 59
How are suffixes deleted if LDAP data is already loaded in the configured IBM Tivoli Directory Server suffix? A. Use the idsucfgsuf command with -r option. B. Use the idsucfgsuf command with -d option. C. Use idsucfgsuf to unconfigure suffix and then delete complete Directory Information Tree from RDBM back-end. D. Delete complete Directory Information Tree from the RDBM back-end and then use idsucfgsuf to unconfigure suffix. Answer: D

Question: 60
Which tool configures IBM Tivoli Directory Server (ITDS) instance suffix? A. idsldapadd B. idsldapexop C. ITDS Control Center D. ITDS Instance Configuration Tool Answer: D

Question: 61
Which IBM Tivoli Directory Server (ITDS) tool splits an LDIF file into separate LDIF files that can be loaded onto individual directory servers while configuring the proxy server? A. ITDS Control Center B. ITDS Web Administration Tool C. ITDS Instance Administration Tool D. ITDS Distributed Directory Setup Tool Answer: D

Question: 62
What does the Health Check Feature identify in IBM Tivoli Directory Server (ITDS) proxy? A. It determines the state of the ITDS proxy server. B. It determines the state of the ITDS proxy server database. C. It determines the state of the ITDS proxy server backend(s). D. It determines whether ITDS proxy can process pass through authentication requests. Answer: C

Question: 63
Which servers can be placed in one server group in a distributed directory environment? A. Backend server with the same backend server role. B. Backend server with the same backend server type. C. Backend server with the same split of the directory database. D. Backend server with the same partition of the directory database. Answer: D

Question: 64
Which administrative group must a user be a member of in order to configure the IBM Tivoli Directory Server (ITDS) proxy to connect to the backend server? A. ITDS Data Administrative group B. ITDS Global Administrative group C. ITDS RDBM Administrative group D. ITDS Backend Administrative group Answer: B

Question: 65
How does IBM Tivoli Directory Server proxy locate and distribute data based on default settings? A. based on hash on DN B. based on hash on RDN C. based on hash on unique attribute D. based on hash on the ibm-entryuuid attribute Answer: B

Question: 66
Which tool configures an IBM Tivoli Directory Server (ITDS) proxy server? A. ITDS Control Center B. ITDS Instance Creation Tool C. ITDS Web Administration Tool D. ITDS Instance Administration Tool Answer: C

Question: 67
Which IBM Tivoli Directory Server V6.3 (ITDS) command creates a key stash file to cryptographically synchronize ITDS instances? A. idsadcfg B. idsldapexop C. idsgendirksf D. ibmslapdcfgksf Answer: C

Question: 68
Which value cannot be retrieved from the IBM Tivoli Directory Server instance after it has been created and configured? A. encryption key B. encryption salt C. encryption seed D. encryption seed-salt Answer: C

Question: 69
What is an example of when it is recommended to have cryptographically synchronized instances? A. When SSL is configured. B. When referrals are configured. C. When replication is configured with a two-way encryption scheme. D. When replication is configured with a one-way encryption scheme. Answer: D

Question: 70
What action can be performed using the IBM Tivoli Directory Server extended operation tool? A. encrypt attributes B. suspend replication C. configure password policy D. configure server for SSL-only mode Answer: B

Question: 71
Which IBM Tivoli Directory Server log file contains errors about replication conflicts? A. audit.log B. ibmslapd.log C. idschange.log D. lostandfound.log Answer: D

Question: 72
Which two statements are true about the format of the GLPRPL022W error string based on the standard format for error messages? (Choose two.) A. This message is a warning. B. This message is printed by the referral process. C. This message is printed by the replication process. D. This message is printed by the gateway component. E. This message indicates the data is resynchronized in the directory. Answer: AC

Question: 73
Which statement is true about replication administrator and directory data administrator roles? A. They have equivalent rights. B. They have nothing in common. C. The administrator rights of directory data administrator are a subset of the replication administrator. D. The administrator rights of directory data administrator are a superset of the replication administrator. Answer: D

Question: 74
Which subtree must be configured for replication if an IBM Tivoli Directory Server administrator wants schema changes to be replicated? A. cn=schema B. cn=localhost C. cn=replication D. cn=ibmpolicies Answer: D

Question: 75
A customer is configuring replication between a supplier and a consumer in the IBM Tivoli Directory Server Web Administration Tool and it fails.Which two logs will help resolve this error? (Choose two.) A. audit.log from the supplier B. ibmrepl.log from the supplier C. ibmslapd.log from the supplier D. ibmslapd.log from the targeted consumer E. lostandfound.log from the targeted consumer Answer: CD

Question: 76
Which command stops a remote instance of an IBM Tivoli Directory Server? A. kill B. db2stop C. idsslapd D. idsdirctl Answer: D

Question: 77
There is a small amount of data changes to make to multiple servers in a replication topology, including custom schemas. Which command accomplishes this with the least impact to running systems? A. idsldif2db B. idsbulkload C. idsldapexop D. idsldapmodify Answer: D

Question: 78
A customer is preparing to bulkload a large LDIF file to a server. The size of the LDIF file is 500 MB. What should the minimum amount of disk space available be in the ldapimport (-L parameter) directory? A. 250 MB B. 500 MB C. 1 GB D. 1.5 GB Answer: D

Question: 79
An IBM Tivoli Directory Server (ITDS) administrator has been tasked with configuring an ITDS V6.3 server for SSL communications. The following tasks have been performed: A CMS key database has been created. A personal certificate has been created and stored in the CMS key database. The certificate has been extracted and distributed to the client application. The server configuration has been updated with the required SSL parameters via an idsldapmodify command. What must happen next in order for this configuration to take effect? A. The ibmdiradm process must be restarted. B. The server must be started in configuration only mode. C. Nothing; the environment is ready for SSL communication. D. The ibmslapd and ibmdiradm processes must be restarted. Answer: D

Question: 80
What does the GSKCapiCmd tool do? A. It creates only PKCS11 key databases. B. It creates only PKCS12 key databases. C. It manages keys, certificates, and certificate requests within a JKS key database. D. It manages keys, certificates, and certificate requests within a CMS key database. Answer: D

Question: 81
Click the Exhibit button.The exhibit contains a stanza from an IBM Tivoli Directory Server V6.3 (ITDS) server ibmslapd.conf file. What can be observed about the SSL configuration? A. This server has a key stash file. B. This server can receive only SSL traffic. C. This server can receive both SSL and non-SSL traffic. D. This server is required to perform a two-way handshake in order to establish an SSL communication. Answer: C

Question: 82
Which method can be used for pass-through authentication when attribute mapping is not specified in IBM Tivoli Directory Server (ITDS)? A. ITDS creates its own attribute mapping logic. B. Pass-through authentication is not supported in this situation. C. ITDS searches for a mapping entry on the pass-through LDAP server. D. The entry on the actual ITDS maps explicitly to some entry on the pass-through LDAP server. Answer: D

Question: 83
A client attempts to bind to a directory server and the user credential is not available locally. Then the server attempts to verify the credential from another external directory server on behalf of the client. What is this called? A. Referral authentication B. Kerberos authentication C. Credential authentication D. Pass-through authentication Answer: D

Question: 84
How can an administrator enable the pass-through authentication feature in the IBM Tivoli Directory Server V6.3 (ITDS) instance from the ITDS Web Administration tool? A. Server Administration > Manage Admin Properties > Pass-through Authentication B. Server Administration > Manage Server Properties > Pass-through Authentication C. Server Administration > Manage Security Properties > Pass-through Authentication D. Server Administration > Manage Authentication Properties > Pass-through Authentication Answer: C

Question: 85
What is the most important consideration when configuring IBM DB2 for online backups? A. amount of disk space B. amount of physical memory C. number of DB2 connections D. number of DB2 tablespaces Answer: A

Question: 86
Which command displays backup status in IBM Tivoli Directory Server? A. idsdirctl -h <hostname> -D cn=root -w <password> backupstatus B. idsldapexop -h <hostname> -D cn=root -w <password> -op backupstatus C. idsldapsearch -h <hostname> -D cn=root -w <password> -s base -b cn=backup,cn=monitor objectclass=* D. idsldapdisplay -h <hostname> -D cn=root -w <password> -s base -b cn=backup,cn=monitor objectclass=* Answer: C

Question: 87
Why is it necessary to have online backup enabled on the source instance when the idsideploy command is being used? A. It improves performance. B. It performs circular logging. C. It allows the database copy to be created when the server is up and running. D. It allows the database copy to be created with more security than an offline backup. Answer: C

Question: 88
An administrator has been instructed that password encryption must be a two -way encryption method. Which option is valid for this requirement? A. crypt B. AES128 C. SHA-256 D. SSHA-256 Answer: B

Question: 89
An administrator has decided to use the AES256 method for password encryption but does not have access to IBM Tivoli Directory Server (ITDS) Web Administration Tool. Which section of the ITDS instance information must be modified using idsldapmodify to achieve this? A. cn=schema B. cn=configuration C. cn=crypto,cn=localhost D. cn=pwdpolicy,cn=ibmpolicies Answer: B

Question: 90
An administrator has modified the password encryption method using the command idsldapmodify. Assuming the adminDN is cn=root and the adminPW is secret, which command is required to make the change take effect without having to restart the server? A. idsldapexop -D cn=root -w secret -op readconfig -scope single "cn=configuration" ibmslapdPWEncryption B. idsldapexop -D cn=root -w secret -op updateconfig -scope single "cn=configuration" ibmslapdPWEncryption C. idsldapexop -D cn=root -w secret -op readconfig -scope single "cn=SSL,configuration" ibmslapdsslcipherspec D. idsldapexop -D cn=root -w secret -op updateconfig -scope entire "cn=SSL,configuration" ibmslapdsslcipherspec Answer: A

Question: 91
Click the Exhibit button.Based upon the exhibit, which statements is true? A. cn=fred,o=ibm has no access to object 3 B. cn=fred,o=ibm has read access to object 5 C. cn=fred, o=ibm has read access to object 6 D. cn=fred,o=ibm has read-write access to object 1 Answer: B

Question: 92
Which statement about Access Control Lists (ACL) is correct? A. the aclInherit attribute is only used for non-Filtered ACLs. B. The aclPropagate attribute is only used for non-Filtered ACLs. C. Filtered ACLs and non-Filtered ACLs propagate in a similar manner. D. A single entry may have both Filtered and not-Filtered ACLs as long as they do not propagate. Answer: B

Question: 93
What are the correct steps to set a Filtered ACL on an entry using the IBM Tivoli Directory Server Web Administration Tool? A. 1) Navigate to Directory Management > Manage ACL.2) Select the entry where the ACL is to be added.3) Select Select Actions > Edit ACL > Go.4) Select Effective ACLs.5) Click Add.6) Define the ACL. B. 1) Navigate to Directory Management > Manage Entries.2) Select the entry where the ACL is to be added.3) Select Select Actions > Edit ACL > Go.4) Select Effective ACLs.5) Click Add.6) Define the ACL. C. 1) Navigate to Directory Management > Manage ACL.2) Select the entry where the ACL is to be added.3) Select Select Actions > Edit ACL > Go.4) Select Filtered ACLs.5) Click Add.6) Define the ACL. D. 1) Navigate to Directory Management > Manage Entries.2) Select the entry where the ACL is to be added.3) Select Select Actions > Edit ACL > Go.4) Select Filtered ACLs.5) Click Add.6) Define the ACL. Answer: D

Question: 94
What are the correct steps to set a Non-Filtered ACL on an entry using the IBM Tivoli Directory Server Web Administration Tool? A. 1) Navigate to Directory Management > Manage ACL.2) Select the entry where the ACL is to be added.3) Select Select Actions > Edit ACL > Go.4) Select Non-Filtered ACLs.5) Click Add.6) Define the ACL. B. 1) Navigate to Directory Management > Manage Entries.2) Select the entry where the ACL is to be added.3) Select Select Actions > Edit ACL > Go.4) Select Non-Filtered ACLs.5) Click Add.6) Define the ACL. C. 1) Navigate to Directory Management > Manage ACL.2) Select the entry where the ACL is to be added.3) Select Select Actions > Edit ACL > Go.4) Select Filtered ACLs.5) Click Add.6) Define the ACL. D. 1) Navigate to Directory Management > Manage Entries.2) Select the entry where the ACL is to be added.3) Select Select Actions > Edit ACL > Go.4) Select Effective ACLs.5) Click Add.6) Define the ACL. Answer: B

Question: 95
Click the Exhibit button.Based upon the exhibit, what is the resulting ACL on cn=Bob Jones? A. aclEntry: group:cn=Dept XYZ,o=sample:normal:grant:rsc B. aclEntry: group:cn=Dept XYZ,o=sample:normal:grant:rscaclEntry: ABC,o=sample:at.attribute1:grant:rsc C. aclEntry: group:cn=Dept ABC,o=sample:at.attribute1:grant:rsc D. aclEntry: group:cn=Dept XYZ,o=sample:at attribute1:normal:grant:rsc Answer: B

group:cn=Dept

Question: 96
Which attribute can be used when analyzing the current ACL set on a server? A. ibm-aclentry B. ibm-effectiveAcl C. ibm-filterAclEntry D. ibm-AllAclEntries Answer: B

Question: 97
Which LDIF is correct for enabling the Server Administrative Group? A. dn: cn=Configurationchangetype: modifyreplace: ibm-slapdAdminGroupEnabledibmslapdAdminGroupEnabled: TRUE B. dn: cn=Admin,cn=Configurationchangetype: modifyreplace: ibm-slapdAdminGroupEnabledibmslapdAdminGroupEnabled: TRUE C. dn: cn=Configurationchangetype: modifyreplace: ibm-slapdAdminGroupEnabledibmslapdAdminGroup: Enabled D. dn: cn=Admin,cn=Configurationchangetype: modifyreplace: ibm-slapdAdminGroupEnabledibmslapdAdminGroupEnabled: TRUE Answer: A

Question: 98
Where in the IBM Tivoli Directory Server Web Administration Tool are Administrative Groups enabled? A. Expand the Users and Groups category in the navigation area. Click Manage Groups. B. Expand the Server Administration category in the navigation area. Click Manage Groups. C. Expand the Users and Groups in the navigation area. Click Manage Administrative Group. D. Expand the Server Administration category in the navigation area. Click Manage Administrative Group. Answer: D

Question: 99
Which statement is correct? A. The Global Administrative Group members are stored within the cn=GlobalAdminGroup, cn=localhost DN. B. The Administrative Group members are stored in the Global Admin Group and are maintained within the cn=ibmpolicies tree. C. The Administrative Group members are stored in the server configuration file within the cn=AdminGroup, cn=Configuration DN. D. The Administrative Group members are stored in the directory (database), and all members must have a valid DN in the directory information tree. Answer: C

Question: 100
Which command deploys the IBM Tivoli Directory Server Web Administration Tool on a Linux system? A. /opt/ibm/ldap/V6.3/bin/deploy_IDSWebApp B. /opt/IBM/ldap/V6.3/sbin/deploy_IDSWebApp C. /opt/IBM/ldap/V6.3/idstools/deploy_IDSWebApp D. /opt/IBM/ldap/V6.3/appsrv/bin/deploy_IDSWebApp Answer: C

Question: 101
What are the default ports for the first IBM Tivoli Directory Server instance on a system? A. Port: 389, Secure Port: 636, Administrative Port: 338, Secure Administrative Port: 339 B. Port: 389, Secure Port: 636, Administrative Port: 3538, Secure Administrative Port: 3539 C. Port: 389, Secure Port: 1389, Administrative Port: 3528, Secure Administrative Port: 3530 D. Port: 1389, Secure Port: 1636, Administrative Port: 3540, Secure Administrative Port: 3541 Answer: B

Question: 102
What are the default user ID and password for the IBM Tivoli Directory Server Web Administration Tool Administrative Console? A. cn=root/secret B. superadmin/secret C. cn=admin/password D. superadmin/password Answer: B

Question: 103
A customer is concerned that an application is sending very time consuming queries to the server. All of their applications use distinct credentials for logging into the server. Which set of Audit sett ings are appropriate? A. Performance true. Failed operations only false. B. Bind, UnBind, and Search true. Failed operations only false. C. Bind, Unbind, and Performance true. Failed operations only true. D. Bind, UnBind, Search, and Performance true. Failed operations only false. Answer: D

Question: 104
Which set of LDIF statements will turn on auditing for all logins and attribute modifications? A. dn: cn=Audit, cn=Log Management, cn=Configurationchangetype: modifyreplace: ibm-auditibmaudit: true-replace: ibm-auditbind-unbindibm-auditbind-unbind: TRUE-replace: ibmauditfailedoponlyibm-auditfailedoponly: FALSE-replace: ibm-auditmodifyibm-auditmodify: TRUE B. dn: cn=Audit, cn=Log Management, cn=Configurationchangetype: modifyreplace: ibm-auditibmaudit: true-replace: ibm-auditbindibm-auditbind: TRUE-replace: ibm-auditfailedoponlyibmauditfailedoponly: FALSE-replace: ibm-auditmodifyibm-auditmodify: TRUE C. dn: cn=Audit, cn=Log Management, cn=Configurationchangetype: modifyreplace: ibm-auditibmaudit: true-replace: ibm-auditbindibm-auditbind: TRUE-replace: ibm-auditfailedoponlyibmauditfailedoponly: TRUE-replace: ibm-auditmodifyibm-auditmodify: TRUE D. dn: cn=Audit, cn=Configurationchangetype: modifyreplace: ibm-auditibm-audit: true-replace: ibm-auditbindibm-auditbind: TRUE-replace: ibm-auditfailedoponlyibm-auditfailedoponly: FALSEreplace: ibm-auditmodifyibm-auditmodify: TRUE Answer: B

Question: 105
Click the Exhibit button.Which statement is true given the audit log configuration in the Exhibit? A. All failed operations are logged. B. Only searches, adds, binds and unbinds are logged. C. All successful and failed enabled operations are logged. D. Only failed searches, adds, binds and unbinds are logged. Answer: D

Question: 106
A customer is looking to export data in LDIF format. The LDIF data is only to include the entries of objectclass inetOrgPerson, in the o=acme subtree. There should be about 1000 entries. Which utility will accomplish this? A. db2dump B. idsexport C. idsdb2ldif D. idsldapsearch Answer: D

Question: 107
Which two commands export all of the data in a particular subtree in LDIF format? (Choose two.) A. db2dump B. idsexport C. idsdb2ldif D. idsldapexop E. idsldapsearch Answer: CE

Question: 108
Which command exports all inetOrgPerson entries from the o=acme subtree on the idsInst instance? A. idsldif2db -I idsInst -s o=acme -f objectclass=inetorgperson -o /tmp/data.ldif B. idsdb2ldif -D cn=root -w ? o=acme -f objectclass=inetorgperson -o /tmp/data.ldif C. idsldapsearch -I idsInst -b o=acme -L objectclass=inetOrgPerson > /tmp/data.ldif D. idsldapsearch -D cn=root -w ? -b o=acme -L objectclass=inetOrgPerson > /tmp/data.ldif Answer: D

Question: 109
Using the IBM Tivoli Directory Server Web Administration Tool, what is the navigational path to configure Tombstone? A. Server Administration > Manage Tombstone B. Server Administration > Manage Tombstones > Tombstone C. Server Administration > Manage Server Properties > Tombstone D. Server Administration > Manage Server Properties > Delete Settings Answer: D

Question: 110
Which set of commands and LDIF files will enable Tombstone and set a lifetime of two days? A. Assuming the Admin DN is cn=root.idsldapmodify -D cn=root -w ? -f <file>idsldapexop -D cn=root w ? -op readconfig -scope entirewhere <file> contains:dn: cn=Directory, cn=RDBM Backends, cn=IBM Directory, cn=Schemas, cn=Configurationibm-slapdTombstoneEnabled: TRUEibmslapdTombstoneLifeTime: 48 B. Assuming the Admin DN is cn=root.idsldapmodify -D cn=root -w ? -f <file>idsldapexop -D cn=root w ? -op readconfig -scope entirewhere <file> contains:dn: cn=Directory, cn=RDBM Backends, cn=IBM Directory, cn=Schemas, cn=Configurationibm-slapdTombstoneEnabled: TRUEibmslapdTombstoneLifeTime: 2 C. Assuming the Admin DN is cn=root.idsldapmodify -D cn=root -w ? -f <file>idsldapexop -D cn=root w ? -op readconfig -scope entirewhere <file> contains:dn: cn=Directory, cn=RDBM Backends, cn=IBM Directory, cn=Schemas, cn=Configurationibm-slapdTombstoneEnabled: TRUEibmslapdTombstoneLifeTimeInDays: 2 D. Assuming the Admin DN is cn=root.idsldapmodify -D cn=root -w ? -f <file>idsldapexop -D cn=root w ? -op readconfig -scope entirewhere <file> contains:dn: cn=Directory, cn=RDBM Backends, cn=IBM Directory, cn=Schemas, cn=Configurationibm-slapdTombstoneEnabled: TRUEibmslapdTombstoneLifeTimeInHours: 48 Answer: A

Question: 111
Which command creates a list of the distinguished names (DN) for all objects that have been deleted, assuming Tombstone has been enabled and the Admin DN is cn=root? A. idsldapsearch -b "" -r -D cn=root -w ? objectclass="Tombstone" dn B. idsldapsearch -b "cn=localhost" -r -D cn=root -w ? objectclass=* dn C. idsldapsearch -b "cn=Tombstones" -r -D cn=root -w ? objectclass=* dn D. idsldapsearch -b "cn=Deleted Objects" -r -D cn=root -w ? objectclass=* dn Answer: D

Question: 112
What is the correct objectclass for creating a default referral? A. ref B. referral C. ibm-slapdReferral D. ibm-serverReferral Answer: C

Question: 113
Which attribute within a normal referral is used to contain the URL for the referred to server? A. ref B. referral C. ibm-slapdReferral D. ibm-serverReferral Answer: A

Question: 114
Which statement about referrals is correct? A. Referrals can only be used with replication. B. In a proxy environment, the proxy server will return referrals. C. The server will automatically connect to a referred to server. D. Referrals provide a way for servers to refer clients to additional directory servers. Answer: D

Question: 115
In order to configure Active Directory Synchronization, what must be installed in the environment? A. IBM Tivoli Access Manager B. IBM Tivoli Directory Integrator C. IBM WebSphere Application Server D. IBM Tivoli Directory Server White Pages Answer: B

Question: 116
How is the synchronization performed when Active Directory Synchronization is configured for an IBM Tivoli Directory Server V6.3 (ITDS) environment? A. Synchronization is one-way, from ITDS to Active Directory only. B. Synchronization is one-way, from Active Directory to ITDS only. C. Synchronization is two-way, from Active Directory to ITDS and from ITDS to Active Directory. D. Synchronization is two-way, from ITDS to any LDAP server and from any LDAP server to ITDS. Answer: B

Question: 117
What does the idsadsrun command do? A. It performs synchronization from any LDAP server to an IBM Tivoli Directory Server. B. It performs synchronization from an IBM Tivoli Directory Server to any LDAP server. C. It performs Active Directory Synchronization from an Active Directory Server to an IBM Tivoli Directory Server. D. It performs Active Directory Synchronization from an IBM Tivoli Directory Server to an Active Directory Server. Answer: C

Question: 118
Which operational attributes return all password policy attributes for a given entry? A. +ibmpwdpolicy B. ibm-pwdPolicy C. ++idspwdpolicy D. +passwordMinAlphaChars Answer: A

Question: 119
Which statement is true about password policy support in IBM Tivoli Directory Server? A. Password policy can only be set at the suffix level. B. Password policy can be set at group or user level. C. Password policy is determined by a user's group membership. D. Password policy can only be set globally and equally applies to all users in all suffixes on the server. Answer: B

Question: 120
Which attribute under "cn=Configuration" entry designates the password encryption method used to encrypt a user password for any entry? A. ibm-slapdPwEncryption B. ids-slapdPwEncryption C. ids-slapdMD5Encryption D. ibm-slapdMD5Encryption Answer: A

Question: 121
Which command line tool is used to remove the IBM Tivoli Directory Server instance, DB2 instance, and DB2 database? A. db2idrop -I <instance name> -d -n B. idsidrop -I <instance name> -r -n C. idsiremove -I <instance name> -r -l D. idsidelete -I <instance name> -L -n Answer: B

Question: 122
Which command line tool is used to unconfigure the IBM DB2 database? A. idscfgdb B. idsucfgdb C. idscfgchlg D. idsucfgchlg Answer: B

Question: 123
Which utility confirms that IBM Tivoli Directory Server instance, DB2 instance, and DB2 database are unconfigured? A. idsilist B. db2ilist C. idsishow D. db2ishow Answer: A

Question: 124
What is the purpose of the migbkup utility? A. to backup LDIF data B. to backup an IBM DB2 database C. to migrate instance and its database D. to backup instance configuration and schema Answer: D

Question: 125
Which two functions are performed by the IBM Tivoli Directory Server (ITDS) idsimigr utility? (Choose two.) A. migration of the operating system B. unconfiguration of previous version of ITDS C. migration of associated IBM DB2 instance D. upgrade of instance schema and configuration E. migration of the ITDS Web Administration Tool Answer: CD

Question: 126
Which GUI tool performs a migration to IBM Tivoli Directory Server V6.3? A. ITDS Control Center B. ITDS Web Administration Tool C. ITDS Instance Configuration Tool D. ITDS Instance Administration Tool Answer: D

Question: 127
Which two methods determine if the IBM Tivoli Directory Server V6.3 (ITDS) instance is running in normal mode? (Choose two.) A. idsdirctl utility B. ITDS Control Center C. idsldapexop utility D. idsldapsearch utility E. ITDS Web Administration Tool Answer: DE

Question: 128
What provides database disk space utilization information? A. ldapsearch on Root DSE B. ldapsearch on cn=monitor C. ldapsearch on cn=localhost D. ldapsearch on cn=system,cn=monitor Answer: D

Question: 129
What provides a method to monitor the replication status? A. ldapsearch on cn=monitor B. ldapsearch on cn=connections,cn=monitor C. Web Administration Tool > Replication Management > Manage Queues D. Web Administration Tool > Replication Management >Manage Replication Topology Answer: C

Question: 130
Which IBM Tivoli Directory Server V6.3 (ITDS) document describes the server and client utilities? A. Command Reference B. Programming Reference C. System Requirements Document D. Installation and Configuration Guide Answer: A

Question: 131
What is the purpose of the option -k provided with ibmslapd? A. It stops the ibmslapd process. B. It restarts the ibmslapd process. C. It starts ibmslapd in kernel mode. D. It restarts ibmslapd in kernel mode. Answer: A

Question: 132
Which command reviews IBM Tivoli Directory Server V6.3 instance details? A. idslist B. waslist C. db2ilist D. idsilist Answer: D

Question: 133
Which command starts the IBM Tivoli Directory Server V6.3 LDAP server remotely using LDAP protocol? A. ibmslapd B. ibmdirctl C. idsdiradm D. idsldapstart Answer: B

Question: 134
An administrator uses this sequence of commands:# idsldapsearch -D cn=root -w password -h ldaphost -p 389 -b cn=connections,cn=monitor -s base objectclass=*cn=connections,cn=monitorconnection=1234 : 10.9.8.7 : 2010-10-28 11:23:44 GMT : 1 : 5 : CN=ROOT : :connection=1236 : 10.9.8.5 : 2010-10-28 11:33:54 GMT : 1 : 3 : CN=ROOT : :connection=1239 : 10.9.8.3 : 2010-10-28 11:53:55 GMT : 1 : 4 : CN=ROOT : :connection=1242 : 10.9.8.43 : 2010-10-28 11:53:55 GMT : 1 : 3 : CN=ROOT : :# idsldapexop -D cn=root -w password -op unbind -ip 10.9.8.43What is the result? A. connection from a system with ip address 10.9.8.43 is closed B. connection from a system with ip address 10.9.8.43 is restarted C. connection from a system with ip address 10.9.8.43 is refreshed D. connection from a system with ip address 10.9.8.43 is not modified Answer: A

Question: 135
What is the purpose of a persistent LDAP search in IBM Tivoli Directory Server V6.3? A. to provide paged search results B. to provide sorted search results C. to provide updated search results D. to provide replicated search results Answer: C

Question: 136
In an IBM Tivoli Directory Server V6.3 environment, user and group-based password policies are enabled in addition to the global password policy. What method evaluates the resulting password policy on a given user? A. ldapexop on the user with an extended operation getattributes B. ldapexop on the user with an extended operation effectpwdpolicy C. ldapsearch on the user with an operational attribute class ++ibmentry D. ldapsearch on the user with an operational attribute class ++ibmpwdpolicy Answer: B

Question: 137
An administrator updates a suffix entry to add an additional objectclass ibmreplicationContext.Consider these actions as possible next steps:Add a replication consumer entry with an objectclass ibm-replicationagreement. Add a replication credential object with an objectclass ibm-replicationcredentials. Add a replication supplier entry with an objectclass ibm replicasubentry. Add a replication settings container called ibm-replicagroup=default. Add a supplier entry into consumer server configuration with an objectclass ibm-slapdsupplier. What action order results in a successful replication setup? A. 4, 3, 2, 1, 5 B. 1, 2, 3, 4, 5 C. 5, 2, 1, 3, 4 D. 3, 2, 4, 1, 5 Answer: A

Question: 138
Which tool splits data in a distributed directory environment? A. idsldif2db B. idsdb2ldif C. idsddsplit D. idsddsetup Answer: D

Question: 139
What provides a way to work with realms and templates in an IBM Tivoli Directory Server V6.3 (ITDS) instance? A. ITDS Control Center B. ITDS Web Administration Tool C. ITDS Instance Configuration Tool D. ITDS Instance Administration Tool Answer: B

Question: 140
Which tool copies a directory server instance of the same version in IBM Tivoli Directory Server V6.3 (ITDS)? A. ITDS Control Center B. ITDS Web Administration Tool C. ITDS Instance Configuration Tool D. ITDS Instance Administration Tool Answer: D

Question: 141
Which three tasks can be performed by the IBM Tivoli Directory Server Web Administration Tool on a fully configured instance? (Choose three.) A. export LDIF data B. configure a suffix C. configure replication topology D. work with access control lists E. copy a remote server instance F. optimize the server database Answer: BCD

Question: 142
Which two log file settings can be modified using the IBM Tivoli Directory Server Web Administration Tool > Modify Log Settings panel? (Choose two.) A. tools log file B. db2cli log file C. ldapinst log file D. db2diag log file E. db2 transaction log file Answer: AB

Question: 143
Which suffix is the only location under which user and group-based password polices can be defined when using the IBM Tivoli Directory Server Web Administration Tool? A. cn=localhost B. cn=pwdpolicy C. cn=ibmpolicies D. cn=configuration Answer: C

Question: 144
Which two backup methods are available with the IBM Tivoli Directory Server Instance Configuration Tool? (Choose two.) A. idsdbback method B. idsldif2db to import LDIF data C. idsdb2ldif to export LDIF data D. idsbulkload to export LDIF data E. idsldapsearch method to export LDIF data Answer: AC

Question: 145
Which IBM Tivoli Directory Server V6.3 (ITDS) command performs IBM DB2 maintenance to ensure the health and performance of an ITDS? A. idsxcfg B. idsmigr C. idsrunstats D. idsideploy Answer: C

Question: 146
Which IBM Tivoli Directory Server V6.3 utility can be used to update statistical inf ormation used by the query optimizer? A. idsdbmaint B. idslogmaint C. idsperftune D. idsrunstats Answer: D

Question: 147
Which IBM Tivoli Directory Server V6.3 utility is used to apply fixpacks? A. idsxcfg B. ldapexop C. idssupport D. idsinstall Answer: D

Question: 148
Which command can be used based on the recommendations from reorgchk to reorganize tablespaces to improve access performance? A. reorg B. runstats C. idsdbmaint D. idsperftune Answer: A

Question: 149
Which method should an IBM Tivoli Directory Server V6.3 (ITDS) administrator use to take advantage of the ITDS Performance Tuning Tool? A. run the sample script that generates workload based on o=sample suffix B. generate as much multi-threaded traffic to the server as possible while running the Performance Tuning Tool C. create regenerative workload that closely models the normal server traffic while running the Performance Tuning Tool D. create as much traffic as possible to the server whil e changing different IBM DB2 tuning parameters and check the result Answer: C

Question: 150
Which IBM Tivoli Directory Server V6.3 command monitors performance? A. idsldapsearch -h ldaphost -s base -b cn=threads objectclass=* B. idsldapsearch -h ldaphost -s base -b cn=monitor objectclass=* C. idsldapsearch -h ldaphost -s base -b cn=replication objectclass=* D. isdldapsearch -h ldaphost -s base -b cn=performance objectclass=* Answer: B

Question: 151
Which two methods are available to adjust the IBM Tivoli Directory Server V6.3 (ITDS) caches? (Choose two.) A. idsrunstats B. idsldapmodify C. idsldapsearch D. ITDS Web Administration Tool > Server administration section E. ITDS Web Administration Tool > Directory management section Answer: BD

Question: 152
Given a fully configured IBM Tivoli Directory Server V6.3 environment, which cache stores member and uniquemember attribute values with their entries? A. ACL cache B. Entry cache C. Attribute cache D. Group members' cache Answer: D

Question: 153
Which method of performance tuning can be performed using the IBM Tivoli Directory Server (ITDS) Web Administration Tool? A. tuning ITDS filter cache B. enabling IBM DB2 monitors C. tuning database buffer pools D. tuning operating system kernel parameters Answer: A

Question: 154
Which GUI tool provides the capability to run the IBM Tivoli Directory Server V6.3 (ITDS) Performance Tuning Tool? A. ITDS Control Center B. IBM DB2 Control Center C. ITDS Web Administration Tool D. ITDS Instance Configuration Tool Answer: D

Question: 155
Which three actions can be performed using IBM Tivoli Directory Server V6.3 Database Maintenance Tool (idsdbmaint)? (Choose three.) A. IBM DB2 row compression B. IBM DB2 index reorganization C. IBM DB2 buffer pool expansion D. IBM DB2 transaction log maintenance E. tablespace conversion from SMS to DMS F. converting entries from changelog into the main database Answer: ABE

Question: 156
Which three methods can be performed when an IBM Tivoli Directory Server V6.3 instance's LDAP server is online? (Choose three.) A. import ldif data using idsbulkload B. perform database backup using idsdbback C. start performance tuning using idsperftune D. collect IBM DB2 statistics using idsrunstats E. perform database maintenance using idsdbmaint F. configure a change log database using idscfgchglg Answer: BCD

Question: 157
Which log file provides useful information about which attributes need to be indexed? A. db2cli.log B. idstools.log C. ibmslapd.log D. lostandfound.log Answer: C

Question: 158
After an index is set in IBM Tivoli Directory Server V6.3 (ITDS), using either the ITDS Web Administration Tool or idsldapmodify, what must be done in order for the index to take effect? A. idsdbmaint B. idsldapexop C. idsrunstats D. idsperftune Answer: C

Question: 159
Which log identifies slow running queries? A. audit.log B. db2cli.log C. idstools.log D. db2clicmds.log Answer: A

Question: 160
In order to enable performance auditing, what must be enabled in addition to normal audit logging? A. IBMSLAPD_PREOP_AUDIT=NO B. IBMSLAPD_PREOP_AUDIT=YES C. ibm-auditextopevent field set to True D. ibm-auditPerformance field set to True Answer: D

Question: 161
What additional information is added to an audit record when performance auditing is enabled? A. PREOP identifier only B. PREOP identifier, POST OP indentifier, thread ID C. indexPresent, indexNeeded, networkDelay, serverWaitTime D. operationResponseTime, timeOnWorkQ, rdbmLockWaitTime, clientIOTime Answer: D

Question: 162
An IBM Tivoli Directory Server V6.3 administrator was given the task of enabling auditing for performance. Auditing is currently enabled for searches, binds, unbinds, and adds. Performance auditing is then enabled by performing this task:ldapmodify -h <hostname> -p <port number> -D <adminDN> -w <adminpwd>dn: cn=Audit,cn=Log Management,Configurationchangetype: modifyreplace: ibm-auditPerformanceibm-auditPerformance: trueWhat must happen next to ensure performance auditing is in effect? A. restart the ibmslapd process only B. restart the ibmdiradm process only C. restart both the ibmslapd and ibmdiradm processes D. Nothing; performance auditing is dynamically enabled and should be in effect immediately. Answer: D

Question: 163
If a performance issue is encountered, which two logs should be enabled or reviewed to identify possible causes? (Choose two.) A. audit.log B. db2cli.log C. idstools.log D. ibmslapd.log E. adminaudit.log Answer: AD

Question: 164
If an issue is encountered while attempting to configure an IBM Tivoli Directory Server V6. 3 database using the idscfgdb command, what can be done to learn more information about the error? A. run db2ilist B. enable audit logging C. enable a server trace D. run idscfgdb with the -d <debug level> Answer: D

Question: 165
What information can be found in the db2cli.log? A. information about missing indexes B. information about slow running queries C. information about IBM DB2 configuration failures D. information about any SQL errors generated during LDAP operations Answer: D

Question: 166
If conflict resolution is enabled in a replication topology and a conflict occurs, what can be done to find more information about the conflict? A. enable audit logging B. review the db2cli.log C. review the lostandfound.log D. collect an ascii server trace Answer: C

Question: 167
Given this replication agreement only, what can be identified about server1?dn: cn=server1:3389,cn=server2:4389,ibm-replicaGroup=default,O=SAMPLEibm-replicaconsumerid: 40caebc0-01e1-102e-8d89-8732c6578572ibm-replicationonhold: FALSEibm-replicacredentialsdn: cn=mycreds,cn=replication,cn=localhostibm-replicaurl: ldap://server1:3389objectclass: ibmreplicationagreementobjectclass: topcn: server1:3389 A. It is a supplier. B. It is a gateway. C. It is a forwarder. D. It is a consumer. Answer: D

Question: 168
Given this subentry, what can be determined about server1?dn: cn=server1:389,ibm replicaGroup=default,o=sampleobjectclass: ibm-replicasubentryobjectclass: topibm-replicaserverid: 40caebc0-01e1-102e-8d89-8732c6578572ibm-replicationserverismaster: TRUEcn: server1:389 A. It is member of the dynamic group ibm-replicator. B. It is a replica in the o=sample replication topology. C. It is a supplier in the o=sample replication topology. D. It is a consumer for the o=sample replication topology. Answer: C

Question: 169
An IBM Tivoli Directory Server V6.3 server was recently configured for SSL communication. To test the server configuration the administrator performs this search from the local client using the server's keyfile and encounters the following error:==> idsldapsearch -p 636 -D cn=root -w secret -K /home/sslserverkey.kdb -P serverpwd -s base -b "o=sample" objectclass=*ldap_ssl_client_init failed! rc == 113, failureReasonCode == 202Keyring file open errorWhat should the administrator do to correct or learn more about the failure? A. enable audit logging B. review the ibmslapd.log C. change the keyfile password D. verify the location and permissions of the keyfile Answer: D

Question: 170
An IBM Tivoli Directory Server (ITDS) administrator recently configured an ITDS V6.3 server for SSL communication. When an SSL search is performed from the local client using the servers keyfile, th is error is observed.==> idsldapsearch -Z -p 636 -D cn=root -w secret -K /home/ssl/serverkey.kdb -s base -b "o=sample" objectclass=*ldap_ssl_client_init failed! rc == 113, failureReasonCode == 408Bad keyfile passwordWhat should the administrator do to correct or learn more about the error? A. enable Audit logging B. collect a GSKit trace C. collect a dynamic ascii server trace D. check to see if a keystash file is present in the keyfiles home directory Answer: D

Question: 171
What are two valid methods for viewing the certificates contained in a CMS keyfile? (Choose two.) A. collect a GSKit trace B. use the gskcapicmd command to list the certificates C. open the keyfile with the ikeyman and browse the certificates D. use the IBM Tivoli Directory Server Web Administration Tool to browse the certificates E. use the IBM Tivoli Directory Server Instance Administration Tool to view the certificates Answer: BC

Question: 172
When installing IBM Tivoli Directory Server V6.3 (ITDS) using native installation methods what is the correct order to install ITDS and co-requisite products to prevent failure? A. GSKit, DB2, ITDS B. ITDS, DB2, GSKit C. DB2, ITDS, GSKit D. GSKit, ITDS, DB2 Answer: A

Question: 173
On AIX, Linux, and Solaris systems, where are the IBM DB2 install logs located from an IBM Tivoli Directory Server V6.3 ISMP installation of IBM DB2? A. /tmp B. /var/idsldap/V6.3/ C. /opt/IBM/ldap/V6.3 D. <instance home>/idsslapd-<instance name>/logs/ Answer: B

Question: 174
If an error is encountered during an installation of IBM Tivoli Directory Server V6.3, what should be done to learn more about the failure? A. review the ldapinst.log B. review the idstools.log C. review the idsinstall.log D. review the ibmslapd.log Answer: A

Question: 175
An IBM Tivoli Directory Server (ITDS) administrator recently pointed a new application to an ITDS V6.3 server in their development environment. While running some performance tests, slow response times are identified. What should be collected / reviewed to learn more about the performance issue? (Choose three.) A. review the db2cli.log B. review the ibmslapd.log C. review the lostandfound.log D. enable dynamic binary server tracing E. enable Performance Auditing and rerun the test F. review the ITDS V6.3 Performance Tuning and Capacity planning guide Answer: BEF

Question: 176
What does this IBM Tivoli Directory Server search do?idsldapsearch -h <hostName> -p <port> -D <adminDN> -w ? -s base -b cn=monitor objectclass=* A. It provides information about the CPU usage. B. It provides statistical information about the DB2 database performance. C. It provides information on how many monitor threads are currently running. D. It provides statistical information about the ITDS server that can be used to monitor performance. Answer: D

Question: 177
What are three tools / logs used to learn more about the performance of an IBM Tivoli Directory Server V6.3 environment? (Choose three.) A. audit.log B. db2cli.log C. rootDSE search D. performance tracing E. cn=monitor search F. cn=perftune search Answer: AFE

Question: 178
An administrator is using the Configuration Tool to configure an IBM Tivoli Directory Server V6.3 database and the process is interrupted by a segmentation fault. When the administrator tries to restart the process, this message is displayed:Task is already running.What should be done to correct this? A. stop the process and restart the Configuration Tool B. manually delete the ~<idsslapd-instance_name> directory C. stop the process and restart the instance administration tool D. manually delete all of the *.dat and *.stat files in the ~<idsslapd-instance_name>/tmp directory Answer: D

Question: 179
An error is encountered while running the IBM Tivoli Directory Server V6.3 idscfgdb utility to create and configure an IBM DB2 database. What can be done to learn more about the failure? A. review the db2cli.log B. review the db2clicmds.log C. collect an ascii server trace D. rerun the command with the -d <debug level> Answer: D

Question: 180
When configuring an IBM Tivoli Directory Server instance, what is the minimum space requirement needed to create and configure the IBM DB2 database? A. 1 GB B. 40 MB C. 80 MB D. 320 MB Answer: C

S-ar putea să vă placă și