Saturday, December 2, 2017

Exam 98-380 Introduction to Programming Using Block-Based Languages (Touch Develop)

Published: January 27, 2017
Languages: English
Audiences: Academics
Technology: Programming
Credit toward certification: MTA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Apply Strategies to Solve Computational Problems (15-20%)
Identify basic algorithmic steps to solve simple problems
Decompose simple problems into steps, sequence processes in the appropriate order, describe storyboards, resolve challenges and errors related to logic or pseudocode
Decompose a computational problem into sub-problems
Describe computer programs that use logical subdivisions, describe solutions that use programmable strategies such as objects, functions, and parameters in the pseudo code provided, identify situations when code can be reviewed

Design Algorithms (25-30%)
Create Algorithms
Differentiate problems as easy or hard for computers to solve, apply the concept of iteration, create simple algorithms
Analyze game play to identify the algorithmic sequences
Analyze a game and create a sequence of instructions for playing it, identify an event, create the code for an event in block-based editors, explain the “on every frame” code and event handlers
Create and analyze algorithms used to implement animation and movement in code
Describe animation that uses a series of individual frames, resolve errors in algorithms, create algorithms that can be translated into pseudocode or block-based code, use code to command items on the screen or device
Explain sequence, selection, and iteration
Define loops, identify the control variable, predict the output of loop, random number, and control variable constructs, identify conditional statements; choose the appropriate Boolean logic for specific results

Work with Data Representation in Block-Based Programming Languages (15-20%)
Represent data in text, sounds, pictures, and numbers
Create code to add and position objects, such as sprites on a screen or device, identify data examples as text, sound, pictures, or numbers, change the parameters of “set frame grid” to work with different sprite sheets, explain the role of cloud variables, explain the impact of variable scope, including cloud variables, global variables, and local or temporary variables, design, create, and populate a table or two-dimensional array, describe multiple uses for data
Employ simple data structures to solve computational problems
Declare and use variables in a program, use input and variables to calculate new information, describe arrays, lists, and collections, explain the differences between variables and arrays
Describe how data is accessed in apps and games
Distinguish among variable data types, add, remove, and insert elements in a collection, iterate through collections using for loops and for-each loops, describe how random numbers are used

Solve Computational Problems by Using Modeling and Simulation (5-10%)
Solve computational problems by using computer and non-computer methods
Use algorithms and Boolean logic, use games and apps to simulate practical tasks such as converting currencies
Represent events observed in the physical world by coding simulation and modeling programs
Create programs and apps that mimic random occurrences, create programs and apps that demonstrate fundamentals of physics such as gravity, acceleration, and bounce

Code Programs in Block-Based Programming (15-20%)
Implement solutions using code
Identify the basic coding elements of the programming environment, create code for conditional statements, create conditional statements using AND, OR, and NOT, create loops, use counting variables
Use libraries and built-in functions to facilitate programming solutions
Code by using ready-made functions related to objects including the game board, wall, obstacle, sprite, string, textbox, collection, and turtle
Make connections between elements of mathematics and computer science
Plot points on a gaming coordinate system, analyze a game to discover how random numbers are used, use the random range function to generate random numbers, evaluate random numbers by using conditionals

Assess Personal Security in Internet Communications (5-10%)
Explain the basic components of Internet communication
Explain how information travels across the Internet, define cloud computing, describe the Internet of Things, describe the roles of cloud computing and cloud storage and their uses
Explain the principles of security
Describe how personal information can be used in inappropriate ways, describe how to prevent someone from gaining access to an online account, describe steps that websites take to keep passwords secure, describe the Caesar Cipher
Implement encryption and authentication strategies
Encode and decode messages using Unicode, evaluate passwords based on security criteria, describe how hashed passwords enhance Internet security

Examine the Software Development Process (5-10%)
Plan and create programs
Analyze problems in relation to your audience and identify which apps or games can be part of the solution and how they can be used, describe user-experience principles, gather user input, use code or text to create instructions for using a program
Describe software development processes used to solve problems
Plan project tasks and delegate responsibilities, describe a cycle of create, evaluate, and revise
Analyze and evaluate completed programs
Evaluate for readability and usability, give and receive feedback, evaluate feedback and revise the program accordingly

QUESTION 1
This question requires that you evaluate the underlined text to determine if it is correct.
You are writing an app for Best For You Organics Company.
The app needs to allow the user to convert a recipe from cups to liters. The app will use the conversion ratio of 1 cup is equal to 0.2366 liters.
You define the pseudocode as follows:
INPUT cups
liters = cups * 0.2366
OUTPUT liters
Review the underlined text. If it makes the statement correct, select “No change is needed.” If the statement is incorrect, select the answer choice that makes the statement correct.

A. No change is needed.
B. cups * 2.366
C. cups / 0.2366
D. cups / .02366 * 10

Answer: A


QUESTION 2
You are creating a calculator app. The Power function must calculate the result of raising a number by a positive exponent value.
You create the following pseudocode:
Function Power(number, exponent)
DECLARE result
End Function
You need to complete the pseudocode for the function.
Which pseudocode should you use?

A. WHILE exponent > 1 SET result TO result * number SET exponent TO exponent – 1LOOPReturn result
B. IF exponent > 1 SET result TO result * number SET exponent TO exponent – 1END IFReturn result
C. IF exponent > 1 SET result TO result * number SET exponent TO exponent + 1END IFReturn result
D. WHILE exponent > 1 SET result TO result * number SET exponent TO exponent + 1LOOPReturn result

Answer: C

QUESTION 3
You are creating an app that will allow university students to connect with advisors and other students to discuss stressful situations. Only students who attend the university can access the app.
Which two steps should you take to protect student’s identity and personal information? (Choose two.)

A. Hash student data transmissions with a random salt.
B. Hash the password with a random salt.
C. Encrypt student data transmissions.
D. Hash the password using an algorithm in the Google database.
E. Encrypt the password.

Answer: C

QUESTION 4
Humberto wants to create a Touch Develop game that he can play with his friends competing for the highest score. Because Humberto’s friends live out of state, he needs to create a game that can be played on different devices with each player’s score being saved and compared to the other friend’s scores. He needs help determining the right type of variable to store the highest player’s score for use in his game.
You need to give Humberto advice on the correct type of variable he needs to create for his game.
Which variable type should you recommend?

A. Table
B. Global
C. Local
D. Cloud

Answer: B

Explanation:
References: http://bjc.berkeley.edu/bjc-r/cur/programming/variables/global-variables.html


Saturday, November 11, 2017

C9010-260 IBM Power Systems with POWER8 Sales Skills V2

Number of questions: 62
Number of questions to pass: 41
Time allowed: 120 mins
Status: Live

This exam consists of 4 sections described below.

Competition 15%
Differentiate Power Systems servers against the competition, including Oracle, HP, Dell, and Cisco.
Differentiate Power Systems servers against x86 Linux competition.
Differentiate IBM virtualization solutions, such as PowerVM and PowerKVM, against competitive virtualization solutions, including VMware, Hyper-V, KVM and XenServer.
Recognize opportunities in situations where IBM has partnered with the competition (e.g. Oracle on Power).
Identify appropriate tools and resources (e.g. IBM COMP, Executive Briefing Center, Eagle Study) to use in competitive situations.
Discuss the benefits of porting existing applications / databases to POWER8.
Differentiate Cloud AWS (Amazon Web Services), Microsoft Azure, and Oracle Cloud from Power-based cloud solutions.

General Product Knowledge 27%
Describe the IBM Power Systems Scale-out and Linux models, including capabilities and/or limitations.
Recognize the targeted market opportunity for the Power Systems with NVIDIA technology.
Describe the IBM Power Systems Enterprise model servers, including capabilities and/or limitations.
Describe Power Systems peripherals (e.g. HMC/Virtual HMC, I/O expansion drawers, UPS, racks, tape and/or off-line storage), and when these are recommended or required.
Given a scenario, determine which disk storage is appropriate (traditional internal disk, internal SSD, flash, or external storage).
Given a scenario, determine which operating system is appropriate (AIX, IBM i, or Linux).
Describe Power Systems Software products and their intended function, including PowerHA, PowerVM, PowerSC, PowerVC, PowerVP, PowerKVM, etc.
Describe Power Systems architecture, technologies, and operating systems capabilities which support reliability, availability and/or serviceability (RAS).
Describe the energy management capabilities of Power Systems.
Describe available I/O adapters at a high level (e.g. SAS, Flash, Fibre Channel, Infiniband, Ethernet), including those built into the system, and how they apply to current solutions.
Describe key IBM products which support cloud, analytics, mobile, security, and social workload requirements.
Describe the unique advantages that CAPI functionality brings to Power Systems solutions.
Describe customer benefits that can be provided by the OpenPOWER Foundation.
Describe customer benefits and competitive advantages that are provided by solutions aligned with the open source community.

High Level Solution Design 29%
Given a set of customer requirements, determine which Power Systems server (e.g., Enterprise vs. Scale-out), operating system, applicable I/O, and systems software supports those needs.
When a client's requirements can be met by either Scale-out or Enterprise systems, articulate the pros and cons of each approach.
Identify pricing advantages or disadvantages of running different operating systems on Power Systems (e.g., implications of IFLs, PVUs, CBUs, etc.).
Identify cost justification elements unique to a customer's requirements (e.g., staffing, financial, software, networking, etc.).
Based on customers' business needs, determine appropriate cloud, analytics, mobile, security, or social solutions.
Based on customer requirements, identify unique Power Systems features that satisfy business needs (e.g., reduced number of cores, FPGAs, CAPI, flash, CoD, RAS, etc.).
Determine pre-sales and pre-install Technical Delivery Assessment (TDA) requirements for enterprise systems.
Identify key elements of a POWER8 proposal that would be included in an Executive Summary.
Overcome design obstacles such as physical space, electrical requirements, training, migration issues, and time-line constraints.
Explain the purpose and uses of Hardware and Software Maintenance (HW/SWMA) at a high level.
Identify the business and processing requirements of a new or existing client, relative to Power Systems solutions.
Overcome objections which would prevent a successful sale, such as budgetary constraints, technological options (high level), conflicting customer strategies, etc.
Engage appropriate resources such as ATS, Techline, eConfig, PartnerWorld, Lab Services, Executive Briefing Center, COMP, etc.

Value Proposition 29%
Describe how Power Systems technologies contribute to lower overall TCO and can improve ROI, including demonstrating an understanding of resources available to determine TCO.
Describe how Power Systems offerings contribute to competitive TCA.
Identify business benefits of Power Systems that solve typical customer pain points (performance, energy consumption, server sprawl, RAS, and budget).
Explain the versatility of Power Systems servers (e.g., virtualization, partition/application mobility, resource utilization, etc.).
Compare the value proposition of Power Systems solutions against / to competitive x86 solutions.
Discuss the benefits of an optimized solution stack (hardware, OS, middleware).
Describe the Power Systems roadmap and how it demonstrates IBM's commitment to customer investment protection.
Describe the key benefits of Power Systems for strategic solutions, such as cloud, analytics, mobile, security, and social.
Identify ISV and IBM middleware (e.g., WebSphere, Rational, Tivoli, Redis, SAP HANA, DB2) solutions that run on Power Systems.
Describe the value that CAPI (Coherent Accelerator Processer Interface) brings to the POWER8 architecture (e.g., differentiate the use cases, recognize the value) and where it is likely to be used.
Identify the IBM cloud solutions on Power Systems (e.g., Cloud Orchestrator, IBM Power Systems Solution Edition for Scale-out Cloud, etc.).
Identify the IBM analytics solutions on Power Systems (e.g., DB2 BLU on Power, IBM Data Engine for Hadoop and Spark - Power Systems Edition, IBM Data Engine for Analytics - Power Systems Edition, IBM Data Engine for NoSQL - Power Systems Edition,Spectrum Scale (GPFS), Cognos, InfoSphere Streams, etc.).
Identify the IBM mobile solutions on Power Systems, e.g., IBM MobileFirst Platform Foundation (formerly IBM WorkLight).
Articulate the infrastructure advantages provided by Power Systems (e.g., virtualization, availability, performance, environmental, tools and standards, security, application availability, scalability, Capacity on Demand).

This exam has an Assessment Exam option: A9010-260 Assessment: IBM Power Systems with POWER8 Sales Skills V2

Assessment exams are web-based exams that provides you, at a cheaper costs, the ability to check your skills before taking the certification exam.
This assessment exam is available in: Korean, Japanese, English

Passing the exam does not award you a certification, and it is only used to help you assess if you are ready or not to take the certification exam.

You can register for it at Pearson VUE and it will provide you a score report, showing you how you did in each section.

All IBM certification tests presume a certain amount of "on-the-job" experience which is not present in any classroom, Web presentation or reference material. The recommended course and reference materials will help you gain the skill and product knowledge outlined in the test objectives. They do not teach the answers to the test questions, and are not intended to. This information may not cover all subject areas in the certification test, or may contain more recent information than is present in the certification test. Reviewing/studying the course and reference materials will not guarantee that you will achieve certification.

IBM POWER8 certification preparation education can be found at the sites below:
IBMers: IBM Systems Academy
Business Partners or Clients: IBM PartnerWorld University
PartnerWorld Code: 03005910
Replaces PW Code: 03005909

Status: Live
The following guidelines reflect the minimum experience and skills one should possess to achieve the credential of IBM Certified Sales Specialist - Power Systems with POWER8 V2:

Recommended Experience:
Candidates must have experience in IBM Power Systems sales and / or sales support roles. The successful candidate structures solutions for customers based on their business requirements, has detailed product knowledge of the Power Systems portfolio (Scale-out and Enterprise systems), and has 12-18 months of experience assessing customer needs.

The Certified Sales Specialist utilizes sales tools and resources in order to manage customer relationships and develop solution proposals.
Recommended Prerequisite Skills

Successful candidates will demonstrate the following specific skills when proposing solutions to customers, regardless of whether AIX, Linux, or IBM i is the primary operating environment:
Detailed knowledge of the Power Systems family of POWER8 servers.
An ability to articulate the unique capabilities and benefits of the Power Systems architecture.
An ability to work with Power Systems, storage, software, and services experts in order to develop a customer focused IBM solution based on the customer's business needs and constraints.
An understanding of the unique characteristics that AIX, Linux, and IBM i operating systems provide and require on Power Systems.
An understanding of the benefits that can be achieved with IBM Power Systems software products such as PowerVM, PowerVC, PowerHA, PowerSC, PowerVP, etc.
An understanding of IBM product and services offerings for big data, analytics, cloud, mobile, social, and security solutions on POWER8 servers.
An ability to successfully position Power Systems products against competitive products and solutions, such as those from Oracle, HP, Cisco, x86 server vendors, and competitive storage vendors.
An awareness of tools and resources available to complete a proposal.
The ability to identify the elements of a complete and successful proposal.
An ability to effectively manage customer relationships, such as responding to objections and understanding the role of the Technical Server Specialist in the sales process.

QUESTION: No: 1
A customer plans to implement a web-based solution that requires 34 Power cores. They want to acquire
a POWER8 solution with the best TCA .
Assuming all other configuration requirements are equal, which solution provides the best TCA?

A. Two S824s
B. One E870
C. One S822
D. Three S814S

Answer: A


QUESTION: No: 2
What elements of POWER8 technology can be explogted by software developers to optimize performance
on an E870?

A. First Failure Data Capture (FFDC) and Senrice processor
B. Hypervisor and Thermal Power Management Device (TPMD)
C. Transactional memory and SMT
D. Active Memory Expansion and storage keys

Answer: C


QUESTION: No: 3
Which of the following is required to run IBM Cloud PowerVC Manager?

A. AIX
B. VIOS
C. Linux
D. IBM i

Answer: D


QUESTION: No: 4
A customer needs to update their Linux applications and is comparing Power to x86 solutions.
What benefit can be highlighted to demonstrate the value that POWER8 offers compared to x86
solutions?

A. POWER8 offers faster processor speeds.
B. POWER8 offers more sockets and cores per server.
C. PowerVM is more secure than VIVIware.
D. POWER8 offers four times the number of threads per core than x86.

Answer: C


QUESTION: No: 5
Which of the following RAS features is available on POVVER8 Scale-out

A. Redundant System Clocks
B. Dynamic Processor Deallocation
C. Capacity on Demand
D. Redundant System Processors

Answer: A

Wednesday, June 14, 2017

C2090-424 InfoSphere DataStage v11.3

Test information:
Number of questions: 64
Time allowed in minutes: 90
Required passing score: 64%
Languages: English, Japanese

Configuration (6%)
Describe how to properly configure DataStage.
Identify tasks required to create and configure a project to be used for jobs.
Given a configuration file, identify its components and its overall intended purpose.
Demonstrate proper use of node pools.

Metadata (5%)
Demonstrate knowledge of framework schema.
Identify the method of importing, sharing, and managing metadata.
Demonstrate knowledge of runtime column propagation (RCP).

Persistent Storage (15%)
Explain the process of importing/exporting data to/from framework.
Demonstrate proper use of a Sequential File stage.
Demonstrate proper usage of Complex Flat File stage.
Demonstrate proper usage of FileSets and DataSets.
Demonstrate use of FTP stage for remote data.
Demonstrate use of restructure stages.
Identify importing/exporting of XML data.
Knowledge of balanced optimization for Hadoop and integration of oozie workflows.
Demonstrate proper use of File Connector stage.
Demonstrate use of DataStage to handle various types of data including unstructured, hierarchical, Cloud, and Hadoop.

Parallel Architecture (9%)
Demonstrate proper use of data partitioning and collecting.
Demonstrate knowledge of parallel execution.

Databases (6%)
Demonstrate proper selection of database stages and database specific stage properties.
Identify source database options.
Demonstrate knowledge of target database options.
Demonstrate knowledge of the different SQL input/creation options and when to use each.

Data Transformation (12%)
Demonstrate knowledge of default type conversions, output mappings, and associated warnings.
Demonstrate proper selections of Transformer stage vs. other stages.
Describe Transformer stage capabilities.
Demonstrate the use of Transformer stage variables.
Identify process to add functionality not provided by existing DataStage stages.
Demonstrate proper use of SCD stage.
Demonstrate job design knowledge of using runtime column propagation (RCP).
Demonstrate knowledge of Transformer stage input and output loop processing.

Job Components (8%)
Demonstrate knowledge of Join, Lookup and Merge stages.
Demonstrate knowledge of Sort stage.
Demonstrate understanding of Aggregator stage.
Describe proper usage of change capture/change apply.
Demonstrate knowledge of real-time components.

Job Design (14%)
Demonstrate knowledge of shared containers.
Describe how to minimize Sorts and repartitions.
Demonstrate knowledge of creating restart points and methodologies.
Explain the process necessary to run multiple copies of the source.
Knowledge of creating DataStage jobs that can be used as a service.
Knowledge of balanced optimization.
Describe the purpose and uses of parameter sets and how they compare with other approaches for parameterizing jobs.
Demonstrate the ability to create and use Data Rules using the Data Rules stage to measure the quality of data.
Demonstrate various methods of using DataStage to handle encrypted data.

Monitor and Troubleshoot (9%)
Demonstrate knowledge of parallel job score.
Identify and define environment variables that control DataStage with regard to added functionality and reporting.
Given a process list, identify conductor, section leader, and player process.
Identify areas that may improve performance.
Demonstrate knowledge of runtime metadata analysis and performance monitoring.
Ability to monitor DataStage jobs using the Job Log and Operations Console.

Job Management and Deployment (8%)
Demonstrate knowledge of DataStage Designer Repository utilities such as advanced find, impact analysis, and job compare.
Articulate the change control process.
Knowledge of Source Code Control Integration.
Demonstrate the ability to define packages, import, and export using the ISTool utility.
Demonstrate the ability to perform admin tasks with tools such as Directory Admin.

Job Control and Runtime Management (8%)
Demonstrate knowledge of message handlers.
Demonstrate the ability to use the dsjob command line utility.
Demonstrate ability to use job sequencers.
Create and manage encrypted passwords and credentials files.

IBM Certified Solution Developer - InfoSphere DataStage v11.3

Job Role Description / Target Audience
This certification demonstrates that the successful candidate has important knowledge and skills necessary to professionally design and develop an efficient and scalable DataStage solution to a complex enterprise level business problem; configure a scalable parallel environment including clustered and distributed configurations; collect, report on, and resolve issues identified through key application performance indicators; be proficient in extending the capabilities of the parallel framework using the provided APIs (build-ops and wrappers).

Recommended Prerequisite Skills
Able to design and develop a scalable complex solution using an optimum number of stages.
Able to select the optimal data partitioning methodology.
Able to configure a distributed or non-symmetric environment.
Should be proficient with BuildOps and wrappers.
Should understand how to tune a parallel application to determine where bottlenecks exist and how to eliminate them.
Should understand basic configuration issues for all relational databases and be highly proficient in at least one.
Able to improve job design by implementing new product features in DataStage v11.3.
Able to monitor DataStage jobs via the Job Log and the Operations Console.

QUESTION 1
Assume you have before and after data sets and want to identify and process all of the changes
between the two data sets. Assuming data is properly partitioned and sorted, which of the
following should be used?

A. Difference
B. Change Apply
C. Change Capture
D. Change Capture and Change Apply

Answer: C
Reference:https://www-
01.ibm.com/support/knowledgecenter/SSZJPZ_11.3.0/com.ibm.swg.im.iis.ds.parjob.dev.doc/topic
s/c_deeref_Change_Capture_Stage.html


QUESTION 2
In the Masking Policy Editor in the Data Masking stage of your job, you have specified for a
column containing credit card numbers the Random Replacement masking policy. For the Copy
option you have specified “(1,2)(3,4)”.
What changes will be made to a credit card number, such as 6327664369, to mask it?

A. Digits 1 through 2 and digits 3 through 4will be randomly changed. The rest of the digits will remain the same.
B. Digits 1 through 2 and digits 3 through 4 will remain the same. The rest of the digits will be randomly changed.
C. The 2 digits starting at digit 1 and the 4 digits starting at digit 3 will remain the same. The rest of the digitswill be randomly changed.
D. The 2 digits starting at digit 1 and the 4 digits starting at digit 3 will be randomly changed. The rest of the digits will remain the same.

Answer: D

Explanation:


QUESTION 3
What is the primary advantage of creating data rules within Information Analyzer as opposed to
creating them within the Data Rules stage?

A. Data rules cannot be created within the Data Rules stage. They must first be created in
Information Analyzer before they can be used in the Data Rules stage.
B. Rules created within Information Analyzer can be tested and debugged on non-operational data
in a testing environment before they are put into production.
C. Rulescreated in the DataStage Data Rules stage have to be compiled into an executable form
before they can be used.
D. The variables in rules created in DataStage Data Rules stage must first be bound to data
columns or literals before they can be run.

Answer: B

Explanation:


QUESTION 4
Which stages will require a schema file when runtime column propagation (RCP) is enabled?
(Choose two.)

A. Data Set
B. Column Import
C. Internal Source
D. External Target
E. Make Subrecord

Answer: B,D
Reference:https://www-
01.ibm.com/support/knowledgecenter/SSZJPZ_11.3.0/com.ibm.swg.im.iis.ds.parjob.dev.doc/topic
s/c_deeref_using_rcp_with_sequential_stages.html


QUESTION 5
Which of the following actions are available when editing a message handler?

A. Abort Job
B. Demote to warning
C. Promote to warning
D. Promote to informational

Answer: C
Reference:http://www-
01.ibm.com/support/knowledgecenter/SSZJPZ_8.5.0/com.ibm.swg.im.iis.ds.design.help.doc/topics/editmessagehandlerswindow.html

Saturday, June 10, 2017

C2090-600 IBM DB2 11.1 DBA for LUW

Test information:
Number of questions: 60
Time allowed in minutes: 90
Required passing score: 64%
Languages: English

DB2 Server Management (15%)
Configure and manage DB2 servers, instances, and databases
Create and manage database storage paths
Exploit autonomic features
Explain the functionality of WLM
Describe the capabilities of Data Server Manager

Physical Design (22%)
Implement BLU Acceleration
Describe DB2 pureScale enhancements
Create, manage, and alter DB2 objects
Demonstrate the proper use of compression
Describe the SQL compatibility available
Describe the partitioning capabilities available

Business Rules Implementation (10%)
Create and modify table constraints
Enforce constraint checking with the SET INTEGRITY command
Create and use triggers

Monitoring DB2 Activity (12%)
Demonstrate the proper use of monitoring tools
Use the DB2 Problem Determination tool (db2pd)
Describe the capabilities of dsmtop
Capture and analyze EXPLAIN information

Utilities (13%)
Demonstrate the proper use of DB2�s data movement utilities
Demonstrate the proper use of REORG, REORGCHK, REBIND, RUNSTATS, FLUSH PACKAGE CACHE, and ADMIN_CMD
Perform an INPLACE table REORG
Demonstrate the proper use of db2look and db2move

High Availability (13%)
Perform database-level and table space level backup and recovery operations
Configure and manage HADR
Implement a DB2 pureScale environment

Security (15%)
Explain the use of LDAP authentication
Create and use trusted contexts
Restrict access to sensitive data
Explain how to encrypt data in transit and data at rest
Configure and use the Audit facility

IBM Certified Database Administrator - DB2 11.1 for Linux, UNIX, and Windows

Job Role Description / Target Audience

This intermediate level certification is intended for those who understand the DB2 11.1 technology and have the skills required in the day-to-day administration of DB2 instances and databases. To attain the certification, candidates must pass two tests. To gain additional knowledge and skills, and prepare for the tests based on the job roles and test objectives, click on the link to the test below and refer to the Test Preparation tab,

QUESTION: No: 1
Assuming no database connections exist, which of the following will dynamically change the LOCKLIST
database configuration parameter for a database named SAMPLE to AUTOMATIC?

A. UPDATE DB CFG FOR sample USING LOOCKLIST AUTOMATIC IMMEDIATE
B. UPDATE DB CFG FOR sample USING LOOCKLIST 8192 AUTOMATIC IMMEDIATE
C. CONNECT TO sample; UPDATE DB CFG FOR sample USINGLOCKLIST AUTOMATIC
IMMEDIATE;CONNECT RESET;
D. ATTACH TO db2instI;UPDATE DB CFG FOR sample USING LOCKLIST AUTOMATIC;DETACH;

Answer: C


QUESTION: No: 2
Which two tasks must be done to read data directly from IBM Softlayer Object Storage and insert it into a
DB2 database? (Choose two.)

A. Catalog a storage access alias in the DB2 database
B. Create an FTP account on IBM Softlayer Object Storage
C. Use the DB2REMOTE parameter of the LOAD command
D. Establish a remote connection to IBM Softlayer Object Storage using DB2 Connect
E. Create a local disk alias at the database server operating system level that points to IBM Softlayer
Object Storage

Answer: A,C


QUESTION: No: 3
Which of the following statements about compression for BLU MPP tables is TRUE?

A. Compression must be explicitly enabled for BLU MPP tables
B. Compression requires decompression to evaluate partition joins
C. Unique compression dictionaries are generated for each partition
D. Each table has a single compression dictionary that getsreplicated across all partitions

Answer: D


QUESTION: No: 4
A production database has the following daily midnight backup schedule which includes all table spaces.
The database incurs the same volume of daily actMty (inserts, updates, and deletes).
Sunday - Delta
Monday - Incremental
Tuesday - Delta
Wednesday - Delta
Thursday- Incremental
Friday - Delta
Saturday- Full
Which day would you expect a RECOVER DATABASE following that day's backup to take the longest
time to complete?

A. Friday
B. Monday
C. Saturday
D. Wednesday

Answer: A

Saturday, April 22, 2017

C2070-981 IBM FileNet Content Manager V5.2, Specialist

Test information:
Number of questions: 72
Time allowed in minutes: 120
Required passing score: 65%
Test languages: English
The test contains seven sections, totaling 72 multiple-choice questions. The percentages after each section title reflect the approximate distribution of the total question set across the sections.
Section 1 – Architecture and Planning (24%)
Demonstrate knowledge of the core components for CPE, WPXT, CSS and Content Navigator
Demonstrate knowledge of Content Manager scalability concepts
Demonstrate knowledge of high availability concepts
Demonstrate knowledge of disaster recovery concepts
Demonstrate knowledge of prerequisite tasks and the use of the installation/upgrade worksheet
Demonstrate an understanding of a FileNet P8 domain
Demonstrate knowledge of platform communications (core engines and infrastructure components)
Demonstrate knowledge of the APIs and available transports
Demonstrate basic knowledge of P8 dependencies to directory servers, database servers and storage devices
Section 2 – Installation and Configuration (11%)
Demonstrate an understanding of installing a single-server and a distributed system
Demonstrate knowledge of the Configuration Manager tool
Show an understanding of the IBM Content Navigator Configuration and Deployment tool
Demonstrate knowledge of security accounts used for configuration
Demonstrate an understanding of Content Platform Engine client files
Section 3 – Administration (25%)
Demonstrate an understanding of backup and restore
Demonstrate knowledge of IBM FileNet P8 component startup and shutdown
Demonstrate an understanding of WorkPlace and WorkPlace XT site/user preferences
Demonstrate knowledge of workflow system configuration
Demonstrate an understanding of Content Based Retrieval (CBR)
Demonstrate knowledge of using Content Engine query builder
Demonstrate knowledge of using Consistency Checker
Demonstrate knowledge of monitoring with IBM System Dashboard
Show knowledge of using the IBM Administration Console for Content Platform Engine (ACCE)
Show an understanding of performing bulk move content jobs
Demonstrate knowledge of object retention and disposition
Demonstrate knowledge of Component Manager
Show knowledge of administering IBM Content Navigator
Section 4 – Repository Design and Management (18%)
Demonstrate an understanding of repository design concepts
Demonstrate knowledge of classes, properties, choice lists, folders, object stores, and life cycle management
Demonstrate knowledge of Content Federation Services
Demonstrate an understanding of Content Platform Engine events: actions and subscriptions
Demonstrate knowledge of search and entry templates
Demonstrate an understanding of auditing
Show an understanding of storage area activation
Demonstrate an understanding of storage areas, content encryption and compression
Section 5 – Deployment (5%)
Demonstrate an understanding of the deployment process
Demonstrate knowledge of the FileNet Deployment Manager
Demonstrate an understanding of using the import/export manifest
Section 6 – Security (7%)
Demonstrate an understanding of authentication and authorization concepts
Demonstrate knowledge of securing content using ACLs, security inheritance, marking sets and security proxies
Demonstrate knowledge of Workplace XT access roles
Demonstrate an understanding of security caching
Section 7 – Troubleshooting and Performance Tuning (8%)
Demonstrate knowledge of using Content Platform Engine trace logging and client API tracing
Demonstrate knowledge of using log4j and application server logging
Demonstrate knowledge of verifying and troubleshooting installations and upgrades
Demonstrate knowledge of evaluating and applying system fix packs
Demonstrate knowledge of performance tuning the Content Platform Engine
Show an understanding of content search optimization
IBM Certified Specialist – FileNet Content Manager V5.2
Job Role Description / Target Audience
This intermediate level certified specialist is an individual that has the knowledge, skills, and abilities necessary to architect, plan, install, manage, deploy, secure and troubleshoot IBM FileNet Content Manager and it’s solutions.
The specialist is generally self-sufficient and is able to perform most of the tasks involved in the role with limited amount of assistance from peers and vendor support services. The specialist efficiently uses product documentation.
Recommended Prerequisite Skills
Before preparing for this certification, basic understanding of the following is recommended and assumed for your environment:
working knowledge of IBM FileNet Content Manager including Content Platform Engine, Content Navigator and Workplace XT
working knowledge of directory services server products
working knowledge of database products
working knowledge of application server products
working knowledge of operating systems
working knowledge of storage areas
working knowledge of High Availability (HA)
working knowledge of Disaster Recovery (DR)
working knowledge of solution deployment

QUESTION 1
Which tool is used to create a connection point to an existing Process Engine isolated region?
A. Workplace XT.
B. Process Administrator.
C. FileNet Enterprise Manager.
D. Process Configuration Console.
Answer: C

QUESTION 2
What are the two ways to enable Content Engine Java API log4j tracing for a client application? (choose two.)
A. Enable trace logging in the FileNet Enterprise Manager.
B. Add the fnlog4j.properties file to the java\jre\lib folder of the client application.
C. Add the following Java Virtual Machine (JVM) parameter to the client application: – Dlog4j.configuration=path\log4j.properties.
D. Add the following Java Virtual Machine (JVM) parameter to the client application: – DContenEngine.debug=true.
E. Package the log4j.properties file at the top level of a new jar file and add the jar file to the client application classpath.
Answer: C,E

QUESTION 3
If Content Engine is deployed on WebSphere and tracing is enabled in FileNet Enterprise Manager, in which default area and filename is the FileNet trace file located?
A. <WebSphere_profile>/logs/<server-name>/trace.log.
B. <WebSphere_profile>/logs/<server-name>/SystemOut.log.
C. <WebSphere_profile>/logs/<server-name>/p8_server_trace.log.
D. <WebSphere_profile>/FileNet/<server-name>/p8_server_trace.log.
Answer: D

QUESTION 4
How can you start and stop P8 components?
A. IBM FileNet Enterprise Manager.
B. Command-line based instruction only for Unix.
C. Graphical user interface (GUI) only for Windows.
D. Graphical user interface (GUI) based or command-line-based instruction.
Answer: D

QUESTION 5
Which two attributes can a file storage area have? (choose Two.)
A. Can be a raw file system.
B. Can be a Unix file system.
C. Can be a Windows NTFS volume.
D. Can be an encrypted NTFS volume.
E. Only a one-to-one relationship with a Content Engine server.
Answer: B,C

Thursday, March 16, 2017

C2040-926 Managing and Maintaining IBM Lotus Notes and Domino 8.5 Environments

Lotus certification has restructured the ND8.5 certification paths. For more information, please check out the announcement on the Lotus Certification index page.

Test information:
Number of questions: 73
Time allowed in minutes: 90
Required passing score: 72%
Languages: English, Japanese

Exam 926: Managing and Maintaining IBM Lotus Notes and Domino 8.5 Environments

Description: Covers Lotus Notes Domino 8.5 material as it relates to these competency areas:
Defining and Managing Policies
Install and Configure
Mail
Manage and Maintain
Managing Servers
Platform Support
Security

Defining and Managing Policies
Configuring client policies
Desktop policy
Implementing Policy controls on signed code
Utilizing the How To Apply policy setting

Install and Configure
Backing up DAOS
Binding ports and Internet Services
Building and viewing Replication Topologies
Configuring Automatic Diagnostic Collection
for clients
for servers
Configuring Domain Searching
Configuring Domino Domain Monitoring (DDM)
collection hierarchy
probes
Configuring Domino services
Configuring Event Handler Notifications
Configuring Lotus iNotes
Configuring Ports
Configuring Server Fast Restart
Configuring Smart Upgrade
kits
server failover
Smart Upgrade Governor
Tracking Reports
Configuring the Domino Console and binder
Configuring the Fault Analyzer
Configuring the Server Health Monitor
Creating a desktop locking policy
Creating an ID Vault
Creating Internet Site Documents
Creating Policies
Deploying a centrally managed Widget Catalog
Deploying Lotus Symphony to users
Employing Configuration Tuner for DAOS
Employing DAOS estimator
Employing Transaction Logging for DAOS
Implement database design compression
Implement database on demand collations
Implement database redirection
Implement new agent manager features
Implement Sametime for Lotus iNotes
Implementing Domino Attachment and Object Service (DAOS)
Implementing Domino Configuration Tuner
Implementing Domino Roaming for Standard Clients
Implementing Early Authentication
Registration
Domains
Servers
Users
Understand Domino Domain Monitoring (DDM)
event classes
probe types
Understand the Server Health Monitor
Understanding Installation Package Options
Understanding Server Installation Order (platform independent)
Understanding the Certification Log
Understanding the client Update Manager
Understanding the differences between the Standard and Basic Notes clients
Understanding Websphere Portal integration enhancements
Utilizing Response Files for Server Installations
Utilizing the client install manifest
Utilizing the client reconfiguration wizard

Mail
Configure DNS whitelists on the Domino server
Configure private blacklists on the Domino server
Configure private whitelists on the Notes client
Configure public blacklists on the Domino server
Configure public whitelists on the Domino server
Configuring Calendar Cleanup in the Notes client
Configuring connection error limits
Configuring mail delivery delay reports
Configuring Mail Tracking
Configuring Server Based Mail Rules
Creating Mail Topologies
Enable/Disable message disclaimers from Domino server
Enabling TNEF conversion
Implementing Mail Services
IMAP
iNotes
POP3
Issuing server commands
Stopping the processing of mail rules
Understanding ambiguous name rejections
Understanding Mail Threads
Understanding new Out of Office service types
Working with Recent Contacts utilization/management

Manage and Maintain
Analyzing Activity Trends
Analyzing Server crash files
Changing Port Configurations
Configuring Critical Request scheduling
Configuring Domino Domain Monitoring (DDM) probe schedules
Configuring Server Auxiliary Ports
Implementing Console Log Mirroring
Implementing Image Compression
Implementing Lotus Traveler Policies
Integrating Domino and IBM CommonStore Archive Services
Integrating Domino and the Tivoli Enterprise Console
Manage files and disk space
Managing Groups
Managing roaming users
Managing user desktops
Monitor server status
Releasing locked out users
Setting administrative preferences
Troubleshooting message disclaimers from Domino server
Understand Support for LDAP Attributes
Understanding Advanced Domino Server Tasks
Understanding Directory Services
Extended Directory Catalogs
Search Orders
Understanding Router Optimizations
Understanding Web Style Query
Using iNotes contacts synchronization
Using the Room and Resource Manager
Utilize admin process statistics
Utilizing Administration Process statistics
Utilizing Adminp Requests
Utilizing Automated Client Version Reporting
Utilizing Domino Attachment and Object Service (DAOS)
Utilizing Domino Configuration Tuner
Utilizing Domino server commands
Utilizing Notes Dynamic Client Configuration
Utilizing Save Window State
Utilizing Server Console Commands
Utilizing server serviceability enhancements
Utilizing Smart Upgrade Tracking Reports
Utilizing stronger encryption capabilities
Utilizing the Domino Administrator client
Utilizing the Widget Catalog
Utilizing Web Administration server bookmarks
Viewing server configuration documents
Web administration

Managing Servers
Configuring new Domino Domain Monitoring options
Implementing Domino Domain Monitoring probes
Understanding Domino Directory enhancements
Understanding streaming replication features
Utilizing Administration Process (Adminp) features

Platform Support
Defining Domino attributes
Program Documents
Replication
Server Documents
Server Tasks
Identify Lotus Domino databases

Security
Certificate Authority
Configuring
Creating the Database
Maintaining
Configuring Administrator Access rights
Configuring cross certification
Configuring ID file encryption
Configuring ID Recovery
Configuring key rollover
Configuring SSL on a server
Configuring the Access Control List (ACL)
Enforce a Consistent Access Control List
Maximum Internet name-and-password
Configuring the Certificate Authority (CA)
Configuring the Execution Control List (ECL)
Controlling Server Access
Deploying xPages Security
Employing mixed key environments
Encrypting network traffic
Implementing Internet password locking
Implementing LTPAToken2 for single sign-on
Implementing stronger key strengths
Implementing the ID Vault
Integrating Websphere and Domino with tokens
Managing encryption key lengths
Managing Shared Login
Managing the ID Vault
Managing XPages Security
Password Recovery
Restricting Server Access
Understanding changes in database encryption levels
Understanding new Java Security standards
Understanding public and private keys
Understanding the Execution Control List (ECL)
Using CA with the ID vault
Using the ID Vault
Utilizing the Access Control List (ACL) log
Utilizing the Certificate Authority (CA)
Certificate Revocation List (CRL)
Issued Certificate Lists (ICL)


QUESTION 1
Domino Domain Monitoring (DDM) allows for a central server to collect information from other
servers. What are servers called that the central server collects from?

A. Probe servers
B. Node servers
C. Event Servers
D. Collection servers

Answer: B

Explanation:


QUESTION 2
Lotus Notes Traveler server maintains a database with information pertaining to the cluster
replicas of the mail files which are being synchronized with a Lotus Notes Traveler client. The file
name of this database is which of the following?

A. travcldir.nsf
B. mduserdir.nsf
C. ntsclcache.nsf
D. lntravcache.ndk

Answer: C

Explanation:


QUESTION 3
Charlie is preparing an upgrade of the Notes clients and is testing the Smart Upgrade Tracking
feature. When he tries to manually initiate a Smart Upgrade he receives the error "File Does Not
Exist". What could be the cause of this error?

A. A Desktop Policy is not configured
B. The id file is missing from the person document
C. The Smart Upgrade Tracking database is not named "Smart Upgrade Tracking"
D. The Smart Upgrade Tracking database name is incorrect in the Desktop Policy

Answer: D

Explanation:


QUESTION 4
Carl, the Domino administrator, wishes to migrate users to dynamic policies in his Domino
environment. Which of the following will occur when he completes this task?

A. Groups with each policy name are create and users are assigned to the new group policies
B. Users are added to policy documents and applied policies are removed from their person
document
C. Policies are added to the necessary person documents and document links are assigned to the
policy documents
D. Policies are removed from the users entirely until they reauthenticate and the new dynamic
policies are applied

Answer: B

Explanation:


QUESTION 5
After DAOS is enabled and functioning on your Domino server, which of the following occurs when
a recipient opens a document with an attachment that is in the DAOS repository?

A. Attachment icons display with a link icon over the attachment icon
B. Attachment icons display a doclink to the attachment stored in DAOS
C. Attachment icons display the same as it would on a server without DAOS enabled
D. Attachment icons do not show and they are replaced with text that describes the attachment
and is linked to the attachment

Answer: C

Explanation:

 

Thursday, February 16, 2017

C2040-407 IBM Notes and Domino 9.0 Social Edition System Administration B

Test information:
Number of questions: 59
Time allowed in minutes: 90
Required passing score: 69%
Test languages: English

Description: Covers IBM Notes and Domino 9.0 Social Edition material as it relates to these competency areas:
Security
Messaging
User Management
Replication

Security
Understand IBM Domino certifiers
Understand IBM Notes Shared Login (NSL)
Understand the seven levels of security
Understand different levels of encryption
Understand the internet password
Design a certificate structure
Create an ID Vault
Manage an ID Vault
Configure ID Backup and Recovery
Configure Certificate Authority
Manage the Certificate Authority Process
Manage XPages Security
Configure Key Rollover
Understand the Credential Store
Utilize Access Control List (ACL) and Execution Control List (ECL) security
Understand SAML
Understand protected groups
Understand Readers and Authors fields
Understand Full Access Administrator and other options
Understand Java policy file
Understand differences between IBM Domino and Internet certificates
Install SSL certificate
Understand session authentication
Utilize hidden design
Understand password management

Messaging
Understand IBM Protector concepts
Understand IBM iNotes configuration
Understand IBM iNotes redirection
Configure messaging
Configure SMTP rules
Understand message delivery restrictions and controls
Track messages
Understand MIME mail options
Understand native IBM Notes mail routing
Manage IBM Notes Traveler functionality

User Management
Manage Roaming Users
Move users
Register users
Rename users
Recertify users
Utilize the Single User to Multi-User Migration tool
Manage a user's group membership
Utilize Smart Upgrade/Deployment Kit
Understand the Notes Install Cleanup Executable tool (NICE)
Understand DOLS (Domino Off-Line Services)
Understand types of policies (org, explicit, dynamic)

Understand policy settings
Understand relationships between settings and policies
Configure policies
Manage settings with formulas, including machine-specific settings
Deploy policies
Troubleshoot policies

Replication
Understand replication
Understand cluster replication
Understand managed replication
Set up clustering
Understand replication restrictions
Configure PIRC (Purge Interval Replication Control)
QUESTION 1
An administrator is not able to access a database on an IBM Domino server as he/she receives
the error "You are not authorized to access that database". What can the administrator do to
access that database?

A. Switch IDs to the server ID then try to access the database.
B. Turn on "Full Access Administration" then try to access the database.
C. Run maintenance (fixup, compact, updall) against the database in question.
D. Try to modify the Access Control List of the database by selecting the database in the Files tab
of the administrator client.

Answer: B

Explanation:


QUESTION 2
What is a requirement for implementing the IBM Notes password expiration of Notes users?

A. Notes shared login must be enabled.
B. Users must have their ID in the Notes ID vault.
C. Password checking must be enabled on the IBM Domino server.
D. Password expiration must be configured via a Policy and Person document.

Answer: C

Explanation:


QUESTION 3
What encryption standard has been introduced in IBM Domino 9.0 Social Edition?

A. Secure Hash Algorithm (SHA-2)
B. Wired Equivalent Privacy (WEP)
C. Advanced Encryption Standard (AES)
D. Federal Information Processing Standard (FIPS)

Answer: A

Explanation:


QUESTION 4
Where is an X.509 certificate, which is used to sign and encrypt SMTP mail, stored?

A. in the notes.ini
B. in the IBM Notes ID file
C. in the Personal Names and Address Book of a user
D. in the Person document in the IBM Domino Directory

Answer: B

Explanation:


QUESTION 5
What is used to determine the level of access users and servers have to a database?

A. Policy settings
B. Server document
C. Access Control List
D. Execution Control List

Answer: C

Explanation:


Saturday, January 21, 2017

700-260 Advanced Security Architecture for Account Manager


QUESTION: No: 1
Increased employee productivity, confidence in data confidentiality, and increased visibility are features
that demonstrate which Cisco business value?

A. Cost effectiveness
B. Protection
C. Control
D. Flexibility
E. Completeness

Answer: C


QUESTION: No: 2
Which licensing feature enables customers to better manage their software assets and optimize their IT
spending?

A. Cisco ONE
B. Smart Accounts
C. Enterprise License Agreements
D. License Bundling

Answer: B


QUESTION: No: 3
Which Cisco network security solution helps protect against threats by monitoring and responding to any
network anomalies, continually analyzing for potential threats and reacting to them in real time?

A. Cisco Security Manager
B. Cisco ASA Firewall Senrices
C. Cisco ASA Next-Generation Firewall Services
D. Cisco Next-Generation Intrusion Prevention System
E. Cisco Web Security Appliance
F. Cisco Email Security Appliance
G. Cisco Identity Services Engine
H. Cisco Site-to-Site VPN

Answer: D


QUESTION: No: 4
Which Cisco security technology delivers the best real-time threat intelligence?

A. Cisco Security Intelligence Operations
B. Cisco ASA Next-Generation Firewall Services
C. Cisco Identity Senrices Engine
D. Cisco Security Manager
E. Cisco TrustSec

Answer: A

Monday, January 16, 2017

C2010-530 IBM Maximo Asset Management V7.6 Infrastructure and Implementation

Test C2010-530: IBM Maximo Asset Management V7.6 Infrastructure and Implementation

Test information:
Number of questions: 73
Time allowed in minutes: 120
Required passing score: 64%
Languages: English


An IBM Certified Deployment Professional - Maximo Asset Management V7.6 infrastructure and implementation is a technical professional responsible for the planning, installation, configuration, administration, tuning and problem determination of a IBM Maximo Asset Management V7.6 environment. This individual will be expected to perform these tasks with limited assistance from peers, product documentation, and support resources.

Planning (12%)
Define the logical sequence of events for a successful Maximo installation

Explain the Java Enterprise Edition configuration concepts

Identify the functionality in IBM Maximo Asset Management that can be separated across Application Servers (JVMs)

Explain application server (JVM) performance concepts and optimization settings

Explain the database requirements and configuration

Identify initial configuration data and define proper input sequence

Explain the different security features and options available

Explain the IBM Maximo Asset Management upgrade process from 7.5 to 7.6


Installation and Upgrade (16%)
Demonstrate the configuration of security needed to install IBM Maximo Asset Management

Demonstrate IBM Maximo Asset Management installation sequence

Prepare IBM Maximo Asset Management database schema

Prepare IBM Maximo Asset Management application server

Use the different IBM Maximo Asset Management installation components and tools

Demonstrate installation troubleshooting

Verify which version of IBM Maximo Asset Management has been installed

Validate the installation using the installValidation utility and the TPAE configuration tool

Validate middleware installation and configuration


System Level Configuration (22%)
Enable Application Server Security

Configure the Maximo Integration Framework

Configure the IBM Maximo Asset Management system properties

Build and deploy Maximo EAR files

Configure Cron Tasks

Configure a Workflow Process

Configure IBM Maximo Asset Management logging

Configure the database objects

Create new or configure an existing application

Configure Conditional Expressions


Application Level Configuration (18%)
Configure Item and Company Sets

Configure Organization and Site

Configuration of the General Ledger (GL) component structure

Configure a Security Group

Describe the implentation of Automation Scripting

Configure Domains

Configure Start Center

Configure attached documents

Discuss the usage of Migration Manager and creation of Migration Packages

Identify the reporting options available and configuration tools


Administration (18%)
Describe the Organization and Site settings

Administer Security Groups

Manage Administration Resources for Labor assignment

Manage Escalations

Manage Workflows

Administer Maximo Integration Framework

Use of Report Administration

Managing Adhoc Reports


Performance Tuning and Problem Determination (14%)
Assess application server performance

Analyze database performance issues

Analyze query efficiency

Review Start Center portlets

Define IBM Maximo Asset Management log settings and analyze log files

Explain Diagnostic Tools

Saturday, January 14, 2017

C2010-506 IBM TRIRIGA Real Estate Manager V10.3 Application Consultant

Test information:
Number of questions: 52
Time allowed in minutes: 90
Required passing score: 73%
Languages: English
Related certifications:

IBM Certified Application Consultant - TRIRIGA Real Estate Manager V10.3

Study Guide for the certification test.
Below are the high level objectives for this exam. We recommend reviewing the Study Guide for more detailed information on the test objectives to provide a better idea of the content which will be covered on the exam.

Section 1: Real Estate Concepts
Given knowledge of real estate leasing, define some of the common real estate leasing terms so that they can be explained to a client.

Section 2: Real Estate Contracts
Given that TRIRIGA is installed, the Portfolio is properly configured and loaded with data, the user has a license to the Real Estate module and the proper security permissions, create and populate an Owned Property (Fee) Agreement in the TRIRIGA system so that an activated Owned Property (Fee) Agreement is created for use in tracking, managing and reporting on owned property assets in TRIRIGA.

Given that TRIRIGA is installed, the Portfolio is properly configured and loaded with data, the user has a license to the Real Estate module and the proper security permissions, create and populate an Real Estate Lease in the TRIRIGA system so that a Real Estate Lease can be used in tracking, managing and reporting on lease assets in TRIRIGA.

Given that TRIRIGA is installed, the Portfolio is properly configured and loaded with data, the user has a license to the Real Estate module and the proper security permissions, describe the four different methods and the related steps to enter a lease into the TRIRIGA system so that the consultant can determine and perform the best method based upon their customers requirements.

Given that TRIRIGA is installed, the user has a license to the Real Estate module and the proper security permissions, describe the real estate leasing lifecycle within TRIRIGA so that the consultant can properly advise their clients of the process flow.

Given that an understanding of real estate, compare Owned Property (Fee) Agreement to Real Estate Lease in the TRIRIGA system so that the stated differences between the Real Estate Contract and the Owned Property (Fee) Agreement have been clarified and the consultant will be able to direct the client to use the appropriate record.

Given knowledge of real estate, explain the critical real estate leasing concepts so that the consultant will use appropriate terminology when working with the client.

Given knowledge of the Real Estate module, explain the aspects of a real estate leasing so that the consultant will use appropriate terminology when working with the client.

Given that TRIRIGA is installed, the Portfolio is properly configured and loaded with data, the user has a license to the Real Estate module and the proper security permissions, create a Clause in a Real Estate Lease in the TRIRIGA system so that a clause has been created to support functionality in a TRIRIGA Real Estate Contract.

Given real estate industry knowledge, explain the rental income stream throughout the life of a lease so that a consultant can explain it to their client.

Given real estate industry knowledge, define Percent Rent in the TRIRIGA system so that the consultant can be effective in communicating this understanding during implementation of Tririga Real Estate with a client.

Given that TRIRIGA is installed, the Portfolio is properly configured and loaded with data, the user has a license to the Real Estate module and the proper security permissions, define capital vs operating expense requirements in the TRIRIGA system so that the consultant can determine the best method of use based upon the customers requirements.

Given that TRIRIGA is installed, the user has a license to the Real Estate module and the proper security permissions, create and/or execute an Option on a Contract so that options can be tracked on a lease.

Given that TRIRIGA is installed, the Portfolio is properly configured and loaded with data, the user has a license to the Real Estate module and the proper security permissions, describe the two different methods to create, process and change/update a payment schedule on a lease in the TRIRIGA system so that Real Estate payments are effectively entered and processed for the life of the contract.

Given that TRIRIGA is installed, the Portfolio is properly configured and loaded with data and the user has a license to the Real Estate module and the proper security permissions, describe the process for setting up an Operating Expense / Common Area Maintenance Clause and performing the periodic Payment Reconciliation so that the OPEX/CAM Clause has been entered and is effectively reconciled each period.

Given that TRIRIGA is installed, the Portfolio is properly configured and loaded with data, the user has a license to the Real Estate module and the proper security permissions, describe the method of creating an amendment of a Real Estate Lease so that the Real Estate Lease is effectively amended to reflect new contractual changes.

Given that TRIRIGA is installed, the Portfolio is properly configured and loaded with data, the user has a license to the Real Estate module and the proper security permissions, describe the method for defining and processing indexed rent adjustments so that Real Estate Lease rent payments are updated with the new indexed amounts.

Section 3: Real Estate Transaction Management
Given that TRIRIGA installed, a license to use the Real Estate module, user has appropriate security permissions, CTQ Templates, RE Transaction Plan Templates, Real Estate Contract templates have all been properly created as necessary, all application settings are properly configured as necessary; describe the real estate transaction lifecycle within Tririga so that the consultant can properly advise their customers' of the process flow.

Given that TRIRIGA installed, a license to use the Real Estate module, user has appropriate security permissions, create RE Action Request as an entry point to the RE Transaction Plan so that a real estate requirement has been documented.

Given knowledge of real estate, summarize the benefits of using a Real Estate Transaction Plan so that the benefits can be explained to the client.

Given that client requires an understanding of the product features summarize the benefits of using RE Projects so as to provide a positive understanding of the value and capability of the feature set.

Section 4: Real Estate Common Functionality
Given knowledge of real estate and TRIRIGA, describe the interaction between Real Estate Contracts and portfolio so that portfolio elements that the Real Estate Contracts reference are identified.

Given that TRIRIGA is installed, the Portfolio is properly configured and loaded with data, the user has a license to the Real Estate module and the proper security permissions, describe the method for requiring Real Estate Lease Contact roles so that RE Contract has proper contact roles defined.

Given TRIRIGA is installed, the Portfolio is properly configured and loaded with data, the user has a license to the Real Estate module and the proper security permissions, describe the different notifications that are used in a Real Estate Lease and how they can be generated in the TRIRIGA Real Estate module so that the consultant has defined system generated and manual notifications.

Given that client requires an understanding of the product benefits, summarize document storage so as to provide a understanding of the value and capability of the feature set.

Given expertise in real estate, define financial terminology so that the consultant can explain financial terminology to the client.

Given that TRIRIGA is installed, the user has a license to the Real Estate module and the proper security permissions, describe the out-of-the-box reporting so that the consultant understands the reporting available in the TRIRIGA application.

QUESTION 1
TRIRIGA Projects offers enterprise project management, program management, fund source management and vendor bid management capabilities to deliver which business benefits?

A. Simplified navigation and control, adaptive portal layouts and streamlined application processes
B. Comprehensive suite of operational and analytical applications
C. Single technology platform, scalability and enterprise interoperability
D. All of the above

Answer: C


QUESTION 2
Identify the license type which allows converting a concurrent core license to the Integrated Workplace Manager (IWM) license.

A. Allowed under the S&S contract
B. One-time upgrade license
C. Trade-up license
D. Must purchase an additional IWM license

Answer: C


QUESTION 3
What is a benefit of the TRIRIGA Workplace Enterprise-Class Application system?

A. A single suite of modular applications that manages across the entire workplace function
B. Five low-cost stand-alone applications integrated using Omnibus and SOAP interfaces
C. Automates EH&S regulatory compliance
D. Fully compliant with Sarbanes-Oxley regulatory requirements

Answer: A


QUESTION 4
All pricing includes first year maintenance and support.

A. True
B. False
C. Only for first-time purchases of the software
D. Only for additional license purchases after initial order

Answer: A

Sunday, January 8, 2017

1Z0-066 Oracle Database 12c: Data Guard Administration

1Z0-066 Oracle Database 12c: Data Guard Administration

Oracle Data Guard Basics
Describe the Architecture of Oracle Data Guard
Explain the applicability between physical and logical standby and snapshot databases
Explain the benefits of implementing Oracle Data Guard
Explain Data Guard use with the Oracle Multi-tennant databases

Creating a Physical Standby Database by Using Enterprise Manager Cloud Control
Create a Data Guard broker configuration
Create a physical standby database
Verify a Data Guard configuration
Edit database properties related to Data Guard
Test a Data Guard configuration

Managing Oracle Net Services in a Data Guard Environment
Configure client connectivity in a Data Guard configuration
Implement failover procedures to automatically redirect clients to a new primary database
Using Application Continuity in a Data Guard Environment

Creating a Physical Standby Database by Using SQL and RMAN Commands
Configure the primary database and Oracle Net Services to support the creation of the physical standby database and role transition
Create a physical standby database by using the DUPLICATE TARGET DATABASE FOR STANDBY FROM ACTIVE DATABASE RMAN command

Using Oracle Active Data Guard
Use Real-time Query to access data on a physical standby database
Enable RMAN block change tracking for a physical standby database
Use Far Sync to extend zero data loss protection for intercontinental configurations
Using Temporary Undo. Global Sequences and Session Sequences
Using Automatic Block Media Recovery
Configure Real-Time Cascading

Creating and Managing a Snapshot Standby Database
Create a snapshot standby database to meet the requirement for a temporary, updatable snapshot of a physical standby database
Convert a snapshot standby database back to a physical standby database

Creating a Logical Standby Database
Determine when to create a logical standby database
Create a logical standby database
Manage SQL Apply filtering

Oracle Data Guard Broker Basics
Describe the Data Guard broker architecture
Describe the Data Guard broker components
Explain the benefits of the Data Guard broker
Describe Data Guard broker configurations

Creating a Data Guard Broker Configuration
Create a Data Guard broker configuration
Manage the Data Guard broker configuration

Monitoring a Data Guard Broker Configuration
Use Enterprise Manager to manage your Data Guard configuration
Invoke DGMGRL to manage your Data Guard configuration

Configuring Data Protection Modes
Describe the data protection modes
Change the data protection mode of your configuration

Performing Role Transitions
Explain the database roles
Perform a switchover
Perform a failover

Using Flashback Database in a Data Guard Configuration
Configure Flashback Database
Explain the advantages of using Flashback Database in a Data Guard configuration

Enabling Fast-Start Failover
Configure fast-start failover
View information about the fast-start failover configuration
Manage the observer
Perform role changes in a fast-start failover configuration
Manually reinstate the primary database

Backup and Recovery Considerations in an Oracle Data Guard Configuration
Use Recovery Manager (RMAN) to back up and restore files in a Data Guard configuration
Offload backups to a physical standby database
Recovering databases in a Data Guard Environment
Managing Archive Redo Logs in a Data Guard Environment

Patching and Upgrading Databases in a Data Guard Configuration
Patch and upgrade databases using traditional patch methods
Perform rolling upgrades

Optimizing a Data Guard Configuration
Monitor configuration performance
Optimize redo transport for best performance
Optimize SQL Apply

 

QUESTION: No: 1
Which two statements are true for Data Guard environments with multi-tenant databases?

A. DB_UNIQUE_NAME must be specified differently for each pluggable database within a multitenant
standby database.
B. Each pluggable database within a multi-tenant physical standby database has a minimum of one
associated Oracle Net service name.
C. Each pluggable database within a multi-tenant physical standby has one MRP background process
running during redo apply.
D. A pluggable database within a multi-tenant standby database can have a different open mode than the
container database
E. A pluggable database within a multi-tenant standby database can have a different database role than
the container database.

Answer: A, D

QUESTION: No: 2
Your Data Guard environment has two remote physical standby databases Client applications use the
local naming method to connect to the primary database instance.
You want applications to automatically connect to the new primary database instance in case of a
switchover or a failover
Which will fulfill this requirement?

A. Create a database service on each standby database that is started automatically by a trigger, when
the database rote is PRIMARY, modify the connection description used by client applications to include all
the standby hosts and connect to the database instance using that service name.
B. Create a database service on the primary database that is started automatically by a trigger, when the
database role is PRIMARY, modify the connection descriptors used by client applications to include all the
standby hosts and connect to the database instance using that service name.
C. Set the INSTANCE_NAME parameter identically on all databases; modify the connection descriptor on
client applications to include all the standby hosts and connect to the database instance using that service
name.c
D. Set the DB_NAME and DB_UNIQUE_NAME identical on all databases, modify the connection
descriptors on client applications to include all the standby hosts and connect to the database using that
service name.

Answer: A


QUESTION: No: 3
Examine the Data Guard configuration:
DGMGRL >show configuration;
Configuration-Animals
Protection Mode MaxPerformance Databases
dogs-Primary database
sheep-Snapshot standby database
cats-Snapshot standby database
Fast-Start Failover: DISABLED
Configuration Status: SUCCESS
You receive an error while attempting to raise the protection mode to Maximum Availability:
DGMGDRL> edit configuration set protection mode as max availability;
Error ORA-16627 operation disallowed since no standby databases would remain to support protection
mode Failed.
Identify two statements that you can execute, either one of which will enable successful raising of the
protection mode to Maximum Availability.

A. DGMGRL> convert database sheep to physical standby;
B. DGMGRL> convert database cats to physical standby;
C. DGMGRL> edit database dogs set property LogXptMode= fastsync;
D. DGMGRL> edit database sheep set property LogXptMode= fastsync;
E. DGMGRL> edit database cats set property LogXptMode= sync;

Answer: B, E


QUESTION: No: 4
You administer a Data Guard environment with a primary and two physical standby databases.
One of the physical standby databases is used for reporting and is on the same host as the primary
database.
The other physical standby database is remote, used for disaster recovery and REDO is routed to it via a
far sync instance.
Backups are offloaded to the remote physical standby.
Which three are true concerning the management of archive logs in this Data Guard configuration?

A. Archive logs on the primary database may be deleted once they are applied on all standby databases.
B. Archive logs on the primary database may be deleted once they are shipped on all standby databases.
C. The deletion policy for archive logs on the remote physical standby should be set so that archived logs
are deleted once they backed up at least once on the remote physical standby database.
D. The deletion policy for archive logs on the remote physical standby should be set so that archived logs
are deleted once they are applied on all standby databases.
E. Archive logs on the primary database may be deleted once they are archived locally to disk.

Answer: A, D, E


QUESTION: No: 5
Which two are prerequisites for configuring flashback database for Oracle 12c databases, in a Data
Guard environment?

A. a flash recovery area must be configured
B. The database must be in MOUNT state.
C. The database must be in ARCHIVELOG mode.
D. A far sync instance must be configured to flash back a standby when the primary has been flashed back.
E. The Data Guard Broker must be used.

Answer: A, C