Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

IBM 000-375 Exam -

Free 000-375 Sample Questions:

Q: 1
A company has an IBM WebSphere Process Server clustered environment running. A system administrator is asked to configure a LDAP people directory provider to be used by human tasks. Which action should the system administrator take?
A. Configure the URL of the local LDAP server on all nodes within the cluster.
B. Configure the people directory provider on the cell that contains the cluster.
C. Configure the people directory provider on every node that hosts members of the cluster.
D. Configure a custom property listing on the nodes within the cluster; then configure the people directory provider on the node associated with the custom property.
Answer: C

Q: 2
A developer is trying to change the settings for the Business Process Choreographer container authentication alias (BPC_Auth_Alias) that was created during the profile creation step. An error message indicating the developer does not have sufficient authority to change the settings is displayed. Which one of the following is the minimum role a system administrator should grant to the developer to correct this error?
A. Deployer role
B. Operator role
C. Configurator role
D. Administrator role
E. Adminsecuritymanager role
Answer: C

Q: 3
A new business integration application retrieves and processes sensitive information from an Enterprise Integration System (EIS). The connection is established using a WebSphere JCA adapter export component. To protect the target component (wired) processing the data, the system administrator plans to enable security on WebSphere Process Server. Which action should be performed to integrate the adapter component in this environment?
A. No action is required because the JCA adapter does not support any inbound authentication mechanisms.
B. No action is required. In a security enabled environment all EIS connections to back-end systems are secured by default.
C. The run-as role should be set on the target component of the adapter export to protect downstream component access.
D. The adapter export component should be configured to use a J2C authentication alias to access the downstream components.
Answer: C

Q: 4
A company plans to use WebSphere Business Space widgets. The development team has implemented custom widgets using the Representational State Transfer (REST) services of the Business Process Choreographer API. Security is an important aspect and all communication channels and APIs must be security enabled. Before the development team can test the installed widgets in a secured environment, which action should be performed by the system administrator?
A. Change the communication protocol of all relevant REST service endpoints to use HTTPS.
B. No action needs to be taken because the REST service endpoints do not support HTTPS protocols for API access.
C. Enable administrative security and disable application security on the server or cluster hosting the REST service endpoints.
D. Remove all HTTP port mapping from the list of virtual hosts to automatically use HTTPS ports and communication channels.
Answer: A

Q: 5
When a system administrator creates an IBM WebSphere Process Server profile and selects Enable administrative security, an administrator user name must be supplied. This identity is used as a default for all underlying components. After the installation, which of the following components should be configured to appropriate users from the user repository?
A. Human Task Manager
B. Business State Machine
C. Business Process Choreographer
D. Common Event Infrastructure (CEI)
E. Service component architecture (SCA)
Answer: C,D,E

Q: 6
A business process event has failed. Assuming events are enabled, how may an administrator most easily examine the end-to-end process flow that led to the failed event, working from the Failed Event Manager?
A. From the failed event Details page, click rowse Related Common Base Events?
B. From the failed event Details page, click pen calling process in Business Process Choreographer Explorer?
C. Select the failed event, click esubmit with Trace? and view component logs.
D. Enable tracing on the Failed Event Manager, and resubmit the original request.
Answer: A

Q: 7
A WebSphere Process Server deployment environment is used by the development team.
The Common Event Infrastructure (CEI) was configured to be on its own Derby database.
The functional and recovery tests have passed the Proof of Concept (PoC). The next stage will be to conduct performance tests on a staging environment. For consistency, the production environment will use the same topology as the staging environment. Which action must the system administrator take to improve performance for the staging system?
A. Configure CEI to use multiple Derby databases.
B. Configure a deployment environment referencing a high performance database instead of Derby.
C. Configure the CEI database to be on the same server as the WebSphere Process Server db
D. Configure the CEI database to be on the same server as the Messaging database to minimize network latency.
Answer: B

Q: 8
The Service Integration Bus Browser is a tool available from the Integrated Solutions Console (ISC) that allows the system administrator to perform which tasks?
A. View runtime properties of messaging engines.
B. View runtime properties of messaging engines, and modify message contents.
C. View runtime properties of messaging engines, queue depths, and message contents.
D. View runtime properties of messaging engines, queue depths, and message contents, and perform administration of queued messages.
Answer: C

Q: 9
A WebSphere Process Server module is performing poorly. What can a system administrator do to improve the performance?
A. Turn off state observers that are not needed.
B. Configure module to use application security instead of Java2 security.
C. Optimize performance by installing a Derby database on each node in a cluster.
D. Ensure XA datasources are selected if Common Event Infrastructure (CEI) is used.
Answer: A

Q: 10
Which component in the SOA core layer provides basic event management services to applications which require them?
A. The event catalog application
B. The event management component
C. The Common Base Event (CBE) service
D. The Common Event Infrastructure (CEI)
Answer: D

© 2014, All Rights Reserved