Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

IBM 000-378 Exam - Cheat-Test.com

Free 000-378 Sample Questions:

1. A customer is receiving binary packed EDI using S/MIME over HTTP and S/MIME over FTP. They currently use WebSphere Partner Gateway and WebSphere Transformation Extender to send functional acknowledgements, convert the message, and send a correlated response. They are interested in improving performance and scaling this architecture to remove some of the processing overhead.
How could DataPower SOA Appliances provide a benefit to the customer in this scenario?
A. Add XS40 appliances in the DMZ to provide WS-Security decryption of the secure payload
B. Add XI50 appliances to convert the EDI to XML and send functional acknowledgements
C. Add XI50 appliances to parse the attachments on the request messages and deposit the result on a WebSphere MQ queue
D. Add XB60 appliances to move the security functionality to the DMZ and send MDN acknowledgements
E. Add XM70 appliances to send unicast UDP responses to the clients
Answer: D

2. Which is NOT a feature of Configuration Checkpoint Management?
A. The administrator can limit the number of Checkpoint configurations maintained.
B. Configuration objects can be imported from Checkpoint configurations.
C. Checkpoint configurations can be deleted from file system.
D. Checkpoint configurations may be compared against the running configuration.
E. Checkpoint configurations may be compared against the persisted configuration.
Answer: B

3. A company requires syncpoint on each message extracted from a Request Queue. The Message is processed via HTTP by a backend system. If the DataPower device does not successfully process the message, it should not be removed from the Request Queue. They have created a Multi-Protocol Gateway Service which uses an MQ Front Side Handler and an MQ Queue Manager to facilitate this.
How can they implement syncpoint?
A. Set the Queue Manager objects Units Of Work property to 1
B. Set the Queue Manager objects Total Connection Limit property to 1
C. The DataPower device utilizes an MQ Client, syncpoint cannot be implemented
D. The DataPower device utilizes an MQ Client, syncpoint is implemented by default
E. Create two Queue Manager objects, assign the Request Queue to one Queue Manager and the Reply Queue to the other then add them both to a single MQ Queue Manager Group
Answer: A

4. Which method finds a host's hardware address when only its IP address is known?
A. DNS (Domain Name Service)
B. ARP (Address Resolution Protocol)
C. HSRP (Hot Standby Routing Protocol)
D. DHCP (Dynamic Host Configuration Protocol)
Answer: B

5. Which statement is true about the TCP protocol?
A. TCP is unreliable since it does not support checksum.
B. TCP has no capability to sequence transmitted packets.
C. TCP sends back an ACK packet if the transfer was successful.
D. TCP is usually faster than UDP and is required for any multicasting transmission.
Answer: C

6. Regarding asymmetric keys and certificates, a certificate contains a subject's:
A. private key and the encrypted data.
B. private key and the identification of the issuer of the certificate.
C. public key and private key.
D. public key and the encrypted data.
E. public key and the identification of the issuer of the certificate.
Answer: E

7. Which statement is true about SSL security?
A. SSL is located above the HTTP protocol layer so the HTTP headers are still in plaintext.
B. SSL provides message level security so that intermediary nodes cannot see the message contents.
C. SSL provides transport layer security such that data is secure between the endpoints of a connection.
D. SSL sits below the TCP/IP layer such that the TCP functions (error control, packet marshalling, etc.) are secure.
Answer: C

8. Which statement is true about SSL endpoint authentication?
A. SSL always authenticates the client since the client certificate is always sent to the server.
B. SSL always authenticates the server since the server certificate is always sent to the client.
C. SSL guarantees the identities of the endpoints since certificates are required to flow both ways.
D. SSL is optional; it depends on the cipher suite requested by the client.
Answer: B


© 2014 Cheat-Test.com, All Rights Reserved