Wednesday, October 25, 2017

C8010-450 IBM Watson Customer Engagement: Watson Marketing


Number of questions: 59
Number of questions to pass: 41
Time allowed: 90 mins

This multiple-choice test contains questions requiring single and multiple answers. For multiple-answer questions, you need to choose all required options to get the answer correct. You will be advised how many options make up the correct answer.
This test is designed to provide diagnostic feedback on the Examination Score Report, correlating back to the test objectives, informing the test taker how he or she did on each section of the test. As a result, to maintain the integrity of each test, questions and answers are not distributed.

The test contains five sections totalling 59 multiple-choice questions. The percentages after each section title reflect the approximate distribution of the total question set across the sections.

Section 1 - Architecture 12%
Understand IBM Campaign architecture components
Understand the criteria for software requirements
Understand network requirements for IBM Campaign
Demonstrate knowledge of contact and response history administration, and Cognos reporting

Section 2 - Installation 14%
Understand installation of IBM Marketing Platform and IBM Campaign applications, and their supporting structures (including distributed environments).
Understand the components of a successful installation (UNIX or Windows)
Demonstrate knowledge of upgrade processes, including awareness of upgrade paths
Understand the related Cognos components and how they impact IBM Campaign reporting

Section 3 - Configuration and Customization 27%
Illustrate how to set up different authorization mechanisms
Explain how to manage and access user databases within IBM Campaign
Demonstrate knowledge of setting up security, user roles and policies for IBM Campaign objects
Demonstrate knowledge of standard and custom attributes in IBM Campaign
Configure custom audience levels, and setup contact and response history
Demonstrate ability to configure dashboards
Understand integration between IBM Campaign and other IBM Enterprise Marketing Management (EMM) products
Demonstrate knowledge of character encoding for multiple locales and databases

Section 4 - Functionality and Campaign Development 35%
Illustrate how database table administration functions in IBM Campaign (e.g. table mapping, flat files, base/dimension/general tables, table catalogs)
Configure IBM Campaign processes to build a flowchart
Create offers and apply them to campaigns
Configure the scheduler and schedule IBM Campaign flowcharts
Explain uses and benefits of custom macro
Explain uses and benefits of user variables
Explain uses and benefits of derived fields and persistent derived fields
Explain uses and benefits of triggers
Explain uses and benefits of flowchart templates
Understand reporting
Understand internal workings of cells and flowcharts

Section 5 - Troubleshooting and Performance Tuning 12%
Understand and configure logging
Demonstrate knowledge of IBM Campaign utilities
Demonstrate the ability to isolate performance issues

PartnerWorld Code: 33000102
Replaces PW Code: 33000101

Status: Live
This intermediate level certification is intended for IBM Campaign V9.1 power users (or key users), as well as specialists responsible for planning, installing, configuring, troubleshooting the product.

These technical professionals are also required to have conceptual understanding of different:
Operating Systems (Microsoft Windows, UNIX, Linux)
Databases (DB2, Netezza, SQL server, Teradata, Oracle)
Application Servers (WebSphere, WebLogic)

Recommended Prerequisite Skills

Before preparing for this certification, understanding of the following is recommended and assumed:
basic OS scripting
basic web Application Server knowledge
basic system security authentication and authorization (HTTPS, security certificates, single sign-on, LDAP, active directory)
intermediate database administration skills
write queries, triggers, procedures

In preparing for this certification, the following IBM courses are recommended to further improve your skills. Refer to the Test Preparation web page for additional information and recommendations.
9U01G: IBM Building Campaigns 9.x
9U05G: IBM Campaign 9.x Administration
9U21G: IBM Campaign Advanced Techniques 9.x





Monday, October 16, 2017

C5050-409 IBM Worklight Foundation V6.2 Mobile System Administration

Number of questions: 50
Number of questions to pass: 31
Time allowed: 90 mins

The test consists of seven sections containing a total of approximately 50 multiple-choice questions. The percentages after each section title reflect the approximate distribution of the total question set across the sections.

Section 1 - Architecture 6%
Explain Worklight component architecture.
Describe the capabilities of the Worklight Server.
Describe the components of the Worklight Analytics server and how they fit into the overall Worklight architecture.

Section 2 - Installation and Configuration 26%
Plan and design the implementation of Worklight Server and its prerequisite components.
Install the Worklight Server.
Install the Application Center.
Install the Operational Analytics Platform server, and integrate it with the Worklight Server.
Configure the application server environment for Worklight Server using Ant tasks.
Configure the application server environment for Worklight Server using the Server Configuration Tool.
Perform post-installation and configuration tasks such as installation verification, establishing database connectivity, and certificate management.
Configure and manage the SMS Gateway.
Implement Worklight Server configurations for high availability.
Apply maintenance updates, such as upgrading the Worklight Server to a newer version.
Set up a cluster for Operational Analytics.
Perform backup and recovery of the Worklight Server environment.

Section 3 - Application and Adapter Deployment 14%
Deploy Worklight applications and adapters by using the Worklight console.
Deploy Worklight applications and adapters by using Ant tasks.
Deploy Worklight applications by using the command line interface (CLI).
Move Worklight applications from development to test or production environments.

Section 4 - Securing the Environment 14%
Compare the web, mobile, and custom security tests.
Explain the configuration of realms and login modules.
Configure device Single Sign-On (SSO) for Worklight applications.
Configure Worklight to use LDAP.
Configure Worklight to use LTPA.
Ensure secure communication between Worklight components.
Manage Worklight Console users, groups and roles.

Section 5 - Managing Mobile Application Distribution, Availability and Updates 14%
Notify users about Worklight application updates.
Manage multiple versions of Worklight applications.
Manage Worklight applications using the command line interface (CLI).
Manage Worklight applications using Ant.
Manage Worklight applications using the Worklight Console.
Use the Application Center to publish Worklight applications within an organization.
Use the Application Center to manage access controls to Worklight applications that are published within an organization.

Section 6 - Monitoring Mobile Applications and Performance Tuning 8%
Monitor push notifications.
Track devices that access the Worklight Server (user to device mapping).
Manage device access rights to the Worklight Server.
Tune the Worklight Server environment.

Section 7 - Problem Determination 18%
Diagnose connectivity issues between devices, Worklight Server and enterprise systems.
Troubleshoot installation problems.
Troubleshoot issues of migration from earlier versions of Worklight.
Troubleshoot issues that may arise when moving Worklight applications between environments.
Troubleshoot analytics configurations.
Troubleshoot authentication.
Use system log files to diagnose problems.
Use the Command Line Interface (CLI) tools to retrieve server and application information.
Diagnose build and deployment issues.

PartnerWorld Code: 15011002
Replaces PW Code: 15011001


Status: Live
This intermediate level certification is intended for system administrators who need to install, configure, manage, monitor, troubleshoot and maintain secure mobile application infrastructure.

These mobile system administrators are generally self-sufficient and able to perform most of the tasks involved in the role with limited assistance from peers and vendor support services. These mobile system administrators use the product documentation effectively and efficiently.

To attain the IBM Certified Mobile System Administrator - Worklight Foundation V6.2 certification, candidates must pass 1 test. To prepare for the test, refer to the job role description and recommended prerequisite skills, and click the link to the test below to refer to the test objectives (skills measured on the test) and the Test preparation tab.
Recommended Prerequisite Skills

Knowledge and foundational skills one needs to possess before acquiring skills measured on the certification test. These foundational skills are NOT measured on the test. For skills measured on the test, see Test Objectives.)

Experience with application server administration.
Experience using Apache Ant.
Good understanding of LDAP.
Familiarity with Worklight Studio.
Familiarity with web application development and deployment.

Requirements
This certification requires 1 exam

Exam Required:
Click on the link below to see exam details, exam objectives, suggested training and sample tests.

C5050-409 - IBM Worklight Foundation V6.2 Mobile System Administration

Each test:
contains questions requiring single and multiple answers. For multiple-answer questions, you need to choose all required options to get the answer correct. You will be advised how many options make up the correct answer.

is designed to provide diagnostic feedback on the Examination Score Report, correlating back to the test objectives, informing the test taker how he or she did on each section of the test. As a result, to maintain the integrity of each test, questions and answers are not distributed.


Thursday, September 14, 2017

C2150-606 IBM Security Guardium V10.0 Administration

Test information:
Number of questions: 55
Time allowed in minutes: 90
Required passing score: 63%
Languages: English

Related certifications:
IBM Certified Administrator - Security Guardium V10.0

The test consists of 6 sections containing a total of approximately 55 multiple-choice questions. The percentages after each section title reflect the approximate distribution of the total question set across the sections.

Section 1 - Product features and capabilities (16%)
Understand high-level components of a Guardium solution.
Describe the features and capabilities of Data Activity Monitoring (DAM) and File Activity Monitoring (FAM).
Describe the features and capabilities of Classification, Entitlement, and Vulnerability Assessment.
Use data level access control features (SGATE and Redaction).
Describe features and capabilities of available agents and modules (GIM, S-TAP, CAS, etc).

Section 2 - Planning, sizing and capacity (15%)
Identify the main factors that affect the volume of data managed by Guardium including backups and archives.
Plan appliance location architecture.
Understand properties of the systems to be monitored such as operating systems, databases, type of data and volume and their effects.
Plan strategy for high availability.
Calculate the number and type of appliances required based on Processor Value Unit (PVU) load.
Identify the system requirements of Guardium appliances.

Section 3 - Installation and configuration (25%)
Locate and download appropriate Guardium appliance and agent installers.
Build new collectors and aggregators.
Perform initial appliance setup and configuration.
Configure appliance data management processes and schedules.
Configure the appliance for interfacing with standard systems (mail, SNMP, LDAP, SIEM).
Manage the access of Guardium users.
Install Guardium Installation Manager (GIM) and upgrade agents and modules with GIM.
Install software tap (S-TAP) from command line.
Demonstrate detailed understanding of agent configuration and inspection engine parameters.

Section 4 - Data monitoring, policy rules and reporting (15%)
Perform a Vulnerability Assessment test.
Differentiate the effects of policy rules and associated actions.
Define and use monitoring features such as queries, reports, audit processes, and alerts.
Use Enterprise Search.

Section 5 - Self-monitoring and performance (15%)
Use Guardium self-monitoring reports and alerts.
Analyze and act upon errors or exceptions.
Identify and resolve appliance performance issues.
Optimize internal database tables to maintain performance.
Monitor and report on Guardium user activity.
Maintain a managed environment.

Section 6 - Maintenance and support (15%)
Use available IBM troubleshooting resources and services, for example, Knowledge Center, technotes and IBM Support.
Plan and install appliance patches and agent upgrades.
Collect diagnostic information and troubleshoot problems.
Use common Command Line Interface (CLI) and GrdAPI commands including support commands.
Restore data and configuration from backups and archives.

IBM Certified Administrator - Security Guardium V10.0

Job Role Description / Target Audience
This intermediate level certification is intended for Guardium administrators (data security and deployment professionals).

This certification covers the products IBM Security Guardium Data Activity Monitor V10.0, IBM Security Guardium File Activity Monitor V10.0, and IBM Security Guardium Vulnerability Assessment 10.0.

These Guardium administrators are familiar with the product features and capabilities, plan, install and configure, self-monitor and monitor data, define policy rules and report, maintain and support.

To attain the IBM Certified Administrator - Security Guardium V10.0 certification, candidates must pass 1 test. To prepare for the test, it is recommended to refer to the job role description and recommended prerequisite skills, and click the link to the test below to refer to the test objectives and the test preparation tab.

Basic knowledge of:
operating systems and databases.
hardware or virtual machines.
networking and protocols.
auditing and compliance.
information security guidelines.

Requirements
This certification requires 1 test(s).

QUESTION 1
AGuardium administrator just finished installing the Guardium product to build a Collector. The administrator wants to make sure the Collector has the licenses needed to provide functionality for data activity monitoring, masking and blocking (terminate).
Which of the following lists the minimum licenses the administrator needs to install?

A. Base Collector license.
B. None, the licenses required are already installed automatically by the Guardium product installer.
C. Base Collector license plus IBM Security Guardium Standard Activity Monitor for Databases (DAM Standard).
D. Base Collector license plus IBM Security Guardium Advanced Activity Monitor for Databases (DAM Advanced).

Answer: D


QUESTION 2
A Guardium administrator is planning to build an environment that contains an S-TAP with one primary Collector and one failover Collector. What must the administrator ensure when setting up this environment?

A. Both Collectors are centrally managed.
B. There is network connectivity between the S-TAP and both Collectors.
C. Guardium Installation Manager (GIM) is installed on the Database Server.
D. in the guard_tap.ini file of the S-TAP set participate_in_load_balancing=1

Answer: B


QUESTION 3
During a Guardium deployment planning meeting, the team decides to deploy all S-TAP agents on all Unix/Linux database systems. A Unix/Linux system administrator team manager asks a Guardium administrator if there are any differences between Guardium S-TAPs for AIX and Linux systems that the team should be aware of.
What should be the Guardium administrator's response?

A. A-TAP is required on all AIX DB Servers.
B. aserver reboot is required to capture shared memory traffic from all databases on AIX.
C. K-TAP is required on the AIX DB servers. The exact uname -a output is required to determine the correct K-TAP module for the server.
D. K-TAP is required on the Linux DB servers. The exact uname -a output is required to determine the correct K-TAP module for the server.

Answer: B

Saturday, August 26, 2017

C2150-602 IBM Security Intelligence Solution Advisor V1

Test information:
Number of questions: 48
Time allowed in minutes: 90
Required passing score: 60%
Languages: English

Related certifications:
IBM Certified Solution Advisor - Security Intelligence V1

The test consists of five sections containing a total of approximately 48 multiple-choice questions. The percentages after each section title reflect the approximate distribution of the total question set across the sections

Section 1 - Discover (35%)
Interpret the customer�s requirements.
Estimate the customer�s environment.
Identify and map requirements into product capabilities.
Deliver presentations.
Interpret RFP/RFQ to address functionality and components.
Explain the benefits of partnering with IBM Security.
Identify the business driver for security intelligence.

Section 2 - Scope (15%)
Discuss sizing and licensing considerations such as hardware requirements, number of regions/data centers, and network impacts.
Demonstrate how the integration can evolve with adoption of new components.
Identify the requirement for customization and deployment.

Section 3 - Plan (21%)
Construct a deployment plan (i.e., appliances needed, placement and licensing of the equipment).
Define general requirements for performance, capacity, security, reporting, availability, and regulations.
Define the feasibility requirements in terms of integration.
Prepare a conceptual view of the architecture.

Section 4 - Design (10%)
Finalize a customer�s use case.
Finalize a customer's environment.

Section 5 - Consult (19%)
Outline the Bill of Material.
Deliver customized presentation solutions.
Explain detailed drawings.
Discuss design options, focusing on requirements, product capabilities and licensing.

IBM Certified Solution Advisor - Security Intelligence V1

Job Role Description / Target Audience
These solution advisors identify opportunities and influence direction across the IBM Security Intelligence portfolio.

Overall, these solution advisors are able to discover, scope, plan, design and consult. They recommend education, influence key decision makers, are able to respond to Request for Proposals (RFPs) and Request for Quotes (RFQs) and understand licensing and pricing.

These solution advisors also understand infrastructure and application security, and competitive analysis. They also have knowledge of the broader IBM Security portfolio and software development cycle, the IBM Security Intelligence products, business drivers and licensing.

These solution advisors are generally self-sufficient and able to perform most of the tasks involved in the job role with limited assistance.

To attain the IBM Certified Solution Advisor - Security Intelligence V1 certification, candidates must pass 1 test. To prepare for the test, it is recommended to refer to the job role description and recommended prerequisite skills, and click the link to the test below to refer to the test objectives and the Test preparation tab.

Recommended Prerequisite Skills
Basic understanding of IBM Security products with emphasis on IBM Security Intelligence portfolio.
General knowledge of network security practices.
Common knowledge of regulatory compliance.

Requirements
Test C2150-602 - IBM Security Intelligence Solution Advisor V1

The test:
contains questions requiring single and multiple answers. For multiple-answer questions, you need to choose all required options to get the answer correct. You will be advised how many options make up the correct answer.
is designed to provide diagnostic feedback on the Examination Score Report, correlating back to the test objectives, informing the test taker how he or she did on each section of the test. As a result, to maintain the integrity of each test, questions and answers are not distributed.





Friday, June 30, 2017

Exam RC0-N06 CompTIA Network+ Recertification Exam for Continuing Education

Eligibility Candidates MUST have:
An active Network+ CE certification earned by passing exam N10-005 or earlier.
Received an email from CompTIA containing a Private Access Code (PAC).

Exam Description
The CompTIA Network+ Recertification Exam covers these domains:

1.0 Network Architecture (17% of total)
2.0 Network Operations (15% of total)
3.0 Network Security (20% of total)
4.0 Troubleshooting (28% of total)
5.0 Industry standards, practices, and network theory (20% of total)

Number of Questions 45
Type of Questions Multiple choice questions (single and multiple response)
Length of Test 75 Minutes
Passing Score 7​20 (on a scale of 100-900)

Only candidates with an active Network+ CE certification will receive CEU credit.
Passing the exam will automatically renew your existing Network+ CE. Please allow 1-3 days for your record to be updated.
INTRODUCTION
The  CompTIA Network

Re certification  Exam is one way for CompTIA certified professionals to keep their Network+ certification active. A CompTIA Network+ certification earned on or after January 1st, 2011 is valid for three years from the date the certification was earned. The certification must be renewed within three years in order for the individual to remain certified. To remain certified, individuals may:

Re-take (and pass) the current certification exam (N10-006)
Participate in continuing education activities

Take (and pass) the Network+ recertification exam (RC0-N06)

The CompTIA Network+ Recertification Exam RC0-N06 bridges the competencies measured by the Network+ N10-005 series and the N10-006 series. The exam (RC0-N06) blueprint includes the objectives new to the N10-006 series and also assesses the highest weighted competencies that appear on the exam (i.e., the knowledge and skills rated by SMEs as most relevant for on-the-job -performance).

NOTE: Availability of RC0-N06 is LIMITED TO THOSE who have kept their Network+ certification active and have not taken and passed the current N10-006 series exam.
CompTIA Network+ is accredited by ANSI to show compliance with the ISO 17024 Standard and, as such, undergoes regular reviews and updates to the exam objectives. The following CompTIA Network+ Recertification RC0-N06 exam objectives result from subject matter expert workshops and industry-wide survey results regarding the skills and knowledge required of an entry-level IT technical support professional.

This examination blueprint includes domain weighting, test objectives, and example content. Example topics and concepts are included to clarify the test objectives and should not be construed as a
comprehensive listing of all the content of this examination.

Candidates are encouraged to use this document to guide their studies. The table below lists the domains measured by this examination and the extent to which they are represented. The CompTIA Network+ RC0-N06 exam is based on these objectives

QUESTION 1 - (Topic 1)
A technician, Joe, needs to troubleshoot a recently installed NIC. He decides to ping the local loopback address. Which of the following is a valid IPv4 loopback address?

A. 10.0.0.1
B. 127.0.0.1
C. 172.16.1.1
D. 192.168.1.1

Answer: B

Explanation:
The loopback address is a special IP address that is designated for the software loopback interface of a computer. The loopback interface has no hardware associated with it, and it
is not physically connected to a network. The loopback address causes any messages sent to it to be returned to the sending system. The loopback address allows client software to communicate with server software on the same computer. Users specify the loopback address which willpoint back to the computer's TCP/IP network configuration.
In IPv4, the loopback address is 127.0.0.1.
In IPv6, the loopback address is 0:0:0:0:0:0:0:1, more commonly notated as follows. ::1


QUESTION 2 - (Topic 1)
A technician needs to set aside addresses in a DHCP pool so that certain servers always receive the same address. Which of the following should be configured?

A. Leases
B. Helper addresses
C. Scopes
D. Reservations

Answer: D

Explanation:
A reservation is used in DHCP to ensure that a computer always receives the same IP address. To create a reservation, you need to know the hardware MAC address ofthe network interface card that should receive the IP address.
For example, if Server1 has MAC address of 00:A1:FB:12:45:4C and that computer should always get 192.168.0.7 as its IP address, you can map the MAC address of Server1 with the IP address to configure reservation.


QUESTION 3 - (Topic 1)
A technician, Joe, has been tasked with assigning two IP addresses to WAN interfaces on connected routers. In order to conserve address space, which of the following subnet masks should Joe use for this subnet?

A. /24
B. /32
C. /28
D. /29
E. /30

Answer: E

Explanation:
An IPv4 addressconsists bits. The first x number of bits in the address is the network address and the remaining bits are used for the host addresses. The subnet mask defines how many bits form the network address and from that, we can calculate how many bits are used for the host addresses.
In this question, the /30 subnet mask dictates that the first 30 bits of the IP address are used for network addressing and the remaining 2 bits are used for host addressing. The formula to calculate the number of hosts in a subnet is 2n - 2. The "n" in the host's formula represents the number of bits used for host addressing. If we apply the formula (22 – 2), a /30 subnet mask will provide 2 IP addresses.


QUESTION 4 - (Topic 1)
Which of the following is MOST likely to use an RJ-11 connector to connect a computer to an ISP using a POTS line?

A. Multilayer switch
B. Access point
C. Analog modem
D. DOCSIS modem

Answer: C

Explanation:
Before ADSL broadband connections became the standard for Internet connections, computers used analog modems to connect to the Internet. By today’s standards, analog modems are very slow typically offering a maximum bandwidth Kbps.
An analog modem (modulator/demodulator) converts (modulates) a digital signal from a computerto an analog signal to be transmitted over a standard (POTS) phone line. The modem then converts (demodulates) the incoming analog signal to digital data to be used by the computer.
An analog modem uses an RJ-11 connector to connect to a phone line (POTS)in the same way a phone does.


QUESTION 5 - (Topic 1)
A host has been assigned the address 169.254.0.1. This is an example of which of the following address types?

A. APIPA
B. MAC
C. Static
D. Public

Answer: A

Explanation:
APIPA stands for Automatic Private IP Addressing and is a feature of Windows operating systems. When a client computer is configured to use automatic addressing (DHCP), APIPA assigns a class B IP address from 169.254.0.0 to 169.254.255.255 to the client when a DHCP server is unavailable.
When a client computer configured to use DHCP boots up, it first looks for a DHCP server to provide the client with IP address and subnet mask. If the client is unable to contact a DHCP server, it uses APIPA to automatically configure itself with an IP address from a range that has been reserved especially for Microsoft. The client also configures itself with a default class Bsubnet mask .255.0.0. The client will use the self-configured IP address until a DHCP server becomes available.


QUESTION 6 - (Topic 1)
A network engineer needs to set up a topology that will not fail if there is an outage on a single piece of the topology. However, the computers need to wait to talk on the network to avoid congestions. Which of the following topologies would the engineer implement?

A. Star
B. Bus
C. Ring
D. Mesh

Answer: C

Explanation:
Token Ring networks are quite rare today. Token Ring networks use the ring topology. Despite being called a Ring topology, the ring is logical and the physical network structure often forms a ‘star’ topology with all computers on the network connecting to a central multistation access unit (MAU). The MAU implements the logical ring by transmitting signals to each node in turn and waiting for the node to send them back before it transmits to the next node. Therefore, although the cables are physically connected in a star, the data path takes the form of a ring. If any computer or network cable fails in a token ring network, the remainder of the network remains functional. The MAU has the intelligence to isolate the failed segment.
To ensure that the computers need to wait to talk on the network to avoid congestions, a Token Ring network uses a ‘token’. The token continually passes around the network until a computer needs to send data. The computer then takes the token and transmits the data beforereleasing the token. Only a computer in possession of the token can transmit data onto the network.

Saturday, June 24, 2017

C2090-560 PureData System for Analytics v7.1

Test information:
Number of questions: 67
Time allowed in minutes: 90
Required passing score: 63%
Languages: English, Japanese

Section 1 Database Design
Ability to design, create and manage databases and database objects (tables, views, etc.)
Ability to create and manage users and groups
Knowledge of the Netezza schema concept
Demonstrate the ability to design, implement and maintain materialilzed views
Knowledge of the benefits of clustered based tables
Demonstrate knowledge and application of sequences
Demonstrate knowledge of zone maps
Demonstrate knowledge of and application of data types
Demonstrate knowledge of table defaults and constraints

Section 2 Physical Optimization
Demonstrate knowledge of data distribution and skew
Ability to select an appropriate data distribution key
Knowledge of PureData System for Analytics implementation of temporary tables
Demonstrate knowledge of optimizer settings
Abilty to maintain statistics and knowledge of impact on performance
Demonstrate the abillity to correctly size system for capacity planning
Abilty to utlize groom table feature and knowledge of impact on performance and storage

Section 3 Netezza Appliance Components
Knowledge of the TwinFin architecture and disks/dataslices
Ability to identify the number of disks/dataslices on a system
Knowledge of the appliance architecture (FPGA, SPU, Disk Array, etc.)

Section 4 High Availability Architecture
Demonstrate knowledge of Linux High Availability (HA) and Distributed Replicated Block Device (DRDB)
Knowledge of behavior of nzLoad and query processing with a state change (host, disk, blade)

Section 5 Security
Knowledge of access/priviledge database objects
Knowledge of using Lightweight Directory Access Protocol (LDAP)�
Knowledge of Linux system administration�
Knowledge of ODBC/JDBC in a Unix or Windows environment and OLE-DE connectivity
Knowledge of new cryptographics mode and Row Secure Tables

Section 6 Data Movement
Demonstrate ability to use external tables in loading and unloading data
Demonstrate ability to use backup/restore utilities
Demonstrate ability to perform inserts (external tables vs cross system)
Demonstrate ability to design cross database access
Demonstrate ability to use nzload

Section 7 Monitoring and Performance
Demonstrate knowledge of log files
Demonstrate knowledge of locks with update, delete, insert, and select
Demonstrate knowledge of transactions that use temporary tables
Demonstrate knowledge of system views
Describe alerts
Describe data flow and life of a query
Demonstrate knowledge of compression
Demonstrate knowledge of broadcasts and co-location/redistribute
Demonstrate knowledge of data skew
Analyzing Query Plan Files (Explain plans vs execution plans; Joins (expression based, cross product, merge, hash joins); recognizing the correct query plan (original vs executing))
Performance Tuning (Multiple Snippets (Data Restrict Optimization); Snippets Limiter; Invisible Columns)

Section 8 Troubleshooting
Demonstrate knowledge of directory location (log files)
Demonstrate knowledge of nzdumpschema
Demonstrate knowledge of Event Manager Changes

Section 9 Operations
Ability to manage the system using the command line interface
Demonstrate knowledge of NZ_ defaults settings

Query History (Enablement, management, selection tables, configuration files, staging, notifications)
Software Support Toolkit (common tasks - migration, table movement)
Backup and Recovery
Replication
System Health Check (basic and advanced)
Demonstrate knowledge to administer BI and Analytic functionality

Section 10 Transaction Management
Serialization issues
Data Columns (housekeeping) (CreateXID, DeleteXID, RowID)
Unreferencable rows

Section 11 Workload Management
GRA (Guarenteed Resource Allocation)
PQE (Priority Query Execution)
SQB (Short Query Bias)
Virtual Tables
New features (7.1 and later)�
Scheduler Rules

IBM Certified Specialist - PureData System for Analytics v7.1

Job Role Description / Target Audience
An IBM Certified Specialist drives the design, implementation and support applications on the PureData System for Analytics platform. This individual has experience designing a PureData System for Analytics in accordance with best practices of ETL, BI, data modeling, and analytical solution.

Recommended Prerequisite Skills
Knowledge and experience managing IBM PureData System for Analytics Platform applications
Knowledge of SQL fundamentals within IBM PureData System for Analytics Platform applications
Experience in data warehouse industry best practices
Basic understanding of Linux and UNIX


QUESTION 1
What are the minimum permissions required to install an IBM Tivoli Endpoint Manager (TEM) Relay from the TEM Console?

A. TEM Operator
B. Local Administrator
C. Domain Administrator
D. TEM Master Operator

Answer: A


QUESTION 2
What is an IBM Tivoli Endpoint Manager analysis?

A. It allows viewing of various client properties.
B. It allows changing of various client properties.
C. It is a task used to analyze the status of the clients.
D. It is a Fixlet used to analyze the status of the clients.

Answer: A


QUESTION 3
What statement is correct when assigning roles to Active Directory security groups in IBM Tivoli Endpoint Manager Web Reports?

A. Security groups can be assigned any role.
B. Security groups can only be assigned the role Normal.
C. Security groups can only be assigned the role Read-only.
D. Security groups can only be assigned the role Administrator.

Answer: A


QUESTION 4
Which statement is true about Relay Affiliation group names?

A. The names are case sensitive.
B. Names must start with a double underscore.
C. Names must not use a relay machine name.
D. Any naming scheme can be set up by an administrator.

Answer: D


QUESTION 5
Why would an IBM Tivoli Endpoint Manager (TEM) administrator use the task relay setting Name Override?

A. to provide an alternate domain name for the agent connections to a relay
B. to have the relay report a different name to the server to avoid name collision with another relay
C. to have the relay display a different name in the TEM Console than its default name so it can be grouped with other relays
D. to have the relay use a different domain name so it can be part of a Managed Service Point segmented customer environment

Answer: A

Friday, June 2, 2017

Exam 70-346 Managing Office 365 Identities and Requirements

Published: February 17, 2014
Languages: English, Chinese (Simplified), Chinese (Traditional), French, German, Japanese, Portuguese (Brazil), Spanish
Audiences: IT professionals
Technology: Microsoft Office 365
Credit toward certification: MCP, MCSA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

As of June 30, 2016, this exam includes content covering the latest updates and features of Office 365. To learn more about these changes and how they affect the skills measured, please download and review the exam 70-346 change document.

Provision Office 365 (15–20%)
Provision tenants
Configure the tenant name, tenant region, initial global administrator; manage tenant subscriptions; manage the licensing model; configure tenant for new features and updates
Add and configure custom domains
Specify domain name, confirm ownership, specify domain purpose, set default domain, and move ownership of DNS to Office 365
Plan a pilot
Designate pilot users; identify workloads that don’t require migration; run the Office 365 Health, Readiness, and Connectivity Checks; run IdFix; create a test plan or use case, and connect existing email accounts for pilot users; understand service descriptions and planning to onboard users to Office 365; configure connected accounts

Plan and implement networking and security in Office 365 (15–20%)
Configure DNS records for services
Create DNS records for Exchange Online, Skype for Business Online, and SharePoint Online
Enable client connectivity to Office 365
Configure proxy to allow client access to Office 365 URLs, configure firewalls for outbound port access to Office 365, recommend bandwidth, configure Internet connectivity for clients, deploy desktop setup for previous versions of Office clients
Administer Microsoft Azure Rights Management (RM)
Activate rights management, configure Office integration with rights management, assign roles for rights management, enable recovery of protected documents
Manage administrator roles in Office 365
Implement a permission model; create or revoke assignment of administrative roles or the administrative model; determine and assign global administrator, billing administrator, user administrator, and delegated administrator; control password resets

Preparation resources
Create DNS records for Office 365 when you manage your DNS records
Assigning admin roles in Office 365

Manage cloud identities (15–20%)
Configure password management
Set expiration policy, password complexity, password resets in Administration Center
Manage user and security groups
Import users using bulk import (CSV), soft delete, Administration Center, and multi-factor authentication
Manage cloud identities with Windows PowerShell
Configure passwords to never expire, bulk update of user properties, bulk user creation, Azure Active Directory cmdlets, bulk user license management, hard delete users

Preparation resources
Password policy for Office 365
User account management
Manage Azure AD using Windows PowerShell

Implement and manage identities by using Azure AD Connect (15–20%)
Prepare on-premises Active Directory for Azure AD Connect
Plan for non-routable domain names, clean up existing objects, plan for filtering Active Directory, implement support for multiple forests
Set up Azure AD Connect tool
Implement soft match filtering and identify synchronized attributes, password sync, and installation requirements
Manage Active Directory users and groups with Azure AD Connect in place
Delete (soft delete), create, modify users and groups with Azure AD Connect in place, schedule and force synchronization

Preparation resources
Prepare for directory synchronization
Synchronize your directories

Implement and manage federated identities for single sign-on (SSO) (15–20%)

Plan requirements for Active Directory Federation Services (AD FS)
Plan namespaces and certificates, plan AD FS internal topologies and dependencies, plan WAP/AD FS proxy topologies, network requirements, multi-factor authentication, and access filtering using claims rules
Install and manage AD FS servers
Create AD FS service account, configure farm or stand-alone settings, add additional servers, convert from standard to federated domain, manage certificate lifecycle
Install and manage WAP/AD FS proxy servers
Set up perimeter network name resolution, install required Windows roles and features, set up certificates, configure WAP/AD FS proxy settings, set custom proxy forms login page, switch between federated authentication and password sync

Preparation resources

Plan your AD FS deployment
Checklist: Use AD FS to implement and manage single sign-on
Administering Office 365 Jump Start (03): DirSync, SSO, and AD FS

Monitor and troubleshoot Office 365 availability and usage (15–20%)

Analyze reports
Analyze service reports, mail protection reports, analyze Office 365 audit log reports, analyze portal email hygiene reports
Monitor service health
Monitor health using RSS feed, use service health dashboard (including awareness of planned maintenance, service updates, and historical data), Office 365 Management Pack for System Center Operations Manager, and Windows PowerShell cmdlets
Isolate service interruption
Create a service request; determine connection issues using the Microsoft Remote Connectivity Analyzer (RCA), Microsoft Lync Connectivity Analyzer tool, and Microsoft Connectivity Analyzer tool; determine availability issues using the hybrid free/busy troubleshooter; determine client configuration issues using Office 365 Client Performance Analyzer and Microsoft Support and Recovery Assistant for Office 365

Preparation resources
Reporting features and troubleshooting tools
Service health
QUESTION 1
An organization plans to migrate to Office 365.
You need to estimate the post-migration network traffic.
Which tool should you use?

A. Lync 2013 Bandwidth Calculator
B. Process Monitor
C. Microsoft Network Monitor
D. Microsoft OnRamp Readiness tool

Answer: A

Explanation:
Office 365 includes Lync 2013.
With this latest version of the Microsoft Lync Server 2010 and 2013 Bandwidth Calculator, you can enter information about your users and the Lync Server features that you want to deploy, and the Bandwidth Calculator will determine bandwidth requirements for the WAN that connects sites in your deployment. The accompanying Bandwidth Calculator User Guide describes the recommended process for estimating your WAN bandwidth needs for Lync client real-time traffic.
Reference: Lync Server 2010 and 2013 Bandwidth Calculator Version 2.0
http://blogs.technet.com/b/nexthop/archive/2013/06/07/lync-server-2010-and-2013-
bandwidth-calculator-version-2-0.aspx

QUESTION 2
A company has an Office 365 tenant that has an Enterprise E1 subscription. The company has offices in several different countries.
You need to restrict Office 365 services for existing users by location.
Which Windows PowerShell cmdlet should you run?

A. Set-MsolUser
B. Redo-MsolProvisionUser
C. Set-MsolUserLicense
D. Set-MsolUserPrincipalName
E. Convert-MsolFederatedUser
F. Set-MailUser
G. Set-LinkedUser
H. New-MsolUser

Answer: A

Explanation:
The Set-MsolUser cmdlet is used to update a user object.
Example: The following command sets the location (country) of this user. The country must be a two-letter ISO code. This can be set for synced users as well as managed users. Set-MsolUser -UserPrincipalName user@contoso.com -UsageLocation "CA"
Note:
Some organizations may want to create policies that limit access to Microsoft Office 365 services, depending on where the client resides.
Active Directory Federation Services (AD FS) 2.0 provides a way for organizations to configure these types of policies. Office 365 customers using Single Sign-On (SSO) who require these policies can now use client access policy rules to restrict access based on the location of the computer or device that is making the request. Customers using Microsoft Online Services cloud User IDs cannot implement these restrictions at this time.
Reference: Limiting Access to Office 365 Services Based on the Location of the Client https://technet.microsoft.com/en-us/library/hh526961(v=ws.10).aspx
Reference: Set-MsolUser https://msdn.microsoft.com/en-us/library/azure/dn194136.aspx

Friday, April 21, 2017

C2070-589 IBM Enterprise Records V5.1 Deployment Professional

Test information:
Number of questions: 59
Time allowed in minutes: 120
Required passing score: 66%
Test languages: English

The test contains six sections, totaling 59 multiple-choice questions. The percentages after each section title reflect the approximate distribution of the total question set across the sections.

Section 1 - Planning, Preparation, and Security (15%)
Identify sizing and architecture requirements for an IBM Enterprise Records (IER) deployment
Demonstrate knowledge of database requirements for an IBM FileNet P8 object store
Demonstrate knowledge of defining LDAP user/group roles for use in IER
Demonstrate application server configuration knowledge (IBM WebSphere, Oracle WebLogic)
Demonstrate a knowledge of IBM FileNet P8 product dependencies

Section 2 - Installation and Upgrade (19%)
Demonstrate knowledge of IBM FileNet P8 CE and PE Client installation
Demonstrate knowledge of object store configuration for an IER deployment (e.g. data models, ROS vs FPOS)
Demonstrate knowledge of High Availability configuration (e.g. shared location for bootstrap properties)
Demonstrate knowledge of IBM FileNet P8 PE configuration (e.g. connection point, isolated regions, workflow configuration, component manager)
Demonstrate knowledge and pre-requisites on running the IER Configuration Manager tool
Demonstrate knowledge of upgrade dependencies

Section 3 - Configuration and Validation (22%)
Demonstrate knowledge on configuring IER tools (e.g. Disposition Sweep, Hold Sweep, File Plan Tool, etc)
Demonstrate ability to complete a validation procedure (e.g. declare a record, complete destroy workflow)
Demonstrate ability to test in High Availability environment
Demonstrate knowledge of integrating IER and Workplace XT
Show understanding of optional configuration tasks (e.g. auditing, PRM Workflow subscription)

Section 4 - Implementation (17%)
Demonstrate knowledge of customizing security (e.g. partial proxy vs full proxy)
Demonstrate knowledge of automation options (e.g. record entry templates, workflow declaration, RMAutoDeclare)
Demonstrate a basic understanding of how record retention principles relate to IER file plan design
Demonstrate knowledge of important routine system maintenance and operations (e.g. backups, restores, file pruning, sweeps)

Section 5 - Performance Tuning (10%)
Demonstrate knowledge of database tuning for IBM FileNet P8 platform and IER (e.g. creating appropriate database indexes)
Show understanding of the Disposition Sweep and Hold Sweep utility configuration options
Demonstrate an understanding of the impact on performance due to auditing configuration

Section 6 - Troubleshooting (17%)
Show an understanding of IER problems and troubleshooting resolution steps
Demonstrate a working knowledge of record searches and database queries (Note to SME: finding certain records, CBR component
Demonstrate knowledge of IBM FileNet P8 CE trace (e.g. EJB, database)
Demonstrate knowledge of log4j logging
Demonstrate knowledge of BPM (e.g. Workflow functionality, component manager)

IBM Certified Deployment Professional - Enterprise Records V5.1

Job Role Description / Target Audience
This intermediate level certification is intended for deployment professionals that perform planning, installation, upgrade, configuration/security, customization, performance tuning and troubleshooting on IBM Enterprise Records V5.1 systems.

To attain the IBM Certified Solution Designer - Enterprise Records V5.1 certification, candidates must pass 1 test. To gain additional knowledge and skills, and prepare for the tests based on the job roles and test objectives, click on the link for Test 000-589 below.

Recommended Prerequisite Skills

Before preparing for this certification, basic understanding of the following is recommended and assumed:
Knowledge of IBM FileNet P8 installation, administration and security
Knowledge of IBM FileNet BPM/IBM Case Foundation
Basic knowledge of records retention principles and file plan design.
Knowledge of operating systems: Microsoft Windows, UNIX, Linux.
Knowledge of databases.
Knowledge of application servers.
Lightweight Directory Access Protocol (LDAP) servers: Tivoli, Active Directory.
High Availability (HA): load balancing, farming, and clustering technologies.
Upgrading to 8.5 and policies

Friday, March 17, 2017

C2040-951 IBM Lotus Notes Domino 8.5 System Administration Update

Test information:
Number of questions: 50
Time allowed in minutes: 75
Required passing score: 76%
Languages: English, Japanese

Exam 956: IBM Lotus Notes Domino 8.5 System Administration Update

Description: Covers Lotus Notes Domino 8.5 material as it relates to these competency areas:
Install and Configure
Manage and Maintain
Security

Install and Configure
Creating Dynamic Policies
Deploying a centrally managed Widget Catalog
Implementing Domino Attachment and Object Service (DAOS)
Implementing Domino Configuration Tuner
Implementing Domino Roaming for Standard Clients
Implementing Early Authentication
Implementing iNotes Redirector Changes
Implementing Lotus iNotes enhancements
Implementing Lotus Notes on Citrix
Implementing Lotus Traveler

Manage and Maintain
Implementing Console Log Mirroring
Implementing Image Compression
Implementing Lotus Traveler Policies
Understanding iNotes Redirector Changes
Understanding Router Optimizations
Utilizing Administration Process statistics
Utilizing Domino Attachment and Object Service (DAOS)
Utilizing Domino Configuration Tuner
Utilizing Domino server commands
Utilizing Dynamic Policies
Utilizing the Widget Catalog

Security
Deploying Lotus Traveler Security Features
Deploying the ID Vault
Deploying xPages Security
Implementing Shared Login
Implementing the ID Vault
Managing Shared Login
Managing the ID Vault

 

QUESTION 1
Darren is working with the Outline view on a new XPage. He drags a button control so that it is above an
edit box control. What effect does this have on the XPage in the Design editor?

A. The button control will move above and to the left of edit box control.
B. There will be no effect until Darren saves the Xpage, then the button control will move above and to the
left of edit box control.
C. There will be no effect until Darren clicks the Synchronize Navigator with Editor tab in the application
navigator, then the button control willmove above and to the left of edit box control.
D. There will be no effect until Darren clicks the Synchronize Navigator with Editor tab in the Outline view,
then the button control will moveabove and to the left of edit box control.

Answer: A


QUESTION 2
Abbas has imported the screen.css stylesheet into his application. He has discovered that he needs to
edit the properties of some of the classes in the CSS. What steps can he follow to make the needed
changes and save the CSS changes within the application?

A. From the application navigator in Designer, expand Resources and expand Style Sheets. Double-click
screen.css to use the built-in CSSeditor.
B. From the application navigator in Designer, expand Resources and expand Style Sheets. Click
screen.css and in the Outline view select aclass to use the built-in CSS editor.
C. From the application navigator in Designer, expand Resources and double-click Style Sheets. Select
screen.css in the Design pane. Fromthe Design tab of the Properties view, double-click a CSS class to
edit its properties.
D. From the application navigator in Designer, expand Resources and double-click Style Sheets. Select
screen.css in the Design pane. Fromthe Web Properties tab of the Properties view, double-click a CSS
class to edit its properties.

Answer: A


QUESTION 3
Janet uses Domino Designer's Dynamic Help feature to clarify something. What kind of help will she get?

A. An animated, talking icon that offers to assist her.
B. A wizard that follows a support tree to narrow down the answer to her question.
C. A personalized search interface that remembers all of her previous searches and their results.
D. A context-sensitive help view that constantly updates a list of possible relevant topics based on what
she's doing.

Answer: D


QUESTION 4
Joshua would like to have a cookie set on his Movie Rental XPage before it loads on the browser. Which
view would Joshua use to add this functionality?

A. Events view
B. Controls view
C. Properties view
D. Applications view

Answer: A


QUESTION 5
Carlos added an edit box control to his registration XPage. He wants to make the field a required field with
a message displaying to the user if the field is left blank. Where would he add these additional features to
the edit box control?

A. Editor
B. Events view
C. Properties view
D. Controls palette

Answer: C

Wednesday, March 8, 2017

400-251 CCIE Security

Exam Number 400-251 CCIE Security
Associated Certifications CCIE Security
Duration 120 minutes (90 - 110 questions)
Available Languages English

The written exam validates experts who have the knowledge and skills to architect, engineer, implement, troubleshoot, and support the full suite of Cisco security technologies and solutions using the latest industry best practices to secure systems and environments against modern security risks, threats, vulnerabilities, and requirements.

Topics include network functionality and security-related concepts and best practices, as well as Cisco network security products, solutions, and technologies in areas such as next generation intrusion prevention, next generation firewalls, identity services, policy management, device hardening, and malware protection.

The written exam utilizes the unified exam topics which includes emerging technologies, such as Cloud, Network Programmability (SDN), and Internet of Things (IoT).

The CCIE Security Version 5.0 exam unifies written and lab exam topics documents into a unique curriculum, while explicitly disclosing which domains pertain to which exam, and the relative weight of each domain.

The Cisco CCIE Security Written Exam (400-251) version 5.0 is a two-hour test with 90–110 questions that validate professionals who have the expertise to describe, design, implement, operate, and troubleshoot complex security technologies and solutions. Candidates must understand the requirements of network security, how different components interoperate, and translate it into the device configurations. The exam is closed book and no outside reference materials are allowed.

The Cisco CCIE Security Lab Exam version 5.0 is an eight-hour, hands-on exam that requires a candidate to plan, design, implement, operate, and troubleshoot complex security scenarios for a given specification. Knowledge of troubleshooting is an important skill and candidates are expected to diagnose and solve issues as part of the CCIE lab exam.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

1.0 Perimeter Security and Intrusion Prevention 21%

1.1 Describe, implement, and troubleshoot HA features on Cisco ASA and Cisco FirePOWER Threat Defense (FTD)

1.2 Describe, implement, and troubleshoot clustering on Cisco ASA and Cisco FTD

1.3 Describe, implement, troubleshoot, and secure routing protocols on Cisco ASA and Cisco FTD

1.4 Describe, implement, and troubleshoot different deployment modes such as routed, transparent, single, and multicontext on Cisco ASA and Cisco FTD

1.5 Describe, implement, and troubleshoot firewall features such as NAT (v4,v6), PAT, application inspection, traffic zones, policy-based routing, traffic redirection to service modules, and identity firewall on Cisco ASA and Cisco FTD

1.6 Describe, implement, and troubleshoot IOS security features such as Zone-Based Firewall (ZBF), application layer inspection, NAT (v4,v6), PAT and TCP intercept on Cisco IOS/IOS-XE

1.7 Describe, implement, optimize, and troubleshoot policies and rules for traffic control on Cisco ASA, Cisco FirePOWER and Cisco FTD

1.8 Describe, implement, and troubleshoot Cisco Firepower Management Center (FMC) features such as alerting, logging, and reporting

1.9 Describe, implement, and troubleshoot correlation and remediation rules on Cisco FMC

1.10 Describe, implement, and troubleshoot Cisco FirePOWER and Cisco FTD deployment such as in-line, passive, and TAP modes

1.11 Describe, implement, and troubleshoot Next Generation Firewall (NGFW) features such as SSL inspection, user identity, geolocation, and AVC (Firepower appliance)

1.12 Describe, detect, and mitigate common types of attacks such as DoS/DDoS, evasion techniques, spoofing, man-in-the-middle, and botnet

2.0 Advanced Threat Protection and Content Security 17%

2.1 Compare and contrast different AMP solutions including public and private cloud deployment models

2.2 Describe, implement, and troubleshoot AMP for networks, AMP for endpoints, and AMP for content security (CWS, ESA, and WSA)

2.3 Detect, analyze, and mitigate malware incidents

2.4 Describe the benefit of threat intelligence provided by AMP Threat GRID

2.5 Perform packet capture and analysis using Wireshark, tcpdump, SPAN, and RSPAN

2.6 Describe, implement, and troubleshoot web filtering, user identification, and Application Visibility and Control (AVC)

2.7 Describe, implement, and troubleshoot mail policies, DLP, email quarantines, and SenderBase on ESA

2.8 Describe, implement, and troubleshoot SMTP authentication such as SPF and DKIM on ESA

2.9 Describe, implement, and troubleshoot SMTP encryption on ESA

2.10 Compare and contrast different LDAP query types on ESA

2.11 Describe, implement, and troubleshoot WCCP redirection

2.12 Compare and contrast different proxy methods such as SOCKS, Auto proxy/WPAD, and transparent

2.13 Describe, implement, and troubleshoot HTTPS decryption and DLP

2.14 Describe, implement, and troubleshoot CWS connectors on Cisco IOS routers, Cisco ASA, Cisco AnyConnect, and WSA

2.15 Describe the security benefits of leveraging the OpenDNS solution.

2.16 Describe, implement, and troubleshoot SMA for centralized content security management

2.17 Describe the security benefits of leveraging Lancope

3.0 Secure Connectivity and Segmentation 17%

3.1 Compare and contrast cryptographic and hash algorithms such as AES, DES, 3DES, ECC, SHA, and MD5

3.2 Compare and contrast security protocols such as ISAKMP/IKEv1, IKEv2, SSL, TLS/DTLS, ESP, AH, SAP, and MKA

3.3 Describe, implementc and troubleshoot remote access VPN using technologies such as FLEXVPN, SSL-VPN between Cisco firewalls, routers, and end hosts

3.4 Describe, implement, and troubleshoot the Cisco IOS CA for VPN authentication

3.5 Describe, implement, and troubleshoot clientless SSL VPN technologies with DAP and smart tunnels on Cisco ASA and Cisco FTD

3.6 Describe, implement, and troubleshoot site-to-site VPNs such as GETVPN, DMVPN and IPsec

3.7 Describe, implement, and troubleshoot uplink and downlink MACsec (802.1AE)

3.8 Describe, implement, and troubleshoot VPN high availability using Cisco ASA VPN clustering and dual-hub DMVPN deployments

3.9 Describe the functions and security implications of cryptographic protocols such as AES, DES, 3DES, ECC, SHA, MD5, ISAKMP/IKEv1, IKEv2, SSL, TLS/DTLS, ESP, AH, SAP, MKA, RSA, SCEP/EST, GDOI, X.509, WPA, WPA2, WEP, and TKIP

3.10 Describe the security benefits of network segmentation and isolation

3.11 Describe, implement, and troubleshoot VRF-Lite and VRF-Aware VPN

3.12 Describe, implement, and troubleshoot microsegmentation with TrustSec using SGT and SXP

3.13 Describe, implement, and troubleshoot infrastructure segmentation methods such as VLAN, PVLAN, and GRE

3.14 Describe the functionality of Cisco VSG used to secure virtual environments

3.15 Describe the security benefits of data center segmentation using ACI, EVPN, VXLAN, and NVGRE

4.0 Identity Management, Information Exchange, and Access Control 22%

4.1 Describe, implement, and troubleshoot various personas of ISE in a multinode deployment

4.2 Describe, implement, and troubleshoot network access device (NAD), ISE, and ACS configuration for AAA

4.3 Describe, implement, and troubleshoot AAA for administrative access to Cisco network devices using ISE and ACS

4.4 Describe, implement, verify, and troubleshoot AAA for network access with 802.1X and MAB using ISE.

4.5 Describe, implement, verify, and troubleshoot cut-through proxy/auth-proxy using ISE as the AAA server

4.6 Describe, implement, verify, and troubleshoot guest life cycle management using ISE and Cisco network infrastructure

4.7 Describe, implement, verify, and troubleshoot BYOD on-boarding and network access flows with an internal or external CA

4.8 Describe, implement, verify, and troubleshoot ISE and ACS integration with external identity sources such as LDAP, AD, and external RADIUS

4.9 Describe ISE and ACS integration with external identity sources such as RADIUS Token, RSA SecurID, and SAML

4.10 Describe, implement, verify, and troubleshoot provisioning of AnyConnect with ISE and ASA

4.11 Describe, implement, verify, and troubleshoot posture assessment with ISE

4.12 Describe, implement, verify, and troubleshoot endpoint profiling using ISE and Cisco network infrastructure including device sensor

4.13 Describe, implement, verify, and troubleshoot integration of MDM with ISE

4.14 Describe, implement, verify, and troubleshoot certificate based authentication using ISE

4.15 Describe, implement, verify, and troubleshoot authentication methods such as EAP Chaining and Machine Access Restriction (MAR)

4.16 Describe the functions and security implications of AAA protocols such as RADIUS, TACACS+, LDAP/LDAPS, EAP (EAP-PEAP, EAP-TLS, EAP-TTLS, EAP-FAST, EAP-TEAP, EAP- MD5, EAP-GTC), PAP, CHAP, and MS-CHAPv2

4.17 Describe, implement, and troubleshoot identity mapping on ASA, ISE, WSA and FirePOWER

4.18 Describe, implement, and troubleshoot pxGrid between security devices such as WSA, ISE, and Cisco FMC

5.0 Infrastructure Security, Virtualization, and Automation 13%

5.1 Identify common attacks such as Smurf, VLAN hopping, and SYNful knock, and their mitigation techniques

5.2 Describe, implement, and troubleshoot device hardening techniques and control plane protection methods, such as CoPP and IP Source routing.

5.3 Describe, implement, and troubleshoot management plane protection techniques such as CPU and memory thresholding and securing device access

5.4 Describe, implement, and troubleshoot data plane protection techniques such as iACLs, uRPF, QoS, and RTBH

5.5 Describe, implement, and troubleshoot IPv4/v6 routing protocols security

5.6 Describe, implement, and troubleshoot Layer 2 security techniques such as DAI, IPDT, STP security, port security, DHCP snooping, and VACL

5.7 Describe, implement, and troubleshoot wireless security technologies such as WPA, WPA2, TKIP, and AES

5.8 Describe wireless security concepts such as FLEX Connect, wIPS, ANCHOR, Rogue AP, and Management Frame Protection (MFP)

5.9 Describe, implement, and troubleshoot monitoring protocols such as NETFLOW/IPFIX, SNMP, SYSLOG, RMON, NSEL, and eSTREAMER

5.10 Describe the functions and security implications of application protocols such as SSH, TELNET, TFTP, HTTP/HTTPS, SCP, SFTP/FTP, PGP, DNS/DNSSEC, NTP, and DHCP

5.11 Describe the functions and security implications of network protocols such as VTP, 802.1Q, TCP/UDP, CDP, LACP/PAgP, BGP, EIGRP, OSPF/OSPFv3, RIP/RIPng, IGMP/CGMP, PIM, IPv6, and WCCP

5.12 Describe the benefits of virtualizing security functions in the data center using ASAv, WSAv, ESAv, and NGIPSv

5.13 Describe the security principles of ACI such as object models, endpoint groups, policy enforcement, application network profiles, and contracts

5.14 Describe the northbound and southbound APIs of SDN controllers such as APIC-EM

5.15 Identify and implement security features to comply with organizational security policies, procedures, and standards such as BCP 38, ISO 27001, RFC 2827, and PCI-DSS

5.16 Describe and identify key threats to different places in the network (campus, data center, core, edge) as described in Cisco SAFE

5.17 Validate network security design for adherence to Cisco SAFE recommended practices

5.18 Interpret basic scripts that can retrieve and send data using RESTful API calls in scripting languages such as Python

5.19 Describe Cisco Digital Network Architecture (DNA) principles and components.

6.0 Evolving Technologies 10%

6.1 Cloud

6.1.a Compare and contrast Cloud deployment models
6.1.a [i] Infrastructure, platform, and software services (XaaS)
6.1.a [ii] Performance and reliability
6.1.a [iii] Security and privacy
6.1.a [iv] Scalability and interoperability
6.1.b Describe Cloud implementations and operations
6.1.b [i] Automation and orchestration
6.1.b [ii] Workload mobility
6.1.b [iii] Troubleshooting and management
6.1.b [iv] OpenStack components

6.2 Network Programmability (SDN)

6.2.a Describe functional elements of network programmability (SDN) and how they interact
6.2.a [i] Controllers
6.2.a [ii] APIs
6.2.a [iii] Scripting
6.2.a [iv] Agents
6.2.a [v] Northbound vs. Southbound protocols
6.2.b Describe aspects of virtualization and automation in network environments
6.2.b [i] DevOps methodologies, tools and workflows
6.2.b [ii] Network/application function virtualization (NFV, AFV)
6.2.b [iii] Service function chaining
6.2.b [iv] Performance, availability, and scaling considerations

6.3 Internet of Things (IoT)

6.3.a Describe architectural framework and deployment considerations for Internet of Things
6.3.a [i] Performance, reliability and scalability
6.3.a [ii] Mobility
6.3.a [iii] Security and privacy
6.3.a [iv] Standards and compliance
6.3.a [v] Migration
6.3.a [vi] Environmental impacts on the network
QUESTION: No: 2
According IS027001 ISIVIS, which of the following are mandatory documents? (Choose 4)

A. ISNIS Policy
B. Corrective Action Procedure
C. IS Procedures
D. Risk Assessment Reports
E. Complete Inventory of all information assets

Answer: A, B, C, D


QUESTION: No: 3
Which two statements describe the Cisco TrustSec system correctly? (Choose two.)

A. The Cisco TrustSec system is a partner program, where Cisco certifies third-party security products as
extensions to the secure infrastructure.
B. The Cisco TrustSec system is an approach to certifying multimedia and collaboration applications as secure.
C. The Cisco TrustSec system is an Advanced Network Access Control System that leverages
enforcement intelligence in the network infrastructure.
D. The Cisco TrustSec system tests and certifies all products and product versions that make up the
system as working together in a validated manner.

Answer: C, D


QUESTION: No: 4
Which three attributes may be configured as part of the Common Tasks panel of an authorization profile in
the Cisco ISE solution? (Choose three.)

A. VLAN
B. voice VLAN
C. dACL name
D. voice domain permission
E. SGT

Answer: A, C, D


QUESTION: No: 5
Which three statements about Cisco Flexible NetFIow are true? (Choose three.)

A. The packet information used to create flows is not configurable by the user.
B. It supports IPv4 and IPv6 packet fields.
C. It tracks all fields of an IPv4 header as well as sections of the data payload.
D. It uses two types of flow cache, normal and permanent.
E. It can be a useful tool in monitoring the network for attacks.

Answer: B, C, E


QUESTION: No: 6
Which three statements are true regarding RFC 5176 (Change of Authorization)? (Choose three.)

A. It defines a mechanism to allow a RADIUS server to initiate a communication inbound to a NAO.
B. It defines a wide variety of authorization actions, including "reauthenticate."
C. It defines the format for a Change of Authorization packet.
D. It defines a DIVI.
E. It specifies that TCP port 3799 be used for transport of Change of Authorization packets.

Answer: A, C, D

Tuesday, February 28, 2017

C2040-431 IBM SmartCloud Notes Administration V1

Test information:
Number of questions: 57
Time allowed in minutes: 90
Required passing score: 62%
Languages: English

Section 1: Architecture (25%)
Explain mail server configurations and disaster recovery locations
Explain SMTP outbound mail routing options
Explain SMTP inbound mail routing options
Verify Domino Directory requirements
Explain delegation options for mail and calendaring
Identify network ports used for communication protocols
Explain Sametime server options (hosted by IBM vs.on-premises)
Explain differences in subscription options
Describe differences between the physical Notes ID file and other logins
Explain NRPC routing from an on prem user to an IBM Connections Mail on Cloud user
Explain free and busy lookup for SmartCloud
Describe cloud service security
Explain NRPC routing from an IBM Connections Mail on Cloud user to an on prem user
Describe security options for restricting access to users mail in SmartCloud Notes

Section 2: Configure and Deploy (23%)
Enable and configure IMAP for users
Provision end-users for IBM SmartCloud Traveler for Notes
Create IBM SmartCloud Traveler policies
Integrate Extended Directory Catalog
Deploying two IBM Domino top-level Organizations (O)
Understand deployment options for mail: local/managed mail replica or web mail
Run and interpret the results of the Domain Configuration Tool
Configure mail routing from a secondary domain
Verify domain ownership
Explain Domain configuration utility
Create a passthru server (standalone and separate Domino Domain )
Configure and Manage ID Vault
Generate OU Certifier
Create Global Domain document

Section 3: System Administration (33%)
Change subscription for user
Configure cloud polices
Describe how to rename a user in SmartCloud
Configure Trash options
Understand Notes Client setup for a SmartCloud Notes user
Describe options for user to have their password reset
Configure journaling options
Explain integration of meetings service in calendaring
Configure email filtering
Understand Rooms and Resource scheduling within a hybrid environment
Identify available subscriptions
Change a SmartCloud Notes user's organization unit and/or organization
Configure Mail Templates
Explain user provisioning process without data migration
Add a user
Delete or suspend a user
Add a group
Setup a mail address

Section 4: Mobile Device Administration (7%)
Prepare SmartCloud Traveler for Notes for users
Enable application passwords in IBM SmartCloud Traveler for Notes
Setup Traveler on mobile device
Explain mobile device wiping

Section 5: Instant Messaging (2%)
Configure IBM Sametime connectivity

Section 6: Troubleshooting (11%)
Identify network port issues
Identify needed server group names
Identify mail routing issues
Identify policy issues
Identify connection issues
Identify password issues

IBM Certified System Administrator - SmartCloud Notes V1
An IBM Certified System Administrator- SmartCloud Notes V1 is a person who can demonstrate the administration and day-to-day management of an IBM SmartCloud Notes hybrid implementation. They can do this with limited assistance from support, documentation or relevant subject matter experts.

Key areas of competency include:
Architecture
Configure and Deploy
System Administration
Mobile Device Administration
Instant Messaging
Troubleshooting

Recommended Prerequisite Skills
Configuration and use of Lotus Domino administration policies and settings documents
Working knowledge of firewall rules and concepts
Working knowledge of Domain Name Services (DNS) including CNAME records
Working knowledge of TCPIP network routing and tracing / troubleshooting connectivity between two endpoints

Friday, February 24, 2017

C2040-414 IBM Sametime 9.0 Fundamentals

Test information:
Number of questions: 62
Time allowed in minutes: 90
Required passing score: 67%
Languages: English, Japanese

Related certifications:
IBM Certified Associate - Sametime 9.0
Exam 414: IBM Sametime 9.0 Fundamentals

Description: Covers IBM Sametime 9.0 material as it relates to competencies within the following product areas:
IBM Sametime Skills Requirements
Managing IBM Sametime
IBM Sametime Clients
Integration with other Products

IBM Sametime Skills Requirements
Identify the skills required to administer an IBM Sametime infrastructure
Identify administrative requirements for IBM Sametime components
Understand the IBM Sametime architecture
Understand IBM Sametime server components and roles
Compare IBM Sametime Communicate vs. Conference vs. Complete
Identify IBM Sametime ports and URLs
Summarize installation steps
List the mobile and browser clients
Describe client deployment methods
Describe features of the instant messaging, standalone, embedded and web clients
Describe the features IBM Sametime Mobile
Describe features of the Meeting Center, Web and Rich Client
Describe audio and video capabilities through the web and through peer to peer
Understand audio and video integration
Understand requirements for traversing video features through a network firewall
Understand requirements for integrating into an existing IBM Domino network
Identify IBM Sametime Advanced features
Review migration steps
Explain the use of LDAP with IBM Sametime
Explain accessing IBM Sametime services from outside the network
Explain clustering/HA options
Understand IBM Sametime Unified Telephony scope: what it does and what hardware is involved
Understand policy settings

Managing IBM Sametime
Verify IBM Sametime system requirements (including limitations of virtualization)
Identify supporting servers needed (IBM DB2, IBM WebSphere, IBM Domino, LDAP, IBM Sametime)
Understand the fundamentals of IBM Sametime System Console
Configure LDAP for IBM Sametime
Work with IBM DB2
Manage IBM Domino security (configure trusted IP)
Configure virtual hosts
Perform actions to start and stop the IBM WebSphere Application Server
Configure IBM Sametime Business Cards
Assign and apply policies

IBM Sametime Clients
Work with IBM Sametime features and preferences
Understand and work with mobile clients
Understand and work with the Meeting Room features
Work with Broadcast Communities and Persistent Chat
Identify IBM Sametime client features within IBM Sametime Unified Telephony
Understand the inclusion of the soft phone
Understand plug-in deployment and update sites
Add communities
Work with the Contact list
Configure transcripts and chat logging
Use voice and video in meetings and chats
Use offline messaging

Integration with other Products
Understand IBM Notes integration
Understand IBM Connections integration
Understand IBM WebSphere Portal integration
Understand IBM Sametime Plug-ins
Understand IBM Sametime Gateway connectivity to all supported instant messaging communities
IBM Certified Associate - Sametime 9.0
This entry-level certification is intended for individuals who have a good understanding of IBM Sametime 9.0 features and functionality including, but not limited to:
- IBM Sametime Skills Requirements
- Managing IBM Sametime
- IBM Sametime Clients
- Integration with other products

This certified individual is able to perform the basic tasks involved with this role with little assistance from peers, product documentation and vendor support services.

Recommended Prerequisite Skills
Knowledge and skills one needs to possess before beginning to prepare for this job role certification:
- Basic knowledge and use of IBM Sametime 9.0
- Understand the skills needed to administer an IBM Sametime environment
- Basic understanding of IBM WebSphere and IBM Domino 9.0
- Basic understanding of databases
- Basic concepts of unified communication
QUESTION 1
The IBM Sametime Meeting Server supports which file types for document conversion?

A. zip, iso, exe
B. doc. xls. ppt
C. log, csv, key
D. vcf. xml. wav

Answer: B

Explanation:


QUESTION 2
In which policy is the setting "Allow screen sharing" found?

A. Meeting
B. Sametime
C. Media Manager
D. Instant Messaging

Answer: A

Explanation:


QUESTION 3
The ability to create an audio video conference with more than two participants requires the use of
which type of server?

A. IBM Sametime Proxy Server
B. IBM Sametime Video Manager
C. IBM Sametime Unified Telephony Server
D. IBM Sametime Multimedia Control Server

Answer: B

Explanation:


QUESTION 4
Which two features are included with Sametime 9 Mobile Chat Client?

A. Meeting support
B. Broadcast tool support
C. Multi-point video on phone
D. Point-to-point video on tablets
E. Push-notification support for Android

Answer: A,E

Explanation:

Saturday, February 18, 2017

C2040-409 IBM Notes and Domino 9.0 Social Edition Application Development A

Test information:
Number of questions: 61
Time allowed in minutes: 90
Required passing score: 72%
Languages: English, Japanese

Related certifications:
IBM Certified Advanced System Administrator - Notes and Domino 9.0
IBM Certified Application Developer - Notes and Domino 9.0

Description: Covers IBM Notes and Domino 9.0 Social Edition material as it relates to these competency areas:
Application Architecture
Application Debugging
Application Design Elements
Application Performance
IBM Domino Designer and Eclipse
Integrating External Data
Security Features

Application Architecture
Control behavior based on client type and platform
Create and use profile documents
Develop navigation with design elements
Understand database properties
Import and utilize resource files
Manage document locking
Understand application and xsp.properties
Understand Document IDs
Understand parent and response documents
Understand the Notes Indexing Facility
Work with field size limits
Work with local replicas
Work with master templates or template inheritance

Application Debugging
Implement error logging
Debug an agent
Use Agent Manager debug
Use remote agent debugger
Use server-side JavaScript debugger
Utilize application logs

Application Design Elements
Create a script library
Create a Theme and Style Sheets
Create an action
Creating a web service (provider and consumer)
Design a form and field
Design a view and column
Design calendar views
Integrating subforms in forms
Understand agent management
Work with shared design elements
Write an agent

Application Performance
Optimize XPage performance
Manage view complexity and size
Understand the performance characteristics of design

IBM Domino Designer and Eclipse
Integrate with source control systems
Understand Eclipse preferences and customization
Understand Eclipse perspectives
Perform Eclipse Search
Use working sets

Work with Eclipse views
Integrating External Data

Implement JDBC connections
Develop LSXLC code
Develop using Domino Data Service (REST API)
Integrate with IBM Sametime Instant Messaging
Understand data sources and data binding
Work with Component Object Model (COM) and Object Linking and Embedding (OLE) objects

Security Features
Create a role
Design a secure web application SAML
Understand ACL entries and privileges
Understand document encryption
Utilize Control Access Sections
Understand IBM Domino server security
Understand document security (Authors and Readers fields)
Understand SSL implementation in IBM Domino
Use agent security
Integrate session token management within web applications
Work with application privileges on the userBean
IBM Certified Advanced System Administrator - Notes and Domino 9.0

Job Role Description / Target Audience
This certification is for experienced IBM Domino system administrators who need to plan, install, set up, and manage IBM Domino 9.0 Social Edition servers and users. The IBM Certified Advanced System Administrator - Notes and Domino 9.0 should be able to demonstrate skills associated with growth in expanding a Domino infrastructure through such areas as clustering, expanded monitoring configurations and replication/mail routing topologies. Additionally, the certified individual should understand integration points with other IBM products and have an understanding of OpenSocial standards.

Key areas of focus:
Installation
Administration
Networking and Integration
Security
Replication
Messaging
User Management

While the System Administration electives required to qualify for Advanced level certification are still in development, with the release of the Notes and Domino 9.0 certifications, the program is recognizing those System Administrators who also have experience in Application Development. These individuals can attain advanced level certification in System Administration by passing one or more of the Application Development 9.0 exams.

Recommended Prerequisite Skills
Basic troubleshooting skills
Understanding of messaging concepts and architecture
Basic knowledge of IBM Connections, OpenSocial standards
Understanding of composite applications
Basic knowledge of IBM WebSphere Application Server
Basic networking skills
Working knowledge of security concepts compatible with the Domino platform
Working knowledge web application and directory servers

In addition to the above System Administration skills, individuals who have proven their proficiency in IBM Notes and Domino 9.0 Application Development by passing either of the core Application Development tests or achieving certification in Application Development will qualify for this Advanced level System Administrator certification.
IBM Certified Application Developer - Notes and Domino 9.0

Job Role Description / Target Audience
This certification is for IBM Notes and Domino application developers who will be using Domino Designer 9.0. The individual seeking certification will need a deep understanding of Notes and Domino architectural concepts and the use of complex functions and features, including XPages, CSS, XML and JavaScript.

Key areas of focus:
Application Architecture
Application Debugging
Application Design Elements
Application Performance
Extension Library
IBM Domino Designer and Eclipse
Integrating External Data
Programming
Security Features
User Management
XPages

Recommended Prerequisite Skills
build and modify single and multi-database applications
build IBM Domino 9.0 applications that are Web-enabled
employ advanced formula techniques
employ methods for accessing data sources (Domino and non-Domino)
employ workflow functionality used to route documents
employ XPages functionality
implement security requirements