質問 1:A solution implementer needs to immediately quiesce a DataPower appliance in the event of a power supply failure. How can the solution implementer satisfy this requirement?
A. Configure an EventSubscription for the power supply failure event to execute the "appliance-quiesce" command.
B. Configure an Event Filter for the power supply failure event to execute the "appliancequiesce" command.
C. Configure an Event Trigger for the power supply failure event to execute the "appliancequiesce" command.
D. Create a Scheduled Processing Rule that parses the system log to execute the SOMA request to quiesce the appliance.
正解:C
質問 2:A solution implementer is debugging a web service proxy which communicates with a backend service http://server1:9092/myserv. The irregular performance to the backend service cannot be explained so a packet capture is run to dig deeper into the issue. The results need to be stored in a file called packet-capture. Also, the solution implementer wants to capture data only related to the specific backend service host and across all interfaces. What CLI syntax should the solution implementer use and how can the packet capture be analyzed?
A. packet-capture-advanced all temporary:///packet-capture -1 10000 9000 "host server1" and analyze the packet capture using the Troubleshooting section in the DataPower WebGUI.
B. packet-capture-advanced all temporary:///packet-capture -1 10000 9000 "host server1" and analyze using any 'pcap' compliant application, such as 'tcpdump' or 'Wireshark'.
C. packet-capture temporary:///packet-capture -1 10000 9000 "host server1" and analyze using any 'pcap' compliant application, such as 'tcpdump' or 'Wireshark'.
D. packet-capture temporary:///packet-capture -1 10000 9000 and analyze using any text editor or word processor
正解:B
質問 3:A customer wants to protect communication between two WebSphere DataPower Appliances against a replay attack. The second DataPower appliance needs to validate that the message received from the first appliance has spent no more than 30 seconds in transit. How should the solution implementer satisfy this requirement?
A. Configure mutually authenticated SSL between the two DataPower appliances with an SSL timeout field configured to 30 seconds.
B. Use symmetric key encryption using an encrypt-string extension function on a timestamp string on the first DataPower appliance. Then use the same key with a decrypt-string extension function on the second appliance and validate the timestamp.
C. Set the var://service/transaction-timeout variable on the first DataPower appliance to30 seconds.
D. Use symmetric key encryption using an encrypt-string extension function on a timestamp string on the first DataPower appliance. Then use the public certificate from the first device with a decrypt-string extension function on the second appliance and validate the timestamp.
正解:B
質問 4:A company is receiving digitally signed SOAP/HTTPS messages to process payment transactions from its business partner and verifies those messages using the Verify action.
There is also a requirement to use the signing certificate sent by the partner to encrypt the confidential response message from the company back to the partner. To satisfy this requirement, the solution implementer creates an Encrypt action with the 'Use Dynamically Configured Recipient Certificate' parameter to 'on'. Which statement related to the scenario above is false?
A. The encrypt action will use the certificate defined in the variable var://context/transaction/encrypting-cert to encrypt the message.
B. The public certificate used to encrypt the outgoing message will be automatically extracted from the incoming signed message while the signature is verified in the Verify action.
C. The certificate created in the 'Recipient Certificate' field takes precedence over the dynamic certificate inputoption.
D. The dynamic certificate used to encrypt the outgoing message can be user-defined using the syntax 'name:CertificateObjectName'
正解:C
質問 5:A customer needs message privacy and message integrity on a given transaction, and prefers the use of WS-Policy. WebSphere DataPower must receive a username from each user, but no authentication is required. In order to implement this without additional custom work, the solution implementer can:
A. use an Encrypt and SignAction in the request, followed by a Decrypt and Verify Action in the response.
B. use WS-Policy with UsernameToken, Encryption and Signature enforced.
C. use a basic authentication header, then use the default encryption and signature inherent in the WS-Proxy.
D. use WS-Policy with Encryption, Signature and pass the username in the message body.
正解:B
質問 6:A solution implementer creates a request to the XML Management Interface as shown in the following exhibit:
The XMLManagement Interface configuration on all appliances is configured with the property "SOAP Management URI" enabled. There may be other unsaved changes in this domain. Which of the following statements about the request are true? (choose 2)
A. The request will modify the logging target object's remote address property and set its other properties to their default values.
B. Only the remote address property of the logging target object will be modified.
C. Using a URI for the request of /service/mgmt/current will be successful.
D. Using no URIfor the request will be successful.
E. Only the logging target configuration will be saved.
正解:B,D
質問 7:A solution implementer needs to configure the appliance to throttle transactions if the device memory utilization reaches 70%. What can the solution implementer do to achieve the desired result?
A. Configure Throttle Settings and set the Memory Throttle threshold to 30%.
B. Memory management is an internal DataPower function and cannot be configured.
C. Configure an SLM action to throttle transactions when memory reaches 70%.
D. Configure the Statistic Settings with load interval of 1 and memory threshold to 30%.
正解:A
質問 8:The solution implementer needs to configure the DataPower appliance to restrict user account access to specific domains. The solution implementer implements this requirement by configuring the Domain Restriction section of the user account. During application execution, the configured user account is able to access a domain that is configured as restricted (no access allowed by this user). What should the solution implementer identify as a valid source of the problem?
A. The RBM system was not used to restrict access, which is the only way to meet the Domain Restriction requirement.
B. The user is a member of the 'root' user group.
C. An existing access policy or RBM policy can supersede the Domain Restriction list.
D. User access cannot be restricted to a specific domain in the user account configuration.
正解:C
弊社のIBM 000-274を利用すれば試験に合格できます
弊社のIBM 000-274は専門家たちが長年の経験を通して最新のシラバスに従って研究し出した勉強資料です。弊社は000-274問題集の質問と答えが間違いないのを保証いたします。
この問題集は過去のデータから分析して作成されて、カバー率が高くて、受験者としてのあなたを助けて時間とお金を節約して試験に合格する通過率を高めます。我々の問題集は的中率が高くて、100%の合格率を保証します。我々の高質量のIBM 000-274を利用すれば、君は一回で試験に合格できます。
安全的な支払方式を利用しています
Credit Cardは今まで全世界の一番安全の支払方式です。少数の手続きの費用かかる必要がありますとはいえ、保障があります。お客様の利益を保障するために、弊社の000-274問題集は全部Credit Cardで支払われることができます。
領収書について:社名入りの領収書が必要な場合、メールで社名に記入していただき送信してください。弊社はPDF版の領収書を提供いたします。
TopExamは君に000-274の問題集を提供して、あなたの試験への復習にヘルプを提供して、君に難しい専門知識を楽に勉強させます。TopExamは君の試験への合格を期待しています。
弊社は失敗したら全額で返金することを承諾します
我々は弊社の000-274問題集に自信を持っていますから、試験に失敗したら返金する承諾をします。我々のIBM 000-274を利用して君は試験に合格できると信じています。もし試験に失敗したら、我々は君の支払ったお金を君に全額で返して、君の試験の失敗する経済損失を減少します。
一年間の無料更新サービスを提供します
君が弊社のIBM 000-274をご購入になってから、我々の承諾する一年間の更新サービスが無料で得られています。弊社の専門家たちは毎日更新状態を検査していますから、この一年間、更新されたら、弊社は更新されたIBM 000-274をお客様のメールアドレスにお送りいたします。だから、お客様はいつもタイムリーに更新の通知を受けることができます。我々は購入した一年間でお客様がずっと最新版のIBM 000-274を持っていることを保証します。
弊社は無料IBM 000-274サンプルを提供します
お客様は問題集を購入する時、問題集の質量を心配するかもしれませんが、我々はこのことを解決するために、お客様に無料000-274サンプルを提供いたします。そうすると、お客様は購入する前にサンプルをダウンロードしてやってみることができます。君はこの000-274問題集は自分に適するかどうか判断して購入を決めることができます。
000-274試験ツール:あなたの訓練に便利をもたらすために、あなたは自分のペースによって複数のパソコンで設置できます。
IBM WebSphere DataPower SOA Appliances Firmware V5.0 Solution Implementation 認定 000-274 試験問題:
1. The solution implementer needs to configure the DataPower appliance to restrict user account access to specific domains. The solution implementer implements this requirement by configuring the Domain Restriction section of the user account. During application execution, the configured user account is able to access a domain that is configured as restricted (no access allowed by this user). What should the solution implementer identify as a valid source of the problem?
A) The RBM system was not used to restrict access, which is the only way to meet the Domain Restriction requirement.
B) The user is a member of the 'root' user group.
C) An existing access policy or RBM policy can supersede the Domain Restriction list.
D) User access cannot be restricted to a specific domain in the user account configuration.
2. A web service proxy is configured with a subscription to a Concept in WebSphere Service Registry and Repository (WSRR) V7.5 or later. A new WSDL is added to the Concept from the WSRRinterface.
What options are available to the solution implementer or updating the web service proxy to include the new WSDL? (choose 3)
A) Navigate to the Advanced Proxy Settings tab and click 'Poll Now'.
B) Open the WSRR Server object and set the Update field to Auto.
C) In the WSRR interface, open the Concept page and click 'Deploy to DataPower'.
D) Navigate to the WSRR Subscription Status page and click 'Synchronize'.
E) Set the Synchronization Method to Poll and then wait for the RefreshInterval.
F) Set the Synchronization Method to Automatic and then wait for the WSRR refresh interval.
3. A solution implementer is tasked with securing a backend web service by creating an externally advertised web service interface that will: ?easilyadapt to any backend changes. ?conform to the backend service Web Service Description Language (WSDL) document. ?monitor and control message traffic based on consumer and requested resources to the WSDL operation level. What DataPower service should the solution implementer configure to satisfy these requirements?
A) Loopback XML firewall with a user agent subscribed to a WSDL.
B) Web service proxy using the WSDL with a dynamic backend.
C) Web application firewall with operations imported directly from the WSDL.
D) Multi-protocol gateway using a WSDL with a sign/verifyactions.
4. A solution implementer is required to enrich the request message using information storedin a DB2 database table. The search condition of the SQL query needs to be dynamically generated by using a search key from the request message. Which SQL Input Methods can the solution implementer configure to execute the dynamic SQL in a SQL action? (choose two)
A) Dynamic SQL
B) Stylesheet
C) Variable
D) Web service
E) Static
5. A solution implementer is considering the following active-standby configuration between two DataPower appliances:
In a simulated power failure of Appliance 1 using this active-standby configuration in a sandbox environment, Appliance 2 did not take over the active interface. What could be causing this behavior?
A) It can take several minutes for the standby interfaces to be active in an active-standby configuration.
B) In an active-standby configuration, thepriority of Appliance 2 must be changed to 99 for the failure takeover to work.
C) There might be a firewall between the two appliances which has not been configured to allow broadcast traffic in an active-standby configuration.
D) Appliances in the active-standby configuration must be in the same network subnet and broadcast domain.
質問と回答:
質問 # 1 正解: C | 質問 # 2 正解: D、E、F | 質問 # 3 正解: B | 質問 # 4 正解: B、C | 質問 # 5 正解: D |