Anda di halaman 1dari 29

000-011

IBM Tivoli Application Dependency and Discovery Manager


V7.1 Implementation

Version 1.0
QUESTION NO: 1
How is a community string used by IBM Tivoli Application Dependency and Discovery
Manager V7.1?

A. To authenticate Apache servers


B. As an access credential for SNMP devices
C. To access only non-Cisco network devices
D. As a base value to encrypt passwords in collation.properties

Answer: B

QUESTION NO: 2
Data level security has been enabled on an IBM Tivoli Application Dependency and
Discovery Manager V7.1 (TADDM) server. Access Collection 'AC1' contains all Linux
Computer Systems. 'User1' has access to AC1 and AC2, an Access Collection of Oracle
databases. A discovery finds new Linux computer systems. Which statement is true?
A. User1 receives notification of the new Linux computer systems.
B. AC1 is flagged and the administrator must reset the Access Collection.
C. User1 will only see the details of the original set of Linux computer systems.
D. User1 will see the details of both the original set of Linux computer systems and the
newly discovered systems.

Answer: C

QUESTION NO: 3
You suspect that an IBM Tivoli Application Dependency and Discovery Manager V7.1
process is having memory problems. Which action should be taken first to determine if
the application has failed because of an out of memory condition?

A. Check the log/services/core.log file


B. Check for core.<pid> files in the bin directory
C. Check the core.XXX.XXX.XXX.dmp files found in the log directory
D. Check the service log file of the service suspected of running out of memory

Answer: B

QUESTION NO: 4
Which api command is used to delete all configuration items from the IBM Tivoli
Application Dependency and Discovery Manager V7.1 topology?

A. api.sh -u <userid> -p <password> delete all


B. api.sh -u <userid> -p <password> topology clear
C. api.sh -u <userid> -p <password> topology delete all
D. api.sh -u <userid> -p <password> collation topology all

Answer: B

QUESTION NO: 5
Which log settings are available in IBM Tivoli Application Dependency and Discovery
Manager V7.1?

A. ERROR, WARN, INFO, DEBUG, EXTRA, OFF


B. DEBUG, INFO, WARN, EXTRA, TRACE, NONE
C. FATAL, ERROR, WARN, INFO, DEBUG, TRACE
D. INFO, DEBUG, WARN, TRACE, EXTRA, MINIMUM

Answer: C

QUESTION NO: 6
Which command found in the support/bin directory can be used in testing whether an
IBM Tivoli Application Dependency and Discovery Manager V7.1 has valid access
credentials for a UNIX machine?

A. testssh.py
B. wmiscan.jy
C. encryptprops.sh
D. testconnection.sh

Answer: A

QUESTION NO: 7
Which command is used to test SSH?

A. UNIX: sshtest.sh <ip> or Windows: sshtest.bat <ip>


B. UNIX: testssh.sh <ip> or Windows: testssh.cmd <ip>
C. UNIX: execssh.sh <host> or Windows: execssh.bat <host>
D. UNIX: testssh.py <command> or Windows: testssh.bat <command>

Answer: D

QUESTION NO: 8
What is the effect of turning on the SplitSensorLog setting?
A. Messages from sensors are in separate folders with a file for each discovery.
B. Messages from sensors are in separate files within a folder for each discovery.
C. Messages from sensors are grouped by log levels and placed in files within a folder for
each discovery.
D. Messages from sensors are in separate files in the folder Log/sensors that contains
only the latest discovery.
Answer: B

QUESTION NO: 9
Which parameter in the collation.properties file holds the value that is used by Jetty
HTTPS server, GUI HTTPS server, and is required for adding domains to the IBM Tivoli
Application Dependency and Discovery Manager V7.1 Enterprise Server?

A. com.collation.websslport
B. com.collation.commsslport
C. com.collation.sslpassphrase
D. com.collation.JettyGui.sslpwd

Answer: C

QUESTION NO: 10
What are two available application descriptor file format types? (Choose two.)
A. Base application descriptor
B. Module application descriptor
C. Component application descriptor
D. Hardware server application descriptor
E. Application server application descriptor

Answer: A, C

QUESTION NO: 11
In which directory is encryptprops.sh located?

A. <COLLATION_HOME>/bin
B. <COLLATION_HOME>/etc/bin
C. <COLLATION_HOME>/support/bin
D. <COLLATION_HOME>/support/scripts

Answer: C

QUESTION NO: 12
A customer wants to run credential free discoveries using Nmap. There is a firewall
between the IBM Tivoli Application Dependency and Discovery Manager V7.1
(TADDM) server and the target machines. Which operating system combination is valid
for the customer?

A. TADDM server and anchor server are on AIX


B. TADDM server on Solaris and anchor server on Linux
C. TADDM server on Linux and anchor server on Windows 2000 Server
D. TADDM server on Windows 2000 Server and anchor server on Linux

Answer: B
QUESTION NO: 13
At a client site, the firewall between the IBM Tivoli Application Dependency and
Discovery Manager V7.1 (TADDM) Domain Server and the targeted Windows and
UNIX systems has only SSH port 22 and WMI port 135 open. At a minimum, which
additional TADDM components are needed?

A. A gateway server is only required on the side of the targeted systems.


B. A gateway server is required on the same side as the TADDM Domain Server.
C. No anchor servers or gateway servers are needed since SSH and WMI ports are open.
D. An anchor server and a gateway server are required on the side of the targeted
systems.

Answer: D

QUESTION NO: 14
IBM Tivoli Application Dependency and Discovery Manager V7.1
(TADDM) requires two database user accounts. What is the purpose of one of the
TADDM user accounts?

A. TADDM database archiving


B. Synchronizing TADDM data with other Tivoli products
C. TADDM database synchronization to a TADDM server
D. Database archiving and synchronization to the TADDM Enterprise Server

Answer: A

QUESTION NO: 15
An IBM Tivoli Application Dependency Discovery Manager 7.1 (TADDM) server
reports that all TADDM processes are running. However, the Product Console from a
client machine is unable to establish a connection to the TADDM server, reporting that
the server is not running. Which parameter in the collation.properties file needs to be
changed from default to an IP address to enable the Product Console to connect to the
server?

A. com.collation.jini.rmi.ip.address
B. com.collation.java.rmi.server.hostname
C. com.collation.clientproxy.rmi.server.hostname
D. com.collation.platform.os.RemoteHostDNSLookup

Answer: C

QUESTION NO: 16
When should Perform Full Synchronization be selected when performing domain
synchronization?
A. Once a week
B. Once a month
C. On the very first domain synchronization
D. Every time a manual synchronization is done

Answer: C

QUESTION NO: 17
What are two requirements to discover Linux systems? (Choose two.)

A. lsof must be run with a password challenge.


B. lsof must be run without a password challenge.
C. A non-root user account with bash shell is required.
D. A non-root user account with Bourne shell is required.
E. Root user privilege must be used to install WMI modules.

Answer: B, D

QUESTION NO: 18
Which report should be run to help identify patterns to use in the Custom Server
Template?

A. Other Servers
B. Custom Query
C. Unknown Servers
D. Dormant Components

Answer: C

QUESTION NO: 19
Which two settings affect the messages in the folder log/sensors? (Choose two.)

A. com.collation.log.level
B. com.collation.log.level.vm.DbInit
C. com.collation.log.level.vm.Tomcat
D. com.collation.log.level.vm.Discover
E. com.collation.log.level.vm.EventsCore

Answer: A, D

QUESTION NO: 20
Which two sensors require access credentials? (Choose two.)

A. CCMDBSensor
B. PortScanSensor
C. StackScanSensor
D. WebSphereNodeSensor
E. WindowsComputerSystemsSensor

Answer: D, E

QUESTION NO: 21
The SessionSensor is launched, but it fails to complete. Which support command is the
best command to use to begin debugging the session sensor?

A. testssh.jy <ip address>


B. testsession.jy <ip address>
C. testportscan.jy <ip address>
D. testping.jy -t ip <ip address>

Answer: A

QUESTION NO: 22
When running discoveries using IBM Tivoli Application Dependency Discovery
Manager 7.1
(TADDM), IP addresses are displayed instead of hostnames. Which two commands can
be used to test DNS resolution from the TADDM server to the target machines? (Choose
two.)

A. lookup <hostname>
B. ping -a <hostname>
C. nsswitch <hostname>
D. nslookup <hostname>
E. dnslookup <hostname>

Answer: B, D

QUESTION NO: 23
A new IBM Tivoli Application Dependency and Discovery Manager V7.1
(TADDM) user needs to be created. This new user needs to be able to run discoveries.
Assuming only the default roles that ship with the TADDM product are available, which
two roles would give this new user the required permission? (Choose two.)

A. User
B. Discover
C. Operator
D. Supervisor
E. Administrator

Answer: D, E

QUESTION NO: 24
Which three items must be specified when configuring IBM Tivoli Application
Dependency and Discovery Manager V7.1 to authenticate to an LDAP user registry?
(Choose three.)

A. LDIF version
B. Hostname of the LDAP server
C. The root of the distinguished name
D. The port number of the LDAP server
E. Root user's password for LINUX or UNIX
F. The name of the object class used to represent users in LDAP

Answer: B, D, F

QUESTION NO: 25
When initiating a IBM Tivoli Application Dependency and Discovery Manager V7.1
discovery using the Product Console, the scope can be specified in two different ways.
What are these two choices? (Choose two.)

A. Subnet
B. Hostname
C. Select Components
D. Select Scope Elements
E. IP address or address range

Answer: C, D

QUESTION NO: 26
An IBM Tivoli Application Dependency and Discovery Manager V7.1 server can be
installed in many different environments. Which pre-requisite must be met prior to the
installation?

A. Acquire OS hosting preference only


B. Acquire customer application preference
C. Acquire customer hardware and firewall preference
D. Acquire customer hardware and OS hosting preference

Answer: D

QUESTION NO: 27
What happens after all the WMI files are deployed on all Windows systems and
gateways? (Choose two.)

A. WMI is restarted.
B. Aports.dll is registered.
C. Taddm.exe is executed.
D. TaddmWmi.dll is registered.
E. TaddmPortMap.exe is executed.

Answer: A, D

QUESTION NO: 28
Which three criteria can be used to define a custom server? (Choose three.)

A. Port
B. Argument
C. Program name
D. Operating system
E. Server domain name
F. Parent process name

Answer: A, B, C

QUESTION NO: 29
Data can be imported into the IBM Tivoli Application Dependency and Discovery
Manager V7.1 database from other management systems through the exchange and
loading of IdML books. What is a correct IdML load command string?

A. idmlload.sh -f <path to file> -o


B. idmlload.sh -u <user name> -p <password> <input file name>
C. loadidml.sh -f <path to file> -u <user name> -p <password>
D. bulkload.sh -f <path to file> -u <user name> -p <password> -b -x

Answer: C

QUESTION NO: 30
Which statement is true about the tools IBM Tivoli Application Dependency and
Discovery Manager V7.1 (TADDM) provides to verify database access credentials?
A. 'testjdbc' validates the Access List entries for the database server.
B. 'dbquery' validates the Access List entries for the database server.
C. 'estjdbc' validates the username and password for the TADDM database.
D. 'dbquery' and 'testjdbc' work only when TADDM is installed on UNIX/Linux.

Answer: A

QUESTION NO: 31
Given a list of machines that are part of a Business Application, what is the first step to
discover this Business Application?

A. Create a Scope Set and add the machines to the Scope Set
B. Create a Profile and add the Business Application to the Profile
C. Create a Scope Set and add the Business Application to the Scope Set
D. Create the Business Application and add the machines to the Business Application
Answer: A

QUESTION NO: 32
Which two statements are true about using the client-side WebSphere SSL certificate files
in the IBM Tivoli Application Dependency and Discovery Manager V7.1 (TADDM)
Access List entry? (Choose two.)

A. Certificate files must be on the TADDM client machine.


B. Certificate files must be kept on the WebSphere machine.
C. .P12 files must be converted to .jks files for use by TADDM.
D. Both .P12 and .jks files are acceptable, as TADDM will convert as needed.
E. With client-side certificates, there is no need for user/password in the Access List
entry.

Answer: A, C

QUESTION NO: 33
A discovery is currently running. The customer wants a second discovery to be run. How
can this be accomplished?

A. Start the second discovery using the Product Console.


B. A second discovery must be started using the api.sh command.
C. Wait for the first discovery to complete, then start the second discovery.
D. Make sure the com.collation.max.concurrent.discovery is set to at least 2 and start the
second discovery.

Answer: C

QUESTION NO: 34
The IBM Tivoli Application Dependency and Discovery Manager V7.1 (TADDM)
support/bin directory contains two tools to improve the performance of the TADDM DB2
database. Which two scripts are used to improve database performance? (Choose two.)

A. gen_stats.jy
B. reorg_db2.sql
C. gen_db_stats.jy
D. run_db2_stats.jy
E. runstats_db2_catalog.sql

Answer: C, E

QUESTION NO: 35
For what is the credential free discovery profile used?
A. To create a software inventory
B. To establish a discovery scope
C. To create an IpDevice Inventory
D. To create a computer system inventory

Answer: D

QUESTION NO: 36
A collection is created and ten Computer Systems are associated with it. Each Computer
System has exactly ten configuration items (CIs). How many CIs are members of this
collection?

A. 10
B. 11
C. 100
D. 110

Answer: A

QUESTION NO: 37
What is the recommended maximum number of Configuration Items (CIs) or Computer
Systems (CSs) that the domain server can discover and store?

A. 100,000 CIs or 2500 CSs


B. 250,000 CIs or 2500 CSs
C. 2 million CIs or 10,000 CSs
D. 10 million CIs or 10,000 CSs

Answer: C

QUESTION NO: 38
Which two statements are true about an IBM Tivoli Application Dependency and
Discovery Manager V7.1 remote database? (Choose two.)

A. The archive user account should belong to the adm group on the remote database
system.
B. The DB2 database is created manually, and the script 'make_db2_user' is used to create
DB2 users.
C. The script 'make_ora_db' is used to create the Oracle database, and the archive user is
created manually.
D. The script make_db2_db is used to create the DB2 database, and the archive user is
created manually.
E. The Oracle database is created manually, and the script make_ora_user is used to
create Oracle users.

Answer: D, E

QUESTION NO: 39
Which api command is used to find the GUID of the DB2 instances in the IBM Tivoli
Application Dependency and Discovery Manager V7.1 database?
A. api.sh -u <user> -p <password> get "select * from '<name from taddm console>?
B. api.sh -u <user> -p <password> find "select * from '<name from taddm console>'
C. api.sh -u <user> -p <password> get "select guid from Db2Instance where
displayName=='<name from
taddm console>'
D. api.sh -u <user> -p <password> find "select guid from Db2Instance where
displayName=='<name from
taddm console>'

Answer: D

QUESTION NO: 40
What is the primary use case for Business Services within IBM Tivoli Application
Dependency and Discovery Manager V7.1 (TADDM)?

A. They are used to build and model SOA Services in the TADDM model.
B. They are required for integration with Tivoli Business Service Manager.
C. They are used to consolidate lower level TADDM components and their relationships
to ease reporting and analysis.
D. They are used to model composite applications for easing TADDM integration with
tools such as those in the Tivoli Composite Application Manager family of tools.

Answer: C

QUESTION NO: 41
Which authority can be used to log in and create an anchor service User ID on a
Windows 2003 Server?
A. Root user authority
B. Guest user authority
C. Taddm user authority
D. Administrator user authority

Answer: D

QUESTION NO: 42
Which statement is true about the behavior of Application Templates?

A. An Application Template can automatically build Business Applications only out of


custom servers.
B. When an Application Template is deleted, the Business Applications created by the
template are disabled.
C. When an Application Template is deleted, the Business Applications created by the
Application Template are also deleted.
D. Templates created on one IBM Tivoli Application Dependency and Discovery
Manager V7.1 (TADDM) server cannot be exported and imported into a second TADDM
server.

Answer: A

QUESTION NO: 43
What are two methods to define a new Component using the Product Console? (Choose
two.)

A. Select Edit -> Create Component from the Menu bar


B. Click the Create a new component icon in the toolbar
C. Create a Custom Server Template and run discovery
D. Right mouse click in the empty space in the Physical Infrastructure topology
E. Right mouse click in the empty space in the Application Infrastructure topology

Answer: A, B

QUESTION NO: 44
What are two reasons for creating a version in IBM Tivoli Application Dependency
Discovery Manager (TADDM)? (Choose two.)

A. Disaster recovery planning


B. To detect changes over time
C. To provide a backup of the TADDM database
D. To compare post-migration infrastructure with pre-migration infrastructure
E. To detect intermediate configuration changes from one version to another

Answer: A, D

QUESTION NO: 45
Over 1000 Windows computer systems are discovered using a Level 2 discovery. The
computer systems need to be migrated to run a Linux operating system. During this
migration, only the operating system will be updated. No hardware changes will take
place. What happens to the configuration items for these computer systems when the
migration is completed and another Level 2 discovery is performed?

A. A new ComputerSystem is created, a new OperatingSystem configuration item is


created, and a computer system change history report shows the operating system
migration.
B. The old ComputerSystem configuration item is used, a new OperatingSystem
configuration item is created, and a computer system change history report will show the
operating system migration.
C. The old ComputerSystem configuration item is used, the old OperatingSystem
configuration item is used, and a computer system change history report shows the
operating system migration.
D. A new ComputerSystem configuration item is created, the old OperatingSystem item
is used, and a custom computer system change history report is written to show the
operating system migration.

Answer: B

QUESTION NO: 46
The primary naming rule for a ComputerSystem configuration item is the computer
system's signature.
How is the signature populated by the discovery process?

A. It is the computer system's hostname attribute.


B. It is the fully qualified domain name of the computer.
C. It is the MAC and IP address of one of the computer network interfaces.
D. It is the IP address of the computer system through which the device was discovered.

Answer: C

QUESTION NO: 47
Prior to designating a UNIX anchor server, a service account User ID must be created at
the server. With which group should the service account be associated?

A. bin
B. sys
C. cron
D. adm

Answer: B

QUESTION NO: 48
What are two reasons to avoid using the log level TRACE? (Choose two.)
A. It may expose passwords.
B. It generates large volumes of log messages.
C. It prevents the creation of Discovery Versions.
D. It uses disk space inefficiently, as logs will not be deleted automatically.
E. It is restricted to specific parts of IBM Tivoli Application Dependency and Discovery
Manager V7.1.

Answer: A, B

QUESTION NO: 49
After a Computer System discovery, reports indicate an issue capturing a configuration
file on the target. What does the status indicate on the History pane?

A. Done
B. Error
C. Warning
D. In progress

Answer: C

QUESTION NO: 50
How many defined scope sets can be selected for the anchor server and Windows
gateway?

A. One
B. Three
C. Five
D. Unlimited

Answer: A

QUESTION NO: 51
Which two statements are true about Level 3 discovery? (Choose two.)

A. Application Server dependencies are not discovered.


B. It does not build dependencies for all applications as they are discovered.
C. Only the profile is needed to discover the entire application infrastructure.
D. It uses the default Custom Server Templates delivered with IBM Tivoli Application
Dependency and Discovery Manager V7.1.
E. Deployed software components, physical servers, network devices, virtual LAN, and
host data used in a runtime environment can be discovered.

Answer: D, E

QUESTION NO: 52
Which authority can be used to log in and create an anchor service User ID on a
UNIX/Linux server?

A. Root user authority


B. Guest user authority
C. Taddm user authority
D. Administrator user authority

Answer: A

QUESTION NO: 53
Which api options are valid in IBM Tivoli Application Dependency and Discovery
Manager V7.1?

A. start, stop, discover, topology, import, export


B. start, stop, version, delete, import, topology, export
C. discover, topology, changes, import, export, naming
D. discover, list, changes, delete, import, export, naming

Answer: C

QUESTION NO: 54
What are valid log levels for IBM Tivoli Application Dependency and Discovery
Manager V7.1?

A. FATAL, FLAG, TERM


B. FATAL, INFO, DEBUG
C. WARN, FLAG, DEBUG
D. ERROR, TRACE, TERM

Answer: B

QUESTION NO: 55
Application Templates can be used to automatically create Business Applications out of
which data model object types?

A. All AppServer configuration item data model types


B. All configuration item types defined in the Common Data Model
C. Configuration items discovered through Custom Server Templates
D. All ComputerSystem and AppServer configuration item data model types

Answer: C

QUESTION NO: 56
Which parameter in the collation.properties forces all modules to at least log at the
current level?
A. com.collation.log.level
B. com.collation.debuglevel
C. com.collation.log.level vm.Topology
D. com.collation.deploy.dynamic.logging

Answer: A

QUESTION NO: 57
Which two user registries are supported by IBM Tivoli Application Dependency and
Discovery Manager V7.1? (Choose two.)

A. SAM
B. TAI
C. eDirectory
D. LDAP server
E. IBM WebSphere Application Server Federated Repositories
Answer: D, E

QUESTION NO: 58
Which statement is true about using gen_db_stats.jy?

A. It is used to generate SQL commands to optimize DB2 and is not used for Oracle.
B. It is used to generate a file of SQL commands that improves database performance.
C. It is used to permanently remove configuration items that were deleted from the
Product Console.
D. It is used only once after the first discovery to generate SQL commands to optimize
database performance.

Answer: B

QUESTION NO: 59
Where are scripts for supporting the manual creation of an IBM Tivoli Application
Dependency and Discovery Manager V7.1 database located?

A. In the <COLLATION_HOME>/bin folder


B. In the <COLLATION_HOME>/etc folder
C. In the <COLLATION_HOME>/install folder
D. In the<COLLATION_HOME>/support/bin folder

Answer: D

QUESTION NO: 60
Which two statements are true about testssh.py? (Choose two.)

A. This command allows a specified command to be run on a specific host.


B. In order to execute the testssh.py command, access credentials must be provided on
the command line.
C. It uses the IBM Tivoli Application Dependency and Discovery Manager V7.1 server to
test if a discovery run can secure shell to the specified host.
D. The script testssh.py is used to verify that the anchor servers have been configured
properly, thereby allowing UNIX systems to scan windows devices.
E. It creates a direct secure shell connection to the specified host, bypassing the TADDM
infrastructure, to test that SSH is configured properly on the remote host.

Answer: A, C

QUESTION NO: 61
Which files get pushed to the targeted Windows system for Level 2 discovery?

A. Taddm.dll, Taddm.exe, Taddm.mof


B. WMI.dll, PortMap.dll, aports.dll, TaddmWmi.exe
C. WMI.dll, PortMap.dll, TaddmWmi.dll, TadddWmi.exe
D. TaddmWmi.dll, TaddmWmi.exe, TaddmWmi.mof, TaddmWmi.pdb

Answer: D

QUESTION NO: 62
A customer's IT department may have a preference for the type of database that is used.
What are the entire supported databases for IBM Tivoli Application Dependency and
Discovery Manager V7.1?

A. DB2 V8.2 and V9.1


B. DB2 V8.2, V9.1 and Oracle V9i, V10g
C. all flat files and relational databases, including DB2 and MySQL
D. DB2 V9.1, Oracle V9i and V10g, and Microsoft SQL Server 2005/2008

Answer: B
QUESTION NO: 63
What is used to change the maximum heap size for all IBM Tivoli Application
Dependency and Discovery Manager V7.1 Java applications?

A. -Xmx
B. -Xms
C. -Xmn
D. -XX:MaxPermSize

Answer: A

QUESTION NO: 64
An OracleInstance configuration item is discovered through a sensor discovery. The same
OracleInstance configuration item is discovered through the import of an IdML book.
There will be two configuration items in the database because they were each created
using a different naming rule.
Which method should be used to solve this problem?

A. They can be reconciled through a second discovery.


B. They can be merged because they are stored as the same CI type.
C. All such problems can be addressed by running the support/bin/fixci.jy script.
D. There is nothing that can be done, short of deleting one of the configuration items.

Answer: B

QUESTION NO: 65
Which parameter is modified to separate sensor logs into multiple files?

A. Com.collation.discover.engine.SplitLog
B. Com.collation.discover.engine.SensorLog
C. Com.collation.discover.engine.SeparateLog
D. Com.collation.discover.engine.SplitSensorLog

Answer: D

QUESTION NO: 66
What does IBM Tivoli Application Dependency and Discovery Manager V7.1 (TADDM)
use to work with IBM Tivoli Monitoring (ITM), which is an operation management
product?

A. ITMSensor
B. Custom Server Template
C. Events that ITM sends to TADDM
D. Discovery Library Adapter bulk load of IdML

Answer: D

QUESTION NO: 67
What is the correct method to stop the anchor server?

A. Run the stop-anchor.sh script as the UNIX/Linux account for the anchor server
B. Run the stop-local-anchors.sh script as the UNIX/Linux account for the anchor server
C. Kill the Java processes running under the UNIX/Linux account for the anchor server
D. Log into the Domain Manager as an IBM Tivoli Application Dependency and
Discovery Manager V7.1 administrator and stop the anchor server

Answer: C

QUESTION NO: 68
When discovering the host atlas.companyxyz.com using IBM Tivoli Application
Dependency Discovery Manager 7.1 (TADDM), the IP address (192.168.10.10) for the
host is displayed instead of the hostname as desired. To solve this, the DNS settings for
the TADDM server must be confirmed.

Which command will test the DNS resolution from the TADDM server?

A. Ping 192.168.10.10
B. Dnslookup 192.168.10.10
C. Nslookup atlas.companyxyz.com
D. Lookupdns atlas.companyxyz.com

Answer: C

QUESTION NO: 69
A customer has a firewall between 800 Windows Servers and the IBM Tivoli Application
Dependency and Discovery Manager V7.1 (TADDM) Domain Server. The customer
requires that a single Level 3 discovery run be performed for all 800 Windows Servers at
the same time.

Which architecture best meets the customer requirement?

A. A TADDM Domain Server with one Linux anchor server


B. A TADDM Domain Server with one Windows gateway server
C. A TADDM Domain Server with two Windows gateway servers
D. A TADDM Domain Server with one Windows anchor server and one Windows
gateway server

Answer: C

QUESTION NO: 70
What does the encryptprops.sh $COLLATION_HOME command encrypt?
A. The collation.properties file
B. The database user passwords
C. All passwords in all properties files
D. The IBM Tivoli Application Dependency and Discovery Manager V7.1 user password

Answer: B

QUESTION NO: 71
IBM Tivoli Application Dependency and Discovery Manager V7.1 (TADDM) is not
starting properly. A status check of all the TADDM services reveals that DbInit has failed
to start. Which support command is the best command to use to begin troubleshooting the
failed start of TADDM?

A. testos.jy
B. testhang.jy
C. testjdbc.jy
D. testtaddm.jy

Answer: C

QUESTION NO: 72
Which statement is true about application descriptor files?

A. Application descriptor files are xml files that need to be deployed by the customer.
B. Application descriptor files automatically find Business Services and will create those
Business Services during discovery.
C. There are three different application descriptor file formats, all of which must be
discovered during a discovery run before applications will be automatically created.
D. Application descriptor files are xml files for which IBM Tivoli Application
Dependency and Discovery Manager V7.1 provides a graphical editor for their creation
and deployment.
Answer: A

QUESTION NO: 73
What are the two ways that the Windows gateway and anchor server can be defined using
the Product Console? (Choose two.)

A. Group
B. Account
C. Password
D. IP Address
E. Host Name

Answer: D, E

QUESTION NO: 74
How can IBM Tivoli Application Dependency and Discovery Manager V7.1 (TADDM)
discover MySQL?

A. Using MySqlSensor
B. Using the SqlServerSensor
C. Using a Custom Server Template
D. TADDM does not discover MySQL

Answer: C

QUESTION NO: 75
Where is the api command that can be used to export data to an xml file?
A. COLLATION_HOME/sdk/bin
B. COLLATION_HOME/etc/sdk/bin
C. COLLATION_HOME/dist/sdk/bin
D. COLLATION_HOME/dist/etc/sdk/bin

Answer: A

QUESTION NO: 76
What is the reason to turn on the SplitSensorLog feature?
A. To allocate disk space for logs efficiently
B. To split the sensor logs by discovery levels
C. To split the sensor logs by discovery profiles
D. To diagnose problems with a particular discovery sensor

Answer: D

QUESTION NO: 77
Which statement is true about the tools IBM Tivoli Application Dependency and
Discovery Manager V7.1 (TADDM) provides to verify database access credentials?

A. 'dbquery' and 'testjdbc' work only when TADDM is installed on UNIX/Linux.


B. 'dbquery' validates the Access List entries for the database to be discovered.
C. 'dbquery' validates the username and password in collation.properties for the TADDM
database.
D. 'testjdbc' validates the username and password in collation.properties for the TADDM
database.

Answer: C

QUESTION NO: 78
What information does IBM Tivoli Application Dependency and Discovery Manager
V7.1 obtain from lsof?

A. A list of files on UNIX and Linux


B. A list of open connection ports on Cisco devices
C. A list of open files and associated processes on Windows 2003
D. A list of open files and associated processes on UNIX and Linux

Answer: D

QUESTION NO: 79
Which statement is true about versions?
A. Versions must be manually deleted.
B. Versions are deleted when the topology is cleared.
C. Versions are automatically deleted after six months.
D. Versions contain the change history as of the time they are created.

Answer: A

QUESTION NO: 80
Which three criteria can be used from the Unknown Servers report to identify the criteria
used for the Custom Server Template? (Choose three.)

A. Port
B. Parameters
C. Search Path
D. Environment
E. Program Name
F. Application Descriptor File

Answer: A, D, E

QUESTION NO: 81
What is the procedure to create a local service account domain ID on a Windows 2003
Server gateway running WinSSHD?

A. Add Virtual Group and create Virtual account


B. Run the ssh-host-config program and add User ID account
C. Create Access Control User and Access Control passwords
D. Run opensshd from the net category and add User ID account

Answer: A

QUESTION NO: 82
In a customer network environment, there are two firewalls between the IBM Tivoli
Application Dependency and Discovery Manager V7.1 (TADDM) server and the targeted
systems. Behind
Firewall #1 there are 1000 Computer Systems: 500 Windows 2000 and 500 Windows
2003 Servers. Behind Firewall #2 there are approximately 800 UNIX systems.
What are the two best architecture choices? (Choose two.)

A. Firewall #1: one AIX anchor server


B. Firewall #2: one Windows 2003 anchor server
C. Firewall #1: one Windows 2003 gateway server
D. Firewall #2: no anchor or gateway server is required
E. Firewall #1: one TADDM Domain Server and one Windows 2003 gateway server

Answer: B, C

QUESTION NO: 83

IBM Tivoli Application Dependency and Discovery Manager V7.1 provides


ExtraDebugging settings to diagnose specific issues. What are two characteristics that
these settings share? (Choose two.)
A. Accept true/false settings
B. Write to the ProcessFlowManager.log
C. Accept log level settings like other LOG4J loggers
D. Are independent from the log levels for other settings
E. Write to the corresponding log file in log/sensors directory

Answer: A, D

QUESTION NO: 84
Which statement is true about the relationship between Business Applications and
Business Services?
A. You can subscribe Business Application configuration items to Business Services.
B. You can subscribe Business Service configuration items to Business Applications.
C. You cannot create any relationship between Business Services and Business
Applications.
D. Business Service is the Java class name defining the Business Application
configuration item.

Answer: A

QUESTION NO: 85
How would a IBM Tivoli Application Dependency and Discovery Manager V7.1
discovery be scheduled to be run on a regular schedule?

A. Discoveries can only be run on demand.


B. From the Product Console, select the Schedule option from the Discover tab.
C. From the Domain Manager, select the Schedule option from the Discover tab.
D. Discoveries can only be scheduled using an external job scheduler (ex. Tivoli
Workload Scheduler) and the api.sh command.

Answer: B

QUESTION NO: 86
A large Business Application is being discovered, using two IBM Tivoli Application
Dependency and Discovery Manager V7.1 (TADDM) Domain Servers. TADDM Domain
Server #1 is discovering machine A, which has a database server. TADDM Domain
Server #2 discovers machine B, containing a web server. The web server has a
dependency on the database server.
A TADDM Enterprise Server is pulling data from these two Domain Servers. Which
statement is true about the dependency between the database server and the web server?

A. The TADDM Domain Server #1 will show this dependency in the topology.
B. The TADDM Domain Server #2 will show this dependency in the topology.
C. The TADDM Enterprise Server will show this dependency in the topology.
D. Neither the TADDM Domain Server nor the TADDM Enterprise Server will show this
dependency.

Answer: C

QUESTION NO: 87
Which command can be used on a IBM Tivoli Application Dependency and Discovery
Manager Server to test WMI on a target Windows-based system?

A. UNIX: execwmi.jy <ip> Windows: execwmi.bat <ip>


B. UNIX: execwmi.sh <ip> Windows: execwmi.bat <ip>
C. UNIX: wmiexec.jy <command> Window: wmiexec.bat <command>
D. UNIX: wmiexec.jy <ip> <command> Windows: wmiexec.bat <ip> <command>

Answer: D
QUESTION NO: 88
For IBM Tivoli Application Dependency and Discovery Manager V7.1 (TADDM), which
two types of information might be found in the Access List? (Choose two.)

A. Port
B. Discovery scope
C. SNMP community string
D. User name and password credentials
E. TADDM Domain Server administrator user and password

Answer: C, D

QUESTION NO: 89
Which port(s) is set in the Anchors and Gateways panel?

A. SSH
B. Anchor server only
C. Windows gateway only
D. Anchor server and Windows gateway

Answer: B

QUESTION NO: 90
Given a spreadsheet with a list of 100 machines to be discovered, which two tools can be
used to define a scope for these machines? (Choose two.)

A. api.sh
B. loadidml.sh
C. setscope.jy
D. loadscope.jy
E. templateloader.jy

Answer: A, D

QUESTION NO: 91
Which statement is true about the discovery process?
A. The discovery process can only be run on demand.
B. The discovery process schedule is executed from the Domain Manager.
C. The discovery process schedule is created in the Domain Summary pane.
D. The discovery process can be run on demand, as part of a schedule, or can be driven
by externally triggered events.

Answer: D

QUESTION NO: 92
What should the IBM Tivoli Application Dependency and Discovery Manager V7.1
administrator do in order to assign Read and Discover permissions to User1?
A. Create User1 and check the boxes for Read and Discover permissions
B. Create a new role with Read and Discover permissions, and assign the role to User1
C. Create an Access Collection with Read and Discover permissions and assign User1 to
the Access Collection
D. Create User1 with default settings and edit User1 to set permissions, as the create step
cannot modify permissions

Answer: B

QUESTION NO: 93
Due to a firewall restriction, the port to the database connection needs to be modified so
that IBM Tivoli Application Dependency Discovery Manager 7.1 can connect to the
database.
Which parameter needs to be modified to establish this connection?

A. com.collation.port
B. com.collation.db.server
C. com.collation.db.archive.url
D. com.collation.db.connection

Answer: C

QUESTION NO: 94
After an IBM Tivoli Application Dependency and Discovery Manager V7.1 discovery,
the topology shows that there is a connection between an Oracle Instance and a Java
application. This connection is an example of which type of Common Data Model
relationship?

A. Implicit
B. Explicit
C. Exports
D. Transactional dependency

Answer: D

QUESTION NO: 95
The customer's IBM Tivoli Application Dependency and Discovery Manager V7.1
(TADDM) environment consist of two TADDM Domain Servers (domain_A and
domain_B) and one TADDM Enterprise Server (enterprise_1). A TADDM user, myuser1
with password domainApw, has been created on the domain_A TADDM server. The same
TADDM user with a different password, enterprise1pw, has been created on the TADDM
Enterprise Server. Both domain servers are running and connected to the enterprise
server. Which password must be used to log on to the domain_B TADDM server with
user myuser1?

A. Collation
B. Domainapw
C. Enterprise1pw
D. User myuser1 with a password would first need to be created on domain_B. The
password given the new user would be used.

Answer: C

QUESTION NO: 96
What are the two supported browsers and corresponding operating systems for the
Product Console and the Domain Manager? (Choose two.)
A. Netscape on UNIX
B. Internet Explorer V7 for Windows
C. Internet Explorer V6 and V7 for Windows
D. Firefox 2.0 for Linux, Solaris, AIX and Windows
E. Firefox 2.0 and Netscape for Linux, Solaris and AIX

Answer: B, D

QUESTION NO: 97
Which three component types can the Product Console's Create Component wizard
define? (Choose three.)

A. Cluster
B. Firewall
C. Collection
D. J2EE Server
E. Cisco Switch
F. Business Service

Answer: A, B, D

QUESTION NO: 98
Which status can be displayed on the History pane when a sensor has completed?

A. Done
B. Success
C. Discovered
D. In progress

Answer: A

QUESTION NO: 99
What are two ways that a IBM Tivoli Application Dependency and Discovery Manager
V7.1 discovery can be initiated? (Choose two.)

A. Api.sh
B. Collation
C. Control start
D. Product Console
E. Domain Manager

Answer: A, D

QUESTION NO: 100


It appears as though a bulk load failed. Which two actions should be taken initially to
verify that the load did not return any errors? (Choose two.)

A. Review the bulkload log file.


B. Check the return code from the idML book load command.
C. Check the results file in the results folder to verify that it loaded properly
D. Check the history in the IBM Tivoli Application Dependency and Discovery Manager
V7.1 (TADDM) GUI to see the results of any discoveries, runs. and ldML book loads.
E. Look into the TADDM database to see if any of the ldML book's data was loaded.

Answer: B, C

Anda mungkin juga menyukai