Which two backup methods are available with the IBM Tivoli Directory Server Instance Configuration Tool? (Choose two.)
A. idsdbback method
B. idsbulkload to export LDIF data
C. idsldif2db to import LDIF data
D. idsldapsearch method to export LDIF data
E. idsdb2ldif to export LDIF data
正解:A,E
質問 2:
Which method can be used for pass-through authentication when attribute mapping is not specified in IBM Tivoli Directory Server (ITDS)?
A. ITDS searches for a mapping entry on the pass-through LDAP server.
B. Pass-through authentication is not supported in this situation.
C. ITDS creates its own attribute mapping logic.
D. The entry on the actual ITDS maps explicitly to some entry on the pass-through LDAP server.
正解:D
質問 3:
Which action is typically taken prior to performing a migration of an IBM Tivoli Directory Server environment?
A. backup of user data
B. backup of the Changelog database
C. backup of replication database
D. backup of Audit log
正解:A
質問 4:
Which method verifies the successful uninstallation of IBM DB2 V9.7 on AIX, Linux, or Solaris?
A. run the lslpp / rpm / pkginfo command and verify
B. run the db2_listfixpacks command and verify
C. run the db2ls command and verify
D. run the db2_deinstall command and verify
正解:C
質問 5:
The customer has a requirement to send updates through a proxy server. What authority should be planned?
A. Anonymous User
B. Global Administration Group Member
C. System Administrator
D. Local Administration Group Member
正解:B
質問 6:
What is the most important consideration when configuring IBM DB2 for online backups?
A. amount of physical memory
B. amount of disk space
C. number of DB2 tablespaces
D. number of DB2 connections
正解:B
質問 7:
What are two methods used to uninstall IBM Tivoli Directory Server V6.3 (ITDS) packages? (Choose two.)
A. mark ITDS folders as deleted
B. removesITDS and related folders
C. use InstallShield GUI
D. use ITDS provided utilities to unconfigure software
E. use operating system utilities
正解:C,E
質問 8:
What does the Health Check Feature identify in IBM Tivoli Directory Server (ITDS) proxy?
A. It determines the state of the ITDS proxy server.
B. It determines the state of the ITDS proxy server database.
C. It determines the state of the ITDS proxy server backend(s).
D. It determines whether ITDS proxy can process pass through authentication requests.
正解:C