免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 1337 | 回复: 0
打印 上一主题 下一主题

000-537考題下載 [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2011-04-08 18:04 |只看该作者 |倒序浏览
<p align="left"><p align="left">最新000-537考題分享</p></p><p align="left"><p align="left">Question: 1</p></p><p align="left"><p align="left">Which two attribute types are available on an objectclass definition? (Choose two.)</p></p><p align="left"><p align="left">A. nominal</p></p><p align="left"><p align="left">B. required</p></p><p align="left"><p align="left">C. optional</p></p><p align="left"><p align="left">D. unrestricted</p></p><p align="left"><p align="left">E. generalized date syntax</p></p><p align="left"><p align="left">Answer: B,C</p></p><p align="left"><p align="left">Question: 2</p></p><p align="left"><p align="left">Applications authenticate to the IBM Tivoli Directory Server V6.3. Which two pieces of</p></p><p align="left"><p align="left">information are used for authentication? (Choose two.)</p></p><p align="left"><p align="left">A. cn attribute</p></p><p align="left"><p align="left">B. unique identified name</p></p><p align="left"><p align="left">C. ibm-entryuuid attribute</p></p><p align="left"><p align="left">D. userPassword attribute</p></p><p align="left"><p align="left">E. full distinguished name</p></p><p align="left"><p align="left">Answer: D,E</p></p><p align="left"><p align="left">Question: 3</p></p><p align="left"><p align="left">Which file format is used to load customer data?</p></p><p align="left"><p align="left">A. DSML file from a Web Application Server</p></p><p align="left"><p align="left">B. MS Word document of department entries</p></p><p align="left"><p align="left">C. an XML extract from a department spreadsheet</p></p><p align="left"><p align="left">D. LDIF file extract from a Human Resources system</p></p><p align="left"><p align="left">Answer: D</p></p><p align="left"><p align="left">Question: 4</p></p><p align="left"><p align="left">What are two common attributes used to create a person entry? (Choose two.)</p></p><p align="left"><p align="left">A. sn</p></p><p align="left"><p align="left">B. cn</p></p><p align="left"><p align="left">C. uid</p></p><p align="left"><p align="left">D. lastname</p></p><p align="left"><p align="left">E. givenname</p></p><p align="left"><p align="left">Answer: A,B</p></p><p align="left"><p align="left">Question: 5</p></p><p align="left"><p align="left">What type of objectclass is required in order to define an LDAP entry to be loaded into an IBM</p></p><p align="left"><p align="left">Tivoli Directory Server V6.3 environment?</p></p><p align="left"><p align="left">A. auxiliary</p></p><p align="left"><p align="left">B. absolute</p></p><p align="left"><p align="left">C. structural</p></p><p align="left"><p align="left">D. hierarchical</p></p><p align="left"><p align="left">Answer: C</p></p><p align="left"><p align="left">Question: 6</p></p><p align="left"><p align="left">Which tool configures an IBM Tivoli Directory Server (ITDS) proxy server?</p></p><p align="left"><p align="left">A. ITDS Control Center</p></p><p align="left"><p align="left">B. ITDS Instance Creation Tool</p></p><p align="left"><p align="left">C. ITDS Web Administration Tool</p></p><p align="left"><p align="left">D. ITDS Instance Administration Tool</p></p><p align="left"><p align="left">Answer: C</p></p><p align="left"><p align="left">Question: 7</p></p><p align="left"><p align="left">Which IBM Tivoli Directory Server V6.3 (ITDS) command creates a key stash file to</p></p><p align="left"><p align="left">cryptographically synchronize ITDS instances?</p></p><p align="left"><p align="left">A. idsadcfg</p></p><p align="left"><p align="left">B. idsldapexop</p></p><p align="left"><p align="left">C. idsgendirksf</p></p><p align="left"><p align="left">D. ibmslapdcfgksf</p></p><p align="left"><p align="left">Answer: C</p></p><p align="left"><p align="left">Question: 8</p></p><p align="left"><p align="left">Which value cannot be retrieved from the IBM Tivoli Directory Server instance after it has</p></p><p align="left"><p align="left">been created and configured?</p></p><p align="left"><p align="left">A. encryption key</p></p><p align="left"><p align="left">B. encryption salt</p></p><p align="left"><p align="left">C. encryption seed</p></p><p align="left"><p align="left">D. encryption seed-salt</p></p><p align="left"><p align="left">Answer: C</p></p><p align="left"><p align="left">Question: 9</p></p><p align="left"><p align="left">What is an example of when it is recommended to have cryptographically synchronized</p></p><p align="left"><p align="left">instances?</p></p><p align="left"><p align="left">A. When SSL is configured.</p></p><p align="left"><p align="left">B. When referrals are configured.</p></p><p align="left"><p align="left">C. When replication is configured with a two-way encryption scheme.</p></p><p align="left"><p align="left">D. When replication is configured with a one-way encryption scheme.</p></p><p align="left"><p align="left">Answer: D</p></p><p align="left"><p align="left">Question: 10</p></p><p align="left"><p align="left">What does the GSKCapiCmd tool do?</p></p><p align="left"><p align="left">A. It creates only PKCS11 key databases.</p></p><p align="left"><p align="left">B. It creates only PKCS12 key databases.</p></p><p align="left"><p align="left">C. It manages keys, certificates, and certificate requests within a JKS key database.</p></p><p align="left"><p align="left">D. It manages keys, certificates, and certificate requests within a CMS key database.</p></p><p align="left"><p align="left">Answer: D</p></p>
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP