- 论坛徽章:
- 0
|
<p align="left"><p align="left">最新000-537考題分享</p></p><p align="left"><p align="left">Question: 1</p></p><p align="left"><p align="left">Which two attribute types are available on an objectclass definition? (Choose two.)</p></p><p align="left"><p align="left">A. nominal</p></p><p align="left"><p align="left">B. required</p></p><p align="left"><p align="left">C. optional</p></p><p align="left"><p align="left">D. unrestricted</p></p><p align="left"><p align="left">E. generalized date syntax</p></p><p align="left"><p align="left">Answer: B,C</p></p><p align="left"><p align="left">Question: 2</p></p><p align="left"><p align="left">Applications authenticate to the IBM Tivoli Directory Server V6.3. Which two pieces of</p></p><p align="left"><p align="left">information are used for authentication? (Choose two.)</p></p><p align="left"><p align="left">A. cn attribute</p></p><p align="left"><p align="left">B. unique identified name</p></p><p align="left"><p align="left">C. ibm-entryuuid attribute</p></p><p align="left"><p align="left">D. userPassword attribute</p></p><p align="left"><p align="left">E. full distinguished name</p></p><p align="left"><p align="left">Answer: D,E</p></p><p align="left"><p align="left">Question: 3</p></p><p align="left"><p align="left">Which file format is used to load customer data?</p></p><p align="left"><p align="left">A. DSML file from a Web Application Server</p></p><p align="left"><p align="left">B. MS Word document of department entries</p></p><p align="left"><p align="left">C. an XML extract from a department spreadsheet</p></p><p align="left"><p align="left">D. LDIF file extract from a Human Resources system</p></p><p align="left"><p align="left">Answer: D</p></p><p align="left"><p align="left">Question: 4</p></p><p align="left"><p align="left">What are two common attributes used to create a person entry? (Choose two.)</p></p><p align="left"><p align="left">A. sn</p></p><p align="left"><p align="left">B. cn</p></p><p align="left"><p align="left">C. uid</p></p><p align="left"><p align="left">D. lastname</p></p><p align="left"><p align="left">E. givenname</p></p><p align="left"><p align="left">Answer: A,B</p></p><p align="left"><p align="left">Question: 5</p></p><p align="left"><p align="left">What type of objectclass is required in order to define an LDAP entry to be loaded into an IBM</p></p><p align="left"><p align="left">Tivoli Directory Server V6.3 environment?</p></p><p align="left"><p align="left">A. auxiliary</p></p><p align="left"><p align="left">B. absolute</p></p><p align="left"><p align="left">C. structural</p></p><p align="left"><p align="left">D. hierarchical</p></p><p align="left"><p align="left">Answer: C</p></p><p align="left"><p align="left">Question: 6</p></p><p align="left"><p align="left">Which tool configures an IBM Tivoli Directory Server (ITDS) proxy server?</p></p><p align="left"><p align="left">A. ITDS Control Center</p></p><p align="left"><p align="left">B. ITDS Instance Creation Tool</p></p><p align="left"><p align="left">C. ITDS Web Administration Tool</p></p><p align="left"><p align="left">D. ITDS Instance Administration Tool</p></p><p align="left"><p align="left">Answer: C</p></p><p align="left"><p align="left">Question: 7</p></p><p align="left"><p align="left">Which IBM Tivoli Directory Server V6.3 (ITDS) command creates a key stash file to</p></p><p align="left"><p align="left">cryptographically synchronize ITDS instances?</p></p><p align="left"><p align="left">A. idsadcfg</p></p><p align="left"><p align="left">B. idsldapexop</p></p><p align="left"><p align="left">C. idsgendirksf</p></p><p align="left"><p align="left">D. ibmslapdcfgksf</p></p><p align="left"><p align="left">Answer: C</p></p><p align="left"><p align="left">Question: 8</p></p><p align="left"><p align="left">Which value cannot be retrieved from the IBM Tivoli Directory Server instance after it has</p></p><p align="left"><p align="left">been created and configured?</p></p><p align="left"><p align="left">A. encryption key</p></p><p align="left"><p align="left">B. encryption salt</p></p><p align="left"><p align="left">C. encryption seed</p></p><p align="left"><p align="left">D. encryption seed-salt</p></p><p align="left"><p align="left">Answer: C</p></p><p align="left"><p align="left">Question: 9</p></p><p align="left"><p align="left">What is an example of when it is recommended to have cryptographically synchronized</p></p><p align="left"><p align="left">instances?</p></p><p align="left"><p align="left">A. When SSL is configured.</p></p><p align="left"><p align="left">B. When referrals are configured.</p></p><p align="left"><p align="left">C. When replication is configured with a two-way encryption scheme.</p></p><p align="left"><p align="left">D. When replication is configured with a one-way encryption scheme.</p></p><p align="left"><p align="left">Answer: D</p></p><p align="left"><p align="left">Question: 10</p></p><p align="left"><p align="left">What does the GSKCapiCmd tool do?</p></p><p align="left"><p align="left">A. It creates only PKCS11 key databases.</p></p><p align="left"><p align="left">B. It creates only PKCS12 key databases.</p></p><p align="left"><p align="left">C. It manages keys, certificates, and certificate requests within a JKS key database.</p></p><p align="left"><p align="left">D. It manages keys, certificates, and certificate requests within a CMS key database.</p></p><p align="left"><p align="left">Answer: D</p></p> |
|