C2070-582 IBM FileNet Business Process Manager V5.1

Test information:
Number of questions: 61
Time allowed in minutes: 90
Required passing score: 58%
Test languages: English, Japanese

Related certifications:
IBM Certified Specialist – FileNet Business Process Manager V5.1

This multiple-choice test contains questions requiring single and multiple answers. For multiple-answer questions, you need to choose all required
options to get the answer correct. You will be advised how many options make up the correct answer.
This test is designed to provide diagnostic feedback on the Examination Score Report, correlating back to the test objectives, informing the test taker how
he or she did on each section of the test. As a result, to maintain the integrity of each test, questions and answers are not distributed.

The test contains seven sections totalling 61 multiple-choice questions. The percentages after each section title reflect the approximate distribution of the total question set across the sections.

Section 1 – Planning and Architecture (7%)
Demonstrate understanding of IBM FileNet Business Process Manager Architecture
Identify minimum installation requirements
Identify product integration options available to the Process Engine

Section 2 – Installation and Configuration (18%)
Demonstrate installation and configuration knowledge (e.g. multiple instances configuration, security)
Demonstrate knowledge of high availability installation and configuration
Demonstrate knowledge of deploying add-on software (e.g. P8 eForms, Case Analyzer, Case Monitor)
Demonstrate knowledge of deployment validation procedures

Section 3 – Administration (15%)
Demonstrate knowledge of system administration tasks (e.g. maintenance tasks, best practices)
Demonstrate knowledge of workflow administration tools and tasks
Demonstrate knowledge of Process Engine security.

Section 4 – Designing, Deploying and Testing Workflows and Applications (20%)
Understand the steps needed to plan and create a BPM application (i.e. workflow design) based on FileNet BPM
Understand the steps needed to design and implement a BPM application (i.e. workflow design) based on FileNet BPM
Understand the steps needed to deploy an application from development to testing to production
Understand the steps needed to expose a workflow as a service
Understand and demonstrate the process engine using custom components (e.g. dropping in Java Code, Step Processors, etc.)

Section 5 – Extending IBM FileNet Business Process Manager Configuration (11%)
Demonstrate knowledge of integration of FileNet BPM with external system using WebServices & JMS.
Understand how Process Engine interacts with Case Manager
Understand how to integrate Rules, Case Analyzer, Case Monitor, P8 eForms and Lotus Forms, and Records Manager with workflow

Section 6 – Troubleshooting (16%)
Understand how to use the ISA Lite tool to collect diagnostic information.
Familiarity with the logging options for the Process Engine (e.g. PE Server System logs and trace logs, VW Tool Trace, log4j)
Given a scenario, identify the tools available to troubleshoot the Process Engine (e.g. Process Tracker, Process Administrator, vwlog, vwtool, diagnostic URL)

Section 7 – Performance and Tuning (13%)
Demonstrate knowledge of monitoring options (e.g. WebSphere Business Monitor, Case Monitor)
Understand the principles of performance and tuning recommendations
Demonstrate knowledge of JVM tuning
Demonstrate knowledge of database tuning

QUESTION 1
You are installing a Process Engine server that will be a part of an IBM Case Manager installation.
What is a requirement for the Process Engine installation?

A. The Process Engine can only have one virtual server.
B. IBM Case Manager and Process Engine must be on the same server.
C. The Content Engine and Process Engine must be on the same server.
D. You must use the same database for both the Content Engine and Process Engine.

Answer: D

Explanation:


QUESTION 2
There is a need to generate the Case Analyzer reports based on fields in the workflow. Which two
configuration steps are required to do this? (Choose two.)

A. Configure the Case Analyzer pruning schedule
B. Expose the workflow fields in the Process Engine Event Log
C. Expose the workflow fields in all queues associated with the workflow
D. Expose the workflow fields in the Roster associated with the workflow
E. Create new data fields in Case Analyzer based on these workflow fields

Answer: B,E

Explanation:


QUESTION 3
Which two adaptors are supported by IBM FileNet P8 Business Process Manager out-of-the-box?
(Choose two.)

A. C#
B. Java
C. JMS
D. .NET
E. TIBCO

Answer: B,C

Explanation:


QUESTION 4
How do you configure multiple Component Managers to access the same Component Queues?

A. Create exact replicas of Component Manager instances on the same host accessing the same
component queues.
B. Create exact replicas of Component Manager instances on different hosts accessing the same
component queues.
C. Create the Component Manager instances each with a different Service User name to access
the same component queues.
D. Create duplicates of the Component Queues and have each Component Manager point to a
copy of the component queue.

Answer: C

Explanation:


QUESTION 5
You are installing a Process Engine server that will be a part of an IBM Case Manager installation.
What configuration setting must be set to establish the connection between an object store and an
isolated region for IBM Case Manager?

A. A Region id must be created in the object store.
B. The Runtime Options tab must be configured in Process Configuration Console.
C. A symbolic link between the object store and the isolated region must be created.
D. The IBM Case Manager server host name must be specified on the Server Connections tab on
the Process Engine Process Task Manager.

Answer: C

Explanation:

Click here to view complete Q&A of C2070-582 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best IBM C2070-582 Certification, IBM C2070-582 Training at certkingdom.com

C2070-580 IBM Case Manager V5.0

Test information:
Number of questions: 58
Time allowed in minutes: 90
Required passing score: 72%
Test languages: English

Related certifications:

IBM Certified Specialist – Case Manager V5.0

The test contains six sections totalling approximately 58 multiple-choice questions. The percentages after each section title reflect the approximate distribution of the total question set across the sections.

Section 1 – Planning and Architecture (14%)
Demonstrate understanding of IBM Case Manager Architecture
Identify solutions best addressed by Case Manager
Identify minimum installation requirements
Identify key differences between development and production environments
Identify integrated product capabilities included in base license

Section 2 – Installation and Configuration (10%)
Demonstrate installation knowledge
Demonstrate knowledge of single server installation
Demonstrate knowledge of Case Manager Administration Client (CMAC) functionality
Demonstrate knowledge of deploying add-on software
Demonstrate knowledge of deployment validation procedures

Section 3 – Designing, Deploying and Testing a Case Solution (45%)
Demonstrate an understanding of the Case Manager object model
Demonstrate an understanding of Case Builder and it’s Artifacts
Demonstrate an understanding of Case Client and Space Templates
Demonstrate an understanding of Case Task, Process Fragments and WPS Integration
Demonstrate an understanding of the security model
Demonstrate an understanding of custom mashup pages
Demonstrate an understanding of IBM Case Manager bundled components: Sametime, iLog JRules, Case Analyzer, Case Monitor, Case Content Analytics, eForms
Demonstrate an understanding of the deployment structure
Demonstrate an understanding of solution templates

Section 4 – Extending a Case Management Solution (17%)
Demonstrate knowledge of integrating custom widgets, eForms, iLog JRules and analytics customization
Identify other IBM add-on products to extend Case Manager capabilities
Identify WPS capabilities to extend Case Manager capabilities
Demonstrate an understanding of building a custom application using REST service APIs

Section 5 – Migrating a Solution to a Production Environment (9%)
Demonstrate an understanding of using FileNet Deployment Manager
Demonstrate an understanding of requirements and steps to deploy to production
Demonstrate an understanding of configuring security in a production environment

Section 6 – Troubleshooting (5%)
Describe how to monitor the system
Understanding the Case Manager logs: Case Builder, Case Client, API
Describe important add-on and platform logs external to Case Manager

IBM Certified Specialist – Case Manager V5.0

Job Role Description / Target Audience
This certification test certifies that the successful candidate has important knowledge, skills, and abilities necessary to plan, install, configure, troubleshoot, administer, secure and maintain IBM Case Manager. The candidate must successfully develop and deploy IBM Case Manager solutions and migrate solutions to a production environment.

Recommended Prerequisite Skills

Before preparing for this certification, the following knowledge and skills are recommended and assumed:
Knowledge of IBM Case Manager
Knowledge of IBM FileNet Content Manager
Knowledge of IBM FileNet Business Process Manager
Knowledge of Lotus Mashups
Knowledge of WebSphere Process Server
Knowledge of WebSphere Application Server
Knowledge of DB2

QUESTION 1

Which two components are optional with the IBM Case Manager? (Choose two)
A. IBM Case Analyzer
B. IBM Mashup Center
C. IBM Content Engine
D. IBM WebSphere Process Server
E. IBM Process

Answer: A,D
Explanation:

QUESTION 2

In a distributed system architecture scenario, if installing IBM Case Manager to an existing FileNet
P8 environment, which option applies?
A. Deploy a new P8 5.0 Process Engine server in the existing database collocated with the case
management target object store database
B. Deploy a new P8 5.0 Process Engine server with its own separate database collocated with the
case management target object store database
C. Collocate the existing P8 4.5 Process Engine database with the corresponding target object
store database for case management on Content Engine
D. Collocate the existing P8 5.0 Process Engine database with the corresponding target object
store database for case management on Content Engine

Answer: B
Explanation:

QUESTION 3

A. Content Manager Interoperability Services (CMIS) APIs
B. Case REST APIs
C. Object REST APIs
D. Content REST APIs
E. Analytics REST

Answer: A,B
Explanation:

Click here to view complete Q&A of C2070-580 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best IBM C2070-580 Certification, IBM C2070-580 Training at certkingdom.com

C2065-052 IBM Intelligent Operations Center V1.6, Implementation

Test information:
Number of questions: 57
Time allowed in minutes: 120
Required passing score: 61%
Languages: English

Related certifications:
IBM Certified Implementation Professional – Intelligent Operations Center V1.6

This multiple-choice test contains questions requiring single and multiple answers. For multiple-answer questions, you need to choose all required options to get the answer correct. You will be advised how many options make up the correct answer.
This test is designed to provide diagnostic feedback on the Examination Score Report, correlating back to the test objectives, informing the test taker how he or she did on each section of the test. As a result, to maintain the integrity of each test, questions and answers are not distributed.

The test contains eight sections totalling 57 multiple-choice questions. The percentages after each section title reflect the approximate distribution of the total question set across the sections.

Section 1 – Architecture (12%)
Understand the topology
Explain the product architecture
Understand and use extension points
Identify the major function elements of IBM IOC
Understand how IBM IOC connects to Geographic Information Systems (GIS)

Section 2 – Installation (16%)
Define the hardware and software requirements
Define the installation prerequisites
Define the different types of installation
Perform post-Installation verification steps
Perform post-Installation configuration
Explain the role of the Precheck tool
Identify the difference between a standard and a high-availability installation

Section 3 – Data Source (16%)
Understand and set up data sources
Understand the process of creating a event from a new data source
Explain event correlation
Define the input source and the processing on the source to send it to Key Performance Indicator (KPI)
Define the input source and the processing on the source to send it to Standard Operating Procedure (SOP)
Process Common Alerting Protocol (CAP) messages
Understand the importance of routing schema files

Section 4 – User Interface (UI) (11%)
Create roles and users
Configure location map
Customize the UI by adding a new portlet
Customize the UI by creating a new webpage on the portal
Configure filters in the menu for slideouts

Section 5 – KPI & SOP (16%)
Describe the overall system/data flow
Create and customize a KPI
Develop a hierarchy
Create and customize a SOP

Section 6 – Business Rules & Reporting (7%)
Create a new report using IBM Cognos and Dojo
Configure and change an existing report

Section 7 – Administration & Troubleshooting (18%)
Ensure all processes are running correctly
Identify the different types of errors and troubleshooting techniques
Use ISA Data Collector for IBM IOC (formerly IBM Support Assistant Lite)
Use the Platform Control tool
Enable logs and traces
Understand the difference between IOC V1.5 to V1.6
Maintain the IBM IOC system

Section 8 – Security (4%)
Understand fundamental IBM IOC security concepts
Understand connecting IBM IOC to an existing customer identity store

IBM Certified Implementation Professional – Intelligent Operations Center V1.6

Job Role Description / Target Audience
This intermediate level certification is intended for implementation professionals who have hands-on experience with IBM Intelligent Operations Center V1.6 to install, configure, deploy and operate IOC to meet customer needs. The questions on this exam are current to IBM Intelligent Operations Center V1.6.0.1.

An implementation professional who passes this exam is able to:
explain the architecture
understand the installation process
configure data sources, UI, KPI, SOP, business rules and reporting
administer the system and perform troubleshooting tasks

This implementation professional is generally an IT specialist with a background in complex systems administration, but not in a developer role. It is not necessary for this implementation professional to have a programming background.

This implementation professional is generally self-sufficient and is able to perform most of the tasks involved in the role with limited amount of assistance from peers and vendor support services. The deployment professional efficiently uses product documentation

Before preparing for this certification, basic understanding of the following is recommended and assumed:
Linux
Java
Networking
IBM WebSphere Application Server
IBM DB2
IBM WebSphere Business Monitor

In preparing for this certification, the following IBM courses are recommended to further improve your skills associated with the exam topics. Refer to the Test Preparation web page for additional information and recommendations.

9J07G: IBM® Intelligent Operations Center 1.6 Primer WBT
9J11G: Getting Started with Intelligent Operations Center 1.6
9J13G: IBM Intelligent Operations Center 1.6 Configuration
Upgrading to 8.5 and policies

Click here to view complete Q&A of C2065-052 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best IBM C2065-052 Certification, IBM C2065-052 Training at certkingdom.com

C2065-050 IBM i2 COPLINK Detect V4.x

Test information:
Number of questions: 55
Time allowed in minutes: 120
Required passing score: 72%
Languages: English

Related certifications:
IBM Certified Solutions Specialist – i2 COPLINK Detect V4.x

This multiple-choice test contains questions requiring single and multiple answers. For multiple-answer questions, you need to choose all required options to get the answer correct. You will be advised how many options make up the correct answer.
This test is designed to provide diagnostic feedback on the Examination Score Report, correlating back to the test objectives, informing the test taker how he or she did on each section of the test. As a result, to maintain the integrity of each test, questions and answers are not distributed.

Test C2065-050: IBM i2 COPLINK Detect V4.x
The test contains six sections totalling 55 multiple-choice questions. The percentages after each section title reflect the approximate distribution of the total question set across the sections.

Section 1 – General IBM i2 COPLINK Application Knowledge (13%)
launch and log in to the application
determine how connections are made (i.e. What is Adaptive Analytical Architecture (A3)?)
determine the type of information that can be found on COPLINK Detect
normalization and consolidation of data in COPLINK

Section 2 – Application Navigation (16%)
understand the components and location of the menu bar options
identify the major search components tabs (i.e. person, vehicle, organization, location, media, firearms, property, securities, phones, events, documents)
identify the concept of sub-tabs (filters) relating to each of the major tabs
navigate the application using action buttons (i.e. find, create mug book, add and clear)
navigate to association queries, including basic search, refined search, and Find Path
understand how to use nodes selection boxes

Section 3 – Administrative Functions (20%)
understand how to set up queries in an individual session (i.e. Matching (wild card or exact match), Soundex, Metaphone, Diminutive)
differentiate between match unknowns and no unknowns
differentiate between show all associations and show limited associations
use hot keys to navigate the user interface
understand how to set up preferences
understand the user inactivity timeout function
use the Document Count feature
use the “search all” description
understand and use history functions
export types (e.g. print, export to a file, mug books, photo lineups, et cetera)

Section 4 – Data Search (Find) (20%)
differentiate between types of phone searches
identify different types of permissible wild cards in the query windows
understand query constraints, including text fields and pull-down menu
understand the function of the numeric range boxes
understand select and deselect query features (i.e. checkboxes)
locate and use the multi-select feature
use and differentiate between filter capabilities
understand the “less is more” search concept

Section 5 – Association Search (16%)
conduct Basic Association Search
conduct Refined Association Search
conduct Find Path Search

Section 6 – Result Analysis (15%)
understand and analyze query results
understand and identify the summary table result icons
sort search results
interpret and narrow search results
use mug books and photo lineups to identify potential investigative leads
understand the maximum query result function

IBM Certified Solutions Specialist – i2 COPLINK Detect V4.x

Job Role Description / Target Audience
This intermediate level certification is intended for law enforcement professionals responsible for using the IBM i2 COPLINK Detect V4.x application.

This certification is relevant to police investigators, police officers, crime analysts, management analysts, records personnel and dispatch personnel. These law enforcement professionals may conduct queries while investigating crimes, in attempt to identify investigative leads or analyze crime data.

This professional must either be employed by:

a law enforcement agency with the proper security clearance, or

IBM i2 COPLINK team, or Authorized IBM resellers

Recommended Prerequisite Skills
Before preparing for this certification, the following is recommended and assumed:

ability to understand basic computer operating principles basic understanding of police investigative procedures

In preparing for this certification, the following IBM course(s) are recommended to further improve your skills:

9I36G: IBM i2 COPLINK Detect Essentials
9S205G: i2 COPLINK Detect Refresher

Click here to view complete Q&A of C2065-050 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best IBM C2065-050 Certification, IBM C2065-050 Training at certkingdom.com

C2040-986 Creating IBM Lotus Notes and Domino 8.5 Applications with Xpages and Advanced Techniques

Lotus certification has restructured the ND8.5 certification paths. For more information, please check out the announcement on the Lotus Certification index page.

Test information:
Number of questions: 82
Time allowed in minutes: 100
Required passing score: 75%
Languages: English, Japanese

Exam 986: Creating IBM Lotus Notes and Domino 8.5 Applications with Xpages and Advanced Techniques

Description: Covers Lotus Notes Domino 8.5 material as it relates to these competency areas:

Advanced Techniques
Application Architecture
Application Configuration
Programming and Design Elements
Security

Using xpages

Xpages Application Architecture
Xpages Application Configuration
Xpages Application Security
Xpages Design Elements
Xpages in Domino Applications

Application Architecture
Designing Web applications that read non-Domino data
Setting up Web site rules

Application Configuration
Creating and enabling a Data Connection Resource
Setting database ACL advanced properties

Programming and Design Elements
Advanced options for columns
Create and use image resource sets
Creating a Web service Consumer
Enabling and using agent profiling
Integrating eclipse features into the design including working set
Personalizing Web site experience using Cookies
Understanding XSLT
Using electronic signatures in Notes applications
Working with DXL Tools

Security
Determining Secure Sockets Layer security
Planning application security based on Web authentication
Planning Single Sign-on
Setting and troubleshooting agent security
Setting Database Access
Controlling Web Authentication
Using Anonymous Access
Using Maximum Internet name and password
Using Roles
Setting database ACL advanced properties
Understanding Database encryption
Using Mail encryption

Xpages Application Architecture
Comparing available Features
Comparing forms based to Xpages Application architecture
Comparing Security Features
Designing applications that work on mobile clients
Designing applications that work on Web clients
Exploring page layout and navigation
Planning an Xpages Application
Planning your Xpages application navigation
Understand server tasks for web browsing
Understand the purpose and features of Xpages
Capabilities of themes
Distinctions between themes and CSS
Extensible via custom controls
Understand the Purpose and value of preprogrammed simple actions in Web Applications
Value of being Ajax enabled
Understanding server tasks for Web browsing
Understanding Xpages application architecture

Xpages Application Configuration
Setting database launch properties(launching into Xpages)
Open designated page in notes client (Xpages) – forms properties
Open designated Xpage for the notes client- database properties
Troubleshooting database performance
Caching (Xpages)
Server page persistence (Xpages)
Single copy Xpage design

Xpages Application Security
Restricting access to an Xpage
Server document settings affecting Xpages
Transforming domino forms into xpages withXSLT
Troubleshooting Effective Access
Using Xpage Custom Control ACLs

Xpages Design Elements
Creating, Troubleshooting, Modifying Custom Controls
Creating, Troubleshooting, Modifying Xpages
Deploying, utilizing LotusScript agents
Restricting access to an Xpage
Troubleshooting workflow routing issues
Understand purpose and use of the Outline view
Understanding the JavaScript Document Object Model (DOM)
Using calendar views in applications
Using design perspectives
Using electronic signatures in Notes applications
Working with visibility formulas

Xpages in Domino Applications
Change Document Mode
Confirm Action
Connecting to Enterprise data
Create Response Document
Delete Document
Delete Selected Documents
Design and develop using XPages, including:
Add styles
Create and edit and use Theme resources
Debug XPage programming issues
Execute Script
Javascript
Accessing databases, views, and documents
Searching for documents in a view or database
Stepping through a view to access documents
Leverage Global functions in Server-side scripting
ApplicationScope
Context
Cookie
FacesContext
GetClientId
GetComponent
Header
Param
RequestScope
SessionScope
View
Managing data and design replication
Modify Field
Open Page
Other Controls
Use Container Controls
Use Core Controls
Programming with the formula language
Save Data Sources
Save Document
Server document settings affecting the Xpages
Set Value
Understand purpose and use of the Controls Palette
Understand purpose and use of the Data Palette
Understand the purpose and use of the events view
Use pre-programmed simple actions in Web applications, including
Using @ commands in web Applications
Using @ Functions in Web Applications

QUESTION 1
Barney imports a WSDL file into a LotusScript script library, which generates code to call the Web
service methods defined by the WSDL file. Where can he use this script library?

A. Only in agents
B. Only in agents that run on the server
C. Only in agents and form or view actions
D. Anywhere that LotusScript can be used

Answer: D

Explanation:


QUESTION 2
Marge wants to track user preference information while users navigate through her Web site, but
does not want to require users to authenticate when accessing the site. Which of the following
should she use to track the user information?

A. Cookies
B. Servlets
C. User profile documents
D. The users must authenticate

Answer: A

Explanation:


QUESTION 3
Winnie is enhancing the interface on the Corporate Phone Book Web application. Ted, the
graphics designer who is providing Winnie with the images for her Domino application, has
suggested that she use image resource sets. What is a feature that Winnie can incorporate by
using image resource sets?

A. A vertical image set can be used to incorporate effects using the onmouseover, onmouseout,
and onclick events of an image on an XPage.
B. A vertical image set can be used to incorporate effects using the Normal, Mouse-over,
Selected, and Mouse-down image states of a Domino Web page image.
C. A horizontal image set can be used to add effects when a user hovers the mouse over an
image. For example, the normal image could be replaced with a larger image when the mouse
hovers over it.
D. A horizontal image set can be used to add effects when a user hovers the mouse over an
image. For example the normal image could be replaced with an image with different coloring
when the mouse hovers over it.

Answer: D

Explanation:


QUESTION 4
What is the purpose of using XSLT in a Lotus Domino Web application?

A. To define what DXL should be available for export.
B. To allow a Web service to interact with a Java agent.
C. To display a view as HTML without using a Java applet.
D. To transform XML documents to HTML or even to another XML document.

Answer: D

Explanation:


QUESTION 5
To approve an expense report, Quy goes to a controlled-access section and marks the Status field
“Approved”. Status is a sign-enabled field. When is the signature attached?

A. Immediately
B. When the document is saved
C. When the document is mailed
D. When the document is encrypted

Answer: B

Explanation:

Click here to view complete Q&A of C2040-986 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best IBM C2040-986 Certification, IBM C2040-986 Training at certkingdom.com

C2040-951 IBM Lotus Notes Domino 8.5 Application Development Update

Test information:
Number of questions: 60
Time allowed in minutes: 90
Required passing score: 71%
Languages: English, Japanese

Exam 951: IBM Lotus Notes Domino 8.5 Application Development Update

Description: Covers Lotus Notes Domino 8.5 material as it relates to these competency areas:
Domino Designer in Eclipse
Programming Enhancements
Xpages in Domino Applications

Domino Designer in Eclipse
Understand and use new Designer features, including
Access design elements using the Applications Navigator
Access online Help via Eclipse plug-ins
Access the Script Editor
Arrange, show, and hide Eclipse views
Manage Working Sets
Understand purpose and use of the Controls Palette
Understand purpose and use of the Data Palette
Understand purpose and use of the Events view
Understand purpose and use of the Outline view
Understand purpose and use of the Problems view
Understand purpose and use of the Properties view
Understand benefits of the Eclipse platform
including built-in editors

Programming Enhancements
Understand purpose and use of new Designer features, including
Ability to enable enhanced HTML generation
Edit with DXL
JavaScript controls for display of rich text
Understand purpose and use of new LotusScript methods, including
NotesDocument.AttachVCard
NotesRichTextDocLink.RemoveLinkage
NotesSession.ResetUserPassword
NotesUIDocument.GetComponentViewPreference
NotesUIDocument.OnFocus
Understand purpose and use of new @Formula
@GetComponentViewPreference
Use new capabilities when designing with images
Create and use image resource sets
Use image placeholders

Xpages in Domino Applications
Design and develop using XPages, including
add styles
create and edit and use Theme resources
debug XPage programming issues
Other Controls
use Container Controls
use Core Controls
use custom controls
Leverage Global functions in Server-side scripting
getClientId
getComponent
Leverage Global objects in Server-side scripting
applicationScope
context
cookie
facesContext
header
param
requestScope
sessionScope
view
Understand purpose and features of XPages, including
available Container Controls
available Core Controls
available Other Controls
capabilities of Themes
distinction between Themes and CSS
extensible via custom controls
support for Styling using CSS
value of being Ajax-enabled
Use pre-programmed simple actions in Web applications, including
Change Document Mode
Confirm Action
Create Response Document
Delete Document
Delete Selected Documents
Execute Script
Modify Field
Open Page
Save Data Sources
Save Document
Set Value

Job Role Description / Target Audience
This certification is for experienced Domino 8 system administrators or system administrators new to Domino and who need to plan, install, set up, and manage Lotus Domino 8.5 servers and users, including configuring Domino Web servers. The IBM Certified Advanced System Administrator – Lotus Notes Domino 8.5 should be able to perform tasks associated with the IBM Certified System Administrator – Lotus Notes and Domino 8.5, and demonstrate knowledge of Domino Web server administration including configuring Web protocols (HTTP, LDAP, IMAP, and others), understanding HTTP rules and how they effect Web traffic, and configuring Internet certificates (SSL).

Recommended Prerequisite Skills
Domino and DB2 Integration
Installation and configuration
Mail and messaging
Management and maintenance
Management of servers
Defining Domino attributes
Understanding, configuring, and managing security

IBM Certified Application Developer – Lotus Notes and Domino 8.5
This certification is for experienced Notes Domino 8 application developers or application developers new to developing Domino applications and who will be using Domino Designer 8.5. In contrast with the associate application developer certification, this certification requires a deeper understanding of Lotus Notes and Domino architectural concepts and the use of complex functions and features, including Xpages.

Recommended Prerequisite Skills
build and modify single and multi-database applications
build Lotus Domino 8.5 applications that are Web-enabled
employ advanced formula techniques
employ methods for accessing data sources (Domino and non-Domino)
employ workflow functionality used to route documents
employ Xpages functionality
implement security requirements
use navigation elements such as links, outlines, pages and framesets


QUESTION 1
Darren is working with the Outline view on a new XPage. He drags a button control so that it is above an
edit box control. What effect does this have on the XPage in the Design editor?

A. The button control will move above and to the left of edit box control.
B. There will be no effect until Darren saves the Xpage, then the button control will move above and to the
left of edit box control.
C. There will be no effect until Darren clicks the Synchronize Navigator with Editor tab in the application
navigator, then the button control willmove above and to the left of edit box control.
D. There will be no effect until Darren clicks the Synchronize Navigator with Editor tab in the Outline view,
then the button control will moveabove and to the left of edit box control.

Answer: A


QUESTION 2
Abbas has imported the screen.css stylesheet into his application. He has discovered that he needs to
edit the properties of some of the classes in the CSS. What steps can he follow to make the needed
changes and save the CSS changes within the application?

A. From the application navigator in Designer, expand Resources and expand Style Sheets. Double-click
screen.css to use the built-in CSSeditor.
B. From the application navigator in Designer, expand Resources and expand Style Sheets. Click
screen.css and in the Outline view select aclass to use the built-in CSS editor.
C. From the application navigator in Designer, expand Resources and double-click Style Sheets. Select
screen.css in the Design pane. Fromthe Design tab of the Properties view, double-click a CSS class to
edit its properties.
D. From the application navigator in Designer, expand Resources and double-click Style Sheets. Select
screen.css in the Design pane. Fromthe Web Properties tab of the Properties view, double-click a CSS
class to edit its properties.

Answer: A


QUESTION 3
Janet uses Domino Designer’s Dynamic Help feature to clarify something. What kind of help will she get?

A. An animated, talking icon that offers to assist her.
B. A wizard that follows a support tree to narrow down the answer to her question.
C. A personalized search interface that remembers all of her previous searches and their results.
D. A context-sensitive help view that constantly updates a list of possible relevant topics based on what
she’s doing.

Answer: D


QUESTION 4
Joshua would like to have a cookie set on his Movie Rental XPage before it loads on the browser. Which
view would Joshua use to add this functionality?

A. Events view
B. Controls view
C. Properties view
D. Applications view

Answer: A


QUESTION 5
Carlos added an edit box control to his registration XPage. He wants to make the field a required field with
a message displaying to the user if the field is left blank. Where would he add these additional features to
the edit box control?

A. Editor
B. Events view
C. Properties view
D. Controls palette

Answer: C

Click here to view complete Q&A of C2040-951 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best IBM C2040-951 Certification, IBM C2040-951 Training at certkingdom.com

C2040-926 Managing and Maintaining IBM Lotus Notes and Domino 8.5 Environments

Lotus certification has restructured the ND8.5 certification paths. For more information, please check out the announcement on the Lotus Certification index page.

Test information:
Number of questions: 73
Time allowed in minutes: 90
Required passing score: 72%
Languages: English, Japanese

Exam 926: Managing and Maintaining IBM Lotus Notes and Domino 8.5 Environments

Description: Covers Lotus Notes Domino 8.5 material as it relates to these competency areas:
Defining and Managing Policies
Install and Configure
Mail
Manage and Maintain
Managing Servers
Platform Support
Security

Defining and Managing Policies
Configuring client policies
Desktop policy
Implementing Policy controls on signed code
Utilizing the How To Apply policy setting

Install and Configure
Backing up DAOS
Binding ports and Internet Services
Building and viewing Replication Topologies
Configuring Automatic Diagnostic Collection
for clients
for servers
Configuring Domain Searching
Configuring Domino Domain Monitoring (DDM)
collection hierarchy
probes
Configuring Domino services
Configuring Event Handler Notifications
Configuring Lotus iNotes
Configuring Ports
Configuring Server Fast Restart
Configuring Smart Upgrade
kits
server failover
Smart Upgrade Governor
Tracking Reports
Configuring the Domino Console and binder
Configuring the Fault Analyzer
Configuring the Server Health Monitor
Creating a desktop locking policy
Creating an ID Vault
Creating Internet Site Documents
Creating Policies
Deploying a centrally managed Widget Catalog
Deploying Lotus Symphony to users
Employing Configuration Tuner for DAOS
Employing DAOS estimator
Employing Transaction Logging for DAOS
Implement database design compression
Implement database on demand collations
Implement database redirection
Implement new agent manager features
Implement Sametime for Lotus iNotes
Implementing Domino Attachment and Object Service (DAOS)
Implementing Domino Configuration Tuner
Implementing Domino Roaming for Standard Clients
Implementing Early Authentication
Registration
Domains
Servers
Users
Understand Domino Domain Monitoring (DDM)
event classes
probe types
Understand the Server Health Monitor
Understanding Installation Package Options
Understanding Server Installation Order (platform independent)
Understanding the Certification Log
Understanding the client Update Manager
Understanding the differences between the Standard and Basic Notes clients
Understanding Websphere Portal integration enhancements
Utilizing Response Files for Server Installations
Utilizing the client install manifest
Utilizing the client reconfiguration wizard

Mail
Configure DNS whitelists on the Domino server
Configure private blacklists on the Domino server
Configure private whitelists on the Notes client
Configure public blacklists on the Domino server
Configure public whitelists on the Domino server
Configuring Calendar Cleanup in the Notes client
Configuring connection error limits
Configuring mail delivery delay reports
Configuring Mail Tracking
Configuring Server Based Mail Rules
Creating Mail Topologies
Enable/Disable message disclaimers from Domino server
Enabling TNEF conversion
Implementing Mail Services
IMAP
iNotes
POP3
Issuing server commands
Stopping the processing of mail rules
Understanding ambiguous name rejections
Understanding Mail Threads
Understanding new Out of Office service types
Working with Recent Contacts utilization/management

Manage and Maintain
Analyzing Activity Trends
Analyzing Server crash files
Changing Port Configurations
Configuring Critical Request scheduling
Configuring Domino Domain Monitoring (DDM) probe schedules
Configuring Server Auxiliary Ports
Implementing Console Log Mirroring
Implementing Image Compression
Implementing Lotus Traveler Policies
Integrating Domino and IBM CommonStore Archive Services
Integrating Domino and the Tivoli Enterprise Console
Manage files and disk space
Managing Groups
Managing roaming users
Managing user desktops
Monitor server status
Releasing locked out users
Setting administrative preferences
Troubleshooting message disclaimers from Domino server
Understand Support for LDAP Attributes
Understanding Advanced Domino Server Tasks
Understanding Directory Services
Extended Directory Catalogs
Search Orders
Understanding Router Optimizations
Understanding Web Style Query
Using iNotes contacts synchronization
Using the Room and Resource Manager
Utilize admin process statistics
Utilizing Administration Process statistics
Utilizing Adminp Requests
Utilizing Automated Client Version Reporting
Utilizing Domino Attachment and Object Service (DAOS)
Utilizing Domino Configuration Tuner
Utilizing Domino server commands
Utilizing Notes Dynamic Client Configuration
Utilizing Save Window State
Utilizing Server Console Commands
Utilizing server serviceability enhancements
Utilizing Smart Upgrade Tracking Reports
Utilizing stronger encryption capabilities
Utilizing the Domino Administrator client
Utilizing the Widget Catalog
Utilizing Web Administration server bookmarks
Viewing server configuration documents
Web administration

Managing Servers
Configuring new Domino Domain Monitoring options
Implementing Domino Domain Monitoring probes
Understanding Domino Directory enhancements
Understanding streaming replication features
Utilizing Administration Process (Adminp) features

Platform Support
Defining Domino attributes
Program Documents
Replication
Server Documents
Server Tasks
Identify Lotus Domino databases

Security
Certificate Authority
Configuring
Creating the Database
Maintaining
Configuring Administrator Access rights
Configuring cross certification
Configuring ID file encryption
Configuring ID Recovery
Configuring key rollover
Configuring SSL on a server
Configuring the Access Control List (ACL)
Enforce a Consistent Access Control List
Maximum Internet name-and-password
Configuring the Certificate Authority (CA)
Configuring the Execution Control List (ECL)
Controlling Server Access
Deploying xPages Security
Employing mixed key environments
Encrypting network traffic
Implementing Internet password locking
Implementing LTPAToken2 for single sign-on
Implementing stronger key strengths
Implementing the ID Vault
Integrating Websphere and Domino with tokens
Managing encryption key lengths
Managing Shared Login
Managing the ID Vault
Managing XPages Security
Password Recovery
Restricting Server Access
Understanding changes in database encryption levels
Understanding new Java Security standards
Understanding public and private keys
Understanding the Execution Control List (ECL)
Using CA with the ID vault
Using the ID Vault
Utilizing the Access Control List (ACL) log
Utilizing the Certificate Authority (CA)
Certificate Revocation List (CRL)
Issued Certificate Lists (ICL)


QUESTION 1
Domino Domain Monitoring (DDM) allows for a central server to collect information from other
servers. What are servers called that the central server collects from?

A. Probe servers
B. Node servers
C. Event Servers
D. Collection servers

Answer: B

Explanation:


QUESTION 2
Lotus Notes Traveler server maintains a database with information pertaining to the cluster
replicas of the mail files which are being synchronized with a Lotus Notes Traveler client. The file
name of this database is which of the following?

A. travcldir.nsf
B. mduserdir.nsf
C. ntsclcache.nsf
D. lntravcache.ndk

Answer: C

Explanation:


QUESTION 3
Charlie is preparing an upgrade of the Notes clients and is testing the Smart Upgrade Tracking
feature. When he tries to manually initiate a Smart Upgrade he receives the error “File Does Not
Exist”. What could be the cause of this error?

A. A Desktop Policy is not configured
B. The id file is missing from the person document
C. The Smart Upgrade Tracking database is not named “Smart Upgrade Tracking”
D. The Smart Upgrade Tracking database name is incorrect in the Desktop Policy

Answer: D

Explanation:


QUESTION 4
Carl, the Domino administrator, wishes to migrate users to dynamic policies in his Domino
environment. Which of the following will occur when he completes this task?

A. Groups with each policy name are create and users are assigned to the new group policies
B. Users are added to policy documents and applied policies are removed from their person
document
C. Policies are added to the necessary person documents and document links are assigned to the
policy documents
D. Policies are removed from the users entirely until they reauthenticate and the new dynamic
policies are applied

Answer: B

Explanation:


QUESTION 5
After DAOS is enabled and functioning on your Domino server, which of the following occurs when
a recipient opens a document with an attachment that is in the DAOS repository?

A. Attachment icons display with a link icon over the attachment icon
B. Attachment icons display a doclink to the attachment stored in DAOS
C. Attachment icons display the same as it would on a server without DAOS enabled
D. Attachment icons do not show and they are replaced with text that describes the attachment
and is linked to the attachment

Answer: C

Explanation:

Click here to view complete Q&A of C2040-926 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best IBM C2040-926 Certification, IBM C2040-926 Training at certkingdom.com

C2040-922 Developing IBM Lotus Domino 8.5.2 Applications: Advanced XPage Design Exam

Test information:
Number of questions: 32
Time allowed in minutes: 60
Required passing score: 75%
Languages: English, Japanese

Note: There are 32 scored items and 1 unscored items.
Exam 922: Developing IBM Lotus Domino 8.5.2 Applications: Advanced XPage Design

Description: Covers advanced XPage design in IBM Lotus Domino 8.5.2 applications as it relates to these competency areas:
Building themes
Extending the data sources
Optimizing, troubleshooting and localization
Using advanced Dojo controls
Using Server-side JavaScript
Using XPages for mobile user interfaces
Working with Java

Building themes
Using/modifying themes to set control properties
Working with predefined CSS frameworks (themes)

Extending the data sources
Using relational data sources
Working with programmable data sources

Optimizing, troubleshooting and localization
Approaches to debugging XPages applications
Localizing XPages for other languages
Understanding optimization practices
Understanding the relationship between coding and performance

Using advanced Dojo controls
Adding dijits to your XPage
Parsing JSON
Understanding the Dojo toolkit
Understanding the functions/features of dijits
Using custom built Dojo controls

Using Server-side JavaScript
Calling Server-side JavaScript from Client-side JavaScript
Understand the benefits of using Server-side JavaScript
Using Server-side JavaScript libraries

Using XPages for mobile user interfaces
Integrating additional packages into Designer for Mobile Apps
Rendering elements dependent on user device
Understanding limitations inherent to mobile UIs

Working with Java
Extending the XPage application programming interface (API)
Understanding Java 2 Enterprise Edition (J2EE) and its relationship with XPages
Working with managed beans
Working with the Java perspective

IBM Certified Advanced System Administrator – Lotus Notes and Domino 8.5

Job Role Description / Target Audience
This certification is for experienced Domino 8 system administrators or system administrators new to Domino and who need to plan, install, set up, and manage Lotus Domino 8.5 servers and users, including configuring Domino Web servers. The IBM Certified Advanced System Administrator – Lotus Notes Domino 8.5 should be able to perform tasks associated with the IBM Certified System Administrator – Lotus Notes and Domino 8.5, and demonstrate knowledge of Domino Web server administration including configuring Web protocols (HTTP, LDAP, IMAP, and others), understanding HTTP rules and how they effect Web traffic, and configuring Internet certificates (SSL).

Recommended Prerequisite Skills
Domino and DB2 Integration
Installation and configuration
Mail and messaging
Management and maintenance
Management of servers
Defining Domino attributes
Understanding, configuring, and managing security
IBM Certified Advanced Application Developer – Lotus Notes and Domino 8.5
Job Role Description / Target Audience

This certification is for experienced Notes Domino 8.5 application developers who can demonstrate competency in building and maintaining Domino 8.5 applications with LotusScript, JavaScript, or Web Services, or can build and deploy composite applications with Notes Domino 8.5.

Recommended Prerequisite Skills
The IBM Certified Advanced Application Developer – Lotus Notes Domino 8.5 should be able to demonstrate the skills required to effectively build and maintain Domino 8.5 applications with the application of commensurate knowledge and skills in one of three areas : LotusScript, JavaScript, or Web Services or effectively build and deploy Composite Applications with Notes Domino 8.5.

LotusScript Knowledge and Skill Areas :
Programming Concepts
Application Architecture and Performance competencies
Back-end LotusScript Competencies
User Interface Competencies

JavaScript Knowledge and Skill Areas:
Core JavaScript Skills
Use JavaScipt in Documents and Forms
Use JavaScript in Navigation and the User Interface
Use JavaScript in Notes/Domino Input
Use JavaScript in Notes/Domino Processing and Validation
Use JavaScript in the Notes/Domino Environment

Web Services Knowledge and Skill Areas:
Web services design and architecture
Web services in Domino Designer
Role of WSDL file in a Web service
Role of SOAP in a Web service
Web services using LotusScript

Composite Applications Knowledge and Skill Areas:
Composite Applications design and architecture
Building Composite Applications for Lotus Notes
Deploying Composite Applications in Notes/Domino


QUESTION 1
Jo wants to make a configurable list of countries available to the client side JavaScript of her
XPage for use in various different fields on the web page. What would be the most efficient
approach?

A. Add an @DbColumn to a server side script library to look up the country list in each place it is required
B. Perform an AJAX request to get the country list from another XPage when it is required using dojo.xhrGet
C. Use the Output Script control to create a global Client Side JavaScript object to reference when the list is required
D. Add a @Decorum to a client side script library to look up the country list in each place it is required

Answer: C

Explanation:


QUESTION 2
Aaron has created an XPages application that has a couple of XPages to surface the same data to
two different application roles in two completely different user interfaces. Each role can manipulate
parts of the data, but in both cases, the data must adhere to the same business logic and rules.
What would be the best way for Aaron to implement the same business logic in each XPage?

A. Create a common Client-Side JavaScript Library for the XPages to share that the user interface
can use to execute the business logic
B. Use a series of Custom Controls to hold the business logic and share them amongst the XPages
C. Create a common Server-Side JavaScript Library for the XPages to share that the user
interface can use to execute the business logic
D. The user interface and the business logic in an XPage can not easily be separated and must be
maintained in each XPage

Answer: C

Explanation:


QUESTION 3
Elizabeth needs to parse the contents of a web page held on a remote server into an
applicationScope variable via the server side onclick event of a button using Server Side
JavaScript. How would she do this?

A. It is not possible to perform network operations from Server Side JavaScript
B. Create a new Java class to perform the operation in a Java Script Library and call it from the
onclick event of the button.
C. Create a new Java class to perform the operation in a Java Agent and call it from the onclick
event of the button.
D. Create a new Java class to perform the operation in the WebContent\WEB-INF\src folder via
the Package Explorer and call it from the onclick
event of the button.

Answer: D

Explanation:


QUESTION 4
Rick creates a Server-Side JavaScript library, and defines a few global variables at the beginning
of the library. The JavaScript in his XPage and in the JavaScript library modify those global
variables. The server the application runs on is heavily used, and the application settings are set
to Keep Pages on Disk for best scalability. When the application executes, what is likely to
happen?

A. The application will perform as expected.
B. The application will generate an error because you can not declare global Server-Side
JavaScript variables
C. The application will run, but the values of the globally defined variables may be lost when the
server’s JVM garbage collects variables, causing
unexpected results.
D. The application will run, but every partial or full refresh will reset the values of the global
variables when it reloads the Server-Side JavaScript library.

Answer: C

Explanation:

Click here to view complete Q&A of C2040-922 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best IBM C2040-922 Certification, IBM C2040-922 Training at certkingdom.com

200-125 CCNA Cisco Certified Network Associate Exam

Exam Number 200-125 CCNA
Associated Certifications CCNA Routing and Switching
Duration 90 Minutes (50-60 questions)
Available Languages English, Japanese

This exam tests a candidate’s knowledge and skills related to network fundamentals, LAN switching technologies, IPv4 and IPv6 routing technologies, WAN technologies, infrastructure services, infrastructure security, and infrastructure management.

The Cisco Certified Network Associate (CCNA) Routing and Switching composite exam (200-125) is a 90-minute, 50–60 question assessment that is associated with the CCNA Routing and Switching certification. This exam tests a candidate’s knowledge and skills related to network fundamentals, LAN switching technologies, IPv4 and IPv6 routing technologies, WAN technologies, infrastructure services, infrastructure security, and infrastructure management.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

Subscribe to Cisco Learning Network Premium and access the most comprehensive e-learning training, resources and tools you’ll need to prepare for your CCENT, CCNA and CCNP Routing and Switching certifications.

1.0 Network Fundamentals 15%

1.1 Compare and contrast OSI and TCP/IP models

1.2 Compare and contrast TCP and UDP protocols

1.3 Describe the impact of infrastructure components in an enterprise network

1.3.a Firewalls
1.3.b Access points
1.3.c Wireless controllers

1.4 Describe the effects of cloud resources on enterprise network architecture

1.4.a Traffic path to internal and external cloud services
1.4.b Virtual services
1.4.c Basic virtual network infrastructure

1.5 Compare and contrast collapsed core and three-tier architectures

1.6 Compare and contrast network topologies

1.6.a Star
1.6.b Mesh
1.6.c Hybrid

1.7 Select the appropriate cabling type based on implementation requirements

1.8 Apply troubleshooting methodologies to resolve problems

1.8.a Perform and document fault isolation
1.8.b Resolve or escalate
1.8.c Verify and monitor resolution

1.9 Configure, verify, and troubleshoot IPv4 addressing and subnetting

1.10 Compare and contrast IPv4 address types

1.10.a Unicast
1.10.b Broadcast
1.10.c Multicast

1.11 Describe the need for private IPv4 addressing

1.12 Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in a LAN/WAN environment

1.13 Configure, verify, and troubleshoot IPv6 addressing

1.14 Configure and verify IPv6 Stateless Address Auto Configuration

1.15 Compare and contrast IPv6 address types

1.15.a Global unicast
1.15.b Unique local
1.15.c Link local
1.15.d Multicast
1.15.e Modified EUI 64
1.15.f Autoconfiguration
1.15.g Anycast

2.0 LAN Switching Technologies 21%

2.1 Describe and verify switching concepts

2.1.a MAC learning and aging
2.1.b Frame switching
2.1.c Frame flooding
2.1.d MAC address table

2.2 Interpret Ethernet frame format

2.3 Troubleshoot interface and cable issues (collisions, errors, duplex, speed)

2.4 Configure, verify, and troubleshoot VLANs (normal/extended range) spanning multiple switches

2.4.a Access ports (data and voice)
2.4.b Default VLAN

2.5 Configure, verify, and troubleshoot interswitch connectivity

2.5.a Trunk ports
2.5.b Add and remove VLANs on a trunk
2.5.c DTP, VTP (v1&v2), and 802.1Q
2.5.d Native VLAN

2.6 Configure, verify, and troubleshoot STP protocols

2.6.a STP mode (PVST+ and RPVST+)
2.6.b STP root bridge selection

2.7 Configure, verify and troubleshoot STP related optional features

2.7.a PortFast
2.7.b BPDU guard

2.8 Configure and verify Layer 2 protocols

2.8.a Cisco Discovery Protocol
2.8.b LLDP

2.9 Configure, verify, and troubleshoot (Layer 2/Layer 3) EtherChannel

2.9.a Static
2.9.b PAGP
2.9.c LACP

2.10 Describe the benefits of switch stacking and chassis aggregation

3.0 Routing Technologies 23%

3.1 Describe the routing concepts

3.1.a Packet handling along the path through a network
3.1.b Forwarding decision based on route lookup
3.1.c Frame rewrite

3.2 Interpret the components of a routing table

3.2.a Prefix
3.2.b Network mask
3.2.c Next hop
3.2.d Routing protocol code
3.2.e Administrative distance
3.2.f Metric
3.2.g Gateway of last resort

3.3 Describe how a routing table is populated by different routing information sources

3.3.a Admin distance

3.4 Configure, verify, and troubleshoot inter-VLAN routing

3.4.a Router on a stick
3.4.b SVI

3.5 Compare and contrast static routing and dynamic routing

3.6 Compare and contrast distance vector and link state routing protocols

3.7 Compare and contrast interior and exterior routing protocols

3.8 Configure, verify, and troubleshoot IPv4 and IPv6 static routing

3.8.a Default route
3.8.b Network route
3.8.c Host route
3.8.d Floating static

3.9 Configure, verify, and troubleshoot single area and multi-area OSPFv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs)

3.10 Configure, verify, and troubleshoot single area and multi-area OSPFv3 for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub, virtual-link, and LSAs)

3.11 Configure, verify, and troubleshoot EIGRP for IPv4 (excluding authentication, filtering, manual summarization, redistribution, stub)

3.12 Configure, verify, and troubleshoot EIGRP for IPv6 (excluding authentication, filtering, manual summarization, redistribution, stub)

3.13 Configure, verify, and troubleshoot RIPv2 for IPv4 (excluding authentication, filtering, manual summarization, redistribution)

3.14 Troubleshoot basic Layer 3 end-to-end connectivity issues

4.0 WAN Technologies 10%

4.1 Configure and verify PPP and MLPPP on WAN interfaces using local authentication

4.2 Configure, verify, and troubleshoot PPPoE client-side interfaces using local authentication

4.3 Configure, verify, and troubleshoot GRE tunnel connectivity

4.4 Describe WAN topology options

4.4.a Point-to-point
4.4.b Hub and spoke
4.4.c Full mesh
4.4.d Single vs dual-homed

4.5 Describe WAN access connectivity options

4.5.a MPLS
4.5.b Metro Ethernet
4.5.c Broadband PPPoE
4.5.d Internet VPN (DMVPN, site-to-site VPN, client VPN)

4.6 Configure and verify single-homed branch connectivity using eBGP IPv4 (limited to peering and route advertisement using Network command only)

4.7 Describe basic QoS concepts

4.7.a Marking
4.7.b Device trust
4.7.c Prioritization
4.7.c. [i] Voice
4.7.c. [ii] Video
4.7.c. [iii] Data
4.7.d Shaping
4.7.e Policing
4.7.f Congestion management

5.0 Infrastructure Services 10%

5.1 Describe DNS lookup operation

5.2 Troubleshoot client connectivity issues involving DNS

5.3 Configure and verify DHCP on a router (excluding static reservations)

5.3.a Server
5.3.b Relay
5.3.c Client
5.3.d TFTP, DNS, and gateway options

5.4 Troubleshoot client- and router-based DHCP connectivity issues

5.5 Configure, verify, and troubleshoot basic HSRP

5.5.a Priority
5.5.b Preemption
5.5.c Version

5.6 Configure, verify, and troubleshoot inside source NAT

5.6.a Static
5.6.b Pool
5.6.c PAT

5.7 Configure and verify NTP operating in a client/server mode

6.0 Infrastructure Security 11%

6.1 Configure, verify, and troubleshoot port security

6.1.a Static
6.1.b Dynamic
6.1.c Sticky
6.1.d Max MAC addresses
6.1.e Violation actions
6.1.f Err-disable recovery

6.2 Describe common access layer threat mitigation techniques

6.2.a 802.1x
6.2.b DHCP snooping
6.2.c Nondefault native VLAN

6.3 Configure, verify, and troubleshoot IPv4 and IPv6 access list for traffic filtering

6.3.a Standard
6.3.b Extended
6.3.c Named

6.4 Verify ACLs using the APIC-EM Path Trace ACL analysis tool

6.5 Configure, verify, and troubleshoot basic device hardening

6.5.a Local authentication
6.5.b Secure password
6.5.c Access to device
6.5.c. [i] Source address
6.5.c. [ii] Telnet/SSH
6.5.d Login banner

6.6 Describe device security using AAA with TACACS+ and RADIUS

7.0 Infrastructure Management 10%

7.1 Configure and verify device-monitoring protocols

7.1.a SNMPv2
7.1.b SNMPv3
7.1.c Syslog

7.2 Troubleshoot network connectivity issues using ICMP echo-based IP SLA

7.3 Configure and verify device management

7.3.a Backup and restore device configuration
7.3.b Using Cisco Discovery Protocol or LLDP for device discovery
7.3.c Licensing
7.3.d Logging
7.3.e Timezone
7.3.f Loopback

7.4 Configure and verify initial device configuration

7.5 Perform device maintenance

7.5.a Cisco IOS upgrades and recovery (SCP, FTP, TFTP, and MD5 verify)
7.5.b Password recovery and configuration register
7.5.c File system management

7.6 Use Cisco IOS tools to troubleshoot and resolve problems

7.6.a Ping and traceroute with extended option
7.6.b Terminal monitor
7.6.c Log events
7.6.d Local SPAN

7.7 Describe network programmability in enterprise network architecture

7.7.a Function of a controller
7.7.b Separation of control plane and data plane
7.7.c Northbound and southbound APIs
QUESTION: No: 1
Which layer in the OSI reference model is responsible for determining the availability of the receMng
program and checking to see if enough resources exist for that communication?

A. transport
B. network
C. presentation
D. session
E. application

Answer: E


QUESTION: No: 2
Which of the following describes the roles of devices in a WAN? (Choose three.)

A. A CSU/DSU terminates a digital local loop.
B. A modem terminates a digital local loop.
C. A CSU/DSU terminates an analog local loop.
D. A modem terminates an analog local loop.
E. A router is commonly considered a DTE device.
F. A router is commonly considered a DCE device.

Answer: A, D, E


QUESTION: No: 3
A network interface port has collision detection and carrier sensing enabled on a shared twisted pair
network. From this statement, what is known about the network interface port?

A. This is a 10 Mb/s switch port.
B. This is a 100 Mb/s switch port.
C. This is an Ethernet port operating at half duplex.
D. This is an Ethernet port operating at full duplex.
E. This is a port on a network interface card in a PC.

Answer: C


QUESTION: No: 4
A receMng host computes the checksum on a frame and determines that the frame is damaged. The
frame is then discarded. At which OSI layer did this happen?

A. session
B. transport
C. network
D. data link
E. physical

Answer: D


QUESTION: No: 5
Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two.)

A. The transport layer dMdes a data stream into segments and may add reliability and flow control
information.
B. The data link layer adds physical source and destination addresses and an FCS to the segment.
C. Packets are created when the network layer encapsulates a frame with source and destination host
addresses and protocol-related control information.
D. Packets are created when the network layer adds Layer 3 addresses and control information to a
segment.
E. The presentation layer translates bits into voltages for transmission across the physical link.

Answer: A, D

Click here to view complete Q&A of 200-125 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Cisco 200-125 Certification, Cisco 200-125 Training at certkingdom.com

400-251 CCIE Security

Exam Number 400-251 CCIE Security
Associated Certifications CCIE Security
Duration 120 minutes (90 – 110 questions)
Available Languages English

The written exam validates experts who have the knowledge and skills to architect, engineer, implement, troubleshoot, and support the full suite of Cisco security technologies and solutions using the latest industry best practices to secure systems and environments against modern security risks, threats, vulnerabilities, and requirements.

Topics include network functionality and security-related concepts and best practices, as well as Cisco network security products, solutions, and technologies in areas such as next generation intrusion prevention, next generation firewalls, identity services, policy management, device hardening, and malware protection.

The written exam utilizes the unified exam topics which includes emerging technologies, such as Cloud, Network Programmability (SDN), and Internet of Things (IoT).

The CCIE Security Version 5.0 exam unifies written and lab exam topics documents into a unique curriculum, while explicitly disclosing which domains pertain to which exam, and the relative weight of each domain.

The Cisco CCIE Security Written Exam (400-251) version 5.0 is a two-hour test with 90–110 questions that validate professionals who have the expertise to describe, design, implement, operate, and troubleshoot complex security technologies and solutions. Candidates must understand the requirements of network security, how different components interoperate, and translate it into the device configurations. The exam is closed book and no outside reference materials are allowed.

The Cisco CCIE Security Lab Exam version 5.0 is an eight-hour, hands-on exam that requires a candidate to plan, design, implement, operate, and troubleshoot complex security scenarios for a given specification. Knowledge of troubleshooting is an important skill and candidates are expected to diagnose and solve issues as part of the CCIE lab exam.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

1.0 Perimeter Security and Intrusion Prevention 21%

1.1 Describe, implement, and troubleshoot HA features on Cisco ASA and Cisco FirePOWER Threat Defense (FTD)

1.2 Describe, implement, and troubleshoot clustering on Cisco ASA and Cisco FTD

1.3 Describe, implement, troubleshoot, and secure routing protocols on Cisco ASA and Cisco FTD

1.4 Describe, implement, and troubleshoot different deployment modes such as routed, transparent, single, and multicontext on Cisco ASA and Cisco FTD

1.5 Describe, implement, and troubleshoot firewall features such as NAT (v4,v6), PAT, application inspection, traffic zones, policy-based routing, traffic redirection to service modules, and identity firewall on Cisco ASA and Cisco FTD

1.6 Describe, implement, and troubleshoot IOS security features such as Zone-Based Firewall (ZBF), application layer inspection, NAT (v4,v6), PAT and TCP intercept on Cisco IOS/IOS-XE

1.7 Describe, implement, optimize, and troubleshoot policies and rules for traffic control on Cisco ASA, Cisco FirePOWER and Cisco FTD

1.8 Describe, implement, and troubleshoot Cisco Firepower Management Center (FMC) features such as alerting, logging, and reporting

1.9 Describe, implement, and troubleshoot correlation and remediation rules on Cisco FMC

1.10 Describe, implement, and troubleshoot Cisco FirePOWER and Cisco FTD deployment such as in-line, passive, and TAP modes

1.11 Describe, implement, and troubleshoot Next Generation Firewall (NGFW) features such as SSL inspection, user identity, geolocation, and AVC (Firepower appliance)

1.12 Describe, detect, and mitigate common types of attacks such as DoS/DDoS, evasion techniques, spoofing, man-in-the-middle, and botnet

2.0 Advanced Threat Protection and Content Security 17%

2.1 Compare and contrast different AMP solutions including public and private cloud deployment models

2.2 Describe, implement, and troubleshoot AMP for networks, AMP for endpoints, and AMP for content security (CWS, ESA, and WSA)

2.3 Detect, analyze, and mitigate malware incidents

2.4 Describe the benefit of threat intelligence provided by AMP Threat GRID

2.5 Perform packet capture and analysis using Wireshark, tcpdump, SPAN, and RSPAN

2.6 Describe, implement, and troubleshoot web filtering, user identification, and Application Visibility and Control (AVC)

2.7 Describe, implement, and troubleshoot mail policies, DLP, email quarantines, and SenderBase on ESA

2.8 Describe, implement, and troubleshoot SMTP authentication such as SPF and DKIM on ESA

2.9 Describe, implement, and troubleshoot SMTP encryption on ESA

2.10 Compare and contrast different LDAP query types on ESA

2.11 Describe, implement, and troubleshoot WCCP redirection

2.12 Compare and contrast different proxy methods such as SOCKS, Auto proxy/WPAD, and transparent

2.13 Describe, implement, and troubleshoot HTTPS decryption and DLP

2.14 Describe, implement, and troubleshoot CWS connectors on Cisco IOS routers, Cisco ASA, Cisco AnyConnect, and WSA

2.15 Describe the security benefits of leveraging the OpenDNS solution.

2.16 Describe, implement, and troubleshoot SMA for centralized content security management

2.17 Describe the security benefits of leveraging Lancope

3.0 Secure Connectivity and Segmentation 17%

3.1 Compare and contrast cryptographic and hash algorithms such as AES, DES, 3DES, ECC, SHA, and MD5

3.2 Compare and contrast security protocols such as ISAKMP/IKEv1, IKEv2, SSL, TLS/DTLS, ESP, AH, SAP, and MKA

3.3 Describe, implementc and troubleshoot remote access VPN using technologies such as FLEXVPN, SSL-VPN between Cisco firewalls, routers, and end hosts

3.4 Describe, implement, and troubleshoot the Cisco IOS CA for VPN authentication

3.5 Describe, implement, and troubleshoot clientless SSL VPN technologies with DAP and smart tunnels on Cisco ASA and Cisco FTD

3.6 Describe, implement, and troubleshoot site-to-site VPNs such as GETVPN, DMVPN and IPsec

3.7 Describe, implement, and troubleshoot uplink and downlink MACsec (802.1AE)

3.8 Describe, implement, and troubleshoot VPN high availability using Cisco ASA VPN clustering and dual-hub DMVPN deployments

3.9 Describe the functions and security implications of cryptographic protocols such as AES, DES, 3DES, ECC, SHA, MD5, ISAKMP/IKEv1, IKEv2, SSL, TLS/DTLS, ESP, AH, SAP, MKA, RSA, SCEP/EST, GDOI, X.509, WPA, WPA2, WEP, and TKIP

3.10 Describe the security benefits of network segmentation and isolation

3.11 Describe, implement, and troubleshoot VRF-Lite and VRF-Aware VPN

3.12 Describe, implement, and troubleshoot microsegmentation with TrustSec using SGT and SXP

3.13 Describe, implement, and troubleshoot infrastructure segmentation methods such as VLAN, PVLAN, and GRE

3.14 Describe the functionality of Cisco VSG used to secure virtual environments

3.15 Describe the security benefits of data center segmentation using ACI, EVPN, VXLAN, and NVGRE

4.0 Identity Management, Information Exchange, and Access Control 22%

4.1 Describe, implement, and troubleshoot various personas of ISE in a multinode deployment

4.2 Describe, implement, and troubleshoot network access device (NAD), ISE, and ACS configuration for AAA

4.3 Describe, implement, and troubleshoot AAA for administrative access to Cisco network devices using ISE and ACS

4.4 Describe, implement, verify, and troubleshoot AAA for network access with 802.1X and MAB using ISE.

4.5 Describe, implement, verify, and troubleshoot cut-through proxy/auth-proxy using ISE as the AAA server

4.6 Describe, implement, verify, and troubleshoot guest life cycle management using ISE and Cisco network infrastructure

4.7 Describe, implement, verify, and troubleshoot BYOD on-boarding and network access flows with an internal or external CA

4.8 Describe, implement, verify, and troubleshoot ISE and ACS integration with external identity sources such as LDAP, AD, and external RADIUS

4.9 Describe ISE and ACS integration with external identity sources such as RADIUS Token, RSA SecurID, and SAML

4.10 Describe, implement, verify, and troubleshoot provisioning of AnyConnect with ISE and ASA

4.11 Describe, implement, verify, and troubleshoot posture assessment with ISE

4.12 Describe, implement, verify, and troubleshoot endpoint profiling using ISE and Cisco network infrastructure including device sensor

4.13 Describe, implement, verify, and troubleshoot integration of MDM with ISE

4.14 Describe, implement, verify, and troubleshoot certificate based authentication using ISE

4.15 Describe, implement, verify, and troubleshoot authentication methods such as EAP Chaining and Machine Access Restriction (MAR)

4.16 Describe the functions and security implications of AAA protocols such as RADIUS, TACACS+, LDAP/LDAPS, EAP (EAP-PEAP, EAP-TLS, EAP-TTLS, EAP-FAST, EAP-TEAP, EAP- MD5, EAP-GTC), PAP, CHAP, and MS-CHAPv2

4.17 Describe, implement, and troubleshoot identity mapping on ASA, ISE, WSA and FirePOWER

4.18 Describe, implement, and troubleshoot pxGrid between security devices such as WSA, ISE, and Cisco FMC

5.0 Infrastructure Security, Virtualization, and Automation 13%

5.1 Identify common attacks such as Smurf, VLAN hopping, and SYNful knock, and their mitigation techniques

5.2 Describe, implement, and troubleshoot device hardening techniques and control plane protection methods, such as CoPP and IP Source routing.

5.3 Describe, implement, and troubleshoot management plane protection techniques such as CPU and memory thresholding and securing device access

5.4 Describe, implement, and troubleshoot data plane protection techniques such as iACLs, uRPF, QoS, and RTBH

5.5 Describe, implement, and troubleshoot IPv4/v6 routing protocols security

5.6 Describe, implement, and troubleshoot Layer 2 security techniques such as DAI, IPDT, STP security, port security, DHCP snooping, and VACL

5.7 Describe, implement, and troubleshoot wireless security technologies such as WPA, WPA2, TKIP, and AES

5.8 Describe wireless security concepts such as FLEX Connect, wIPS, ANCHOR, Rogue AP, and Management Frame Protection (MFP)

5.9 Describe, implement, and troubleshoot monitoring protocols such as NETFLOW/IPFIX, SNMP, SYSLOG, RMON, NSEL, and eSTREAMER

5.10 Describe the functions and security implications of application protocols such as SSH, TELNET, TFTP, HTTP/HTTPS, SCP, SFTP/FTP, PGP, DNS/DNSSEC, NTP, and DHCP

5.11 Describe the functions and security implications of network protocols such as VTP, 802.1Q, TCP/UDP, CDP, LACP/PAgP, BGP, EIGRP, OSPF/OSPFv3, RIP/RIPng, IGMP/CGMP, PIM, IPv6, and WCCP

5.12 Describe the benefits of virtualizing security functions in the data center using ASAv, WSAv, ESAv, and NGIPSv

5.13 Describe the security principles of ACI such as object models, endpoint groups, policy enforcement, application network profiles, and contracts

5.14 Describe the northbound and southbound APIs of SDN controllers such as APIC-EM

5.15 Identify and implement security features to comply with organizational security policies, procedures, and standards such as BCP 38, ISO 27001, RFC 2827, and PCI-DSS

5.16 Describe and identify key threats to different places in the network (campus, data center, core, edge) as described in Cisco SAFE

5.17 Validate network security design for adherence to Cisco SAFE recommended practices

5.18 Interpret basic scripts that can retrieve and send data using RESTful API calls in scripting languages such as Python

5.19 Describe Cisco Digital Network Architecture (DNA) principles and components.

6.0 Evolving Technologies 10%

6.1 Cloud

6.1.a Compare and contrast Cloud deployment models
6.1.a [i] Infrastructure, platform, and software services (XaaS)
6.1.a [ii] Performance and reliability
6.1.a [iii] Security and privacy
6.1.a [iv] Scalability and interoperability
6.1.b Describe Cloud implementations and operations
6.1.b [i] Automation and orchestration
6.1.b [ii] Workload mobility
6.1.b [iii] Troubleshooting and management
6.1.b [iv] OpenStack components

6.2 Network Programmability (SDN)

6.2.a Describe functional elements of network programmability (SDN) and how they interact
6.2.a [i] Controllers
6.2.a [ii] APIs
6.2.a [iii] Scripting
6.2.a [iv] Agents
6.2.a [v] Northbound vs. Southbound protocols
6.2.b Describe aspects of virtualization and automation in network environments
6.2.b [i] DevOps methodologies, tools and workflows
6.2.b [ii] Network/application function virtualization (NFV, AFV)
6.2.b [iii] Service function chaining
6.2.b [iv] Performance, availability, and scaling considerations

6.3 Internet of Things (IoT)

6.3.a Describe architectural framework and deployment considerations for Internet of Things
6.3.a [i] Performance, reliability and scalability
6.3.a [ii] Mobility
6.3.a [iii] Security and privacy
6.3.a [iv] Standards and compliance
6.3.a [v] Migration
6.3.a [vi] Environmental impacts on the network

QUESTION: No: 2
According IS027001 ISIVIS, which of the following are mandatory documents? (Choose 4)

A. ISNIS Policy
B. Corrective Action Procedure
C. IS Procedures
D. Risk Assessment Reports
E. Complete Inventory of all information assets

Answer: A, B, C, D


QUESTION: No: 3
Which two statements describe the Cisco TrustSec system correctly? (Choose two.)

A. The Cisco TrustSec system is a partner program, where Cisco certifies third-party security products as
extensions to the secure infrastructure.
B. The Cisco TrustSec system is an approach to certifying multimedia and collaboration applications as secure.
C. The Cisco TrustSec system is an Advanced Network Access Control System that leverages
enforcement intelligence in the network infrastructure.
D. The Cisco TrustSec system tests and certifies all products and product versions that make up the
system as working together in a validated manner.

Answer: C, D


QUESTION: No: 4
Which three attributes may be configured as part of the Common Tasks panel of an authorization profile in
the Cisco ISE solution? (Choose three.)

A. VLAN
B. voice VLAN
C. dACL name
D. voice domain permission
E. SGT

Answer: A, C, D


QUESTION: No: 5
Which three statements about Cisco Flexible NetFIow are true? (Choose three.)

A. The packet information used to create flows is not configurable by the user.
B. It supports IPv4 and IPv6 packet fields.
C. It tracks all fields of an IPv4 header as well as sections of the data payload.
D. It uses two types of flow cache, normal and permanent.
E. It can be a useful tool in monitoring the network for attacks.

Answer: B, C, E


QUESTION: No: 6
Which three statements are true regarding RFC 5176 (Change of Authorization)? (Choose three.)

A. It defines a mechanism to allow a RADIUS server to initiate a communication inbound to a NAO.
B. It defines a wide variety of authorization actions, including “reauthenticate.”
C. It defines the format for a Change of Authorization packet.
D. It defines a DIVI.
E. It specifies that TCP port 3799 be used for transport of Change of Authorization packets.

Answer: A, C, D

Click here to view complete Q&A of 400-251 exam
Certkingdom Review

MCTS Training, MCITP Trainnig

Best Cisco 400-251 Certification, Cisco 400-251 Training at certkingdom.com