IT업계에 종사하는 분이 점점 많아지고 있는 지금 IT인증자격증은 필수품으로 되었습니다. IT인사들의 부담을 덜어드리기 위해 Pass4Test는 IBM certifications I 000-289인증시험에 대비한 고품질 덤프를 연구제작하였습니다. IBM certifications I 000-289시험을 준비하려면 많은 정력을 기울여야 하는데 회사의 야근에 시달리면서 시험공부까지 하려면 스트레스가 이만저만이 아니겠죠. Pass4Test 덤프를 구매하시면 이제 그런 고민은 끝입니다. 덤프에 있는 내용만 공부하시면 IT인증자격증 취득은 한방에 가능합니다.
NO.1 A company is attempting to consolidate the XML processing requirements of multiple applications. One
issue is thatthe URLs being used to fetch the XML documents for transformation contain an old
application and servlet identifier.These must be replaced with a new consolidated application value of bc
Which technique will change a URL such as http://uri1/uri2/uri3, to http://uri1/abc ?
A. A URL-Rewrite Action with a type of eader-rewrite
B. A URL-Rewrite Action with a type of ost-body
C. A URL-Rewrite Rule with a type of bsolute-rewrite
D. A URL-Rewrite Rule with a type of ontent-type
Answer: C
NO.2 A DataPower service is configured to communicate with a backend application server via HTTP on
TCP Port 80. The device's System Logs indicate that the service cannot connect to the backend
application server (Unable to establish backside connection). What tool should be used to verify
connectivity to the backend application server?
A. MultiStep Probe
B. TCP Connection Test
C. Packet Capture
D. Ping Remote
Answer: B
NO.3 A company is having problems with their production WS-Proxy. SOAP requests are being sent to a
back end Web service, where they fail schema validation. The WS-Proxy is deployed in its own domain
on a shared SOA appliance, and the administrator of that domain only has access to that domain. The
administrator suspects that a transparent network proxy is mangling incoming requests, but the SOA
appliance is being blamed for the application behaving incorrectly. The development team has given the
administrator a copy of the SOAP request which the Web service client is sending to the appliance. How
could the administrator simply demonstrate that the appliance is not at fault?
A. Submit the SOAP request using cURL from a different machine to the Web service client, connecting
directly to the DataPower Appliance and bypassing the proxy.
B. Use the probe to view the incoming SOAP request and compare it to the SOAP request supplied by the
development team.
C. Use the CP connection test facility to confirm that the Network Proxy is in the TCP connection path.
D. Paste the SOAP request into the end a Test Message facility to submit the Web service request locally.
E. Collect a packet capture on the SOA appliance to view the incoming SOAP request and compare it to
the SOAP
request supplied by the development team.
Answer: D
NO.4 A consultant is engaged with an existing customer for a project that requires the deployment of 4 new
XS40s to an existing pool of 5 XI50s. The customer is using basic security functionality, so the sales team
offered the XS40s to close the deal. In order to keep all the devices in sync with the implementation, the
customer provides a domain configuration export from one of the existing XI50s. After importing the
domain to one of the new XS40s, the error log shows the information in the exhibit. Why did this happen?
A. Configurations from XI50s are never portable to the XS40s.
B. The error report was a legacy from the original device and can be ignored.
C. The configuration provided for the XS40 is using exclusive XI50 features.
D. A Queue Manager object must be configured in the Default Domain.
Answer: C
NO.5 An XSL Proxy is configured in loopback mode with a single request rule containing a 'validate' step
followed by an'identity transform' (xform store://identity.xsl) where the input context of the transform is set
to INPUT. If a message issent via HTTP POST to this XSL Proxy that correctly conforms to the XML
Schema referenced in the 'validate' step,what will be returned to the requestor as the response
document?
A. A copy of the request document
B. An empty response document
C. A W3C XML Schema conformance document
D. A schema profile document
Answer: A
NO.6 A company has been testing an XML Firewall using the MultiStep Probe. What will the xport Capture
feature of the Probe provide?
A. An export of Input data to the Firewall.
B. An export of the XML Firewall configuration.
C. An export of the XML Firewall configuration and an export of all transactions currently available in the
probe. Input data to the Firewall will be, in most cases, extracted and stored in the local: directory.
D. An export of the XML Firewall configuration and an export of all transactions currently available in the
probe. Input data to the Firewall will be, in most cases, extracted and stored in the temporary: directory.
E. An export of the XML Firewall configuration and an export of all transactions currently available in the
probe. Input
data to the Firewall may be, in most cases, extracted from the INPUT context of the request transactions.
Answer: E
This document was created with Win2PDF available at http://www.win2pdf.com.
The unregistered version of Win2PDF is for evaluation or non-commercial use only.
This page will not be added after purchasing Win2PDF.
NO.7 Which three statements are true about the product's network Packet Capture troubleshooting facility?
A. Packet Capture files are stored on the device's 'temporary:' directory.
B. Packet Captures must be started from the 'default' Application Domain.
C. Packet Capture works by placing the specified Ethernet interface in Promiscuous Mode, thereby
capturing all traffic appearing on the Ethernet segment to which the interface is attached.
D. A Packet Capture runs until the 'Maximum Duration' time has expired and keeps the last "Maximum
Size" kilobytes of capture data.
E. The device's Packet Capture files are in 'pcap' format and are readable by any 'pcap' compliant
application, such as
'tcpdump' or 'ethereal/wireshark'.
F. Clicking the "Stop Packet Capture" button causes the packet capture to terminate immediately and the
capture data is
discarded.
Answer: ABE
NO.8 You have created an XSL Proxy in Proxy Mode, with a static backend. You have a client to server
StylePolicy Rulewhich executes an XSL Transformation on an XML Document that is submitted as part of
a POST Request. The results from the static backend server will be in HTML. However when you execute
an HTTP Post operation in the form of:
POST /someURL HTTP/1.1 User-Agent: curl/7.15.4 (i586-pc-mingw32msvc) libcurl/7.15.4
OpenSSL/0.9.7e zlib/1.2.2 Host: 192.168.0.2 Accept: */* Content-Length: 0 Content-Type:
application/x-www-form-urlencoded you see the following message in the log:
http://192.168.1.35:2063/someURL: Content type of non-xml (application/x-www-form-urlencoded)
means selected stylepolicy is not executed. What will correct this and execute the StylePolicy?
A. Add an HTTP Header of ontent-Type: text/xml to the client request
B. Add an HTTP Header of ontent-Type: text/html to the client request
C. Add an HTTP Header injection, Direction = Front, Header = Content-Type, Value = text/html
D. Add an HTTP Header injection, Direction = Back, Header = Content-Type, Value = text/xml
Answer: A
NO.9 A company is using an XSL Proxy in Proxy mode to fetch and transform XML Documents from an
HTTP Server. The XSL, feeValue.xsl, contains the following document function which GETs an XML
Document using the HTTPS Protocol:<xsl:variable name="feeDoc"
select="document('https://192.168.1.101/fee.xml')"/> You enter http://192.168.1.35:2063/empty.xmlinto a
Browser to execute this Proxy Policy and see the followingmessages in the log:xslproxy (myXSLProxy):
document function error while executing local:///feeValue.xsl: Internal Error Connecting
Tohttps://192.168.1.101/fee.xmlCannot establish SSL credentialsHow should proper execution of the
document function be enabled?
A. Use https://192.168.1.35:2063/empty.xml, not http://192.168.1.35:2063/empty.xml in Browser Request
B. Assign a Two-Way SSL Proxy Profile to XSL Proxy SSL Server Crypto Profile
C. Use 'https://192.168.1.101' as the Back End Server Address on the XSL Proxy
D. Create a Trusted Servers SSL Crypto Profile and assign it to the XSL Proxy SSL Client Crypto Profile
E. Create a Client Credentials Crypto Profile and use it in the User Agent assigned to the XSL Proxy XML
Manager
Answer: E
NO.10 After configuring an XML Firewall with inbound SOAP traffic and XML outbound traffic, the system log
shows the information in the exhibit. What does the log analysis show?
A. The inbound traffic is valid XML but invalid SOAP.
B. The outbound traffic is valid XML but invalid SOAP.
C. The outbound traffic is invalid XML and invalid SOAP.
D. The inbound traffic is invalid XML and invalid SOAP.
Answer: C
IBM certifications I 000-289덤프
Posted 2013/7/3 7:36:08 | Category: 미분류 | Tag: