0% found this document useful (0 votes)
229 views18 pages

c1000-005 2i3put

The document contains a series of questions and answers related to configuring and managing IBM DataPower, covering topics such as security gateways, service configurations, logging, and firmware management. It addresses specific scenarios a Solution Implementer might encounter, including handling JSON and XML, managing network settings, and using various DataPower features. Each question is followed by multiple-choice answers that provide options for best practices and troubleshooting techniques.

Uploaded by

saraaahadzic
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
229 views18 pages

c1000-005 2i3put

The document contains a series of questions and answers related to configuring and managing IBM DataPower, covering topics such as security gateways, service configurations, logging, and firmware management. It addresses specific scenarios a Solution Implementer might encounter, including handling JSON and XML, managing network settings, and using various DataPower features. Each question is followed by multiple-choice answers that provide options for best practices and troubleshooting techniques.

Uploaded by

saraaahadzic
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

1

While running the same Multi-Protocol Gateway service, variables seem to contain
information from previous transactions which is causing processing issues. Where in
the Probe would a Solution Implementer look for the variables?
A. Local Variables Tab
B. Global Variables Tab
C. Context Variables Tab57
D. Service Variables Tab

2
A Solution Implementer is required to configure DataPower as a security gateway to
proxy service calls from external business partners. As part of the service call, the
business partner passes an attachment that contains details about an order being
placed. In order to ensure the transaction is safe, the Solution Implementer must
validate that the contents of the message and the contents of the attachment are
safe. How can this requirement be satisfied?
A. DataPower has a pre-configured virus scanner that can protect against malicious
attachments.
B. Have the Business Partners request to bypass DataPower and implement custom
security code at the application level.
C. Implement user and message level security protection and use DataPower to
parse the binaries of the attachment and validate its contents.
D. Implement user and message level security protection and use an external virus
scanner via the ICAP protocol to ensure attachment is safe.

3
How can a Solution Implementer configure a DataPower Gateway to retrieve
configuration of a domain from a remote server?
A. By changing the domain's configuration mode from "local" to "import from remote
server"
B. By issuing the command copy-domain from another DataPower Gateway.
C. By installing a DataPower agent in a remote server that is capable of pushing
domain data.
D. DataPower can only load local domain configuration.
4
DataPower provides seamless integration with which of the following two products?
A. SAP
B. IBM DB2
C. Tibco EMS
D. CA-Integrator
E. Compuware Xpediter
5
A Solution Implementer has been asked to setup DataPower Operations Dashboard
to generate and distribute a periodic report regarding usage of memory by service.
What will be the format of the report?
A. XML
O B. JSON
C. Microsoft Excel
D. Fixed position text file

6
An update has been made to a document that is stored on a server and fetched by
DataPower. What must be done so this update is recognized by DataPower?
A Restart the domain
B. Disable and re-enable the Service
C. Flush the DataPower Document Cache
D. Delete the old file so the new one is retrieved

7
Which components of the DataPower Operations Dashboard gathers information
from DataPower and sends it to the Stream Processing component to stream, parse
and analyze incoming data?
A. WS-Management Agents and Sampling Agents
B. Log collection agents and Sampling Agents
C. WS-Management Agents and Log collection agents ß2.put smo ovo
D. WS-Management Agents, Log collection agents and Sampling Agents ß1.put smo
ovo

8
What type of configuration enables uninterrupted operations after the failure of an
ethernet interface?
A. Link Aggregation
B. Load Balancer Group
OC. Secondary IP Addressing
D. Dual redundant static hostnames
9
A Solution Implementer is configuring a JSON based service using a Multi-Protocol
Gateway. All inbound JSON transactions are between 200-300 bytes in length. How
would they protect against the service taking larger invalid payloads?
Ain XML' Threat Protection set 'Maximum Message Size' to 300.
B. In 'JSON' Threat Protection set 'Maximum Message Size' to 300.
C. In Processing Policy Rule use 'Filter' action to set 'Maximum Payload Size' to 300.
D. In XML Manager configure JSON Settings object with 'Maximum Document Size'
set to 300.

10
Where are AAA requests and responses stored within a Probe?
A. Parameters
B. Execution Trace
C. Extension Trace
D. Context variables

11
What must be enabled before viewing the CPU status provider?
A. Serial Connection
B. Statistic Settings
C. Debug Level Logging
D. XML Management Interface (XMI)

12
Managing DataPower firmware versions is an essential part of the DataPower
Administrator role. When uploading a new firmware image, which directory should
the DataPower Administrator use to be able to boot the new firmware image?
A. image:///
B. firmware:///
C. boot://
D. store:///

13
Which command is used to test if backend02 has a web service listening on port 443
with a time out of 6 seconds?
A test tcp-connection backend02 6
B. test tcp-connection backend02:443 6
C. test tcp-connection backend02 443 6
D. test tcp-connection -6 tcp://backend02:443

14
A Solution Implementer wants to create a new Log Target to save transaction
information inside the DataPower Gateway using a file. In order to maintain the
archive while limiting internal space, what archive mode should be set?
A. Upload
B. Overwrite
C. Permanent
D. Synchronous

15
A Solution Implementer has configured a Multi-Protocol Gateway service to
transform XML messages to COBOL copybooks. The processing policy needs to use
IBM Transformation Extender (ITX) to map the data and then must route the
message to the appropriate backend service. Which action must be used to perform
this transformation using ITX?
A. Map
O B. ODBC
OC. Route
D. Transform binary

16
When using WSRR as a repository for DataPower, how is the SLA and SLD stored in a
WSRR exposed to DataPower?
A. Inline in the WSDL
B. As a Policy Attachment
C. As a persistent TCP socket connection
D. As a text file that must be downloaded manually

17
In an AAA Policy, what is the process to convert a value returned from the
authentication phase to a value that can be used in the authorization phase?
A. Group Transform
B. Resource mapping
C. Credential mapping
D. Certificate conversion

18
Which two of the following optional modules are available for IBM DataPower for
Docker?
A. B2B Module
B. Tenant Module
C. Tibco EMS Module
D. Data Integration Module
E. Application Optimization Module
19
What method is used to convert a GatewayScript string containing XML into a DOM
Document object?
A. parse()
B. readAsXML()
C. readAsBuffer()
D. converter.toXML()

20
What needs to be checked on an HSM equipped Gateway with HSM private key
operations that are running slowly?
A. If any crypto keys are expired ???? ovo kaze chatGPT
B. If any crypto keys are corrupted
C. If any certificates are stored in hsm://hsm2/
D. If any crypto key objects reside in the flash file directory

21
When configuring Link Aggregation on DataPower, which action must be taken to
ensure effective use of Link Aggregation Control Protocol (LACP) mode?
A. Confirm there is support and configuration for LACP on the network switch
B. Confirm there is support and configuration for LACP on the default gateway
C. Confirm there is support and configuration for LACP on DataPower's Wireless
Network Receiver (WNR) interface
D. Confirm there is support and configuration for LACP on the cable that is used for
DataPower's LACP port

22
A Solution Implementer is using the GatewayScript Command Line Debugger. What
is the maximum number of debug sessions that can be in progress at any time?
A5
B. 1
C. 10
D. Unlimited

23
There is a requirement to log each time the transaction rate to a particular Multi-
Protocol Gateway service exceeds 150 transactions per second. Which feature on
DataPower can be used to log this event?
A. Log Action
B. Message Count Monitor
C. Message Duration Monitor
D. Log Target Event Trigger

24
What role does DataPower fill in a WS-Policy flow?
A. Gateway Endpoint
B. WS-Service Provider
C. Service Decision Engine
D. Policy Enforcement Point

25
There is a requirement that Gold Card members are allowed to use an online system
as many times as they want and Silver card members can only use the system once
per day. What type of Class should be configured to identify Gold or Sliver members
in an SLM Action?
A. Silver Class
B. Resource Class
C. Schedule Class
D. Credential Class

26
Which parameter must be configured to "tag" packets, in order to send and receive
traffic for different LANs on one interface?
A. Static route
B. Default route
C. VLAN identifier
D. Tag Value Indicator (TVI)

27
Which two are custom OAuth processing stages?
A. introspection
B. signing_request
C. miscinfo_request
D. scope_override_request
E. authorization_revocation

28
An external Business Partner would like to verify that B2B transactions were
successfully received. What should be setup to allow them to view only their
transaction status?
A. External partner B2B Interface object
B. Enable XML Management Interface
C. Enable REST Management Interface
D. Web B2B Viewer Management Service

29
There is an intermittent network error reported in the logs. To investigate further,
packet capture data will need to be gathered at the time the intermittent error
happens. How can a packet capture be stopped automatically when the intermittent
error happens?
A. Set a Log Target Object Filter for the Service
B. Set a Message Count Monitor for the error's message ID
C. Set a Log Target Event Trigger for the error's message ID
D. Service Level Monitoring (SLM) for the error's message ID
30
A DataPower Solution Implementer noticed that every time the service provider (a
SOAP Web Service) sends a response greater than 4 MB in size, the service
consumer receives the error message "Internal Error (from server)". What corrective
action can be performed to prevent this error from happening?
A. The response definition in the WSDL file needs to be increased from the default 4
MB.
B. The service consumer needs to adjust its buffer size to accommodate responses
greater than 4 MB.
C. The maximum response size from the backend needs to be determined and the
"XML Bytes Scanned" property of the XML Manager object needs to be adjusted
accordingly.
D. The maximum response size from the backend needs to be determined and the
"SOAP Response Limit (in bytes)" property of the XML Manager object needs to be
adjusted accordingly.

31
What element in the custom user interface is used to change the color and text on
the Home screen?
A. TextBanner
B. MarkupBanner
C. CustomPrompt
D. User-Interface

32
What is the difference between symmetric and asymmetric encryption?
A. Symmetric is two way and asymmetric is one-way.
B. Symmetric uses one key and asymmetric uses the same key as symmetric.
C. Symmetric uses two keys to encrypt, and asymmetric uses one key to encrypt
and one key to decrypt.
D. Symmetric uses one key to encrypt and decrypt, and asymmetric uses two
different keys, one key to decrypt and one to encrypt

33
A Multi-Protocol gateway service configured as a RESTful facade is bypassing the
service's processing rules and sending messages directly to the back end server.
What configuration change needs to be made to correct the problem?
A. Set the Back Side Response Type to JSON.
B. Turn on the "Process messages whose body is empty" option.
C. Ensure HTTP GET is allowed on the service's front side handler.
D. Make sure a "JSON Settings" object is associated with the service's XML Manager.

34
A company wants to be informed through email when a certificate is about to expire.
How can this configuration be set up?
A. Enable the crypto certificate monitor with the send mail option checked.
B. Enable the crypto certificate monitor and then configure a log target with target
type SMTP.
C. Enable the crypto certificate monitor and then configure the log target with log
format SNMP.
D. Enable the crypto certificate monitor and then configure the log target with log
format SMTP

35
Using Packet Captures to troubleshoot transaction issues can be difficult due to the
large volume of transactions being captured. What action would assist when running
the DataPower packet capture?
A. Filter Expression
B. Set IP.Addr == DP IP
C. Configure Maximum size
D. Set IP.Port == DP port

36
Which of the following will be captured in the audit log?
A. Running a packet capture
B. Setting up link aggregation
C. Creating a new user account ßprvi put
D. Deleting a Multi-Protocol Gateway ßdrugi put

37
How can the Gateway be configured to support multiple firmware images?
A. Using tenants
B. Using image versions
C. Creating firmware patterns
D. Using Partition Default Domain

38
What is the purpose of an event subscription filter?
A. To capture all related events to a specific error ß 2. Put smo ovo I mislim daje to
ok!
B. To capture events that occur within a processing policy
C. To keep events from the log except for specifically defined ones
D. To capture specific events that are lower category than the current log level ß 1.
Put smo ovo

39
When configuring a Secure connection, the SSL Server will have a protocol defined.
What is the default Protocol for a DataPower SSL server?
A. SSLv2+TLSv1d1+TLSv1d2
B. SSLv3+TLSv1d0+TLSv1d1
C. TLSv1d0+TLSv1d1+TLSv1d2
D. SSLv3+TLSv1d0+TLSv1d1+TLSv1d2
40
During the Post-Processing phase of AAA Policy, what are two Token types that Data
Power can generate?
A. OAuth One-Time Token
B. WSDL Validation Token
C. Kerberos SPNEGO Token
D. ISAM Authorization Token

E. WS-Security Username Token


41
Which generated error can be caught by a Processing Rule?
A. ACL rejection
B. Malformed submissions
C. Front Side Protocol Handler
D. Improperly sequenced transactions

42
DataPower's use of EXSLT provides modules that contain extension elements and
extension functions. Which is not a provided module?
A. Sets Module
B. Integration Module
C. Dates and Times Module
D. Regular Expressions Module

43
A key-pair was generated using the Generate Key feature of the Crypto Tools option
available in DataPower During the key-pair generation process, the Solution
Implementer forgot to turn on the option "Export Private Key". How can a second
DataPower Gateway be configured with a matching key-pair?
A. Go to the cert:/// directory and download the key-pair from there.
B. Generate a similar key-pair in the second appliance with the same settings used
in the first appliance.
C. Use the generated certificate file to re-generate the key file using the Generate
Key feature of the Crypto Tools option.
D. Generate a new key-pair in the first appliance with the "Export Private Key" option
turned on, and then download a copy of the key-pair from the temporary:///
directory, so it can later be uploaded to the second appliance.
44
What are two actions that occur when a user signs into a DataPower Gateway?
A. User's credentials are established
B. User can look up all network ports
C. User will receive a token for all interfaces
D. User can change access to another user
E. User is authenticated against a user repository

45
What is one way to convert JSON into XML within a service?
A. Use a "Convert Query Params to XML" action with an HTTP Input Conversion Map
configured to use JSON encoding.
B. Setting the message Request Type of the service to XML.
C. Use a GatewayScript action referencing the "store:///json2jsonx.js" file.
D. Use a Transform action referencing the "store:///jsonx2json.xsl" file.

46
The export configuration function is available from the export wizard. When a
backup completes, the file is stored in which directory?
A. export.
B. local:
C. temporary:
D. config:
47
When creating a JSON Web Signature (JWS) in DataPower, what are unprotected
headers?
A. JSON headers which are signed
B. HTTP headers which are signed
C. JSON Headers which are encrypted
D. JSON headers which are not signed

48
What is a reason XML Sign and Verify actions would not allow MD4 or MD5
algorithms?
A. The RSA Key is more than 2048 bits.
B. FIPS 140-2 Level 1 Mode is enabled. ß2.put
C. Those algorithms are weak and are no longer supported. ß 1. Put smo ovo
D. The SSL Server Profile associated with the service does not allow those
algorithms.

49
How can a Solution Implementer gather debug level logs over a lengthy interval
while minimizing performance impact?
A. Create a log target with a remote endpoint.
B. Enable Statistics Trace with a target of syslog.
C. Set the default log target to use a rotation setting of 0.
D. Set identical event detection to on and compression to on-demand within the log
target.
50
A Solution Implementer needs to create a new service on a DataPower virtual
appliance. The service must accept a client-oriented SOAP request via HTTP and
pass the message to a backend application via MQ. Which service type should the
Solution Implementer configure?
A. XML Firewall
B. HTTP Service
C. Multi-Protocol Gateway
D. Web Application Firewall

51
When integrating DataPower with antivirus scanners what protocol is used?
A. NFS
B. ICAP
C. HTTP
D. SFTP
52
What is one option that is available when creating a web application firewall without
the wizard?
A. Assign a URL rewrite policy
B. Define the secure connection
C. Define service-to-server settings
D. Select the policy to handle violations
53
Which action is used to call a processing rule for every element matching an XPath
expression within an XML input context?
A. For-each
B. Conditional
C. Extract Using XPath
D. Call Processing Rule

54
In order to define RBM with LDAP authentication, an X.500 DN is required. One
option for defining the DN is to enable Search LDAP for DN. What process occurs
when this option is enabled?
A. DataPower does not support LDAP authenitcation for RBM policies.
B. DataPower makes a JDBC call to LDAP with a DataPower specific username.
C. The login name and password passed to LDAP is specific to the IP of the
DataPower device.
D. The login name presented by the user is used with DN bind credentials and
search parameters for an LDAP search to retrieve the user DN.

55
What can be done to increase portability of a service?
A. Using static hosts for backend addresses
B. Writing GatewayScript using the alias module
C. Hosting stylesheets in the shared:/// directory
D. Using the IBM Transformation Extender repository
56
What command can be used from the gateway to test if an NTP server is alive?
A. ping
B. net test ntp
C. test schema
D. test top-connection

57
Which two solutions are used for monitoring DataPower Gateways for application
related metrics?
A. IBM Watson Data Aggregator
B. DataPower Operations Dashboard <-bilo ovo
C. IBM DataWarehouse Data Collector
D. Tivoli Data Collection Agent (TEMA) <--bilo ovo
E. Application Performance Management

58
A Solution Implementer needs to configure an asynchronous web service. Which
standard should be configured in the Web Service Proxy service to accommodate
this requirement?
A. WS-Policy
B. WS-Addressing
OC. WS-Asynchronous
OD. WS-ReliableMessaging

59
A company needs an HTTPS Handler to only be accessible through the data traffic
interface (ethX interface). The DataPower Solution Implementer noticed that a
service attached to this HTTPS Handler is still accessible when they call it using the
IP address of the management interface (mgtX). What corrective action can be
performed to prevent access to this service from the management interface?
A. Configure the "Local IP address" property of the HTTPS Handler with the IP
address used in the ethX interface.
B. Configure the "Local IP address" property of the HTTPS Handler with the IP
address 0.0.0.0.
OC. Configure the "Local IP address" property of the HTTPS Handler with the IP
address 127.0.0.1.
D. Uncheck the "mgtX" option under the "Network Interfaces" property of the HTTPS
Handler.

60
Which module needs to be licensed to support a customer that wants to use the
DataPower Gateway Database integration functionality?
A. JDBC module
B. Database module
C. Integration module
D. Application optimization module

61
Which command displays memory usage for tasks across the system, including all
the memory that has been allocated from the Operating System (OS), regardless of
whether it is being actively used or simply held in reserve?
A show load
B. show profile
C. show domain
D. show system status ßprvi put smo ovo izabrali

62
What statement is true when configuring a VIP on DataPower with Application
Optimization?
A. The VIP must be registered with the network load balancer.
B. The VIP can be different across the load balanced gateways.
C. The VIP must exist on the same subnet as the gateway's real IP address.
D. The VIP does not need to be configured in the default application domain.
63
When using the anti-virus action inside of a processing policy, what must be
configured?
A. The endpoint of an ICAP compatible server ß drugi put smo ovo
B. The SQL-injection signature file to be applied ßprvi put smo ovo izabrali
C. The configuration of DataPower's built-in anti-virus scanner
D. The configuration of the IBM cloud anti-virus scanner

64
Which parameter should be set to TRUE on a back-end MQ URL to commit the
message immediately upon a successful delivery?
A. Sync ß2. Put smo ovo
B. Commit ß1. Put smo ovo
OC. MQGMO LOCK
OD. Transactional

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy