Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 16

IBM LOT-402

Version

QUESTION NO: 1
Bill must perform on-line backups. Of the following, which should be the first
step?

A. He must backup the database before the file system.


B. He must tell the wiki IBM WebSphere Application Server to quit.
C. He must stop the IBM HTTP Server.
D. He should open the WebSphere Application Server administration client and select
on-line backup modeling.
Answer: A

QUESTION NO: 2
What is the default Connections DB2 username used to access Connections DB2 tables?

A. wsadmin
B. lcuser
C. lcadmin
D. dbadmin
Answer: B

QUESTION NO: 3
What is the purpose of the dsx-admin role?

A. It is used by all applications to control which user IDs can query for seedlist
information.
B. It is used by all applications that make widgets available within Communities.
C. It is used by Profiles and Communities to retrieve user or community data.
D. It is used as a system-level user for application-to-application communications.
Answer: C

QUESTION NO: 4
Which of the following statements describes the role of IBM Tivoli Directory
Integrator in an IBM Connections 4.0 environment?

A. It provides a mechanism for the underlying IBM WebSphere Application Server to


authenticate against an LDAP directory.
B. It provides a mechanism to populate the Profiles database with LDAP user
information and to keep the same synchronized.
C. It provides Connectors that allow IBM WebSphere Portal server to access various
file-system directories on different systems.
D. It provides a ready-made solution to keep multiple, supported LDAP directories
synchronized.
Answer: B

QUESTION NO: 5
Kevin, the IBM Connections administrator, wants to enable IBM WebSphere Application
Server administrative security. Which of the following statements about federated
repositories is true?

A. Connections 4.0 supports federated repositories, however the default file-based


user registry must be deleted.
B. Connections 4.0 supports federated repositories, and the default file based
registry can coexist with as many additional LDAP user registries
as required.
C. Connections 4.0 does not require a federated repository configuration as it
supports a standalone LDAP repository.
D. Connections 4.0 support for federated repositories provides the flexibility of
allowing multiple users with the same user ID and distinguished
name (DN).
Answer: B

QUESTION NO: 6
Which statement about the IBM Connections database wizard is true?

A. Besides creating Connections databases, it can also upgrade IBM DB2 to the
latest version, provided the install files are located on the same
file system.
B. Besides creating Connections databases, it can also be used to migrate from one
database server to another.
C. Connections databases can be created locally as well as remotely.
D. It can only be used to create, update and remove Connections databases.
Answer: D

QUESTION NO: 7
While installing IBM WebSphere Application Server Network Deployment, what is the
correct approach for enabling global security?

A. Always set the administrator name / password to wasadmin / wasadmin as the


installation scripts have been written to recognize this name and
password.
B. The administrator name provided during the installation can be any value so long
as the same name exists in the LDAP repository.
C. The administrator name provided during the installation must be a unique value
and should not exist in the LDAP repository.
D. Do nothing, the installation process automatically assigns an administrator name
and password combination, displays it upon successful
installation and also writes that information to the install logs.
Answer: C

QUESTION NO: 8
Charlie is preparing to perform an IBM Connections 4.0 installation. What does he
need to know about a failed Connections 4.0 installation?

A. IBM Installation Manager cancels the installation and rolls back the
installation files. Charlie should fix the condition causing the failure, restore
the Deployment Manger profile to a clean state, delete the Connections_root
directory and restart the installation.
B. IBM Installation Manager cancels the installation. Charlie should run the
uninstall.[bat/sh] file that gets copied to the Connections_root/uninstall
directory first, fix the condition causing the installation to fail, restore the
Deployment Manager profile to a clean state, delete the
Connections_root directory and restart the installation.
C. IBM Installation Manager cancels the installation and rolls back the install
files. It also restores the Deployment Manger profile to a clean state.
Charlie should just restart the Deployment Manager, fix the condition causing the
failure, delete the Connections_root directory and restart the
installation.
D. IBM Installation Manager has advanced capabilities with which it takes a
snapshot of the Deployment Manager profile first. Upon failure, it rolls
back the installation file and reverts to a clean Deployment Manager profile.
Charlie should just fix the condition causing the failure and restart
the installation.
Answer: A

QUESTION NO: 9
Francis, the IBM WebSphere administrator has the option of installing IBM
Connections 4.0 on either Linux or Windows operating system. Which statement is
true about access requirements from an operating system perspective?

A. On Windows, any user will be able to install Connections so long as the


administrator has shared the target installation directories with Full
Control permissions. On Linux, a non-root install is not possible.
B. On Linux, a non-root user can be granted required access permissions to certain
data directories thereby allowing non-root installs. On
Windows, only a local administrator can install Connections 4.0.
C. Both on Windows and Linux, a non-administrator or non-root user can perform
Connections installs, so long as proper access permissions are
granted to the required target directories.
D. On Linux, a non-root user can be granted required access permissions to certain
data directories thereby allowing non-root installs. On
Windows, especially in Windows 2008, the administrator account must be a domain
administrator in order to install Connections 4.0.
Answer: B

QUESTION NO: 10
When installing IBM Connections Mail, which statement about its configuration for
Microsoft Exchange is true?

A. Use Kerberos authentication to configure both server-side and desktop SSO.


B. Email addresses for Exchange can be provided either in Microsoft Active
Directory or in Connections LDAP directory.
C. Use SPNEGO to configure SSO between Connections Mail and Exchange.
D. The Exchange server must be configured to use Connections Web Service.
Answer: C

QUESTION NO: 11
Identify one post-install step that is mandatory while performing an IBM
Connections 4.0 installation.

A. Define a valid administrator email address so that Connections 4.0 applications


can use that address for system notifications.
B. Create a mail session on Deployment Manager so that all Connections 4.0
applications can be enabled for email and notification support.
C. Review and modify JVM heap size and adjust it if necessary to avoid out of
memory errors on each WebSphere Application Server node.
D. Change the context root of URLs that point to Connections 4.0 applications.
Answer: C

QUESTION NO: 12
When troubleshooting IBM Cognos Business Intelligence metrics, two common issues
are conflicts of PowerCube refresh schedules and report query failures. What is a
third common issue?
A. The Cognos Business Intelligence administrator password is incorrect.
B. The PowerCube service needs to be restarted.
C. The Cognos log file is full.
D. There has been an authentication failure.
Answer: D

QUESTION NO: 13
Fran is planning to install IBM Cognos Business Intelligence. What account must
she use to install this software?

A. She must use an account that is created during installation.


B. She must create or select an account in the existing LDAP directory.
C. She must use the wsadmin account.
D. She must use the domain admin account.
Answer: B

QUESTION NO: 14
Which entity must be configured for access to IBM Connections Metrics?

A. wsadmin
B. Trusted Servers
C. Metrics Administrators
D. Cognos Administrators
Answer: C

QUESTION NO: 15
It is possible to re-use most content stores from an IBM Connections 3.0.1
deployment in a new Connections 4.0 environment. Which of the following can not be
re-used?

A. Profiles
B. News
C. Search
D. Activities
Answer: C

QUESTION NO: 16
In order to preserve customizations made to IBM Connections 3.0.1 during migration,
what must be done?

A. Nothing, they are preserved during export.


B. Customizations must be manually re-created.
C. Back them up, then re-apply them.
D. Only customized CSS, JSP, and HTML must be re-applied.
Answer: C

QUESTION NO: 17
Which file defines rules about which HTTP requests, headers, and cookies are
allowed to be redirected to the IBM Connections applications?

A. profiles-config.xml
B. proxy-config.tpl
C. proxy-security.xml
D. security.xml
Answer: B

QUESTION NO: 18
To establish trusted server-to-server communication for IBM Connections, into what
must an administrator import signer certificates from the IBM HTTP Server?

A. Connections trust store


B. IBM WebSphere Application Server default trust store
C. Security.xml
D. Websphere Application Server certificate container
Answer: B

QUESTION NO: 19
Where would the SSO domain name be set?

A. In the Security.xml
B. Log in to the IBM WebSphere Integrated Solutions Console on the Deployment
Manager. Select Security > Global security > Security Domains>
Select New and create a New SSO Domain.
C. This can only be done during the initial installation.
D. Log in to the WebSphere Integrated Solutions Console on the Deployment Manager.
Select Security > Global Security > Web and SIP security
> Single sign-on.
Enter a value for the SSO domain name.
Answer: D

QUESTION NO: 20
What is the procedure to update aliases that reference the administrative user IDs
and passwords used to handle server-to-server communication?

A. The administrator must reinstall and create a new admin role.


B. The administrator must edit the associated J2C authentication data for the
alias. In the IBM WebSphere Integrated Solutions Console, select
Security > Global Security. In the Authentication area, expand Java Authentication
and Authorization Service, and click J2C authentication data.
C. The administrator must do the following: In the WebSphere Integrated Solutions
Console, select Users and Groups > Administrative user roles
> Select Add and create a new Administrative user role.
D. The administrator will need to edit the security.xml, make the changes and
restart the server.
Answer: B

QUESTION NO: 21
Shannon is preparing to apply an upgrade to IBM Connections. Before she does, she
is backing up the Connections install. She stopped all the Connections servers and
used native tools to backup the databases. She also backed up the Deployment
Manager and Application Server profile directory, the Connections installation
directory, profileRegistry.xml and the local and shared data directories. What are
the other two items she should back up to ensure that she can fully recover if she
has serious problems with the upgrade?

A. IBM Installation Manager


B. customized configuration files
C. IBM Tivoli Directory Integrator
D. tdisol
E. shared resource directory
Answer: B,E

QUESTION NO: 22
What script would an administrator run to populate the PROF_IS_MANAGER field in the
EMPLOYEE table in the PEOPLEDB?

A. sync_all_dns.[bat/sh]
B. collect_dns.[bat/sh]
C. populate_from_dn_file.[bat/sh]
D. mark_manager.[bat/sh]
Answer: D

QUESTION NO: 23
An administrator can clear all scheduled tasks and recreate them if an exception
relating to LTPA tokens is seen in the system log before the task runs. This could
be due to a new LTPA token being imported or new LTPA keys being generated. What
other event might require the schedule to be cleared?

A. Moving databases from production to staging.


B. The SSL signer is unknown to the server.
C. Multiple LTPA keys are in use.
D. The search index needs to be recreated.
Answer: A

QUESTION NO: 24
When the sync_all_dns process is performed, it generates a lock file in the IBM
Tivoli Directory Integrator solution directory to prevent other administrators from
starting another sync_all_dns process in the same Tivoli Directory Integrator
solution. The name of the lock file is sync_all_dns.lck. When the sync_all_dns
process has finished successfully, the lock file is automatically deleted. However,
if the process did not complete, the lock file won't be deleted. In this case, how
would an administrator remove this lock file?

A. She must rerun sync_all_dns to attempt to remove the lock file.


B. She can clear the lock herself by running clearsynclock.[bat/sh] which is
located in the Tivoli Directory Integrator solution directory.
C. The server must be restarted to remove the lock.
D. She can delete it herself, or run the clearLock.[bat/sh] command, located in the
Tivoli Directory Integrator solution directory.
Answer: D

QUESTION NO: 25
After migrating from IBM Connections 3.x to version 4.0, the search index for the
new version is created by doing which of the following?

A. Delete the existing index and re-create it.


B. Copy the existing index to the new search/index directory.
C. Nothing, the existing index will work
D. Move the background index to the new server.
Answer: A

QUESTION NO: 26
John is logged in to the IBM Connections Deployment Manager system with the
administrator ID of icadmin. He is at the icadmin home directory. The
app_server_root is /opt/IBM/WebSphere/AppServer and the Deployment Manager profile
is Dmgr01. He is trying to start the wsadmin client using the following
command: ./wsadmin.[bat/sh] -lang jython -port 8879 but it won't start. What does
he need to do first to get the wsadmin client to run?

A. Change directory to /opt/IBM/WebSphere/AppServer/profiles/Dmgr01/wsadmin


B. Change directory to /opt/IBM/WebSphere/AppServer/profiles/Dmgr01
C. Change directory to /opt/IBM/WebSphere/AppServer/bin
D. Change directory to /opt/IBM/WebSphere/AppServer/profiles/Dmgr01/bin
Answer: D

QUESTION NO: 27
Jim is having issues with IBM Connections performance. His system team has shown
that the CPU utilization is very low and that there are no JVM memory constraints.
The network team has shown that there is good network bandwidth and low network
latency. He also sees that the the proxy server is working well and provides good
client-side performance for static content. What major area could be changed to
improve performance?

A. The HTTP server configuration.


B. Disk I/O for the database and file repository.
C. Add an additional IBM WebSphere node.
D. Tune the LDAP server configuration.
Answer: B

QUESTION NO: 28
What is the default amount of time that Activities are retained in the Trash?

A. 30 days
B. 60 days
C. 90 days
D. No default interval is defined.
Answer: C

QUESTION NO: 29
When an administrator runs a sync_all_dns, a comparison is made of the data
contained in LDAP versus the Peopledb. Where is the current LDAP URL stored?

A. map_dbrepos_from_source.properties
B. profiles_tdi.properties
C. profiles-config.xml
D. solution.properties
Answer: B

QUESTION NO: 30
Is it possible for an administrator to control whether specific users are included
or excluded from the social analytics service?

A. An administrator can use SearchService commands to exclude a specified user from


the social analytics service.
B. All users are included in the social analytics service. There is no current way
to exclude any specific user.
C. The users an administrator wishes to exclude must be set to inactive.
D. The users an administrator wishes to exclude must be added to the exclusion list
and the server must be restarted.
Answer: A

QUESTION NO: 31
Administrators can use the update wizard in either interactive or silent mode. When
is interactive mode more useful?

A. When there are other updates to be included with the fixpack


B. When the WAS_Home variable is being changed
C. When the update is being done remotely
D. When the administrator is updating a single installation
Answer: D

QUESTION NO: 32
John is planning an IBM Connections production install. He knows that he will need
to prepare directories to use for two types of content stores. What are the two
types of content stores needed?

A. system and network content stores


B. direct and remote content stores
C. files and data content stores
D. local and shared content stores
Answer: D

QUESTION NO: 33
What is used to access the News configuration file?

A. The IBM WebSphere Integrated Solutions Console


B. The IBM DB2 Connect client
C. The WebSphere wsadmin client
D. The IBM Cognos Express client
Answer: C

QUESTION NO: 34
How is the integration point configured for IBM Connections search integration in
IBM WebSphere Portal server?

A. By configuring the home page search center component to include Connections


content as part of the related search results.
B. By configuring the IBM WebSphere Integrated Solutions Console center component
to include Connections content as part of the related
search results.
C. By configuring the portal search center component to include Connections content
as part of the related search results.
D. By configuring the IBM Cognos search center component to include Connections
content as part of the related search results.
Answer: C

QUESTION NO: 35
How is administrative access to the home page configured?

A. By using the IBM DB2 Connect client


B. Within the IBM WebSphere Integrated Solutions Console
C. By editing the home page in the Admin view and enabling the service
D. By editing the homepage-config.xml file using a text editor
Answer: B

QUESTION NO: 36
What is used to configure the Communities Catalog?

A. IBM WebSphere Integrated Solutions Console


B. IBM WebSphere Application Server wsadmin client
C. IBM DB2 database client
D. IBM Domino Designer client
Answer: B

QUESTION NO: 37
An administrator can define a set of custom extension properties to further
customize Profiles for a deployment?s unique needs. Each extension property is
defined using a unique identifier. An administrator declares extension properties
in the profileExtensionAttributes section in which of the following?

A. attribute-storage.cfg
B. user-extensions.properties
C. profiles-config.xml
D. ext-ident.xml
Answer: C

QUESTION NO: 38
Which of the following is a required step in disabling applications?

A. Edit the home page in the Admin view and disable the application.
B. Edit the application-config.xml.
C. Disable the application's service in the event scheduler.
D. Use the wasadmin client to edit the IBM Connections configuration file.
Answer: D

QUESTION NO: 39
Configuration files can be modified using which two of the following? (Select two.)

A. A text editor
B. IBM DB2 connect client
C. IBM WebSphere Application Server wsadmin client
D. IBM WebSphere Integrated Solutions Console
E. IBM Cognos Express client
Answer: A,C

QUESTION NO: 40
How does an administrator force users' browsers to pick up changes made to
Communities properties?

A. Update the version stamp configuration property in the LotusConnections-


config.xml.
B. Restart the server.
C. Synchronize the communities-config.xml to all nodes.
D. Restart the Deployment Manager.
Answer: A
QUESTION NO: 41
By default, custom extensions are mapped to what data source?

A. An IBM DB2 database


B. The LDAP directory
C. The IBM Cognos repository
D. The portal's home page
Answer: B

QUESTION NO: 42
How can an IBM WebSphere Application Server environment variable be changed?

A. Using an administrator ID, log into the IBM WebSphere Integrated Solutions
Console. Expand Environment, and then click WebSphere
Variables. Find the environment variable that needs to be changed and edit it from
the list. Save and apply the changes, and then restart the
server.
B. This can only be done at the time of install.
C. Edit the Variables.xml in the LotusConnections-config directory. Once this has
been done the server will need to be restarted.
D. Using an administrator ID, log into the WebSphere Integrated Solutions Console.
Expand Servers, Server types and then WebSphere
Variables. Find the environment variable that needs to be changed and edit it from
the list. Save and apply the changes, and then restart the
server.
Answer: A

QUESTION NO: 43
What is the result of setting WebClientAccess to "false" in the mobile-config.xml?

A. Disallows access to IBM Connections.


B. Disallows access to Connections via a web browser.
C. Disallows users not listed in the WebClientAccess role.
D. Disallows web client access to the listed components of Connections.
Answer: B

QUESTION NO: 44
How is a user assigned the global-moderator role?

A. Within the home page administrator view for the application server
B. By mapping the moderator role using the IBM DB2 Connect client
C. Within the IBM WebSphere Integrated Solutions Console
D. By editing the application-config.xml for the moderation application
Answer: C

QUESTION NO: 45
How would an administrator configure IBM Connections to prevent email addresses
from being displayed in the product and protect the privacy of users?

A. By using a text editor


B. With the IBM Cognos Express client
C. With the IBM DB2 Connect client
D. By running a script on the server hosting the Connections server
Answer: D

QUESTION NO: 46
The IBM Connections administrator has explicitly set the caching headers of
Profiles photos in the httpd.conf file. Which of the following LocationMatch module
areas did the administrator configure?

A. photo.do
B. audio.do
C. images.do
D. userjpg.do
Answer: A

QUESTION NO: 47
In order to store IBM Tivoli Directory Integrator events into the Profiles
database, which of the following properties must be set?

A. <property name="profiles.events.system.ignore" value="false" />


B. <property name="profiles.events.system.publish" value="1" />
C. <set="tdi.events.system.ignore" value="1" />
D. <set="tdi.events.system.ignore" value="0" />
Answer: A

QUESTION NO: 48
What is the purpose of using a reverse caching proxy configuration?

A. Improve web performance


B. Reduce database access
C. Increase Java security
D. Enable IBM Connections Mail
Answer: A

QUESTION NO: 49
Which of the following statements best describes IBM Connections Mail?

A. The HTTP server must be disabled on the mail servers as Connections Mail is not
the Web provider for the email service.
B. It doesn't require an external mail server since it has its own mail routing
mechanism.
C. It cannot be used with IBM Lotus Domino or Microsoft Exchange clusters.
D. When sending and receiving files in Connections Mail, an administrator can use
traditional attachments, or he can use Connections Files to
share the files.
Answer: D

QUESTION NO: 50
Which of the following files does Lori need to modify in order to add a widget to
her IBM Connections Communities?

A. widgets-config.xml
B. comm-config.xml
C. widgets-custom.war
D. LotusConnections-config.xml
Answer: A
QUESTION NO: 51
Which of the following files need to copied into and stored in the Customization
Directory in order to modify the Header of IBM Connections?

A. header.jsp
B. top-bar.jsp
C. header.css
D. top-bar-css
Answer: A

QUESTION NO: 52
Which of the following statements is true regarding customization debugging in IBM
Connections 4.0?

A. It is resource intensive and has a major impact on product performance.


B. It will modify the UI of the application by showing all CSS, JS, JSP files being
used at the top of the page when loading.
C. It can be enabled via xml configuration using lotusconnections-config.xml.
D. This feature must be enabled on the HTTP server.
Answer: A

QUESTION NO: 53
Which of the following files needs to be modified by Peter in order to control how
Profiles properties are displayed to other users?

A. businessCardInfo.ftl
B. profileDetails.ftl
C. profiles-config.xml
D. profileEdit.ftl
Answer: B

QUESTION NO: 54
The IBM Connections Plugin for IBM Lotus Notes provides which of the following
benefits?

A. Create and update Wikis.


B. Create and update Bookmarks.
C. Send HTML links to a file.
D. Create Communities.
Answer: C

QUESTION NO: 55
Which two of the following are valid types of Business Cards that can be used from
external web applications? (Choose two.)

A. Inline
B. Pop-up
C. Widget
D. Gadget
E. Web Part
Answer: A,B
QUESTION NO: 56
Brundon has modified blogs.css to include some custom font and colors for the Blog
application. Which of the following will his CSS customization override after the
necessary changes are permanently applied?

A. oneui3.css
B. defaultTheme.css
C. IBMConnections.css
D. oneuiStyle.css
Answer: B

QUESTION NO: 57
Alla needs to gather logs to send to IBM Support. They are helping her resolve an
issue she is having with the installation of an IBM Connections 4.0 environment on
Red Hat Linux. Where might she find these files on her system?

A. /opt/IBM/Connections/data
B. /opt/IBM/Connections/logs
C. /opt/IBM/WebSphere/AppServer/profiles/AppSrv01/logs/server1
D. /tmp/Connections/logs
Answer: B

QUESTION NO: 58
Gabriella has configured the IBM Connections Profiles server to support dynamic
feeds to bring data from Connections to the Microsoft Outlook client via the
Microsoft Outlook Social Connector. The Profiles server schema must be extended
with which of the following attributes?

A. OSCprovider
B. hashEmail
C. profilesAdmin
D. CustomAttr
Answer: B

QUESTION NO: 59
Lindsay is trying to enable SSO for IBM Tivoli Access Manager. She has just
finished installing the Trust Association Interceptor (TAI) for Tivoli Access
Manager but is not able to authenticate via Tivoli Access Manager. What is the
likely cause of her issue?

A. She did not add the web address of the host name of her IBM Connections server
to the Local intranet zone of Microsoft Internet Explorer.
B. The TAI mechanism is not supported in Connections. She needs to use the cookie-
based LTPA mechanism.
C. Tivoli Access Manager is not supported with Connections. She needs to use a
supported third-party security product.
D. Tivoli Access Manager can only be used with SPNEGO authentication.
Answer: B

QUESTION NO: 60
A previous administrator configured users to reply to email notifications. However,
this does not seem to be working. What file does the new administrator need to
check to verify this has been enabled and that a ReplyTo address has been supplied?

A. emaildigest-config.xml
B. Replyto-config.xml
C. news-config.xml
D. LotusConnections-Config.xml
Answer: C

QUESTION NO: 61
Which one of the following best describes the steps that allow an administrator to
enable tracing manually by modifying the log detail levels?

A. In the IBM WebSphere Integrated Solutions Console, click Applications ->


<feature name> -> Logging and Tracing -> Diagnostic Trace.
B. In the WebSphere Integrated Solutions Console, click Servers -> WebSphere
Application Servers -> <server name> -> Diagnostic Trace.
C. In the WebSphere Integrated Solutions Console, click Troubleshooting -> Logs and
trace -> <server name> -> Diagnostic Trace.
D. In the WebSphere Integrated Solutions Console, click Troubleshooting ->
Configuration problems -> Logs and Trace -> Diagnostic Trace.
Answer: C

QUESTION NO: 62
Juliet is trying to troubleshoot an issue in which the Search application is unable
to crawl the Activities application's secured seedlists. Which of the following
represents the best reason why she could be having this issue?

A. The inter-service feature is not functioning correctly.


B. The Activities application does not have a 'dsx-admin' user configured properly
in the IBM WebSphere Integrated Solutions Console.
C. The Activities inter-service domain name is not configured correctly in the
LotusConnections-config.xml file.
D. The Activities context root must be configured to be '/activities' in the
LotusConnections-config.xml file.
Answer: C

QUESTION NO: 63
What is the purpose of a background search index?

A. Lowers CPU utilization during peak usage times.


B. Allows the administrator to correct inconsistencies in the main index without
down time.
C. Allows the administrator to load-balance search among applications.
D. Reduces the amount of space required for search backups.
Answer: B

QUESTION NO: 64
Bill needs to prevent users from saving their IBM Connections passwords and copying
and pasting possible confidential information on their mobile devices. He will
need to make the necessary configuration changes in which of the following?

A. httpd.conf
B. profilesconfig.properties
C. mobile-config.xml
D. wimconfig.xml
Answer: C
QUESTION NO: 65
Tom sees messages in the ibmdi.log that have the CLFRN prefix. What does this mean?

A. The CLFRN prefix indicates an issue with the install of IBM Tivoli Directory
Integrator.
B. The CLFRN prefix is used to identify error messages from all Profiles
components.
C. These messages are normal and can be ignored.
D. CLFRN is an indicator that the version of Tivoli Directory Integrator is out of
date.
Answer: B

QUESTION NO: 66
John is having issues with new users not being able to use the Blogs application.
He thinks that there are issues synching these users with the Blogs database. Which
of the following should John look into in order to troubleshoot his issue?

A. IBM Tivoli Directory Integrator


B. The Sync Service
C. The Profiles Worker
D. The Blogs Sync Worker
Answer: C

QUESTION NO: 67
Jake is the IBM Connections administrator and some users are reporting security
alert (security popup) boxes whenever they attempt to access the site with
Microsoft Internet Explorer. Which of the following represents the likely cause of
Jake's issues?

A. There is no issue, Jake can inform users to use another browser.


B. Jake is using an unsupported third-party certificate.
C. Jake is using a self-signed certificate.
D. Jake needs to import his self-signed certificate into the web server.
Answer: C

QUESTION NO: 68
A day after Locke updated the JDBC properties for the IBM Connections features he
realizes that new users are not being synced from his company's LDAP environment to
the Profiles database. What other file(s) does Locke need to update with the new
properties to resolve the issue?

A. LotusConnections-config.xml
B. tdisettings.properties and LotusConnections-config.xml
C. tdisettings.properties
D. profiles_tdi.properties file
Answer: D

QUESTION NO: 69
Sawyer has just successfully finished running the Profiles population wizard. He
logs into the IBM DB2 command line interface to verify that everything has been
populated. He discovers that only the PEOPLEDB database has been populated with
data and that the other databases such as Activities, Blogs, Communities, Dogear,
Files, Forums, and Wikis were not changed. What did Sawyer do wrong?

A. He should have verified that all application servers (those other than Profiles)
were started before beginning the Profiles population.
B. He did not do anything wrong. The other databases are populated with data as
users interact with the system.
C. He failed to check the "Sync to the following features..." checkbox in the
Profiles population wizard, therefore only Profiles was populated.
D. He did not do anything wrong. He simply needs to execute the
populateFromProfiles.sql script to populate the other databases.
Answer: B

You might also like