Tuesday, 31 October 2017

SY0-501 CompTIA Security+ (501)

Exam Details
Exam Codes SY0-401 SY0-501
Launch Date May 1, 2014 October ​4, 2017

Exam Description The CompTIA Security+ exam will certify the successful candidate has the knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations. The successful candidate will perform these tasks to support the principles of confidentiality, integrity, and availability.

Number of Questions Maximum of 90 questions
Type of Questions Multiple choice and performance-based
Length of Test 90 minutes
​Passing Score 750 (on a scale of 100-900)
Recommended Experience CompTIA Network+ and two years of experience in IT administration with a security focus
Languages English, Japanese, Portuguese and Simplified Chinese. English (Japanese, Portuguese and Simplified Chinese estimated Q2 2018)

Retirement
English retirement: July 31, 2018;
Japanese, Portuguese and Simplified Chinese: December 15, 2018
Usually three years after launch
CompTIA Security+ is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management – making it an important stepping stone of an IT security career.

Jobs that use Security+
Security Specialist/Administrator
Security ​Consultant
Security or ​Systems ​Administrator
Network ​Administrator

Companies that use CompTIA Security+ include:
Apple
Dell
HP
IBM
Intel
U.S. Department of Defense

4 Steps to a Cybersecurity Career
Want more CompTIA Security+ information?

Overview
IT security is paramount to organizations as cloud computing and mobile devices have changed the way we do business. With the massive amounts of data transmitted and stored on networks throughout the world, it’s essential to have effective security practices in place. That’s where CompTIA Security+ comes in. Get the Security+ certification to show that you have the skills to secure a network and deter hackers and you’re ready for the job.

Security+ is government approved
CompTIA Security+ meets the ISO 17024 standard and is approved by U.S. Department of Defense to fulfill Directive 8570.01-M requirements. It is compliant with government regulations under the Federal Information Security Management Act (FISMA).

Security+ is globally recognized
CompTIA Security+ is a globally recognized credential with certified professionals working in over 147 countries throughout the world.

Security+ provides substantial earnings potential
According to the Bureau of Labor Statistics, Security Specialists, Administrators and Managers earn over $86,000 per year.

Security+ is industry supported
Security+ is developed and maintained by leading IT experts. Content for the exams stems from a combination of industry-wide survey feedback and contributions from our team of subject matter experts. Learn more about the people behind the CompTIA Security+ Advisory Committee.

Certkingdom.com is CompTIA’s intelligent online learning tool to help you learn for your Security+ exam. It can verify what you already know and fill in knowledge where you need it. It’s a great addition to your learning prep and will be your guide on your path to master the Security+ curriculum.

Training Materials
There’s a wealth of training materials available that match your learning needs and learning style. Whether you are studying on your own, or in a classroom environment, we recommend CompTIA Authorized Quality Curriculum (CAQC) training materials that will help you get ready for your certification exam and pass the test.

For all training options, visit our training overview.

Instructor-Led Training
Instructor-led training provides a comfortable teaching environment with instructors that are familiar with the certification process and can help you master your certification exam. Find your instructor now.

Ready for the Test?
When you’ve completed your training and you know you can take your certification exam with confidence, head over to the CompTIA Marketplace and purchase your exam voucher that you will need to sign up for the test.

Once you’ve purchased your voucher, you can find a testing location and schedule your test.

Renewal
Keep your certification up to date with CompTIA’s Continuing Education (CE) program. It’s designed to be a continued validation of your expertise and a tool to expand your skillset. It’s also the ace up your sleeve when you’re ready to take the next step in your career.

Get the most out of your certification
Information technology is an incredibly dynamic field, creating new opportunities and challenges every day. Participating in our Continuing Education program will enable you to stay current with new and evolving technologies and remain a sought-after IT and security expert.

The CompTIA Continuing Education program
Your CompTIA Security+ certification is good for three years from the day of your exam. The CE program allows you to extend your certification in three-year intervals through activities and training that relate to the content of your certification. Like Security+ itself, CompTIA Security+ ce also carries globally-recognized ISO/ANSI accreditation status.

It’s easy to renew
You can participate in a number of activities and training programs, including higher certifications, to renew your CompTIA Security+ certification. Collect at least 50 Continuing Education Units (CEUs) in three years, upload them to your certification account, and Security+ will automatically renew.


QUESTION 1
A security analyst wishes to increase the security of an FTP server. Currently, all trails to the FTP server is unencrypted. Users connecting to the FTP server use a variety of modem FTP client software. The security analyst wants to keep the same port and protocol, while also still allowing unencrypted connections. Which of the following would BEST accomplish these goals?

A. Require the SFTP protocol to connect to the file server.
B. Use implicit TLS on the FTP server.
C. Use explicit FTPS for the connections.
D. Use SSH tunneling to encrypt the FTP traffic.

Answer: B


QUESTION 2
A company has three divisions, each with its own networks and services. The company decides to make its secure web portal accessible to all employees utilizing their existing usernames and passwords, The security administrator has elected to use SAML to support authentication. In this scenario, which of the following will occur when users try to authenticate to the portal? (Select TWO)

A. B. The portal will function as an identity provider and issue an authentication assertion
B. C. The portal will request an authentication ticket from each network that is transitively trusted
C. D. The back-end networks will function as an identity provider and issue an authentication assertion
D. The back-end networks will request authentication tickets from the portal, which will act as the third-party service provider authentication store
E. F. The back-end networks will verify the assertion token issued by the portal functioning as the identity provider

Answer: C


QUESTION 3
Which of the following would a security specialist be able to determine upon examination of a server's certificate?

A. CA public key
B. Server private key
C. CSR
D. OID

Answer: B

Saturday, 28 October 2017

C8060-220 IBM Watson Customer Engagement: Watson Supply Chain

Number of questions: 60
Number of questions to pass: 36
Time allowed: 120 mins

This multiple-choice test contains questions requiring single and multiple answers. For multiple-answer questions, you need to choose all required options to get the answer correct. You will be advised how many options make up the correct answer.
This test is designed to provide diagnostic feedback on the Examination Score Report, correlating back to the test objectives, informing the test taker how he or she did on each section of the test. As a result, to maintain the integrity of each test, questions and answers are not distributed.

The test contains five sections totalling 60 multiple-choice questions. The percentages after each section title reflect the approximate distribution of the total question set across the sections.
Approximately 40% of the test questions are either platform-agnostics, or applicable to both UNIX and Windows platforms. This exam does contain questions that are platform-specific. To help you prepare, please note the following:
(1)Questions in this objective cover some z/OS content
(2)Questions in this objective cover only UNIX content
(3)Questions in this objective cover only Windows content

Section 1 - Architecture and Planning 17%
Understand the product functionalities and benefits of using Sterling Connect:Direct.
Describe basic architecture of Sterling Connect:Direct and its components.(1)
Identify environment components that interact with Connect:Direct (e.g. load balancers, firewalls, database for Connect:Direct on Microsoft Windows).(2)
Identify system requirements using worksheets.(3)
Explain the different methods used by Sterling Connect:Direct to store configurations on each platform.
Apply TCP/IP concepts.(1)
Solve a situation that has high availability requirements.

Section 2 - Installation and Configuration 25%
Apply installation procedure.(2)
Configure initialization parameters.
Modify configuration files (e.g. API, functional authorities, translation tables).(2)
Configure remote nodes in the Network Map.
Configure local and remote user and proxy authentication.(2)
Verify installations.(2)
Deploy patches for maintenance.(2)
Identify Sterling Connect:Direct File Agent usage.
Perform silent installs and mass rollouts.(3)
Explain the use of checkpointing.
Explain the use of cyclic redundancy check (CRC).
Implement clustering or high availability.

Section 3 - Deployment Operations (Process Language Scripting) 17%
Describe different methodologies to write processes (e.g. requestor, browser, text editor).(1)
Explain Process Language statements and logic flow.(2)
Solve a situation using code pages.
List different ways to submit processes.
Understand the structure of SYSOPTS on different platforms.(1)
Use binary and text transfers.(1)
Solve a situation of moving data between disparate platforms.(1)
Explain the use of Sterling Connect:Direct File Agent for automation.(1)

Section 4 - Administration (Monitoring, Maintenance and Tuning) 21%
Use Connect:Direct Requestor.(3)
Use Command Line Interface (CLI).
Use ISPF interface (IUI). (for z/OS)(1)
Determine the process completion.
Utilize and maintain statistics files or databases.(2)
Understand Sterling Connect:Direct utilities.(1)
Determine trace options.
Manage and control Sterling Connect:Direct process queues.(2)
Identify tuning requirements.
Identify and apply the appropriate software patches.(3)

Section 5 - Security 20%
Explain local authentication and user roles (e.g. admin versus general user).
Explain the different methods of remote user authentication (e.g. password, RACF, local versus proxy, snodeid, security exit).(1)
Understand the process to create, request and validate x.509 certificates.
Implement the Sterling Connect:Direct Secure STS protocol.
Use different methods for maintaining security on Sterling Connect:Direct Secure (e.g. spadmin, SPCLI, Sterling Control Center).(2)
Troubleshoot x.509 certificate issues (e.g. Sterling Connect:Direct traces).
Implement Sterling External Authentication Server for Connect:Direct.(3)
Implement FIPS option.

PartnerWorld Code: 15003801
Replaces PW Code: Not Applicable

Status: Live
This intermediate level certification is intended for administrators and implementers who are responsible for configuring, troubleshooting and deploying IBM Sterling Connect:Direct with focus on the Microsoft Windows 4.6 and UNIX 4.1 platforms. Some basic understanding of the z/OS 5.1 platform is required.

These technical professionals are also required to have conceptual understanding of the Microsoft Windows, UNIX, z/OS Operating Systems.

An administrator or implementer who passes this exam is able to install and configure IBM Sterling Connect:Direct, and provide:

knowledge of the Sterling Connect:Direct components that interact with the user interface that allows submission, execution and monitoring of Sterling Connect:Direct.
a comprehensive set of managed file transfer capabilities to facilitate data growth, use of automation, reduce security risk, and improve IT and business efficiency.
an understanding of secure connections between trading partners with customers, suppliers and business partners.
visibility and tracking of business data with customers, suppliers and business partners.
visibility for status of sent and received business transactions.

Recommended Prerequisite Skills
Before preparing for this certification, the following knowledge and skills are recommended and assumed:

conceptual understanding of operating systems
basic understanding of firewalls, load balancers and high availability (clustering)
basic understanding of network connectivity
basic understanding security, certificates and encryption

In preparing for this certification, the following IBM course(s) are recommended to further improve your skills:
6C02G: IBM Sterling Connect Direct for Unix V4.2.0
6C03G: IBM Sterling Connect Direct for Windows V4.7 Fundamentals


QUESTION: 1
Which component is invoked to stop Sterling Connect:Direct for UNIX?

A. Security Exit
B. User Manager
C. Session Manager
D. Process Manager

Answer: D

QUESTION: 2
In Sterling Connect:Direct for Windows, which parameter is required when configuring a remote node using Advanced
Program to Program Communication (APPC)?

A. Partner LU Name
B. Alternate Comminfo
C. Host Name/IP Address
D. UDT communication path name

Answer: A

QUESTION: 3
In Sterling Connect:Direct for UNIX, in which path is the file ndmproc located?

A. ndm/|ib/
B.r1dm/blr1/
C. ndm/cfg/cIiapi/
D.r1dm/cfg/cd_r1ode/

Answer: B

QUESTION: 4
In Sterling Connect:Direct for UNIX, an administrator is setting up multiple nodes in a load balancing environment on
a cluster file system (not an NFS). The administrator needs to specify a shared area where the multiple nodes can
place return code files and copy checkpoint information, so that the various nodes are aware of activity. What
parameter is used to specify this?

A. ndm.path
B. comm.info
C. quiesce.resume
D. snode.work.path

Answer: D