Exam overview This exam tests your knowledge of wireless network design, including:
Site surveys
Wired and wireless infrastructure
Mobility
WLAN high availability
Exam Description The Designing Cisco Enterprise Wireless Networks v1.0 (ENWLSD 300-425) exam
is a 90-minute exam associated with the CCNP Enterprise and Cisco Certified
Specialist - Enterprise Wireless Design certifications. This exam certifies a
candidate's knowledge of wireless network design including site surveys, wired
and wireless infrastructure, mobility and WLAN high availability. The course,
Designing Cisco Enterprise Wireless Networks, helps candidates to prepare for
this exam.
The following topics are general guidelines for the content likely to be
included on the exam. However, other related topics may also appear on any
specific delivery of the exam. To better reflect the contents of the exam and
for clarity purposes, the guidelines below may change at any time without
notice.
1.1 Collect design requirements and evaluate constraints 1.1.a Client density
1.1.b Real time applications
1.1.c AP type
1.1.d Deployment type (data, location, voice, video)
1.1.e Security
1.2 Describe material attenuation and its effect on wireless design
1.3 Perform and analyze a Layer 1 site survey
1.4 Perform a pre-deployment site survey
1.5 Perform a post deployment site survey
1.6 Perform a predictive site survey
1.7 Utilize planning tools and evaluate key network metrics (Ekahau, AirMagnet,
PI, Chanalyzer, Spectrum Analyzer)
2.1 Determine physical infrastructure requirements such as AP power, cabling,
switch port capacity, mounting, and grounding
2.2 Determine logical infrastructure requirements such as WLC/AP licensing
requirements based on the type of wireless architecture
2.3 Design radio management
2.3.a RRM
2.3.b RF profiles
2.3.c RxSOP
2.4 Apply design requirements for these types of wireless networks
2.4.a Data
2.4.b Voice and video
2.4.c Location
2.4.d Hyperlocation
2.5 Design high-density wireless networks and their associated components
(campus, lecture halls, conference rooms)
2.6 Design wireless bridging (mesh)
2.6.a Modes of operation
2.6.b Ethernet bridging
2.6.c WGB and roaming
3.1 Design mobility groups based on mobility roles
3.2 Optimize client roaming
3.3 Validate mobility tunneling for data and control path
4.1 Design high availability for controllers
4.1.a Network availability through LAG
4.1.b Stateful Switchover (SSO)
4.1.c Anchor controller priority and redundancy
4.2 Design high availability for APs
4.2.a AP prioritization
4.2.b Fall-back (assigning primary, secondary, and tertiary)
Exam ID HPE0-A121P
Exam type Performance based
Exam duration 8 hours
Passing score 70%
Delivery languages English
Supporting resources These recommended resources help you prepare for the exam:
Aruba Advanced Network Design and Solutions, Rev. 18.41
Register for this Exam You need an HPE Learner ID and an Aruba Learning Management System username
and password
The HPE6-A49 ACDX Written Exam is required to be passed before the practical
exam. Once the written is passed, you will only have 18 months to pass the ACDX
Practical Exam. Candidates who do not pass the ACDX Practical Exam within 18
months will have to retake the current ACDX Written Exam. HPE recommends that
you register for the ACDX Practical Exam within 12 months of passing the written
exam to ensure that you pass in the allotted 18-month timeframe.
Exam description This practical exam tests your ability to design a secure campus wired,
wireless, remote access and management solution for an enterprise mobility
project using Aruba OS (AOS) 8.3 and Aruba Switches OS 16.06. Candidates create
design solutions that include redundancy, WLAN SSIDs, user roles/policies, QoS
design, network security, authentication and integration with existing
infrastructure. Candidates will complete an IRIS BOM, IRIS network diagram and a
VRF diagram for RF planning.
Ideal candidate for this exam Ideal candidates are networking IT professionals with a minimum of three to
five years’ experience in designing complex enterprise-level mobile first
networks. Candidates should have familiarity with building a detailed bill of
materials using the Aruba Controller, Aruba switches, Access Point, Instant,
ClearPass and AirWave products for secure, guest and voice deployments.
Candidates are familiar with AOS 8.3, Airwave Visual RF Plan 8.7, Aruba Instant,
ClearPass, AirWave and Central management.
Exam contents Here are types of questions to expect:
Other - Performance Based
Advice to help you take this exam Complete the training and review all course materials and documents before
you take the exam.
Use HPE Press study guides and additional reference materials; study guides,
practice tests, and HPE books.
Exam items are based on expected knowledge acquired from job experience, an
expected level of industry standard knowledge, or other prerequisites (events,
supplemental materials, etc.).
Successful completion of the course or study materials alone, does not ensure
you will pass the exam.
Objectives
This exam validates that you can:
Percentage of Exam Sections/Objectives
45% IRIS BOM Provide a detailed Bill of Materials (BOM) listing MM, controller models,
Aruba switches, line cards, transceivers, APs, AMs, SMs, Mesh APs, license types
and counts. Indicate the equipment per MDF/IDF closets. Specify the necessary
servers such as AirWave and ClearPass, Meridian with licensing specified for a
given scenario.
Determine encryption and authentication including role based access control (RBAC)
requirements for a Secure or Guest WLAN to meet customer requirements and Aruba
best practices.
Design detailed Aruba firewall policies including aliases for a guest, voice and
secure WLAN to meet customer requirements.
30% Essay Questions Answer typical customer questions on Aruba solutions including enterprise
Campus Design, Remote Access, VIA and RAP solutions, Aruba Instant and Cloud
based solutions, AirWave and Aruba Central management solutions and Meridian
features.
Provide a technical explanation of AP to Controller data-plane and control plane
communications, Controller Discovery Mechanisms and priorities, design of Aruba
mobility Solutions (Layer 2 and Layer 3 mobility). Switching features such as
VSF and stacking.
Provide detailed and comprehensive explanation of secure and guest Aruba WLAN
technologies such as AppRF, WIPS, RF Protect, and ClearPass. Additionally
explain the underlying dependencies, advantages and disadvantages of each
solution.
Explain QOS and voice prioritization technologies to optimize the network for
mobile and BYOD devices.
15% AirWave Visual RF Use the AirWave Visual RF Plan tool to create an RF design to meet the
customer requirements and Aruba best practices.
Move APs and AMs to the appropriate high density WLAN locations on a VisualRF
floor plan.
Create a Visual RF plan and export the RF as a customer deliverable on a given
customer floor plan.
10% IRIS Network Diagram Determine appropriate placement of Aruba equipment in IRIS topology diagram.
Place the proper equipment into the MDF/IDF groups for access, distribution,
core, or DMZ of the network diagram.
Make the connections between devices, switches to switch, switch to AP, MC, MM
and servers
Exam ID HPE0-A127P
Exam type Performance based
Exam duration 8 hours
Passing score 75%
Delivery languages English
Supporting resources These recommended resources help you prepare for the exam:
Register for this Exam You need an HPE Learner ID and an Aruba Learning Management System username
and password.
The HPE6-A81 ACCX Written Exam is required to be passed before the practical
exam. Once the written is passed, you will only have 18 months to pass the ACCX
Practical Exam. Candidates who do not pass the ACCX Practical Exam within 18
months will have to retake the current ACCX Written Exam. HPE recommends that
you register for the ACCX Practical Exam within 12 months of passing the written
exam to ensure that you pass in the allotted 18-month timeframe.
No reference material is allowed at the testing site. This exam may contain beta
test items for experimental purposes.
During the exam, you can make comments about the exam items. We welcome these
comments as part of our continuous improvement process.
Exam description The Aruba Certified ClearPass Expert Practical Exam tests your skills on
ClearPass design and configuration of authentication services. The exam scenario
tests many aspects that are common to enterprise network deployments, and
focuses on configuration elements that are considered of significance for larger
enterprise environments.
Ideal candidate for this exam
Typical candidates for this certification are networking IT professionals with a
minimum of three to five years experience in designing and integrating complex
enterprise-level mobile first networks.
Exam contents Here are types of questions to expect:
Other - This is a scenario based practical exam.
Advice to help you take this exam • Complete the recommended training and review all course materials and
documents before you take the exam.
• Candidates are expected to follow best practices during configuration, as per
the material covered in the ClearPass Essentials 6.7 and ClearPass Advanced labs
6.5 and 6.7 and Aruba Mobility serious courses.
• Familiarity with the ClearPass technotes (available on the support website) is
highly suggested. A selection of technotes and reference guides will be
available to the candidates during the exam.
• For the exam, the candidate will be expected to configure the following
equipment with code versions listed:
• ClearPass 6.8
• Aruba VMC 8.3
• Aruba IAP 8.3
• Cisco WLC 8.0
• Cisco 3560 Switch IPSERVICES 15.0(2) SE5
• Partial configurations will be provided for the Aruba VMC, Aruba Instant,
Cisco WLC and the Cisco switches. However, candidates may have to configure the
devices further to complete the objectives of the exam. In addition, there might
be other equipment present such as wired voice phones and Windows 10 laptops.
The wired voice phones will be pre-configured for the candidate. The candidate
is expected to know how to use Windows 10 laptops as client devices with
ClearPass.
Objectives
25% ClearPass Design and Basic Setup The most significant step towards completing the exam is to ensure that the
design of the ClearPass servers and the basic set up of the servers is in line
with the customers’ requirements (as per the exam scenario).
This includes understanding ClearPass clustering, certificates, integration with
external servers and network devices.
Redundancy is also a major component of the ACCX exam.
51% Aruba Controller/IAP Employee, Guest, NAC and BYOD
The exam will test candidates on their understanding of Microsoft Active
Directory integration, machine authentication, RADIUS accounting, CoA, posture
checks, guest web login, self-registration, sponsor approval, MAC caching and
device onboarding.
Candidates should understand the requirements for successfully deploying these
features, including any configuration necessary on ClearPass, the Aruba
controller or Instant AP.
This exam will test candidates on MDM and SQL server integration with ClearPass.
However, candidates will not be expected to configure an MDM server or SQL
server in the exam.
In addition, the exam will expect candidates to understand how Aruba devices
interact with redundant ClearPass servers.
16% Cisco Wired and WLAN Controller- Employee and Guest This exam tests candidates on the integration of Cisco wireless controllers
with ClearPass, including Microsoft Active Directory integration, machine
authentication, RADIUS accounting and CoA, guest web login, self-registration
and sponsor approval.
Candidates should understand the requirements for successfully deploying these
features including any configuration on ClearPass or the Cisco controller.
The exam tests candidates on their understanding of Wired 802.1X and MAC
authentication integration with Cisco Switches and ClearPass.
This exam expects candidates to have a comprehensive understanding of device
profiling, wired integration requirements and how Cisco devices interact with
redundant ClearPass servers.
8% Admin Accessing and Reporting An understanding of ClearPass as a management authentication server for
network devices.
ClearPass Policy Manager and Guest management authentication are required.
In addition, an understanding of how to use the ClearPass Insight tool is
expected.
Number of questions: 60
Number of questions to pass: 43
Time allowed: 90 mins
Status: Live
An IBM Certified Solution Advisor – IBM Cloud Foundations is an individual who
will engage with clients that are looking to select and design a solution that
is based on IBM Cloud. The Solution Advisor can come from a sales professional,
architect, consultant or developer background. They will have an appreciation
for the responsibilities of each of these roles, and know when to involve them
to deliver a successful outcome for their client. They can also demonstrate how
the leading industry, Open and IBM solution offerings can help customers realize
these benefits.
This exam consists of 6 sections as described below. For more detail, please see
the study guide on the Exam Preparation tab.
IBM Cloud Overview 25% Understand the types of Cloud deployment options
Explain the difference between SaaS, PaaS and IaaS
Understand the different IBM Cloud Account Types
Understand how to use the cost estimator tool
Understand the benefits of the IBM Multicloud strategy
Understand IBM Cloud Support Plans
Explain the benefits of Availability Zones
Understand the international compliance standards that are used by IBM Cloud
Explain the features and benefits of Identity and Access Management (IAM)
Compute Options 22% Understand the benefits and options of Classic Infrastructure
Understand the benefits and options for IBM Kubernetes Service
Understand the benefits and options for IBM Red Hat OpenShift
Understand the benefits and options for IBM Virtual Private Cloud (Gen 1 & Gen
2)
Understand the benefits and options for IBM VMware Solutions
Understand the benefits and options for IBM Cloud Foundry
Storage and Networking 15% Understand the benefits and options of IBM File Storage
Understand the benefits and options of IBM Block Storage
Understand the benefits and options of IBM Cloud Object Storage
Understand the benefits and options of IBM Backup, Recovery and Replication
Solutions
Understand the benefits and options of IBM Cloud Networking
Services 23% Understand the different Application Integration options on IBM Cloud
Explain how Internet of Things (IoT) can be leveraged within IBM Cloud
Describe the value of Blockchain
Explain how DevOps is implemented in IBM Cloud and OpenShift
Understand the benefits and capabilities of adding AI into applications
Understand the different analytics options
Understand the different Database options
Understand the benefits and options of IBM Hyper Protect Crypto services
Understand the benefits and options of IBM Hyper Protect DB as a Service (DBaaS)
Software (IBM Cloud Paks) 7% Understand the benefits and capabilities of IBM Cloud Paks
Understand the benefits and capabilities of IBM Cloud Pak Solutions
Number of questions: 60
Number of questions to pass: 35
Time allowed: 90 mins
Status: Live
The IBM Spectrum Protect V8.1.9 Administration exam covers the features and
functionality of IBM Spectrum Protect V8.1.9. This administrator is capable of
performing the intermediate to advanced tasks related to daily management,
operations, security, performance, installation and configuration of
enhancements, customizations and/or problem determination.
IBM Spectrum Protect V8.1.9 Administration 100%
Section 1 - IBM Spectrum Protect V8.1.9 Concepts List IBM Spectrum Protect V 8.1.9 server components
Describe Spectrum Protect V8.1.9 client components
Describe the different IBM Spectrum Protect 8.1.9 data management methodologies
such as: progressive incremental, differential, full
Describe IBM Spectrum Protect 8.1.9 server (critical – most typical/relevant)
processes
Describe Spectrum Protect V8.1.9 Operations Center tasks/functions
Describe IBM Spectrum Protect V8.1.9 monitoring and alerting
Explain IBM Spectrum Protect V 8.1.9 deduplication (inline/client side)
Describe the purpose of IBM Spectrum Protect for Databases and IBM Spectrum
Protect for Mail
Describe the data protection methods available in IBM Spectrum Protect for
virtual environments
Describe IBM Spectrum Protect 8.1.9 Windows/UNIX backup/archive client automatic
deployment.
Explain Node Replication feature in IBM Spectrum Protect V8.1.9
Describe IBM Spectrum Protect V8.1.9 multiple data streams for database backup
and restore
Explain IBM Spectrum Protect 8.1.9 Policy management
Explain how IBM Spectrum Protect V8.1.9 technologies and functionalities work
with Object Storage and cloud providers. (tiering)
Explain the integration between IBM Spectrum Protect V8.1.9 and IBM Spectrum
Protect Plus V10.1.5 (agent must exist)
Explain encryption and security in IBM Spectrum Protect storage pools and
communications.
Section 2 - IBM Spectrum Protect V8.1.9 Daily Operations
Monitor ongoing health of the IBM Spectrum Protect V8.1.9 environment using the
IBM Spectrum Protect V8.1.9 Operations Center
Monitor/ schedule client operations
|Monitoring and scheduling maintenance operations
Rotate tapes offsite (DR media management)
Section 3 - IBM Spectrum Protect V8.1.9 Server Management Monitor and manage IBM Spectrum Protect database and recovery log usage
Protect the directory container storage pools
Manage Node Replication
Manage device classes and storage pools including active data pools,
deduplication pools, simultaneous write during storage pool migration, and data
shredding
Enable command approval for authorization.
Manage policy domain, policy sets, management class, and copy groups
Manage long-term retention using retention sets.
Manage library, drives, and paths
Configure, monitor and manage server-to-server communication tasks in a IBM
Spectrum Protect server netrwork
Manage disaster recovery (DR) components, DR plan file, and off-site media with
Disaster Recovery Manager.
Describe client node management in IBM Spectrum Protect 8.1.9
Protect the IBM Spectrum Protect Database
Manage administrative users (add, delete and provide privileges).
Manage day to day data movement between IBM Spectrum Protect storage pools
including tiering and migration. Containers going to tape
Repair damaged data in a directory container
Manage replicated data with policies that are defined on the target replication
server
Configure daily or monthly reports regarding server operations within Operations
Center.
Section 4 - IBM Spectrum Protect V8.1.9 Client Management
Install IBM Spectrum Protect backup/archive clients and configure the option
files
Manage IBM Spectrum Protect client component and services (e.g., configure and
manage a BA client scheduler, web access, journal daemon or journal engine
service etc.)
Manage Spectrum Protect V8.1.9 client security and encryption (e.g., configure
Spectrum Protect V8.1.9 client behind a proxy server or firewall, password
encryption, client data encryption, Secure Socket Layer (SSL), etc.)
Configure alternative IBM Spectrum Protect backup/archive methodologies (e.g.,
configure IBM Spectrum Protect journal based backup, Image backup, Inline
deduplication, configure data archive, etc.)
Configure IBM Spectrum Protect LAN-free backup restore
Monitor IBM Spectrum Protect for NDMP operations
Configure an IBM Spectrum Protect Client for Node Replication
Manage IBM Spectrum Protect client/node authorization
Recover IBM Spectrum Protect V8.1.9 client data (Backup/Archive data)
Manage client data (Decommission a client node; move data between storage pools;
move node data)
Upgrade the BA Client software through the Operations Center.
Section 5 - IBM Spectrum Protect V8.1.9 Performance and Problem Determination
Identify/analyze IBM Spectrum Protect Server problems
Identify/analyze errors reported in IBM Spectrum Protect reported by the IBM
client.
Troubleshoot possible security attacks with the Security Notification Panel in
the Operations Center.
Tune IBM Spectrum Protect V8.1.9 server for better performance (e.g.,
reclamation, expiration, migration, IBM Spectrum Protect V8.1.9 server database
backup, IBM Spectrum Protect V8.1.9 server settings and recommend network
changes to support and tune IBM Spectrum Protect DB2 table and index reorgs,
etc.).
Tune IBM Spectrum Protect Client for better performance (e.g.,
resourceutilization, memoryefficient, compression, deduplication, recommend
network changes to support and tune IBM Spectrum Protect, etc.)
Troubleshoot and tune IBM Spectrum Protect LAN-free client configuration
Troubleshoot tape device class (tape libraries, tape drives and tape cartridges)
in IBM Spectrum Protect V8.1.9
Troubleshoot Spectrum Protect V8.1.9 client using Spectrum Protect V8.1.9 Client
Management Services
Analyze Operating System error reporting or perfmon logs
CompTIA Cybersecurity Analyst (CySA+) is an IT workforce
certification that applies behavioral analytics to networks and devices to
prevent, detect and combat cybersecurity threats through continuous security
monitoring.
Why is it different? CompTIA CySA+ is the only intermediate high-stakes cybersecurity analyst
certification with both hands-on, performance-based questions and
multiple-choice questions.
CySA+ focuses on the candidates ability to not only proactively capture,
monitor, and respond to network traffic findings, but also emphasizes software
and application security, automation, threat hunting, and IT regulatory
compliance, which affects the daily work of security analysts.
CySA+ covers the most up-to-date core security analyst skills and upcoming job
skills used by threat intelligence analysts, application security analysts,
compliance analysts, incident responders/handlers, and threat hunters, bringing
new techniques for combating threats inside and outside of the Security
Operations Center (SOC)
About the exam New CompTIA CySA+ (CS0-002) exam available April 21!
The beta exam has ended. If you took the CompTIA CySA+ certification beta exam, thank you! You will
be receiving an email from Certmetrics in the near future which will contain
important information and detailed instructions regarding how to download your
PDF beta score report.
As attackers have learned to evade traditional signature-based solutions, such
as firewalls and anti-virus software, an analytics-based approach within the IT
security industry is increasingly important for organizations. CompTIA CySA+
applies behavioral analytics to networks to improve the overall state of
security through identifying and combating malware and advanced persistent
threats (APTs), resulting in an enhanced threat visibility across a broad attack
surface. It will validate an IT professional’s ability to proactively defend and
continuously improve the security of an organization. CySA+ will verify the
successful candidate has the knowledge and skills required to:
Leverage intelligence and threat detection techniques
Analyze and interpret data
Identify and address vulnerabilities
Suggest preventative measures
Effectively respond to and recover from incidents
CompTIA CySA+ meets the ISO 17024 standard and is approved by U.S. Department of
Defense to fulfill Directive 8570.01-M requirements. It is compliant with
government regulations under the Federal Information Security Management Act (FISMA).
Regulators and government rely on ANSI accreditation because it provides
confidence and trust in the outputs of an accredited program. Over 2.3 million
CompTIA ISO/ANSI-accredited exams have been delivered since January 1, 2011.
What Skills Will You Learn?
Threat and Vulnerability Management Utilize and apply proactive threat intelligence to support organizational
security and perform vulnerability management activities
Security Operations and Monitoring Analyze data as part of continuous security monitoring activities and
implement configuration changes to existing controls to improve security
Software and Systems Security Apply security solutions for infrastructure management and explain software
& hardware assurance best practices
Incident Response Apply the appropriate incident response procedure, analyze potential
indicators of compromise, and utilize basic digital forensics techniques
Compliance and Assessment Apply security concepts in support of organizational risk mitigation and
understand the importance of frameworks, policies, procedures, and controls
Jobs that use CompTIA CySA+
Security analyst -Tier II SOC analyst
-Security monitoring
Threat intelligence analyst Security engineer
Application security analyst Incident response or handler
Compliance analyst Threat hunter
The new exam has been updated to address industry changes, as well as the need
for security analysts to focus on software security and be more proactive with
their defense and threat intelligence. Security Analysts must also ensure their
tasks comply to IT regulatory standards that affect their daily work. With the
end goal of proactively defending and continuously improving the security of an
organization, CySA+ will verify the successful candidate has the knowledge and
skills required to:
Leverage intelligence and threat detection techniques
Analyze and interpret data
Identify and address vulnerabilities
Suggest preventative measures
Effectively respond to and recover from incidents
QUESTION 1 An analyst is performing penetration testing and vulnerability assessment
activities against a new vehicle automation platform.
Which of the following is MOST likely an attack vector that is being utilized as
part of the testing and assessment?
A. FaaS
B. RTOS
C. SoC
D. GPS
E. CAN bus
Correct Answer: B
Explanation:
IoT devices also often run real-time operating systems (RTOS). These are either
special purpose operating
systems or variants of standard operating systems designed to process data
rapidly as it arrives from sensors
or other IoT components.
QUESTION 2 An information security analyst observes anomalous behavior on the SCADA
devices in a power plant. This
behavior results in the industrial generators overheating and destabilizing the
power supply.
Which of the following would BEST identify potential indicators of compromise?
A. Use Burp Suite to capture packets to the SCADA device's IP.
B. Use tcpdump to capture packets from the SCADA device IP.
C. Use Wireshark to capture packets between SCADA devices and the management
system.
D. Use Nmap to capture packets from the management system to the SCADA devices.
Correct Answer: C
QUESTION 3 Which of the following would MOST likely be included in the incident
response procedure after a security breach of customer PII?
A. Human resources
B. Public relations
C. Marketing
D. Internal network operations center
Number of questions: 60
Number of questions to pass: 42
Time allowed: 90 mins
Status: Live
An IBM Certified Administrator on IBM Db2 12 for z/OS is the lead database
administrator for the Db2 product on the z/OS operating system. This individual
has significant experience as a DBA and extensive knowledge of Db2, up to and
including Db2 12 for z/OS Function Level 506. This individual is capable of
performing intermediate to advanced tasks related to database design and
implementation, operation and recovery, security and auditing, distributed
connectivity, performance, installation and migration/upgrades specific to the
z/OS operating system.
This exam consists of 7 sections described below. For more detail, please see
the study guide on the Exam Preparation tab.
Section 1: Database Design and Implementation 22% Design tables and views
Explain the different performance implications of identity column, ROWID, and
sequence column definitions
Design indexes
Design universal table spaces
Perform partitioning
Normalize data (E-R model, process model) and translate data model into physical
model
Understand and describe Db2 database enforced integrity rules
Use the appropriate method to alter Db2 objects
Explain the use and impact of different encoding schemes
Section 2: Operation and Recovery 20% Explain and execute commands and subcommands for normal operational
conditions
Explain and execute commands and utility control statements for use in abnormal
conditions
Load and unload data into and from Db2 tables
Reorganize objects when necessary
Monitor objects by collecting statistics
Monitor and manage threads and utilities
Identify and respond to advisory/restrictive statuses on Db2 objects
Identify and perform problem determination
Perform object and catalog/directory health checks
Identify and perform actions needed to protect databases from planned and
unplanned outages
Identify and perform actions needed to recover data to a consistent point in
time
Section 3: Security and Auditing 10% Explain privileges and authorities
Protect access to Db2 and its objects
Audit Db2 activity and resources and identify primary audit techniques
Identify and respond appropriately to symptoms from trace output or error
messages that signify security problems
Explain and use roles, trusted context, data masking and encryption
Section 4: Performance 21% Plan for performance monitoring by setting up and running monitoring
procedures
Analyze performance (manage and tune CPU requirements, memory, I/O, locks,
response time, index and table compression)
Analyze and respond to RUNSTATS statistics analysis
Determine when and how to perform REBIND
Describe Db2 interaction with Workload Manager (WLM)
Review and tune SQL
Monitor dynamic SQL performance
Design features for performance
Explain how to control and influence access paths
Section 5: Installation and Migration 9% Recommend settings for critical Db2 system parameters
Identify and explain Db2 data sharing components and commands
Describe use of premigration checklists
Describe the function of the catalog and directory
Demonstrate understanding of the Db2 12 continuous delivery process
Explain the migration process and activation of new function levels
Section 6: Additional Database Functionality 9% Explain and use SQL constructs
Explain the use of stored procedures
Explain the use of SQL/XML and XQuery
Explain the use of user-defined functions
Explain and use global variables
Describe the use of triggers, merge statement, pagination options and JSON
support
Section 7: Distributed Access 9% Demonstrate understanding of distributed data access and the role of the
communications database
Demonstrate understanding of Distributed Data Facility (DDF) implementation
options
Recommend values for critical DDF configuration settings
Understanding and implementing distributed data access
Describe Db2 support for Native REST services and differentiate from RESTful API
Actualkey IBM
C1000-078 exam pdf,
Certkingdom IBM
C1000-078 PDF Best IBM
C1000-078 Certification,
IBM C1000-078 Training
at certkingdom.com
Number of questions: 60
Number of questions to pass: 37
Time allowed: 90 mins
Status: Live
The IBM Spectrum Protect Plus V10.1.5 Implementation exam covers the planning,
installation, configuration, administration, and problem determination of an IBM
Spectrum Protect Plus V10.1.5 implementation.
IBM Spectrum Protect Plus V10.1.5 Implementation 100%
Section 1 - Planning Determine customer’s needs/requirements
Use the IBM Spectrum Protect Plus Blueprints and Sizer Spreadsheet
Analyze the output from the sizer and the implications on the installation.
Section 2 - Acquisition and deployment of Software Acquire software (free trial; proper entitlement)
Deploy SPP Server
Deploy VSNAP Storage Server and the VADP proxy server
Deploy vSnap storage server in AWS
Section 3 - Configuration Configure VSNAP storage server(s)
Configure/Manage VADP Backup Proxy Server
Create and update Site Attributes
Configure and Provide credentials for hypervisors and applications
Discover virtual machines and databases
Configure LDAP& SMTP
Configure vsnap server replication
Set up Role-based access control (RBAC)
Define/configure backup policy service level agreements
Configure Offload to Spectrum Protect or to Cloud Provider
Configure Archive to Spectrum Protect or to Cloud Provider
Configure Hyperviser Backup Jobs
Configure Application Backups
Configure file indexing (optional)
Section 4 - Data Protection and Recovery Operations
Manage jobs (start, stop, hold)
Restore a VM
Perform a File Level Restore
Restore an application database and log files
Restore Exchange Databases and Individual Messages
Section 5 - Administration Utilize the Administration Console
Upgrade/patch the SPP server (apply fixes)
Update the vSnap Server.
Upgrade/patch the VADP proxy server
Stop and start servers
Monitor System jobs
Backup and Restore IBM Spectrum Protect Plus Catalog
Customize and run reports
Section 6 - Problem Determination
Use logs for troubleshooting (backup, job monitoring, collect logs for support)
Troubleshoot failed jobs
Troubleshoot security/credential failures (access failures)
Troubleshoot VSNAP storage issues
Troubleshoot network/port failures (DNS)
Number of questions: 61
Number of questions to pass: 40
Time allowed: 90 mins
Status: Live
The IBM Spectrum Control V5.3.5 Implementation exam covers planning,
configuration, customization, administration, and troubleshooting, as well as
Advanced Analytics of IBM Spectrum Control into a storage environment.
The general comments normally go here
IBM Spectrum Control V5.3.5 Implementation 100%
Section 1 - Planning Verify platform requirements and compatibility, product licensing, and
network considerations.
Determine user credentials and Authentication requirements to be used to install
or later in configuration of IBM Spectrum Control.
Determine storage subsystem management requirements to facilitate workload
automation, reporting, alerting, etc..
Ensure and verify all IBM Spectrum Control installation requirements are met and
cross reference the support matrix.
Determine if a new install or migration/upgrade for server and agent is needed.
Section 2 - Installation Ensure availability of correct IBM Spectrum Control media and license files.
Perform IBM Spectrum Control installation steps.
Troubleshoot IBM Spectrum Control for installation errors.
Section 3 - Configuration Check support matrix (connected devices).
Add and configure devices (servers, switches, storage).
Define and create schedules.
Configure History settings.
Configure Alert notifications.
Configure Alerting.
Review and update agentless servers.
Configure Roll-up servers.
Configure License Compliance Panel.
Deploy Storage Resource Agents (SRA).
Manage Authentication.
Section 4 - Customization and Administration
Interact with an SRA.
Perform Application Administration, Maintenance and Support.
Manage authentication (local OS and LDAP), role based authorization and role to
group mappings.
Configure resources history retention.
Create reports for subsystems, SANs, switches and SRAs.
View the performance of specific storage systems, switches and their internal
resources.
View the pool’s historical capacity and verify when the pool will run out of
space.
Verify managed capacity and check licensing.
Interact with Groups (applications, departments and general groups).
Define and Set Tiers to Storage pools in order to be able to use the VSC
advanced Functions.
Administer the database (run re-org of database).
Describe role-based authorization in IBM Spectrum Control.
Identify and configure alerts.
Replace default SSL certificates.
Start and stop processes and components (Scripts, Web UI and Services).
Change Spectrum Control, Cognos and monitored devices passwords and verify the
changes are successful.
Section 5 - Troubleshoot IBM Spectrum Control Installation
Analyze the overall status of the managed environment, investigate device
condition and root causes, resolve and acknowledge statuses.
Determine the status of IBM Spectrum Control components.
Collect problem information to send to Support via cases.
Configure alerting to report on errors sent to IBM Spectrum Control to
facilitate troubleshooting.
Troubleshoot scheduling for jobs or tasks.
Configure tracing.
Gather Support log files.
Troubleshoot disconnected devices.
Troubleshoot the database.
Section 6 - Troubleshoot Performance Issues
Verify monitored devices accurately display the correct connected resources.
Analyze IBM Spectrum Control scheduled tasks, performance metrics and alerts.
Troubleshoot Operating systems.
Troubleshoot Database.
Troubleshoot Spectrum Control software.
Section 7 - Advanced Analytics
Optimize the placement of volumes on storage tiers and analyze the tiering of
volumes.
Balance pools.
Define Service Classes.
Work with Capacity Pools.
Transform Storage Volumes.
Provision storage.
Identify wasted capacity that could potentially be reclaimed and repurposed
using the IBM Spectrum Control Reclamation panel.
Number of questions: 61
Number of questions to pass: 40
Time allowed: 90 mins
Status: Live
The IBM Spectrum Control V5.3.5 Implementation exam covers planning,
configuration, customization, administration, and troubleshooting, as well as
Advanced Analytics of IBM Spectrum Control into a storage environment.
The general comments normally go here
IBM Spectrum Control V5.3.5 Implementation 100%
Section 1 - Planning Verify platform requirements and compatibility, product licensing, and
network considerations.
Determine user credentials and Authentication requirements to be used to install
or later in configuration of IBM Spectrum Control.
Determine storage subsystem management requirements to facilitate workload
automation, reporting, alerting, etc..
Ensure and verify all IBM Spectrum Control installation requirements are met and
cross reference the support matrix.
Determine if a new install or migration/upgrade for server and agent is needed.
Section 2 - Installation Ensure availability of correct IBM Spectrum Control media and license files.
Perform IBM Spectrum Control installation steps.
Troubleshoot IBM Spectrum Control for installation errors.
Section 3 - Configuration Check support matrix (connected devices).
Add and configure devices (servers, switches, storage).
Define and create schedules.
Configure History settings.
Configure Alert notifications.
Configure Alerting.
Review and update agentless servers.
Configure Roll-up servers.
Configure License Compliance Panel.
Deploy Storage Resource Agents (SRA).
Manage Authentication.
Section 4 - Customization and Administration
Interact with an SRA.
Perform Application Administration, Maintenance and Support.
Manage authentication (local OS and LDAP), role based authorization and role to
group mappings.
Configure resources history retention.
Create reports for subsystems, SANs, switches and SRAs.
View the performance of specific storage systems, switches and their internal
resources.
View the pool’s historical capacity and verify when the pool will run out of
space.
Verify managed capacity and check licensing.
Interact with Groups (applications, departments and general groups).
Define and Set Tiers to Storage pools in order to be able to use the VSC
advanced Functions.
Administer the database (run re-org of database).
Describe role-based authorization in IBM Spectrum Control.
Identify and configure alerts.
Replace default SSL certificates.
Start and stop processes and components (Scripts, Web UI and Services).
Change Spectrum Control, Cognos and monitored devices passwords and verify the
changes are successful.
Section 5 - Troubleshoot IBM Spectrum Control Installation
Analyze the overall status of the managed environment, investigate device
condition and root causes, resolve and acknowledge statuses.
Determine the status of IBM Spectrum Control components.
Collect problem information to send to Support via cases.
Configure alerting to report on errors sent to IBM Spectrum Control to
facilitate troubleshooting.
Troubleshoot scheduling for jobs or tasks.
Configure tracing.
Gather Support log files.
Troubleshoot disconnected devices.
Troubleshoot the database.
Section 6 - Troubleshoot Performance Issues
Verify monitored devices accurately display the correct connected resources.
Analyze IBM Spectrum Control scheduled tasks, performance metrics and alerts.
Troubleshoot Operating systems.
Troubleshoot Database.
Troubleshoot Spectrum Control software.
Section 7 - Advanced Analytics
Optimize the placement of volumes on storage tiers and analyze the tiering of
volumes.
Balance pools.
Define Service Classes.
Work with Capacity Pools.
Transform Storage Volumes.
Provision storage.
Identify wasted capacity that could potentially be reclaimed and repurposed
using the IBM Spectrum Control Reclamation panel.
Candidates for this exam are Developers who work with Finance and Operations
apps in Microsoft Dynamics 365 to implement and extend applications to meet the
requirements of the business. Candidates provide fully realized solutions by
using standardized application coding patterns, extensible features, and
external integrations.
Candidates are responsible for developing business logic by using X++, creating
and modifying Finance and Operations reports and workspaces, customizing user
interfaces, providing endpoints and APIs to support Power Platform apps and
external systems, performing testing, monitoring performance, analyzing and
manipulating data, creating technical designs and implementation details, and
implementing permission policies and security requirements.
Candidates participate in the migration of data and objects from legacy and
external systems, integration of Finance and Operations apps with other systems,
implementation of application lifecycle management process, planning the
functional design for solutions, and managing Finance and Operations
environments by using Lifecycle Services (LCS).
Candidates should have a deep knowledge and experience using the underlying
framework, data structures, and objects associated with the Finance and
Operations solutions.
Candidates should have experience with products that include Visual Studio,
Azure DevOps, LCS tools, or SQL Server Management Studio.
Candidates should have experience in developing code by using object-oriented
programming languages, analyzing and manipulating data by using Transact-SQL
code, and creating and running Windows PowerShell commands and scripts.
Skills measured The content of this exam was updated on May 22, 2020. Please download the
exam skills outline below to see what changed.
Plan architecture and solution design (10-15%)
Apply developer tools (10-15%)
Design and develop AOT elements (20-25%)
Develop and test code (10-15%)
Implement reporting (10-15%)
Integrate and manage data solutions (10-15%)
Implement security and optimize performance (10-15%)
Audience Profile Candidates for this exam are developers who work with Finance
and Operations apps in Microsoft Dynamics 365 to implement and extend
applications to meet the requirements of the business. Candidates provide fully
realized solutions by using standardized application coding patterns, extensible
features, and external integrations. Candidates are responsible for developing
business logic by using X++, creating and modifying Finance and Operations
reports and workspaces, customizing user interfaces, providing endpoints and
APIs to support Power Platform apps and external systems, performing testing,
monitoring performance, analyzing and manipulating data, creating technical
designs and implementation details, and implementing permission policies and
security requirements. Candidates participate in the migration of data and
objects from legacy and external systems, integration of Finance and Operations
apps with other systems, implementation of application lifecycle management
process, planning the functional design for solutions, and managing Finance and
Operations environments by using Lifecycle Services (LCS). Candidates should
have a deep knowledge and experience using the underlying framework, data
structures, and objects associated with the Finance and Operations solutions.
Candidates should have experience with products that include Visual Studio,
Azure DevOps, LCS tools, SQL Server Management Studio. Candidates should have
experience in developing code by using object-oriented programming languages,
analyzing and manipulating data by using Transact-SQL code, and creating and
running Windows PowerShell commands and scripts. Skills Measured NOTE: The
bullets that appear below each of the skills measured are intended to illustrate
how we are assessing that skill. This list is not definitive or exhaustive.
NOTE: In most cases, exams do NOT cover preview features, and some features will
only be added to an exam when they are GA (General Availability).
Plan architecture and solution design (10-15%) Identify the major components of Dynamics 365 Finance and Dynamics 365
Supply Chain Management
select application components and architecture based on business components
identify architectural differences between the cloud and on-premises versions
of Finance and Operations apps
prepare and deploy the deployment package identify components of the
application stack and map them to the standard models
differentiate the purpose and interrelationships between packages, projects,
models, and elements
Design and implement a user interface describe the Finance and Operations user interface layouts and components
design the workspace and define navigation
select page options
identify filtering options
Implement Application Lifecycle Management (ALM)
create extension models
configure the DevOps source control process
describe the capabilities of the Environment Monitoring Tool within Lifecycle
Services (LCS)
select the purpose and appropriate uses of LCS tools and components
research and resolve issues using Issue Search
identify activities that require asset libraries
Apply Developer Tools (10-15%)
Customize Finance and Operations apps by using Visual Studio design and build projects
manage metadata using Application Explorer
synchronize data dictionary changes with the application database
create elements by using the Element Designer
Manage source code and artifacts by using version control create, check out, and check in code and artifacts
compare code and resolve version conflicts
Implement Finance and Operations app framework functionality implement the SysOperation framework
implement asynchronous framework
implement workflow framework
implement the unit test framework
identify the need for and implement the Sandbox framework
Design and develop AOT Elements (20-25%)
Create forms add a new form to a project and apply a pattern (template)
configure a data source for the form
add a grid and grid fields and groups
create and populate menu items
test form functionality and data connections
add a form extension to a project for selected standard forms
Create and extend tables add tables and table fields to a project
populate table and field properties
add a table extension to a project for a table
add fields, field groups, relations, and indices
Create Extended Data Types (EDT) and enumerations add an EDT to a project and populate EDT properties
add an enumeration to a project
add or update enumeration elements
add or update enumeration element properties
add an extension of EDT and enumerations
Create classes and extend AOT elements add a new class to a project
create a new class extension and add new methods
add event handler methods to a class
Develop and test code (10-15%)
Develop X++ code identify and implement base types and operators
implement common structured programming constructs of X++
create, read, update, and delete (CRUD) data using embedded SQL code
identify and implement global functions in X++
ensure correct usage of Display Fields
implement table and form methods
Develop object-oriented code
implement X++ variable scoping
implement inheritance and abstraction concept
implement query objects and QueryBuilder
implement attribute classes
implement chain of command
Implement reporting (10-15%) Describe the capabilities and limitations of reporting tools in Dynamics 365
FO
create and modify report data sources and supporting classes
implement reporting security requirements
describe the report publishing process
describe the capabilities of the Electronic reporting (ER) tool
Describe the differences between using Entity store and Bring your own
database (BYOD) as reporting data stores.
Design, create, and revise Dynamics Reports create and modify reports in Finance and Operations apps that use SQL
Server Reporting Services (SSRS)
create and modify Finance and Operations apps reports by using Power BI
create and modify Finance and Operations apps reports FO by using Microsoft
Excel
Design, create, and revise Dynamics workspace design KPIs
create drill-through workspace elements
implement built-in charts, KPIs, aggregate measurement, aggregate dimension,
and other reporting components
Integrate and manage data solutions (10-15%)
Identify data integration scenarios select appropriate data integration capabilities
identify differences between synchronous vs. asynchronous scenarios
Implement data integration concepts and solutions develop a data entity in Visual Studio
develop, import, and export composite data entities
identify and manage unmapped fields in data entities
consume external web services by using OData and RESTful APIs
integrate Finance and Operations apps with Excel by using OData
develop and integrate Power Automate and Power Apps
Implement data management import and export data using entities between Finance and Operations apps
and other systems
monitor the status and availability of entities
enable Entity Change Tracking
set up a data project and recurring data job
design entity sequencing
generate field mapping between source and target data structures
develop data transformations
Implement security and optimize performance (10-15%)
Implement role-based security policies and requirements create or modify duties, privileges, and permissions
enforce permissions policy
implement record-level security by using Extensible Data Security (XDS)
Apply fundamental performance optimization techniques identify and apply caching mechanisms
create or modify temp tables for optimization
determine when to use set-based queries and row-based queries
modify queries for optimization
modify variable scope to optimize performance
analyze and optimize concurrency
Optimize user interface performance diagnose and optimize client performance by using browser-based tools
diagnose and optimize client performance by using Performance Timer
QUESTION 1
You are Dynamics 365 Finance and Operations developer.
You need to explain the performance advantages of the different concurrency
models.
What are three performance advantages of optimistic concurrency control over
pessimistic concurrency control? Each control answer presents a complete
solution.
NOTE: Each correct selection is worth one point.
A. Records are locked as soon as they are retrieved from the database.
B. Records remain available for other processes while they are selected from the
database.
C. Records are locked for a shorter length of time.
D. Fewer resources are used to lock records during updates.
Correct Answer: B,C,D
QUESTION 2 You need to configure security for the Vendor Exclusion List report.
What are two possible ways to achieve this goal? Each correct answer presents a
complete solution.
NOTE: Each correct selection is worth one point.
A. Create a new privilege, add a reference to an output menu item, and then add
the new privilege to a role.
B. Create a new security policy and add an output menu item. Add the new
security policy to duty extension and then to a role extension.
C. Create a new privilege extension and add an output menu item. Add the
privilege to a duty extension and then to a role extension.
D. Create a new privilege and assign it to an output menu item. Add the new
privilege to a duty extension and then add the duty extension to a role.
Correct Answer: A,D
QUESTION 3 You are a Dynamics 365 Finance developer.
You make changes to an existing class.
You need to compare the code that is in source control with the updated class.
In Visual Studio, you display
Team Explorer.
What are three possible ways to achieve the goal? Each correct answer presents a
complete solution.
NOTE: Each correct selection is worth one point.
A. In Team Explorer, select Compare with Latest Version.
B. In Team Explorer, select Compare with Workspace Version.
C. In Team Explorer, select Compare Files.
D. Run the tf diff command.
E. Run the vsdiffmerge command.
Correct Answer: A,B,D
QUESTION 4 Contoso, Ltd. uses Dynamics 365 Unified Operations.
You receive reports of performance issues with the app.
You need to use Performance Timer to investigate the issues.
Which URL should you use?
A. https://contoso.cloudax.dynamics.com/?cmp=USMF&debug=perftimer
B. https://contoso.cloudax.dynamics.com/?cmp=USMF&debug=develop&mi=VendTableListPage
C. https://contoso.cloudax.dynamics.com/?cmp=USMF&mi=performancetimer
D. https://contoso.cloudax.dynamics.com/?cmp=USMF=debug=developer
Number of questions: 61
Number of questions to pass: 45
Time allowed: 90 mins
Status: Live
This intermediate-level exam is for those that are self-sufficient in planning,
installing, and configuring an IBM FileNet P8 V5.5.3 environment.
This exam consists of four sections described below. For more detail, please see
the study guide on the Exam Preparation tab.
Section 1: Planning, Preparation, and Security 25% Identify requirements for high availability, architecture, and supported
environments. (including network ports, software compatibility report, fix pack
compatibility report)
Identify the user accounts required for FileNet P8 platform.
Identify database requirements.
Identify LDAP requirements.
Define storage options for object stores.
Define/Identify application server configuration requirements.
Identify basic performance settings.
Section 2: Installation and Upgrade 30% Install FileNet P8 in either a single-server or multi-server environment.
Utilize the Configuration Manager tool.
Upgrade FileNet P8 in either a single-server or multi-server environment.
Section 3: Configuration 25% Define the proper procedures for initial startup tasks.
Create and configure domains, object stores, database storage areas, file
storage areas, workflow systems, and fixed content devices.
Configure Content Search Services.
Differentiate between various CFS configurations.
Configure SSL connections to CPE.
Configure client application connections to CPE (Content Platform Engine).
Configure CPE in an SSO environment.
Section 4: Troubleshooting and System Validation 20% Identify tools to monitor upgrade status (AutomaticUpgradeStatus, log
files).
Identify and use log files for troubleshooting.
Identify and use the tools for system validation.
Number of questions: 61
Number of questions to pass: 45
Time allowed: 90 mins
Status: Live
This intermediate-level exam is for those that are self-sufficient in planning,
installing, and configuring an IBM FileNet P8 V5.5.3 environment.
This exam consists of four sections described below. For more detail, please see
the study guide on the Exam Preparation tab.
Section 1: Planning, Preparation, and Security 25% Identify requirements for high availability, architecture, and supported
environments. (including network ports, software compatibility report, fix pack
compatibility report)
Identify the user accounts required for FileNet P8 platform.
Identify database requirements.
Identify LDAP requirements.
Define storage options for object stores.
Define/Identify application server configuration requirements.
Identify basic performance settings.
Section 2: Installation and Upgrade 30% Install FileNet P8 in either a single-server or multi-server environment.
Utilize the Configuration Manager tool.
Upgrade FileNet P8 in either a single-server or multi-server environment.
Section 3: Configuration 25% Define the proper procedures for initial startup tasks.
Create and configure domains, object stores, database storage areas, file
storage areas, workflow systems, and fixed content devices.
Configure Content Search Services.
Differentiate between various CFS configurations.
Configure SSL connections to CPE.
Configure client application connections to CPE (Content Platform Engine).
Configure CPE in an SSO environment.
Section 4: Troubleshooting and System Validation 20% Identify tools to monitor upgrade status (AutomaticUpgradeStatus, log
files).
Identify and use log files for troubleshooting.
Identify and use the tools for system validation.