Tuesday, October 24, 2017

C8010-440 IBM Interact V9.1.x

Number of questions: 68
Number of questions to pass: 43
Time allowed: 90 mins

This multiple-choice test contains questions requiring single and multiple answers. For multiple-answer questions, you need to choose all required options to get the answer correct. You will be advised how many options make up the correct answer.
This test is designed to provide diagnostic feedback on the Examination Score Report, correlating back to the test objectives, informing the test taker how he or she did on each section of the test. As a result, to maintain the integrity of each test, questions and answers are not distributed.

The test contains six sections totalling 68 multiple-choice questions. The percentages after each section title reflect the approximate distribution of the total question set across the sections.

Section 1 - Fundamental Concepts 25%
Set up interactive channels
Build and test interactive flowcharts
Configure interaction strategy and offers
Explain how Interactive List process box (ILPB) can be used
Understand the learning mechanism within Interact and its effects on offer suggestion
Understand events, event patterns, multi-phase event patterns and advanced patterns
Understand high-level architecture of IBM Interact
Understand common IBM Interact use cases and implementations
Understand how parameterized offer attributes affect offer inclusion and offer personalization
Understand how to use/configure offer constraints
Understand reporting

Section 2 - Sizing, Planning, Installation, and Architecture 14%
Define the supported environments
Explain possible runtime architecture for high availabilty
Identify software and hardware requirements for the installation
Install IBM Marketing Platform, IBM Campaign and IBM Interact applications
Set up database schemas (i.e. runtime, learning, profile and design time)
Demonstrate knowledge of upgrade procedures
Configure runtime servers

Section 3 - Configuration 18%
Set up required and optional IBM Interact datasources
Define custom audience levels and the related tables in IBM Interact
Demonstrate knowledge of setting up security, user roles and policies for IBM Interact design objects
Configure contact and response history staging
Configure session management (IBM Interact cache, patternstate cache, external cache, Ehcache and threadManagement)
Configure and use cross-session services
Determine when to use memory cache versus external loader file
Configure and use eventActivity and eventPattern
Configure and use defaultedStats, eligOpsStats

Section 4 - Learning, Contact and Response History, and Extract, Transform, Load (ETL) 6%
Understand the database tables related to learning
Configure different learning methods/models (i.e. at the global level and at the interactive channel level)
Understand the relationship between IBM Interact contact/response history and IBM Campaign contact/response history
Set up and configure ETL (i.e. moving data from runtime back to design time)

Section 5 - Java/JS/REST/SOAP API, JS/Web Connector, External Callout, External Profile Service, and External Learning 19%
Understand general IBM Interact API concepts
Understand how to use IBM Interact built-in macros
Implement the Java API
Implement the Javascript API
Implement the SOAP API
Implement the REST API
Configure and implement JS/Web Connector links
Configure and implement external callout macros
Configure and implement External Profile Services
Configure and implement External Learning Algorithms

Section 6 - Logging, Troubleshooting, and Performance Tuning 18%
Determine potential points of failure within IBM Interact
Use the documentation, API, and API Tester to troubleshoot problems
Troubleshoot interactive channel (IC) deployment and API errors
Configure, collect and analyze IBM Interact data for support calls
Configure Performance Monitoring features and tools
Troubleshoot and tune Memory Utilization
Troubleshoot and tune CPU Utilization
Troubleshoot and tune API and events processing throughput
Troubleshoot IBM Campaign and IBM Interact database tables

PartnerWorld Code: 33000801
Replaces PW Code: Not Applicable

Status: Live

This intermediate level certification is intended for IBM Interact V9.1.x power users and system administrators. Specifically, this exam covers content up to IBM Interact V9.1.1.
This specialist is responsible for configuring, administering and troubleshooting the product. This specialist should also be familiar with the following IBM Interact aspects:
Plan (e.g. sizing, setting up network topology, database configuration)
Install (e.g. performance, initial configuration, logging)
Use (e.g. touchpoint integration, API calls)
Maintain (e.g. troubleshooting, monitoring)
Touch point integration (i.e. Interact API)

This specialist is also required to have practical knowledge of different:
Operating Systems (Microsoft Windows, Suse Linux, AIX, Solaris, Red Hat)
Databases (DB2, SQL server, Oracle)
Application Servers (WebSphere, WebLogic)
Languages (Java, JavaScript, XML)
Communication Protocols (SOAP, REST, RMI)

Recommended Prerequisite Skills

Before preparing for this certification, the following knowledge and skills are recommended and assumed:
basic knowledge of IBM Campaign
basic web Application Server knowledge
basic system security authentication and authorization (HTTPS, security certificates, single sign-on)
intermediate database administration skills
ability to write queries, triggers, procedures
knowledge of integration channel API

In preparing for this certification, the following IBM courses are recommended to further improve your skills associated with the exam topics. Refer to the Test Preparation web page for additional information and recommendations.

9U29G: IBM Interact Building Interactive Campaigns 9.1.x
9U30G: IBM Interact 9.1.x Advanced Topics
 

Monday, October 9, 2017

1Z0-964 Oracle Project Portfolio Management Cloud 2017 Implementation Essentials

Associated Certification Paths
Passing this exam is required to earn these certifications. Select each certification title below to view full requirements.

Oracle Project Portfolio Management Cloud 2017 Certified Implementation Specialist

Exam Details
Duration: 120
Number of Questions: 76
Passing Score: 60%
Exam has been validated against Oracle Fusion Project Portfolio Management Cloud Service R12.
Format: Multiple Choice

Fusion Project Portfolio Management overview
Describe the components of Oracle Cloud Project Portfolio Management
Explain the components available for integration

Navigation, User Experience, and Personalization
Describe the business processes that are supported by approvals and workflows
Set up approval and notification tasks

Oracle Fusion Applications Security Overview
Describe the Fusion Applications Security Console
Identify the roles delivered in a seeded security implementation
Manage roles and duties

Fusion Functional Setup Manager
Describe the Fusion Functional Setup Manager
Manage an implementation project
Describe the Rapid Implementation Workbook

Configure Fusion Common Applications
Explain Organizational Structures in Fusion Project Performance Management
Set up Enterprise Structures Units
Manage Reference Data sharing

Common project configuration
Explain common project configuration in Fusion Project Performance Management
Manage Subledger Accounting

Configure Fusion Project Foundation
Set up Project Calendars and Periods
Set up Types and Categorizations
Set up Project Roles
Manage Project Resources
Describe Rate Schedules
Describe Project Types
Explain Action Controls (Microsoft Project Integration)
Set up Transaction Sources
Manage Project Statuses

Configure Fusion Project Costing
Configure Fusion Project Cost Collection Center
Manage Burdening Schedules
Manage Allocations
Explain capitalized interest calculations
Describe Budgetary Controls
Configure Time & Labor for projects
Configure Fusion Integration Options
Describe Fusion Integration Methods

Configure Fusion Project Control
Configure the Resource Breakdown Structure
Setup Plan Types
Set up Project Budgets and Forecasts
Describe Project templates
Describe Financial Plans vs Project Plans

Configure Fusion Project Billing
Configure the Project Contract Model
Set up Revenue Recognition
Set up Project Invoicing
Configure Project Cross Charging and Transfer Pricing
Describe Borrowed and Lent vs Intercompany / Interproject Billing

Configure Project Performance Reporting
Configure Key Performance Indicators for project performance reporting

Configure Project Management
Describe common project execution components
Set up Project and Task codes
Set up Issue and Deliverable types
Describe project requirements
Set up Project Enterprise Structures
Configure Social Network for Project Execution

Configure Project Resource Management
Configure Project Labor Enterprise Resources
Set up Resource Pools
Set up Talent Profile Content

Fusion Project Reporting
Configure Infolets for PPM
Describe Oracle Transactional Business Intelligence (OTBI)



Monday, October 2, 2017

C2150-620 IBM Security Network Protection (XGS) V5.3.2 System Administration

Test information:
Number of questions: 60
Time allowed in minutes: 90
Required passing score: 63%
Languages: English

Related certifications:
IBM Certified System Administrator - Security Network Protection (XGS) V5.3.2

The test consists of 5 sections containing a total of approximately 60 multiple-choice questions. The percentages after each section title reflect the approximate distribution of the total question set across the sections

Section 1 - Features and capabilities (13%)
Compute the available number of protected segments based on the model type, NIMs, and media types (fibre, copper, etc).
Demonstrate a deep knowledge of protection interface inspection modes and settings.
Given a scenario using a specific license type, demonstrate an understanding of what capabilities, settings, and objects are affected by the license.
Demonstrate an understanding of inspection, response capabilities, and deployment considerations.
Demonstrate how to obtain and apply X-Force Exchange-supplied OpenSignatures.
Demonstrate an understanding of User Authentication deployment considerations.

Section 2 - Plan and install (25%)
Given a requirement for network throughput, HA, SSL, bypass requirements and number of inspected segments, infer XGS sizing, network interface module required and licensing.
Demonstrate the use of the serial console and situations where it may be required (proper cabling of the appliance to achieve console access).
Examine the differences between the physical and virtual appliances, the scenarios where they can be used, and how they are deployed within their specific environments (e.g., distributed virtual switches).
Examine network topology to understand where to locate the XGS to achieve the required inspection and circumvent Inbound SSL Traffic Limitations.
Demonstrate an understanding of FIPS mode and how to configure it.
Construct an SSL Inspection implementation plan for both inbound and outbound traffic.
Produce a high availability architecture diagram demonstrating both an Active-Passive and an Active-Active deployment.
Perform first-time setup using Serial Console, CLI, & LMI.
Use the different methods for configuring the XGS, including the CLI, LMI, SiteProtector and know the compatible modes (strict vs. compatible mode).

Section 3 - Configure (28%)
Infer the proper setting to configure in-built hardware bypass, inspection mode, TCP reset, etc. on a protection interface.
Complete XGS registration in SiteProtector and verify all policies have been imported.
Modify Network Access Policy to demonstrate a knowledge of the different ways to inspect different traffic types and generate security events.
Manipulate policies to integrate with 3rd party products, (e.g., syslog, QRadar, SNMP, flow data).
Construct and manipulate IPS objects including changes to X-Force protection level and blocking.
Modify SSL Inspection Policy to inspect specific traffic, including outbound and inbound traffic.
Manipulate SSL encryption keys and certificates to enable inbound and outbound SSL inspection.
Use the PAM documentation to adjust signature rules behavior using advanced tuning parameters.
Modify the management access policy to restrict access to management interface.

Section 4 - Maintain (23%)
Modify Intrusion Prevention Policy to change default threat level and protection settings of signatures.
Modify system alerting policy to propagate certain types of logging events to local and remote logging mechanisms (remote syslog object vs local) and (management access policy).
Perform a snapshot and demonstrate an understanding of limitations when applying snapshots.
Infer appliance status via Log events, System Graphs, and Network Graphs.
Produce a backup of the system to the alternate partition and fail back.
Construct and apply new objects within the network access policy (eg. Address, Application, Inspection, Identity, Response).
Use IPS event Filters to ignore traffic and create exceptions.
Change update-related policies and apply updates to firmware, security content and application databases.

Section 5 - Support (10%)
Use tools available in the CLI to troubleshoot problems.
Perform hardware diagnostics using built-in capability as well as stand-alone diagnostics tool and physical examination of hardware, LEDs, etc.
Demonstrate how to reimage an XGS appliance and restore settings.
Perform a fixpack installation and demonstrate an understanding of the impact of doing so.
Use Service and Support feature to automatically open service requests and send log files to support.

IBM Certified System Administrator - Security Network Protection (XGS) V5.3.2

Job Role Description / Target Audience
This intermediate level certification is intended for network system administrators and system engineers working with IBM Security Network Protection (XGS) V5.3.2.

These system administrators require extensive hands-on experience with the product, are familiar with its features and capabilities, and understand how to plan for and install the product, configure, maintain and support it.

It is expected that these system administrators are generally self-sufficient and are able to perform the tasks involved in the job role with limited assistance from peers, product documentation and vendor support services.

To attain the IBM Certified System Administrator - Security Network Protection (XGS) V5.3.2 certification, candidates must pass 1 test. To prepare for the test, it is recommended to refer to the job role description and recommended prerequisite skills, and click the link to the test below to refer to the test objectives and the test preparation tab.

Recommended Prerequisite Skills

Basic knowledge of:
Intrusion prevention systems technology
Standard network protocols and practices, including the OSI model, secure network transmissions
Network design and architecture, including high availability (HA)
Security technologies such as firewalls, encryption using keys and certificates, SSL, HTTPS, SSH, intrusion detection, VLAN, Span Ports, etc.
Security vulnerabilities, exploits, and attack techniques
Different network media types and connectivity considerations (copper, fibre, transceiver)
Directory-based authentication
SiteProtector agent authentication, policy management, event propagation
Installing firmware from USB
Packet analysis
VMware vSphere administration

Requirements
This certification requires 1 test(s).

Test(s) required:
Click on the link(s) below to see test details, test objectives, suggested training and sample tests.

Test C2150-620 - IBM Security Network Protection (XGS) V5.3.2 System Administration

The test:
contains questions requiring single and multiple answers. For multiple-answer questions, you need to choose all required options to get the answer correct. You will be advised how many options make up the correct answer.
is designed to provide diagnostic feedback on the Examination Score Report, correlating back to the test objectives, informing the test taker how he or she did on each section of the test. As a result, to maintain the integrity of each test, questions and answers are not distributed.

QUESTION 1
A System Administrator has been seeing a lot of SSLv2_Weak_Cipher attacks reported on the network and wants to Increase the severity of the events.
How can this be accomplished?

A. Modify the Threat Level of the signature
B. Create an Incident in SiteProtector for SSLv2_Weak_Cipher
C. Modify the Event Log response for the Intrusion Prevention Object
D. Increase the X-Force Protection Level for the Intrusion Prevention Object

Answer: D


QUESTION 2
A System Administrator has an XGS 4100 appliance that has a single 8-port RJ-45 copper Network Interface Module (NIM) installed.
What is the maximum number of in-line network segments, of any media type, that could be protected?

A. 2
B. 4
C. 6
D. 10

Answer: A


QUESTION 3
A System Administrator has a requirement to be able to pause and resume an XGS for VMware machine to allow the ESXi server to move the servers to another machine.
Which statements regarding VMware Tools functionality is relevant to this requirement?

A. VMware Tools can be used to suspend inspection on the XGS for VMware and traffic will be forced into an automatic bypass mode.
B. VMware Tools can be used to suspend inspection on the XGS for VMware and traffic will not be forced into an automatic bypass mode.
C. VMware Tools functionality can be added to the appliance to provide a more streamlined user experience when migrating to another ESXi host.
D. VMware Tools functionality is already included and will be used when called by the hypervisor to manage the XGS for VMware virtual machine.

Answer: C


QUESTION 4
The System Administrator of a banking organization has become aware of some malicious traffic to its IBM Security Network Protection (XGS) appliance. The logs show patterns of Denial of Service (DoS) attack and a lot of encrypted packets targeted to the M. 1 port of the XGS appliance coming from an internal laptop IP address.
What should the System Administrator do next?

A. Configure Management access policy to restrict access
B. Configure Inbound SSL policy to inspect and drop such traffic
C. Configure Management access policy to set the management port as TCP reset port
D. Configure Network access policy and Intrusion Prevention Policy to block DoS attacks

Answer: B