Do not worry about your HP0-A116 exam preparation? Hand over your problems to CertBus in change of the HP0-A116 HP ArcSight ESM Security Administrator and Analyst certifications! CertBus provides the latest HP HP0-A116 exam preparation materials with PDF and VCEs. We CertBus guarantees you passing HP0-A116 exam for sure.
We CertBus has our own expert team. They selected and published the latest HP0-A116 preparation materials from HP Official Exam-Center: http://www.certgod.com/hp0-a116.html
QUESTION NO: 108
A JDBC provider has been defined at both the cell and node scope. Duplicate datasources have
been defined at both levels. An application has defined the same provider and datasource as part
of an Enhanced EAR file. Which datasource will be used by the application?
A. The datasource defined on the JDBC provider at the cell scope.
B. The datasource defined in the Enhanced EAR file.
C. The datasource defined at the node scope.
D. No datasource will be used as the server and will not start when duplicate resources are
defined.
Answer: B
QUESTION NO:38
What are the minimum and maximum number of extent pools on an IBM System Storage DS8800 with 64
physical disks?
A. the minimum is 1 and the maximum is 8
B. the minimum is 2 and the maximum is 8
C. the minimum is 2 and the maximum is 16
D. the minimum is 1 and the maximum is 64
Correct Answer: A
QUESTION NO: 76
In your job you are using a Sequential File stage as a source. You have decided to use a schema
file as an alternative way of specifying column definitions and record format properties. What two
items are true in configuring this stage in your parallel job? (Choose two.)
A. Enable Run Time Column propagation.
B. Enable Run Time Schema propagation.
C. Configure the column tab with one column named \’Input\’.
D. Configure the Schema File property with the path of the schema file definition.
E. Configure the APT_SEQFILE_HASSCHEMA property with the schema file path.
Answer: A,D
Explanation:
QUESTION NO:51
An organization has built a service called “Employee Management Workflow”, which was developed in IBM
Business Process Manager V8.0. This service is required to be accessed by several external enterprise
applications as a SOAP web service. How can BPM application developer meet this requirement?
A. 1. Create a Web Service2. Add the operation, associating it with the service
B. 1. Create an Undercover Agent (UCA)2. Attach the service
C. 1. Create an External Implementation2. Drag the “Web Service integration” from the palette to the
canvas3. Define the WSDL4. Add the operation
D. 1. Create an Integration Service2. Drag the “Web Service integration” from the palette to the canvas3.
Define the WSDL4. Add the operation
Correct Answer: A
QUESTION NO:86
Your job is using the Sequential File stage as a source. Identify two stage property configurations
that will allow you to accomplish parallel reads? (Choose two.)
A. Read Method property set to \’File Pattern\’ and the environment variable
$APT_IMPORT_PATTERN_USES_FILESET is set to \’FALSE\’.
B. Read Method property set to \’File Pattern\’ and the \’Readers per Node\’ property value set to
greater than 1.
C. Read Method property is set to \’Parallel\’ with the Key property set to a Input column that has
the file names.
D. Read Method property set to \’Specific File(s)\’ with only one file specified and the \’Readers Per
Node\’ property value set to greater than 1.
E. Read Method property set to \’Specific File(s)\’ with more than one file specified and each file
specified has the same format/column properties.
Answer: D,E
Explanation:
QUESTION NO:120
An administrator needs to move a system from security level 30 to 40 and ensure that risk is reduced as much as possible.
How should the administrator configure system security journaling to support the security level change?
A. CHGSYSVAL QAUDCTL to *AUDLVLCHGSYSVAL QAUDLVL *AUTFAILMonitor QAUDJPN for failures.
B. CHGSYSVAL QAUDSYS to *OPSYSCHGSYSVAL QAUDLVL *INTEGRITYMonitor QAUDJRN for System Integrity violations.
C. CHGSYSVAL QAUDCTL to *AUDLVLCHGSYSVAL QAUDLVL *VIOLATIONSCHGOBJAUD OBJ (*All PALL) OBJTYPE(*PGM) OBJAUD(*All)Monitor QAUDJPN for security violations.
D. CHGSYSVAL QAUDSYS to *OPSYSCHGSYSVAL QAUDLVL *PGMVIOCHGOBJAUD QBJ(*All PALL) QBJTYPE(*PGM) OBJAUD(*All)Monitor QAUDJPN for System Program and MI violations.
Correct Answer: A
QUESTION NO:37
A solution implementer needs to set up a DataPower Integration XI52 Appliance in a data center
with the firmware release 5.0.0.x.
The appliance was shipped with the newer 5.0.0.y firmware. The solution implementer needs to
install the older release 5.0.0.x firmware.
The company maintains all firmware images on an internal server at http://repository. Which CLI
command sequence should the solution implementer use to achieve this firmware version
downgrade?
A. xi52# su admin
xi52# flash
xi52(config-flash)# copy http://repository/5.0.0.x.scrypt3 image:5.0.0.x.scrypt3
xi52(config-flash)# boot 5.0.0.x.scrypt3 rollback
B. xi52(config)# flash
xi52(config-flash)# copy http://repository/5.0.0.x.scrypt3 image:5.0.0.x.scrypt3
xi52(config-flash)# boot rollback
C. xi52# configure terminal
xi52(config)# copy http://repository/5.0.0.x.scrypt3 image:5.0.0.x.scrypt3
xi52(config)# flash
xi52(config-flash)# boot image 5.0.0.x.scrypt3
D. xi52# configure terminal
xi52(config)# copy http://repository/5.0.0.x.scrypt2 image:5.0.0.x.scrypt2
xi52(config)# flash
xi52(config-flash)# boot image 5.0.0.x.scrypt2
Answer: C
Explanation:
QUESTION NO:31
A bank has requested proposals for a storage solution to upgrade their disaster recovery processes for
their IBM System z, UNIX, and Microsoft Windows environment. The solution must simulate a multi-site
environment and provide the customer the ability to evaluate Metro Mirror, Global Mirror, Global Mirror for
z/OS, and FlashCopy. 120 TB physical capacity is required per site. Only Fibre Channel drives can be
ExamReal.com — 100% Real QandAs | 100% Real Pass
used. Which solution best meets the specified requirements?
A. two DS8700 systems with two-way processor cards and 600 GB FC drives
B. two DS8700 systems with four-way processor cards and LPAR
C. two DS8700 systems with two-way processor cards and two frames per system
D. two DS8700 systems with four-way processor cards and two frames per system
Correct Answer: D
QUESTION NO: 66
In the context of a private cloud, which three management capabilities require identity
management and/or access management services in order to be consumed securely by end
users? (Choose three.)
A. Storefront
B. Partner Management
C. Storage Management
D. Customer Management
E. Virtualization Management
F. Metering and Billing Management
Answer: A,B,D
Explanation:
QUESTION NO:52
A company has exposed a web service to both internal and external clients. Requests from internal clients
are sent in plain text and requests from external clients are encrypted in accordance with the WS-Security
specification. A single web service proxy has been created using the WSDL that describes the web
service. How can the solution implementer accommodate both the plain text and encrypted requests in the
same web service proxy?
A. Add a Decrypt action to the Default Request Rule, with a Certificate object that is associated with the
external client\’s private key.
B. Provide the company\’s public certificate to the external client for use in encryption, create a Crypto Key
object that points to the company private key, and set the Decrypt Key at the proxy level.
C. Provide the company\’s public certificate to the external client for use in encryption, create a Crypto Key
object that points to the company\’s public certificate, and use it to add a Decrypt action to the Default
Request Rule.
D. Create a Crypto Certificate object using the external client\’s public certificate, create a Crypto
Validation Credential (valcred) using the Crypto Certificate object, and add a Decrypt action that uses
valcred to the Default Request Rule.
Correct Answer: B