[Latest Version] Easily Pass RH-202 Exam With CertBus Updated RedHat RH-202 Preparation Materials
One of my colleague recommend me that CertBus RH-202 dumps are effective and helpful. Thank goodness I followed up with him and choose CertBus as my assistance on my RH-202 Redhat Certified Technician on Redhat Enterprise Linux 5 (Labs) certification exam! I passed my RedHat RH-202 exam very easily. I was lucky, all my questions in the exams were from my RedHat RH-202 dumps.
We CertBus has our own expert team. They selected and published the latest RH-202 preparation materials from RedHat Official Exam-Center: http://www.certgod.com/RH-202.html
QUESTION NO: 26
A customer calls the call-center to initiate a return. However, the customer does not have a sales
receipt of the sales order. How can this return order be created in the system?
A. Create a credit memo.
B. Create a blind return order.
C. Issue a refund to the customer.
D. Create a return with a dummy sales order number.
Answer: B
Explanation:
QUESTION NO:45
A company’s sales process relies on business rules that have been implemented within
WebSphere Operational Decision Management (WODM). There is a requirement to incorporate
these rules within a IBM Business Process Manager V8.0 implementation. What steps must a
BPM application developer take to incorporate these rules within IBM Business Process Manager
V8.0 assuming the WODM server has been properly configured within IBM Business Process
Manager V8.0. Within a decision service:
A. 1. drag a BAL Rule from the palette onto the canvas.
2. select a server .
3. configure the SOAP port.
4. provide credentials.
B. 1. drag a Server Script from the palette onto the canvas.
2. use JavaScript APIs to get ODM server information.
3. use JavaScript APIs to make ODM server calls.
C. 1. drag a Decision Table from the palette onto the canvas.
2. select a server.
3. specify conditions and actions.
D. 1. drag a JRules Decision Service from the palette onto the canvas.
2. select a server.
3. configure the SOAP port.
4. provide credentials.
Answer: D
QUESTION NO:43
A solution implementer is configuring a AAA Policy to secure a DataPower service. Why would the solution
implementer configure Mapping Authentication Credentials and Mapping Requested Resources in the
DataPower AAA Policy? (choose 2)
A. To map the requested resource to the correct backend URL for dynamic message routing.
B. To map the requested resource from a legacy operation name to a new operation name to allow
correct authorization.
C. To map the authenticated credentials to an alternative security token to insert into the message
payload for authorization.
D. To map the authenticated credentials from a DN-formatted LDAP response to a username for Tivoli
Access Manager (TAM) authorization.
E. To map the authenticated credentials to mediate the security headers of two different protocols (for
example from HTTP headers to MQMD).
Correct Answer: BD
QUESTION NO:46
A customer wants to protect communication between two WebSphere DataPower Appliances against a
replay attack. The second DataPower appliance needs to validate that the message received from the first
appliance has spent no more than 30 seconds in transit. How should the solution implementer satisfy this
requirement?
A. Set the var://service/transaction-timeout variable on the first DataPower appliance to 30 seconds.
B. Configure mutually authenticated SSL between the two DataPower appliances with an SSL timeout
field configured to 30 seconds.
C. Use symmetric key encryption using an encrypt-string extension function on a timestamp string on the
first DataPower appliance. Then use the same key with a decrypt-string extension function on the
second appliance and validate the timestamp.
D. Use symmetric key encryption using an encrypt-string extension function on a timestamp string on the
first DataPower appliance. Then use the public certificate from the first device with a decrypt-string
extension function on the second appliance and validate the timestamp.
Correct Answer: C
QUESTION NO:13
A solution implementer is tasked to use a DataPower appliance as an intermediary for providing
Web 2.0 services. Which of the following features of Web 2.0 messages should the solution
implementer be aware of when designing the solution? (choose two)
A. Web 2.0 messages can arrive with an empty body.
B. Web 2.0 messages can be secured by WS-Security.
C. Web 2.0 use cases are best suited for a web service proxy service.
D. Web 2.0 REST messages can use HTTP POST methods like SOAP messages.
E. Web 2.0 message and a SOAP message cannot be processed by the same processing policy
and front side handler of a DataPower Service.
Answer: A,D
Explanation: