Do not worry about that if you are stuck in the 920-181 exam difficulties, CertBus will assist you all your way through the 920-181 CallPilot RIS.5.0 Engineering exam with the most update 920-181 PDF and VCE dumps. CertBus exam 920-181 preparation materials are the most comprehensive material, covering every key knowledge of 920-181 CallPilot RIS.5.0 Engineering exam.
We CertBus has our own expert team. They selected and published the latest 920-181 preparation materials from Nortel Official Exam-Center: http://www.certbus.com/920-181.html
QUESTION NO: 2
An administrator has a requirement to back up a VIO server (VIOS) so that it can be rebuilt in the event of
a disaster. Which set of actions will achieve this requirement?
A. Backup all non rootvg volume groups using savevg. Backup all Storage Pool Information. Run a
mksysb of the system.
B. Save “Upgrade Data” on the HMC. Backup all non rootvg volume groups using savevg. Run a mksysb
of the VIOS with the -U flag.
C. Backup non rootvg structures using savevgstruct. Capture virtual mappings to a file using viosbr.
Run a backupios
D. Capture the virtual network tuning to a file using the optimizenet command. Capture all virtual device
attributes to a file using the lsattr command. Run a backupios.
Correct Answer: C
QUESTION NO: 207
During the migration project from IBM Tivoli Storage Manager V5.5 to V6.2 some nodes are
already protected in the new system by initial backups. In the old system historical data of these
nodes already exists and should be moved to the new system. What is the best way to do this?
A. Export / import the old data to the new system.
B. Keep the old system up and running as long as needed.
C. Restore the old data from the old system to a temporary work area and perform a backup to the
new system.
D. Export the old data to sequential media and put the media into a vault until it is needed for
restore purposes.
Answer: A
QUESTION NO:54
During the TDA, it is determined that Global Mirror will be implemented. The IBM team wants to ensure
that they have enough DS8800 fiber links to handle the mirroring workload. Which tool should be used to
ExamReal.com — 100% Real QandAs | 100% Real Pass
determine the number of fiber links needed?
A. RMF Magic
B. Capacity Magic
C. Disk Magic
D. PerfMon
Correct Answer: C
QUESTION NO:47
A solution implementer has been provided the following security requirements to implement a
solution for a company to transact business with its business partners. ?Message Confidentiality none
can see the message in transit in clear text between the company and partner end points
?Message Integrity – no man-in-the-middle tampered with the message between the company and
partner end points ?Non-repudiation – be able to verify the senders are who they say they are
What actions should the solution implementer take to satisfy all the requirements?
A. Use SSL and create a digital signature solution with sign and verify actions.
B. Use SSL and create an asymmetric encryption on the message with encrypt and decrypt
actions.
C. Use SSL since it satisfies all the requirements without the use of either encrypt/decrypt actions
or sign/verify actions.
D. Use symmetric encryption and share the encryption key with the partner for both request and
response.
Answer: A
Explanation:
QUESTION NO: 46
A customer wants to protect communication between two WebSphere DataPower Appliances
against a replay attack. The second DataPower appliance needs to validate that the message
received from the first appliance has spent no more than 30 seconds in transit. How should the
solution implementer satisfy this requirement?
A. Set the var://service/transaction-timeout variable on the first DataPower appliance to 30
seconds.
B. Configure mutually authenticated SSL between the two DataPower appliances with an SSL
timeout field configured to 30 seconds.
C. Use symmetric key encryption using an encrypt-string extension function on a timestamp string
on the first DataPower appliance. Then use thesame key with a decrypt-string extension function
on the second appliance and validate the timestamp.
D. Use symmetric key encryption using an encrypt-string extension function on a timestamp string
on the first DataPower appliance. Then use thepublic certificate from the first device with a
decrypt-string extension function on the second appliance and validate the timestamp.
Answer: C
Explanation: