IREB IREB IREB www.cert24.com

IREB IREB IREB www.cert24.com

Exam Number/Code : IREB

Exam Name:IREB Certified Professional for Requirements Engineering

Version : Demo

QUESTION NO: 1

You are employed as a requirements engineer in a company that develops control software for electric motors. During your work it becomes increasingly evident that the developers are very well aware of the necessary requirements. Even through the requirements are next documented in their entirely. Nevertheless, you decide to document requirements systematically. Which two of the following arguments justifies this step? (Choose two) Documenting requirements systematically is important, because . . .

A. Implementation without documented requirements is not possible

B. Non-documented requirements are difficult to negotiate between the stakeholders

C. The coverage of the requirements by means of test cause cannot be checked

D. Documented requirements are also good requirements

Answer: C

IREB IREB IREB www.cert24.com

QUESTION NO: 2

Which of the following statements best characterize the relationship between a requirement engineer and a stakeholder in the role of the tester?

A. The requirement engineer delivers input for the work of the stakeholder

B. The output from the requirements engineer is managed by the stakeholder

C. The stakeholder delivers input for the requirements engineer

D. The stakeholder monitors the work of the requirements engineer

E. The work of the requirements engineer is not related to the role of the stakeholder

Answer: C

IREB IREB IREB www.cert24.com

QUESTION NO: 3

Which sentence best characterizes the term “stakeholder”?

A. The external actors interacting with a system and technical interfaces to surrounding systems are designated as stakeholders

B. Stakeholders are persons and organizations affected by the development and the of the system or of the product

C. Stakeholders are special interest representatives who are responsible for the approval of the first project phase

D. A stakeholder is responsible for the administration of the software development environment

Answer: B

IREB IREB IREB www.cert24.com

ISEB-SWT2 ISEB-SWT2 ISEB-SWT2 www.cert24.com

ISEB-SWT2 ISEB-SWT2 ISEB-SWT2 www.cert24.com

Exam Number/Code : ISEB-SWT2

Exam Name:ISTQB-ISEB Certified Tester Foundation Level

Version : Demo

1. A system requires 100% decision coverage at component testing for all

modules. The following module has been tested with a single test case.

The test case follows the path A, B, D, E, F, G. What level of decision

coverage has been achieved?

A. 100%

B. 50%

C. 75%

D. 90%

Answer: B

ISEB-SWT2 ISEB-SWT2 ISEB-SWT2 www.cert24.com

2.During which activity of the Fundamental Test Process test process do

you review the test basis?

A. Evaluating exit criteria and reporting.

B. Test implementation and execution

C. Test analysis and design

D. Test planning and control

Answer: C

ISEB-SWT2 ISEB-SWT2 ISEB-SWT2 www.cert24.com

3.Which of the following statements are true in relation to component

testing?

a. Stubs may be used.

b. May cover resource behaviour (e.g. memory leaks).

c. Tests the interactions between software components.

d. Defects are typically fixed without formally managing these defects.

A. a, c and d

B. a, b and d

C. b, c and d

D. a, b and c

Answer: B

ISEB-SWT2 ISEB-SWT2 ISEB-SWT2 www.cert24.com

ISFS ISFS ISFS www.cert24.com

ISFS ISFS ISFS www.cert24.com

Exam Number/Code : ISFS

Exam Name:Information Security Foundation based on ISO/IEC 27002

Version : Demo

1.What physical security measure is necessary to control access to company information?

A. Air-conditioning

B. Username and password

C. The use of break-resistant glass and doors with the right locks, frames and hinges

D. Prohibiting the use of USB sticks

Answer: C

ISFS ISFS ISFS www.cert24.com

2.Why do organizations have an information security policy?

A. In order to demonstrate the operation of the Plan-Do-Check-Act cycle within an organization.

B. In order to ensure that staff do not break any laws.

C. In order to give direction to how information security is set up within an organization.

D. In order to ensure that everyone knows who is responsible for carrying out the backup procedures.

Answer: C

ISFS ISFS ISFS www.cert24.com

3.You work in the IT department of a medium-sized company. Confidential information has got into the wrong hands several times. This has hurt the image of the company. You have been asked to propose organizational security measures for laptops at your company. What is the first step that you should take?

A. Formulate a policy regarding mobile media (PDAs, laptops, smartphones, USB sticks)

B. Appoint security personnel

C. Encrypt the hard drives of laptops and USB sticks

D. Set up an access control policy

Answer: A

ISFS ISFS ISFS www.cert24.com

ITIL ITIL ITIL www.cert24.com

ITIL ITIL ITIL www.cert24.com

Exam Number/Code : ITIL

Exam Name:ITIL V3 Foundation

Version : Demo

QUESTION NO: 1

Which of the following is NOT an example of Self-Help capabilities?

A. Requirement to always call the service desk for service requests

B. Menu-driven range of self help and service requests

C. Web front-end

D. A direct interface into the back end process handling software

Answer: A

ITIL ITIL ITIL www.cert24.com

QUESTION NO: 2

What is a RACI model used for?

A. Defining roles and responsibilities

B. Monitoring services

C. Performance analysis

D. Recording Configuration Items

Answer: A

ITIL ITIL ITIL www.cert24.com

QUESTION NO: 3

Which of the following statements is INCORRECT?

A. The SKMS is part of the Configuration Management System (CMS)

B. The SKMS can include data on the performance of the organization

C. The Service Knowledge Management System (SKMS) includes Configuration

Management Databases (CMDB)

D. The SKMS can include user skill levels

Answer: A

ITIL ITIL ITIL www.cert24.com

ITILF2011 ITILF2011 ITILF2011 www.cert24.com

ITILF2011 ITILF2011 ITILF2011 www.cert24.com

Exam Number/Code : ITILF2011

Exam Name:The ITIL Foundation- 2011

Version : Demo

QUESTION NO: 1

Which one of the following is the BEST description of a service level agreement (SLA)?

A. The part of a contract that specifies the responsibilities of each party

B. An agreement between the service provider and an internal organization

C. An agreement between a service provider and an external supplier

D. An agreement between the service provider and their customer

Answer: D

ITILF2011 ITILF2011 ITILF2011 www.cert24.com

QUESTION NO: 2

Which one of the following is NOT part of the service design stage of the service lifecycle?

A. Designing and maintaining all necessary service transition packages

B. Producing quality, secure and resilient designs for new or improved services

C. Taking service strategies and ensuring they are reflected in the service design processes and the service designs that are produced

D. Measuring the effectiveness and efficiency of service design and the supporting processes

Answer: A

ITILF2011 ITILF2011 ITILF2011 www.cert24.com

QUESTION NO: 3

Which one of the following activities are carried out during the “Where do we want to be?” step of the continual service improvement (CSI) approach?

A. Implementing service and process improvements

B. Reviewing measurements and metrics

C. Creating a baseline

D. Defining measurable targets

Answer: D

ITILF2011 ITILF2011 ITILF2011 www.cert24.com

JN0-532 JN0-532 JN0-532 www.cert24.com

JN0-532 JN0-532 JN0-532 www.cert24.com

Exam Number/Code : JN0-532

Exam Name:FWV,Specialist (JNCIS-FWV)

Version : Demo

1. Review the exhibit.

You’ve been asked to build a route-based hub and spoke network, with policy control for traffic travelling from spoke to spoke. Which two of the following configuration options will meet this requirement? (Choose two.)

A. Place the spoke tunnel interfaces in the trust zone and create policies on the spokes.

B. Place the spoke tunnel interfaces in the untrust zone and create policies on the spokes.

C. Create a single tunnel interface in the trust zone at the hub and enable intra-zone blocking.

D. Create separate tunnel interfaces at the hub and place them in different zones, then create policies at the hub.

Answer: BD

JN0-532 JN0-532 JN0-532 www.cert24.com

2. Click the Exhibit button.

Review the exhibit. Track-ip has failed on the device, but the device did not fail over to the second unit in the cluster:

Why has failover not occurred?

A. The physical interfaces have not failed.

B. The track-ip interval is not sufficient to cause failover.

C. The track-ip address weight is not sufficient to cause failover.

D. The track-ip address threshold is not sufficient to cause failover.

Answer: C

JN0-532 JN0-532 JN0-532 www.cert24.com

3. Click the Exhibit button.

In the exhibit, the firewall administrator at the Storefront is complaining that when the communication to the DataCenter1 fails, the preexisting transfers and applications are dropped when the traffic is switched to DataCenter2.

Which statement explains this behavior?

A. SYN checking is enabled in the tunnel.

B. The weight value for the DataCenter2 is too high.

C. VPN monitor is misconfigured in the DataCenter2.

D. Phase 1 and Phase 2 negotiations to DataCenter2 did not occur on time.

Answer: A

JN0-532 JN0-532 JN0-532 www.cert24.com

L50-501 L50-501 L50-501 www.cert24.com

L50-501 L50-501 L50-501 www.cert24.com

Exam Number/Code : L50-501

Exam Name:LSI SVM5 Implementation Engineer

Version : Demo

QUESTION NO: 1

During the SVM Management software installation, which two adapters would you select to be controlled by the SVM? (Choose two.)

A. Emulex Fibre Channel adapter

B. Qlogic Fibre Channel adapter

C. Microsoft iSCSI initiator

D. Smart Array controller

Answer: B,C

L50-501 L50-501 L50-501 www.cert24.com

QUESTION NO: 2

At the end of the SVM installation, which three actions should you perform to ensure that the installation is correct? (Choose three.)

A. Test failover between two SVMs to make sure that you can successfully failover between SVMs.

B. Make sure that the SVM recognizes the DPM and that the DPM recognizes all of the devices that are connected to the DPM ports.

C. Make sure that the SVM and DPM recognize the LUNs available on the storage array.

D. Make sure that the DPMs can communicate with each other.

E. Make sure that the LSI Failover Driver is installed on the SVM server.

Answer: A,B,C

L50-501 L50-501 L50-501 www.cert24.com

QUESTION NO: 3

Which parameter must be the same for SVM servers that manage the same SVM domain?

A. serial number

B. SVM domain name

C. computer name

D. WWNN

Answer: B

L50-501 L50-501 L50-501 www.cert24.com

LOT-802 LOT-802 LOT-802 www.cert24.com

LOT-802 LOT-802 LOT-802 www.cert24.com

Exam Number/Code : LOT-802

Exam Name:IBM Lotus Notes Domino 8 System Administration Update

Version : Demo

QUESTION NO: 1

In general, how much space will a DB2 enabled Notes database utilize as compared to a

replica in the standard NSF format?

A. Equal size

B. Half the size

C. Two times more

D. Four times more

Answer: D

LOT-802 LOT-802 LOT-802 www.cert24.com

QUESTION NO: 2

The user name that creates the original DB2 database must be a member of which of the

following groups?

A. SYSADM

B. MANAGERS

C. DB2ADMIN

D. ADMINISTRATORS

Answer: A

LOT-802 LOT-802 LOT-802 www.cert24.com

QUESTION NO: 3

The DB2 Access server facilitates your use of the Lotus Domino Designer view functions

for DB2. Which of the following are enabled by installing the DB2 Access server?

A. Replication

B. DB2 group locking

C. ACLs and reader lists

D. DB2 container storage

Answer: C

LOT-802 LOT-802 LOT-802 www.cert24.com

LOT-925 LOT-925 LOT-925 www.cert24.com

LOT-925 LOT-925 LOT-925 www.cert24.com

Exam Number/Code : LOT-925

Exam Name:Installing and Configuring IBM Lotus Notes and Domino 8.5

Version : Demo

1.A Notes mail message is sent by Miguel to an Internet address through an adjacent Domino domain

over NRPC that then sends mail to the Internet over SMTP. Miguel is now attempting to recall the mail

message. Which of the following will be the result of his attempt?

A. He will receive an email that he cannot recall the email message

B. He will immediately receive a prompt that the message is not enabled for message recall

C. He will receive a message from the Internet recipients mail server that the message cannot be recalled

D. He will successfully recall the message if it is allowed in the server configuration and enabled in his

user policy

Answer: A

LOT-925 LOT-925 LOT-925 www.cert24.com

2.In order for Peggy to establish alternate message recall settings on a per server basis, which of the

following is the best solution?

A. Configure the message recall settings in an organization level policy

B. Configure the message recall settings in each server’s notes.ini file

C. Configure the message recall settings in each server configuration document

D. Configure the message recall settings in explicit policies and manually apply to users

Answer: C

LOT-925 LOT-925 LOT-925 www.cert24.com

3.While configuring an Internet Site document, Kira has left the option blank for which Domino server

hosts the site. What is the default action the server will perform with this option not configured?

A. The Internet Site will not be loaded on any Domino server

B. The Internet Site will be loaded on all Domino servers in the domain

C. The Internet Site will only accept connections for the first IP Address on the server

D. The Internet Site will only accept connections for the hostname in the server document

Answer: A

LOT-925 LOT-925 LOT-925 www.cert24.com

LOT-926 LOT-926 LOT-926 www.cert24.com

LOT-926 LOT-926 LOT-926 www.cert24.com

Exam Number/Code : LOT-926

Exam Name:Managing and Maintaining IBM Lotus Notes and Domino 8.5 Environments

Version : Demo

1.After DAOS is enabled and functioning on your Domino server, which of the following occurs when a

recipient opens a document with an attachment that is in the DAOS repository?

A. Attachment icons display with a link icon over the attachment icon

B. Attachment icons display a doclink to the attachment stored in DAOS

C. Attachment icons display the same as it would on a server without DAOS enabled

D. Attachment icons do not show and they are replaced with text that describes the attachment and is

linked to the attachment

Answer: C

LOT-926 LOT-926 LOT-926 www.cert24.com

2.Event handlers contain numerous notification methods. Which of the following is NOT a supported

notification method?

A. Pager

B. Broadcast

C. Outbound phone call

D. Log to Windows NT Event Viewer

Answer: C

LOT-926 LOT-926 LOT-926 www.cert24.com

3.Domino roaming for the Notes standard configuration clients in Domino 8.5 and higher offers the ability

to synchronize which of the following?

A. A notebook database and user ID file

B. The user ID file and local Eclipse XML configuration files

C. A feeds subscription database and an Eclipse plug-in data and preferences database

D. The Activities plug-in configuration and the integrated Sametime Connect configurations

Answer: C

LOT-926 LOT-926 LOT-926 www.cert24.com