Introduction to IBM Certified Deployment Professional - Tivoli Monitoring V6.3 Exam
The IBM C9560-507 Exam is challenging and thorough preparation is essential for success. This exam study guide is designed to help you prepare for the Tivoli Monitoring Implementation certification exam. It contains a detailed list of the topics covered on the Professional exam, as well as a detailed list of preparation resources. These study guides for the IBM Tivoli Monitoring V6.3 Implementation will help guide you through the study process for your certification.
C9560-507 IBM Tivoli Monitoring V6.3 Implementation Exam Summary
● Exam Name: IBM Tivoli Monitoring V6.3 Implementation
● Exam Code: C9560-507
● Exam Price: $200 (USD)
● Duration: 90 mins
● Number of Questions: 68
● Passing Score: 50 / 68
● Books / Training: IBM Tivoli Monitoring 6.3 for Implementers
● Schedule Exam: Pearson
VUE
● Sample Questions: IBM Tivoli Monitoring Implementation Sample Questions
● Recommended Practice: IBM C9560-507 Certification Practice Exam
Exam Syllabus: C9560-507 IBM Certified Deployment Professional - Tivoli
Monitoring V6.3
1. Planning (20%)
-
Given a customer with a timeline, determine the scope of a monitoring project
so that a Statement of Work and project plan are created.
-
Given the requirements to implement ITM 6.3 and the knowledge of the customer's
organization, determine what is to be monitored so that there is an
understanding of customer's monitoring requirements.
-
Given the customer network diagram and a basic ITM 6.3 architecture, identify
network ports and request to open and test the networking so that firewall
requirements are outlined and verified.
-
Given the customer's operating environment and monitoring requirements,
determine the OS agent platforms so that corresponding OS agents can be
deployed.
-
Given the ITM High Availability (HA) Guide and the customer's business needs,
determine the customer's requirement for a high availability environment so
that an ITM 6.3 HA design plan is created.
-
Given the sizing and the architecture of the monitoring environment, determine
how many Hub Tivoli Enterprise Monitoring Server (Hub TEMS) and RTEMS are
necessary to support the monitoring environment so that an initial version of
an ITM V6.3 solution architecture document is created.
-
Given the customer's monitoring and reporting requirements and the ITM 6.x
Warehouse Load Projections spreadsheet, determine the length of historical data
collection and size the data warehouse so that historical configuration
parameters have been defined and the required storage capacity for historical
data is identified.
-
Given the ITM 6.3 architecture document with estimated agents to be deployed,
define the size of the ITM 6.3 environment so that the appropriate hardware
will be deployed.
-
Given the LDAP or Active Directory server to authenticate, define the
authentication method so that the authentication method is defined.
-
Given an understanding of customer's monitoring requirements, review
authorization options and define TEPS user groups as required so that TEPS
users will have access and permissions required to perform assigned monitoring
functions.
-
Given a basic understanding of ITM software implementation and knowledge of the
ITM installation documentation, review the ITM Installation and Setup Guide and
run the prerequisite scanner so that ITM prerequisites are determined.
-
Given a basic knowledge of ITM architecture concepts , ITM deployment, and the
customer's monitoring requirements, determine the most appropriate installation
methods so that an implementation and deployment plan for Tivoli Monitoring
infrastructure and monitoring agents is developed.
-
Given the scope of the monitoring project and a knowledge of the customer's
monitoring environment, review available event management facilities and
document any need for ITM event integration so that ITM events can be displayed
on an event management console if required.
-
Given knowledge of customer's monitoring requirements and knowledge of what is
to be monitored, assess whether there is a need for agentless monitoring, as
well as or instead of standard OS agents, in the ITM environment so that requirements
for agentless monitoring can be included in the ITM architecture diagram and
hardware resources to support agentless monitoring can be sized appropriately.
-
Given experience and knowledge with ITM, describe the features and functions
that allow ITM agents to run independently of the TEMS so that the features and
functions of Agent Autonomy have been described.
-
Given a knowledge of ITM concepts and the customer's operating environment,
determine what type(s) of the TEP client will be used so that ITM users can be
provided with accurate instructions on accessing the TEP client.
-
Given the dashboard requirements for an organization, describe requirements for
JAZZ and Dash so that business needs are met.
-
Given the data reporting requirements for an organization, describe
requirements for Jazz and Tivoli Common Reporting (TCR) so that business needs
are met.
2. Installation (20%)
-
Given the scope of the monitoring project and a statement of what is to be
monitored, verify the compatibility of IBM Tivoli Monitoring (ITM) and customer
software components and download required ITM software install media so that
correct version of each required ITM component is available to install.
-
Given an ITM Installation and Deployment Guide, an action plan to address any
inadequate or missing requirements and a basic knowledge of the ITM deployment
and the servers where each component is to be installed, install the OS,
hardware and software prerequisites so that requirements for all ITM
infrastructure components are fulfilled.
-
Given the installation media and the host system, install and configure the
supporting RDBMS so that it supports the TDW and/or the TEPS.
-
Given the ITM 6.3 architecture, take the required actions for Hub TEMS , RTEMS,
TEPS, Tivoli Enterprise Portal (TEP) client, TDW and the agents so that the
components of ITM environment are installed.
-
Given the storage capacity and installation media, populate the depot so that
the remote installation of OS and non OS agent can be completed.
-
Given an installed ITM environment at required version level, the knowledge of
the ITM tool, the target business requirement and enabled self describing
feature on TEPS, supported agents, and any remote TEMS, take the required
actions so that self-describing agent capability can be deployed.
-
Given basic knowledge of ITM and agent installation, use the self-describing
agent feature correctly and install application support at the TEMS and TEPS as
required so that agent monitoring data will be displayed correctly in the TEP.
3. Configuration (20%)
-
Given installed base components of the IBM Tivoli Monitoring (ITM) and the ITM
installation guide, the deployment architecture and basic knowledge of the ITM
solution, configure the Tivoli Enterprise Monitoring Server (TEMS) so that TEMS
can run according to required business needs.
-
Given installed base components of the ITM and installed DBMS for Tivoli
Enterprise Portal Server (TEPS) and Tivoli Data Warehouse (TDW), the IBM Tivoli
Monitoring installation guide, the deployment architecture and basic knowledge
of the ITM solution, configure the TEPS so that the ITM environment can run
according to required business needs.
-
Given installed base components of the ITM and installed DBMS for TDW, the ITM
installation guide, the deployment architecture and basic knowledge of the ITM
solution, configure the Summarization and Pruning Agent (SPA) so that the SPA
can run according to required business needs.
-
Given installed base components of the ITM and installed DBMS for Data
Warehouse, the ITM installation guide, the deployment architecture and basic
knowledge of the ITM solution, configure the Warehouse Proxy so that the
Warehouse Proxy can run according to required business needs.
-
Given installed base components of the ITM and the ITM installation guide, the
deployment architecture and basic knowledge of the IBM Tivoli Monitoring
Solution, configure the OS monitoring agent so that the OS monitoring agent can
run according to required business needs.
-
Given installed base components of the ITM and the ITM installation guide, the
deployment architecture and basic knowledge of the ITM solution, configure the
Tivoli Enterprise Portal (TEP) so that the TEP can run according to required
business needs.
-
Given a working ITM environment, configure components so that ITM is highly
available.
-
Given access to event management system, TEMS, and installation guides,
configure the integration with event management so that ITM integration to the
Event Management System can be completed.
-
Given a deployed and running ITM Infrastructure (TEP, TEPS, TEMS and/or
secondary TEMS), configure agents so that they are correctly connected to a
TEMS.
-
Given a working ITM environment, installed and configured WPA and SPA and
Application Support for selected agents, and a customer's historical data
collection and reporting requirements, configure historical data collection so
that required historical data can be collected, summarized and pruned
correctly.
-
Given an installed ITM environment at required version level, the knowledge of
the ITM tool, the target business requirement, take the required actions so
that range partitioning for TDW can be completed.
-
Given a working ITM environment describe the functions of Agent Management
Services (AMS) so that it can be used to monitor and manage agents.
4. Administration (20%)
-
Given an installed and running IBM Tivoli Monitoring (ITM) environment, and the
knowledge of the ITM products, verify the installed components are running
appropriately so that their connection status to the Hub can be confirmed.
-
Given a running ITM V6.3 Infrastructure that is installed and configured
correctly and ITM administrator User ID, use the TEP interface so that users
are created with appropriate access rights and roles.
-
Given an installed, configured and running ITM environment, and knowledge of
the IBM Tivoli Monitoring product, access the TEP so that data visibility for
monitored items can be demonstrated and confirmed.
-
Given a working ITM environment and the authority to create situations, examine
the product provided situations and create a custom situation so that customer
requirements can be met.
-
Given a working ITM environment, periodically verify ITM disk space so that
normal operation and file growth are accommodated.
-
Given access to an implemented ITM system, back up the TEPS database so that a
restore of the TEPS database can be successfully performed, if required.
-
Given a working ITM environment, back up the Hub TEMS objects so that after
restoration, the Hub TEMS is fully operational at the state in which the backup
was taken.
5. Performance Tuning and Problem
Determination (20%)
-
Given access to IBM Tivoli Monitoring (ITM), review the installation logs so
that errors or failures can be identified.
-
Given access to a correctly implemented ITM, set the Java Heap Size so that the
Tivoli Enterprise Portal Server (TEPS) can handle multiple concurrent logins.
-
Given access to the application and system log, review and analyze the logs so
that any issues or error are identified.
-
Given access to the server, enable user and component auditing so that all
changes are tracked.
-
Given access to the TEP with permission to modify situations, ensure that
monitoring situations are running at an appropriate frequency so that the
correct sampling frequency is entered per the customer requirements.
-
Given the customer requirements and TEP access, review the self-monitoring
topology so that the agents are distributed appropriately across the monitoring
infrastructure.
-
Given the number of concurrent users on an HTTP, Apache, or IIS Web server,
tune the Web server so that concurrent users connectivity is optimized.
-
Given access to the server, configure logging so that logging levels and
parameters are set appropriately for the production environment.
IBM C9560-507 Certification Sample Questions and Answers
To make you familiar with IBM Tivoli Monitoring V6.3
Implementation (C9560-507) certification exam structure, we have prepared this
sample question set. We suggest you to try our Sample Questions for Tivoli Monitoring V6.3 (ITM) C9560-507 Certification to test your understanding
of IBM C9560-507process with real IBM certification exam environment.
C9560-507 IBM Tivoli Monitoring V6.3 Implementation Sample Questions:-
01.
What are two ways to override the thresholds for situations in IBM Tivoli
Monitoring V6.3?
(Choose
two.)
a) on-demand
b) with a schedule
c) a special script is needed
d) stop the target agent, make changes, and
restart
e) stop the Tivoli Enterprise Portal Server
(TEPS), make changes, and restart the TEPS
02. Why
would the KDEB_INTERFACELIST variable be set in the Tivoli Enterprise
Monitoring Server configuration file?
a) to define the OMNIbus EIF probe IP address
b) to prevent topology updates due to IP
address changes
c) to configure the IP address of the Tivoli
Enterprise Portal Server
d) to specify the IP address for machines with
multiple network adapters
03. It
has been determined that a key business application running on AIX requires
monitoring, but there is no IBM Tivoli Monitoring (ITM) V6.3 agent designed for
that specific application. Which three options may be available to monitor this
application using ITM?
(Choose
three.)
a) build a custom agent with Agent Builder
b) build a custom agent using the ITM Open
Source toolkit
c) build a custom agent with Agent Management
Service toolkit
d) monitor key performance indicators and
processes using an OS agent
e) monitor the application's log files for key
messages with the Log File agent
f) configure the business application to send
events directly to the Tivoli Data Warehouse
04. How
can situation events be forwarded to an Event Management System?
a) add entries for the situation in the
tecserver.txt configuration file
b) create a reflex action in the Managed
System Status workspace
c) select an Event Integration Facility
receiver in the situation definition
d) create a mapping definition for the
situation in the Manage Tivoli Enterprise Monitoring Services GUI
05.
Which statement is true when configuring the Hub Tivoli Enterprise Monitoring
Server (TEMS) to send events to IBM Tivoli Netcool/OMNIbus?
a) Only one destination event host and port
can be configured in the GUI.
b) Multiple destination event hosts and ports
can be configured in the GUI.
c) Event destination hosts and ports can only
be configured with command line utilities.
d) The destination event host can be
configured in the GUI but the port must be configured with the command tacmd.
06.
When configuring the Warehouse Proxy Agent, which parameter controls whether
partitioning is enabled or not?
a) KHD_RangeSet
b) KHD_PARTITION
c) KHD_Range_Partition
d) KHD_PARTITION_range
07. A
Tivoli Administrator creates a backup of the Hub Tivoli Enterprise Management
Server by skipping the initial preparatory steps and only copying $ITMHOME to a
backup directory. What risk has the administrator taken with this abbreviated
backup strategy?
a) The backup may not be useable for
restoration.
b) The backup will take up significantly more
space.
c) The backup will take significantly longer
to complete.
d) The backup will contain operating system
libraries that do not need to be backed up.
08. A
customer has a large installed base of AIX servers. Given the need for a
comprehensive view of their AIX deployment, which two agents should be
considered for deployment?
(Choose
two.)
a) UNIX agent
b) HMC Base agent
c) AIX Automation agent
d) LPAR Advanced agent
e) AIX Management agent
09.
Using queries, what is the most efficient way to create a workspace with
multiple data views?
a) Never have more than one query per view.
b) Use a single a query that returns all of
the attributes in all of the views.
c) Name the queries sequentially to cause them
to be submitted sequentially.
d) Assign unique queries to each view to keep
the queries as small as possible.
10.
What does the tacmd listsdastatus command display?
a) the self-describing application support
installation records
b) the self-describing installation
configurations for all monitoring servers
c) the self-describing installation
configurations for the hub monitoring server
d) the self-describing enablement and suspend
status for all monitoring servers
Answers:-
Answer
1:- a, b
Answer
2:- d
Answer
3:- a, d, e
Answer
4:- c
Answer
5:- b
Answer
6:- b
Answer
7:- a
Answer
8:- a, b
Answer
9:- b

Comments
Post a Comment