Pass4itsure > IBM > IBM Certified Solution Implementer - Sterling B2B Integ > C8060-218 > C8060-218 Online Practice Questions and Answers

C8060-218 Online Practice Questions and Answers

Questions 4

What would cause the IBM Sterling B2B Integrator (SBI) database size to continually grow and thus impact performance?

A. persistence level set to FULL

B. improperly sized database connection pools

C. index, archive, and purge services not running

D. incorrect number of database threads assigned

Buy Now
Questions 5

Due to a rise in fraud, a financial company risk management team is looking to implement more stringent security measures. What are two security features to address the fraud? (Choose two.)

A. FTP Client and Server Adapters for exchanging data

B. identification policies for recipients of data in a file transfer

C. Cyber Security Operations Center (CSOC) Comprehensive Cyber Threat Detection and Response

D. Controlled Substances Ordering System (CSOS) to permit electronic transmission of orders for controlled substances

E. a suite of encryption services to ensure that data remains secure and meets organization, industry, and government mandates for datasecurity

Buy Now
Questions 6

How can a report be set to be stored on the file system?

A. Schedule a report.

B. Create a new report.

C. Edit an existing report.

D. Change a properties file.

Buy Now
Questions 7

How can a real-time overview of all the defined JDBC pools within a system be viewed?

A. Threads

B. System Status

C. Host Information

D. Database Usage

Buy Now
Questions 8

Which XPath expression references a document in process data?

A. SCIObjectID

B. PrimaryDocument

C. Document/SCIObjectID

D. PrimaryDocument/@SCIObjectID

Buy Now
Questions 9

A global persistence level is set to PERSISTENCE_NONE. Which Business Process (BP) persistence settings will result in more information being persisted?

A. System Default

B. Step Status Only

C. Step Status - Engine May Override

D. BP Start Stop - Engine May Override

Buy Now
Questions 10

A mailbox is created for an end user called /partner/orders/TPA_inbound. When the end user connects, the end user can only see /TPA_inbound mailbox from root. What has happened?

A. A virtual root has been created on /partner/orders for that SBI userid.

B. The end user has been assigned /TPA_inbound permissions for the mailbox.

C. Mailbox permission rights have been changed to VIEW for /partner/orders/TPA_inbound.

D. Another mailbox was created called /partner/orders/TPB_inbound which the user is not allowed to access.

Buy Now
Questions 11

A developer is testing an IBM Sterling B2B Integrator (SBI) Business Process (BP) that was created using the Graphical Process Modeler (GPM). The developer is attempting to extract the Primary Document contained in Process Data to a file system folder using a File System Adapter (FSA). In the File System Adapter Service Editor and/or Service Configuration the developer has assigned values to the parameters for the Action (Extract), extraction folder and for the file name to name the extracted file. However, the process is failing at the FSA with an error indicating that the Primary Document is null or doesn exist.Document is null or doesn? exist. The developer has verified that the Primary Document does exist. What is the most likely cause of the error?

A. File System adapter Service Editor tab Message to ServiceOutput Msg set to Messages Only

B. File System adapter Service Editor tab Message from ServiceInput Msg set to Allow Message Write

C. File System adapter Service Editor tab Message from ServiceInput Msg set to Allow Process Data Write

D. File System adapter Service Editor tab Message to ServiceOutput Msg set to Obtain Message First, then Process Data

E. File System adapter Service Editor tab Message to ServiceOutput Msg set to Obtain Process Data First, then Messages

Buy Now
Questions 12

A developer needs to check if the 'Preprocess' element equals 'Y' in Process Data. Which statement is most efficient?

A. INPUT/Header/Preprocess = 'Y'

B. string(INPUT/Header/Preprocess) = 'Y'

C. string(//INPUT/Header/Preprocess) = 'Y' D. //ProcessData/INPUT/Header/Preprocess/text() = 'Y'

Buy Now
Questions 13

A customer has deployed a two node active-active IBM Sterling B2B Integrator (SBI) cluster in the secure zone on two servers. The customer has installed two servers in the DMZ for the purpose of installing remote SBI Perimeter Servers to facilitate communications with external partners. Each server in the DMZ is multi-homed (two external facing NIC cards with two external IP addresses and one internal facing NIC card) to two different external facing network segments for redundancy in case one network segment fails or a NIC card fails. External partners will connect to an external IP Load Balancer that will distribute inbound FTP/S, SFTP and HTTP Client sessions across the Perimeter Servers. The Perimeter Servers will be installed without using wildcard addresses. The customer requirement is that if any single server fails and oneServers. The Perimeter Servers will be installed without using wildcard addresses. The customer? requirement is that if any single server fails and one of the two external facing network segments fail, all the other SBI nodes and remote Perimeter Server instances must continue to actively handle inbound sessions for each protocol. What is the minimum number of remote Perimeter Server instances that must be deployed in the DMZ?

A. 4

B. 6

C. 8

D. 12

Buy Now
Exam Code: C8060-218
Exam Name: IBM Sterling B2B Integrator V5.2 Solution Implementation
Last Update: Apr 26, 2024
Questions: 104
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99