What would cause the IBM Sterling B2B Integrator (SBI) database size to continually grow and thus impact performance?
A. persistence level set to FULL
B. improperly sized database connection pools
C. index, archive, and purge services not running
D. incorrect number of database threads assigned
Due to a rise in fraud, a financial company risk management team is looking to implement more stringent security measures. What are two security features to address the fraud? (Choose two.)
A. FTP Client and Server Adapters for exchanging data
B. identification policies for recipients of data in a file transfer
C. Cyber Security Operations Center (CSOC) Comprehensive Cyber Threat Detection and Response
D. Controlled Substances Ordering System (CSOS) to permit electronic transmission of orders for controlled substances
E. a suite of encryption services to ensure that data remains secure and meets organization, industry, and government mandates for datasecurity
How can a report be set to be stored on the file system?
A. Schedule a report.
B. Create a new report.
C. Edit an existing report.
D. Change a properties file.
How can a real-time overview of all the defined JDBC pools within a system be viewed?
A. Threads
B. System Status
C. Host Information
D. Database Usage
Which XPath expression references a document in process data?
A. SCIObjectID
B. PrimaryDocument
C. Document/SCIObjectID
D. PrimaryDocument/@SCIObjectID
A global persistence level is set to PERSISTENCE_NONE. Which Business Process (BP) persistence settings will result in more information being persisted?
A. System Default
B. Step Status Only
C. Step Status - Engine May Override
D. BP Start Stop - Engine May Override
A mailbox is created for an end user called /partner/orders/TPA_inbound. When the end user connects, the end user can only see /TPA_inbound mailbox from root. What has happened?
A. A virtual root has been created on /partner/orders for that SBI userid.
B. The end user has been assigned /TPA_inbound permissions for the mailbox.
C. Mailbox permission rights have been changed to VIEW for /partner/orders/TPA_inbound.
D. Another mailbox was created called /partner/orders/TPB_inbound which the user is not allowed to access.
A developer is testing an IBM Sterling B2B Integrator (SBI) Business Process (BP) that was created using the Graphical Process Modeler (GPM). The developer is attempting to extract the Primary Document contained in Process Data to a file system folder using a File System Adapter (FSA). In the File System Adapter Service Editor and/or Service Configuration the developer has assigned values to the parameters for the Action (Extract), extraction folder and for the file name to name the extracted file. However, the process is failing at the FSA with an error indicating that the Primary Document is null or doesn exist.Document is null or doesn? exist. The developer has verified that the Primary Document does exist. What is the most likely cause of the error?
A. File System adapter Service Editor tab Message to ServiceOutput Msg set to Messages Only
B. File System adapter Service Editor tab Message from ServiceInput Msg set to Allow Message Write
C. File System adapter Service Editor tab Message from ServiceInput Msg set to Allow Process Data Write
D. File System adapter Service Editor tab Message to ServiceOutput Msg set to Obtain Message First, then Process Data
E. File System adapter Service Editor tab Message to ServiceOutput Msg set to Obtain Process Data First, then Messages
A developer needs to check if the 'Preprocess' element equals 'Y' in Process Data. Which statement is most efficient?
A. INPUT/Header/Preprocess = 'Y'
B. string(INPUT/Header/Preprocess) = 'Y'
C. string(//INPUT/Header/Preprocess) = 'Y' D. //ProcessData/INPUT/Header/Preprocess/text() = 'Y'
A customer has deployed a two node active-active IBM Sterling B2B Integrator (SBI) cluster in the secure zone on two servers. The customer has installed two servers in the DMZ for the purpose of installing remote SBI Perimeter Servers to facilitate communications with external partners. Each server in the DMZ is multi-homed (two external facing NIC cards with two external IP addresses and one internal facing NIC card) to two different external facing network segments for redundancy in case one network segment fails or a NIC card fails. External partners will connect to an external IP Load Balancer that will distribute inbound FTP/S, SFTP and HTTP Client sessions across the Perimeter Servers. The Perimeter Servers will be installed without using wildcard addresses. The customer requirement is that if any single server fails and oneServers. The Perimeter Servers will be installed without using wildcard addresses. The customer? requirement is that if any single server fails and one of the two external facing network segments fail, all the other SBI nodes and remote Perimeter Server instances must continue to actively handle inbound sessions for each protocol. What is the minimum number of remote Perimeter Server instances that must be deployed in the DMZ?
A. 4
B. 6
C. 8
D. 12