IBM Content Manager V8.5 Solution Designer v6.0 (C2070-987)

Page:    1 / 5   
Total 72 questions

An IBM Convent Manager system administrator wants to log all system administration events for audit purposes.
Which of the following needed to be enabled to achieve this?

  • A. Enable ‘create’ event logging.
  • B. Enable 'Event Subscriptions’ through the library server configuration.
  • C. Enable the system administration log using the log configuration utility.
  • D. Enable system administrator event logging through the library server configuration.


Answer : D

Reference:
http://www-
01.ibm.com/support/knowledgecenter/SSLQWS_8.4.3/com.ibm.administeringcm.doc/clsh0
015.htm

An IBM Content Manager solution designer wants to configure two resource managers (RM
A and RM B) so that an object is available for retrieval or update if the resource manager that contains the primary object is offline.
To meet this requirement, the Content Manager administrator wants to configure replication between the two resource managers (RM A and RM B).
Which two of the following configuration actions in the system administration client will fulfill this requirement?

  • A. On RM B, add a new server definition for RM A, create a new workstation collection and add RM A for replication
  • B. On RM A. add a new -server definition for RM B, create a new workstation collection and add RM B for replication.
  • C. On RM A. add a new server definition for RM B. create a new workstation collection and add RM A for replication
  • D. On RM B, add a new server definition for RM A. create a new workstation collection and enable synchronous replication
  • E. On RM A, add a new server definition for RM B. create a new workstation collection and enable synchronous replication.


Answer : B,C

A company has setup an IBM Content Manager system to store documents and the system designer has deployed all components on one AIX server. The specialist recently found that AIX server disk I/O is too busy.
Which of the fallowing actions can best improve disk I/O?

  • A. Enable connection pooling.
  • B. Enable resource manager replication
  • C. Set all network interfaces to full duplex.
  • D. Put the library server and resource manager databases on separate disk controllers.


Answer : B

An IBM Content Managersolution designer is estimating the size of storage required to store business content On an average, 1.2 million images are created daily and the average image size is 300 KB. The content needs to be stored in the local disk for 60 days and then moved to Tivoli Storage Manager (TSMV). The content will be stored on the TSM system for 5 years. For system health and safety, the enterprise plans to add 10% of the required storage as buffer.
Which of the following is the estimated storage size (including the 10% buffer) required for the local disk?

  • A. 21.6 Terabytes
  • B. 24 Terabytes
  • C. 730 Terabytes
  • D. 750 Terabytes


Answer : C

In which of the following system administration panels can the resource manager LAN cache option be enabled?

  • A. Server Definitions
  • B. File System Volume Properties
  • C. New Resource Manager Definition
  • D. Resource Manager Configuration Properties Services tab


Answer : D

An IBM Content Manager solution designer is designing a new system for a magazine company. Each magazine issue is an item in the item type MAGANIZE. Each item has multiple child components in the component ARTICLES representing the articles in that issue.
In addition, there is an item type AUTHORS containing information of authors who work for the magazine company.
The solution designer decides to create references between ARTICLES and AUTHOR to indicate which authors wrote which articles
Which of the following statements is true?

  • A. The creation of the reference will fail since it cannot use a child component
  • B. The item type can only use one reference since it refers to a child component.
  • C. This item type can create multiple references to store multiple authors per article
  • D. The designer has to create the reference with delete restrict option for this design to work.


Answer : C

Retention and expiration are functions that are used to control the lifecycle of documents in the IBM Content Manager system.
Which of the lolloping is NOT true?

  • A. There are two Types or retention that can be used: application-controlled retention and system-controlled retention.
  • B. With application controlled retention, no external application Controls the intention, expiration and deletion of items
  • C. There are no restrictions on reindexing (moving an item from one item type to another) for systemcontrolled retention
  • D. Within system-controlled retention, there are two types of policies: a fixed-time retention policy and an event-driven retention policy


Answer : B

An IBM Content Manager solution designer is designing a system which requires a certain level of Transport Layer Security (TLS).
Which of the following components need to be configured to use Net Search Extender with
TLS?

  • A. Library server only
  • B. Resource manager only.
  • C. Both library server and resource manager,
  • D. The database connections to library server and resource manager.


Answer : C

  • A. Tivoli Storage Manager API logs
  • B. Tivoli Storage Manager server logs
  • C. Resource manager performance logs
  • D. WebSphere Application Server with resource manager application java core dump


Answer : D

Recently, the system password for the resource manager id rmadmin of RM B expired. On the system with RM B, the administrator updated the following:
1. System password for the rrnadmin
2. Database password for rrnadmin in RM B database for resource manager
3. Resource manager datasource password for rmedmin in WebSphere Application Server with RM B application
After this action was taken, the administrator noticed errors and replication has stopped working from RM A to RM B.
How should the administrator correct the problem using the System Administration Client?

  • A. Select Resource Managers, select RM B, select Server Definitions for RM A and update RM A password
  • B. Select Resource Managers, select RM A. select Server Definitions for RM B and update RM B password
  • C. Select Resource Managers, select RM A. select Server Definitions for RM A and update RM A password
  • D. Select Resource Managers, select RM B, select Server Definitions for RM B and update RM & password


Answer : C

Reference:
http://www-
01.ibm.com/support/knowledgecenter/SSLQWS_8.4.3/com.ibm.administeringcm.doc/trs10
066.htm

A human resources department agrees to share their IBM Content Manager V8.5 infrastructure with the audit department. Both departments want to exclusively administer their users.
Which of the Following options will accomplish this objective?

  • A. Create user groups
  • B. Enable administrative domains
  • C. Create different Resource Managers
  • D. Create different privilege sets and AC Ls


Answer : B

A solution designer is designing the data model for an invoicing system. One of the item types in the system will hold customer information that includes company name, contact name, address and telephone number. The requirements Tor the system state that many of these customers will have multiple contacts with different phone numbers and possibly different addresses. The system must allow users to easily add these contacts and search for them, without relying on text based searching.
Which of the following is the best way to design the data model so that it permits multiple contact information to be entered for each customer and located with a simple search"?

  • A. Add a child component to the customer item type and place the attributes contact name, address and telephone number into this new component.
  • B. Add a varchar attribute to the customer item type and use it to hold the contact information, making sure it is large enough to hold repeated information if necessary.
  • C. Add several attributes to the customer item type for each piece of information which will be repeated such as contact_name1, address 1. phonel. contact_name2, address 2, phone2.
  • D. Create another item type to hold the attributes contact name, address and telephone number and use the auto-linking feature to connect items in this item type with the main customer item type.


Answer : C

An IBM Content Manager solution designer wants to configure Content Manager administrator user IDs (icmadmin and rmadmin)on Microsoft Windows end assign them the following user rights:
1. Act as part of the operating system
2. Create a token object
3. Replace a process level token
4. Important for Brazilian Portuguese users only: create an administrative group called IO and addicmadmin to it.
Which application will be used to accomplish this task?

  • A. Windows Local Security Policy
  • B. Content Manager configuration manager
  • C. Windows Account Computer Management
  • D. Content Manager system administration client


Answer : B

A solution designer is designing an IBM Content Manager (CM) system. As the company already has a Microsoft Active Directory <LDAP) server, the designer needs to create the same users and group-, in CM.
Which of the Following features is supported when imploring users and groups usrng the system administration client?

  • A. Import LDAP passwords to CM
  • B. Maintain LDAP nested group structure in CM.
  • C. Automatically synchronize users and groups from LDAP server to CM.
  • D. Allow user names or group names to contain characters that CM does not support.


Answer : C

An IBM Content Manager user retrieves a document and receives an error.
Which of the following logs does NOT provide any information which may help to debug the issue?

  • A. icmrm.logfile
  • B. cfgactions log
  • C. SystemErr.log
  • D. ICMSERVER log


Answer : C

Page:    1 / 5   
Total 72 questions