You have set up an InfoSphere MDM Server development environment using a test
WebSphere Application Server, locally installed DB2, and have developed a new data extension. After deploying and testing the data extension you need to add some additional attributes to it. You modify the data extension model and re-generate the code.
Before running the generated database setup scripts to deploy the changed database definitions, which step in required?
Answer : A
To turn on probabilistic matching for Suspect Duplicate Processing, which configuration changes must occur?
Answer : B
A granular composite java proxy, CompositeContractPartyRoleLocationTxnBP.java, is created to process (search, inquiry, persist) contractRoleLocation records in InfoSphere
MDM Server Application.
Which ContractinquiryLevel should be chosen in this composite transaction that meets both your functional and performance requirements?
Answer : C
Which two statements are true regarding MDM Composite XML transactions? (Choose two.)
Answer : B,D
You are developing extensions In InfoSphere MDM Server to support managing asset information. There is a business requirement to store a list of asset types. Each asset type must have a short name, language, and an associated numeric code.
Which type at extension is normally used to store this type at data?
Answer : D
What is a component of Data Persistency Entitlements?
Answer : B
You want InfoSphere MDM Server to selectively engage in Suspect Duplicate Processing.
You want the automatic deduplication of parities to occur only if the party records are within the same line of business.
Which two features must be enabled to support your solution? (Choose two.)
Answer : B,D
You have set up an InfoSphere MDM Server development environment using a test
WebSphere Application Server, locally installed DB2, and developed a new data extension.
Which three steps are required when deploying the modified MDM application to the
WebSpnere test server? (Choose three.)
Answer : A,C,D
When InfoSphere MDM Server performs a transaction that modifies the data related to the business object, it needs to inform Event Manager about the data change. Event Manager then tries to detect new occurred events for modified business objects.
Which three steps does Event Manager perform to detect events triggered by a transaction? (Choose three.)
Answer : A,B,D
You are configuring InfoSphere MDM Server for a financial institution with a large number of customers. Which two statements are correct regarding performance of the InfoSphere
MDM Server application? (Choose two,)
Answer : C,D
If the MandatorySearchDone field of the TCRMPartyBObj is set to Y and an A2 suspect is found during an addParty, which two actions occur?(Choose two.)
Answer : B,D
When configuring the Configuration and Management Component of InfoSphere MDM
Server for J2EE, what is the correct value for the NAME column of the
APPDEPLOYMENT table?
Answer : B
For which business objects can configurable inquiry levels be defined?
Answer : D
What are three mandatory steps to configure a fixed type external validation rule applied to an object type through the InfoSphere MDM Server Business Admin UI? (Choose three.)
Answer : A,C,D
You are setting up a new workstation using WebSphere Application Server 6.1.
What are two manual steps that must be completed when setting up InfoSphere MDM
Server on the workstation PC? (Choose two.)
Answer : A,C