In what significant functional way or ways do the CE Java and .NET APIs differ?
A. Only the CE .NET API can use Content Management Interoperability Services (CMIS) as a transport.
B. They have different authentication techniques and distributed transaction handling.
C. The CE Java API cannot use web services as a transport.
D. The CE .NET API uses OLEDB for executing CE SQL queries.
While implementing a Workflow solution on FileNet P8, a business requirement lists the need to integrate
existing legacy applications in the workflow. The legacy mainframe applications have Java interfaces that
can be invoked from the workflow.
Which is the best method to achieve this integration?
A. Use Java Message Service integration.
B. Use a REST based integration from the workflow.
C. Ask the legacy application maintenance team to expose the functionality as a web service.
D. Develop a custom Java component using Component Integrator to invoke the legacy application.
Which of the following is NOT a reason to use the Microsoft Visio diagrams ?
A. Import diagram into P8 Process Designer.
B. Allow a Business Analyst to document the process.
C. Allow you to code System Steps.
D. Ability to map shapes to Process Design objects.
Which of the following is the current framework recommended by IBM for building rich interactive web-based content applications?
A. IBM Rational Data Architect.
B. Workplace Web Application Toolkit (WAT).
C. Administration Console for Content Platform Engine (ACCE).
D. IBM Content Navigator (ICN).
Which of the following is NOT a standard, out-of-the-box feature of P8 security?
A. There is a mechanism for default permissions by document class.
B. There is a mechanism for automatically adjusting permissions during checkout/checkin cycles.
C. Security can be modified individually on business objects.
D. There is a mechanism for automatically adjusting permissions based on date and time.
P8 follows industry practices in separating authentication (validating the identity of users) from
authorization (controlling access to resources for identified users).
Which of the following is TRUE for P8's handling of authentication and authorization?
A. Authentication is handled by the application server. Authorization is handled by P8.
B. Authorization is handled by the application server. Authentication is handled by P8.
C. P8 can handle authentication if the Password Synchronization feature is enabled.
D. The Old Dogs New Tricks (ODNT) policy mechanism can be used to supplement the internal P8 authorization calculations.
A document comes into the company and you need a select list of individuals to process the document
before it can be moved to the next step.
What would you use within a workflow toaccomplish this scenario?
A. Workgroup
B. Personal Queue
C. Work Queue
D. Component Step
While implementing a FileNet P8 solution, you would like to make content addition to the FileNet ECM repository easy, intuitive and productive to end users. The proposed solution should address requirements such as allow documents of a specific type to be added to a given folder, hide certain properties from the user when entering metadata for the document, and apply pre-configured security to documents. Which of the following techniques best addresses these requirements?
A. Use a Form Policy Document.
B. Use the default Add Document functionality provided in the IBM Content Navigator.
C. Use a Search Template.
D. Use a Document Entry Template.
While implementing a line of business application on FileNet P8, the customer has asked to provide the end users a set of pre-defined searches that users can select to retrieve the relevant documents. Which of the following techniques would you use?
A. Provide a Stored Search, which the users will select and the search will execute and return the results.
B. Provide a custom search SQL provider.
C. Let users write their own SQL query.
D. Provide a Entry Template for Content Based Search Retrieval.
What is the recommended size of the nursery within the CPE jvm in relation to heap size?
A. The same as heap
B. Half the size of heap
C. Twice the size of heap
D. There is no correlation between the two