Vcehome > IBM > IBM Enterprise Content Management > P2070-048 > P2070-048 Online Practice Questions and Answers

P2070-048 Online Practice Questions and Answers

Questions 4

In what significant functional way or ways do the CE Java and .NET APIs differ?

A. Only the CE .NET API can use Content Management Interoperability Services (CMIS) as a transport.

B. They have different authentication techniques and distributed transaction handling.

C. The CE Java API cannot use web services as a transport.

D. The CE .NET API uses OLEDB for executing CE SQL queries.

Browse 48 Q&As
Questions 5

While implementing a Workflow solution on FileNet P8, a business requirement lists the need to integrate

existing legacy applications in the workflow. The legacy mainframe applications have Java interfaces that

can be invoked from the workflow.

Which is the best method to achieve this integration?

A. Use Java Message Service integration.

B. Use a REST based integration from the workflow.

C. Ask the legacy application maintenance team to expose the functionality as a web service.

D. Develop a custom Java component using Component Integrator to invoke the legacy application.

Browse 48 Q&As
Questions 6

Which of the following is NOT a reason to use the Microsoft Visio diagrams ?

A. Import diagram into P8 Process Designer.

B. Allow a Business Analyst to document the process.

C. Allow you to code System Steps.

D. Ability to map shapes to Process Design objects.

Browse 48 Q&As
Questions 7

Which of the following is the current framework recommended by IBM for building rich interactive web-based content applications?

A. IBM Rational Data Architect.

B. Workplace Web Application Toolkit (WAT).

C. Administration Console for Content Platform Engine (ACCE).

D. IBM Content Navigator (ICN).

Browse 48 Q&As
Questions 8

Which of the following is NOT a standard, out-of-the-box feature of P8 security?

A. There is a mechanism for default permissions by document class.

B. There is a mechanism for automatically adjusting permissions during checkout/checkin cycles.

C. Security can be modified individually on business objects.

D. There is a mechanism for automatically adjusting permissions based on date and time.

Browse 48 Q&As
Questions 9

P8 follows industry practices in separating authentication (validating the identity of users) from

authorization (controlling access to resources for identified users).

Which of the following is TRUE for P8's handling of authentication and authorization?

A. Authentication is handled by the application server. Authorization is handled by P8.

B. Authorization is handled by the application server. Authentication is handled by P8.

C. P8 can handle authentication if the Password Synchronization feature is enabled.

D. The Old Dogs New Tricks (ODNT) policy mechanism can be used to supplement the internal P8 authorization calculations.

Browse 48 Q&As
Questions 10

A document comes into the company and you need a select list of individuals to process the document

before it can be moved to the next step.

What would you use within a workflow toaccomplish this scenario?

A. Workgroup

B. Personal Queue

C. Work Queue

D. Component Step

Browse 48 Q&As
Questions 11

While implementing a FileNet P8 solution, you would like to make content addition to the FileNet ECM repository easy, intuitive and productive to end users. The proposed solution should address requirements such as allow documents of a specific type to be added to a given folder, hide certain properties from the user when entering metadata for the document, and apply pre-configured security to documents. Which of the following techniques best addresses these requirements?

A. Use a Form Policy Document.

B. Use the default Add Document functionality provided in the IBM Content Navigator.

C. Use a Search Template.

D. Use a Document Entry Template.

Browse 48 Q&As
Questions 12

While implementing a line of business application on FileNet P8, the customer has asked to provide the end users a set of pre-defined searches that users can select to retrieve the relevant documents. Which of the following techniques would you use?

A. Provide a Stored Search, which the users will select and the search will execute and return the results.

B. Provide a custom search SQL provider.

C. Let users write their own SQL query.

D. Provide a Entry Template for Content Based Search Retrieval.

Browse 48 Q&As
Questions 13

What is the recommended size of the nursery within the CPE jvm in relation to heap size?

A. The same as heap

B. Half the size of heap

C. Twice the size of heap

D. There is no correlation between the two

Browse 48 Q&As
Exam Code: P2070-048
Exam Name: IBM FileNet Image Services Administration and Support Mastery Test v1
Last Update: May 15, 2024
Questions: 48 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99