[Free] 2017(Oct) CollectDumps Braindumps IBM C2070-991 V13 Dumps with VCE and PDF Download 41-50

CollectDumps 2017 Oct IBM Official New Released C2070-991 V13
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/C2070-991 V13.html

IBM FileNet P8 V5.2.1, Deployment Professional

Question No: 41

Trace logging was initiated by the administrator to collect CBR Trace Flags and Error Trace flags for an IBM FileNet P8 Content Search issue. The issue has been reproduced and the logs need to be collected and reviewed.

Where do the default locations of thep8_server_trace.logand thep8_server_error.logexist on a Content Engine Instance deployed on an IBM webSphere Application Server?

  1. WAS_install_root/logs

  2. ContentEngine_install_root/ContentEngine

  3. ContentEngine_install_root/ContentEngine/tools/configure/profiles

  4. WAS_install_root/profiles/profile_name/FileNet/server_instance_name

Answer: B

Reference:

https://www- 01.ibm.com/support/knowledgecenter/SSNW2F_5.2.0/com.ibm.p8.installingxt.doc/wxtut003

.htm

Question No: 42

A highly available IBM FileContent Manager V5.2.1 environment has just been installed by the administrators at a large company. A WebSphere Application Server Network Deployment (WAS-ND) Content Platform Engine (CPE) cluster containing four CPE JVMs has been setup. A hardware load balancer is being used to spread HTTP/HTTPS traffic across the CPE JVMs. Workplace XT has been configured to point to the CPE cluster.

Assuming all four CPEJVMs are active, which two of the following are the BEST CHOICES for validating proper CPE responses through the load balancer?(Select two.)

  1. View the status context name (i.e. CPE ping page) of the load balancer. Continue to refresh this page in the browser until all four JVMs have been viewed. View the startup context name of each JVM and compare the results.

  2. Logon via Workplace XT. Begin performing CPE related work. Systematically shutdown and start the CPE JVMs so that no more than three and no fewer than two JVMs are active at any time. Continue testing in this manner for an hour.

  3. Shutdown three of the four CPE JVMs in the WAS-ND. Begin performing CPE related work. In between work steps, start one of the downed JVMs and stop the active one. Continue testing in this manner until all four JVMs have been isolated in this manner.

  4. Disable three of the four JVMs in the load balancer.Begin performing CPE related work. In between work steps, enable one of the downed JVMs and disable the active one. Continue testing in this manner until all four JVMs have been isolated in this manner.

Answer: B

Question No: 43

An insurance company has offices worldwide and makes use of the content cache areas for frequently accessed document content. Recently, the encryption key for encrypted storage area at this insurance company was compromised and a new key needs to be created.

Which of the following is true for the original content in the content cache areas?

  1. If the original content is not encrypted, the cache copy of that content will now be

    encrypted.

  2. If the original content is encrypted, the cache copy of the existing content will now bere- encrypted.

  3. If the original content is not encrypted, then the cache copy of that content will be removed and re-encrypted.

  4. If the original content is encrypted, then it will be re-encrypted with the new encryption key. The cache copy of that content will also be re-encrypted with the new encryption key.

Answer: C

Question No: 44

A FileNet consultantis performing steps to enable Kerberos authentication on an IBM WebSphere Application Server. The consultant is reviewing theFileNetP8KerberosService configuration in the Application Logins and notices the login modules are missing.

Which two of the login modules below should be present? (Select two.)

  1. com.filenet.engine.authentication.LoginModule

  2. com.ibm.ws.security.filenet.server.LoginModule

  3. com.ibm.ws.security.server.lm.ltpaLoginModule

  4. com.ibm.ws.security.server.lm.wsMapDefaultlnboundLoginModule

  5. com.ibm.wsspi.security.common.auth.module.IdentityAssertionLoginModule

Answer: A,C

Question No: 45

For a new IBM FileNet Content Engine server installation or upgrade, what additional information must be provided by an administrator and recorded in the installation and upgrade worksheet in addition to the Global Configuration Database name?

  1. Objectstore database names and database port numbers.

  2. Objectstore database names, database accounts and passwords.

  3. Objectstore database names, database port numbers and database accounts.

  4. Objectstore database names, database accounts, passwords, datasource names and IP address.

Answer: D

Question No: 46

A P8 administrator will be installing the IBM FileNet P8 Content Engine software onto multiple servers and would like to install it silently.

Which file and parameters will need to be updated?

  1. cpe_silent_install.txt.file, LICENSE_ACCEPTED, USER_INSTALL_DIR

  2. ce_silent_install.txt.file, CHOSEN_INSTALL_FEATURE_LIST, CCL_URL

  3. ce_silent_install.txt.file, JAVA_HOME, LICENSE_ACCEPTED, LAUNCH_CM

  4. cpe_silent_install.txt.file, USER_INSTALL_DIR, LAUNCH_CM, CCLWCM_URL

Answer: B

Question No: 47

A customer is setting up a new IBM FileNet Content Platform Engine and would like to know the easiest type of storage areas to create.

Which of the following meetsthis criteria?

  1. Fixed storage areas.

  2. Advanced storage areas.

  3. Database and file storage areas.

  4. Database and Fixed storage areas.

Answer: A

Question No: 48

A consultant for a large grocery store chain needs to ensure that the IBM Case Foundation system to be installed has the ability to handle the variations in application loads as the daily activity changes across file zones. To accomplish this, a highly available and load balanced system using geographically dispersed clusters has been specified.

Which one of the following J2EE servers is supported in this configuration?

  1. RedHat WildFly

  2. Apache Geronimo

  3. Oracle GlassFish Server

  4. IBM WebSphere Application Server Network Deployment

Answer: D

Question No: 49

A company plans to develop separate workflow applications for various business departments.

Which one of the followingapproaches should be considered in order to efficiently locate active workflows of a specific application?

  1. Create in-baskets for each workflow applications.

  2. Create a separate isolated region for each workflow application.

  3. Create a separate workflow roster for each workflow application.

  4. Create a separate application space for each workflow application.

Answer: D

Reference:

http://www-01.ibm.com/support/docview.wss?uid=swg21380814

Question No: 50

A P8 Administrator has been tasked with enabling verbose garbage collection (GC) for the IBM WebSphere Application Server (WAS).

How is verbose GC enabled and what log file contains the data?

  1. Verbose GC can be enabled via the WAS Admin Console. The verbose GC data will default to the SystemOut.log file for AIX, Microsoft Windows, and Linux operating systems.

  2. Verbose GC can be enabled via the WAS Admin Console. The verbose GC data will default to the native_stderr.log file for AIX, Microsoft Windows, and Linux operating systems.

  3. Verbose GC can be enabled via the WAS Admin Console. The verbose GC data will default to the SystemOut.log file for AIX, Microsoft Windows, Solaris, and Linux operating systems.

  4. Verbose GC can be enabled as a command-line parameter only. The verbose GC data will default to the native_stderr.log file for AIX, Microsoft Windows, and Linux operating systems.

Answer: C

100% Free Download!
Download Free Demo:C2070-991 V13 Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps C2070-991 V13 Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE