New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

C2070-981 Leak Questions

Page: 2 / 3
Total 127 questions

IBM FileNet Content Manager V5.2, Specialist Questions and Answers

Question 5

A customer wants to configure more than one LDAP repository with IBM FileNet Content Manager for user authentication.

Which of the following is true for IBM WebSphere Application server?

Options:

A.

FileNet Content Manager only supports one LDAP repository.

B.

Federated repositories are only supported when Java 2 security is enabled.

C.

With Federated repositories more than one LDAP repository can be supported.

D.

Federated repositories are supported only when the same LDAP user id is configured in all repositories.

Question 6

Consider the following distributed IBM FileNet Content Manager configuration:

Server A – Content Platform Engine; IBM Content Navigator

Server B – Content Search Services

Server C – Relational database server

Database files – located on local storage on Server C

Index collection files – located on local storage on Server B

Object store file storage files – located on network attached storage (NAS)

All object stores are configured to use file storage areas and content based retrieval (CBR). A complete offline backup of the system runs daily at 10 PM.

If a disk failure occurs at 2 PM on server C and all database files are lost, how should the administrator recover the system?

Options:

A.

Restore database files to server C.

B.

Restore configuration files to server A, index collection files to server B and database files to server C.

C.

Restore database files to server C, index collection files to server B and file storage files to the NAS device.

D.

Add a new database server, restore database files to this new server and file storage files to the NAS device.

Question 7

What is the primary objective to be considered when implementing a disaster recovery solution for an IBM FileNet Content manager system?

Options:

A.

The ability to resume operations after a large-scale failure while minimizing business data loss.

B.

Maintain data integrity for the GCD, object store databases, storage areas and index data in the event of a disk failure.

C.

Maintain data integrity for the GCD, object store databases, storage areas and index data in the event of data corruption or human error.

D.

Provide high availability through redundant hardware and software so that normal operations can continue uninterrupted after a single failure has occurred.

Question 8

Users have reported that some documents are visible in IBM Content Navigator but are not accessible. The security for these documents needs to be reviewed.

When evaluating access granted by a particular access control list, the access control entries are applied in what order of precedence? (From left to right.)

Options:

A.

Inherited Deny, Inherited Allow, Template Deny, Template Allow, Direct/Default Deny, Direct/Default Allow

B.

Inherited Allow, Inherited Deny, Template Allow, Template Deny, Direct/Default Allow, Direct/Default Deny

C.

Direct/Default Allow, Direct/Default Deny, Template Allow, Template Deny, Inherited Allow, Inherited Deny

D.

Direct/Default Deny, Direct/Default Allow, Template Deny, Template Allow, Inherited Deny, Inherited Allow

Page: 2 / 3
Total 127 questions