PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

which action to be executed is the most efficient for each of the failed instances?

A Business Process (BP) has been identified that failed due to an issue with the Lightweight JDBC
adapter using a database that is unavailable. The database has been made available again. The
BP has no built in OnFault logic. To reprocess the failed BP, which action to be executed is the
most efficient for each of the failed instances?

What is the most effective way to configure SBI to meet the requirements?

A company has many CA certificates in their IBM Sterling B2B Integrator (SBI). The company’s
SBI administrator is responsible for contacting the Certificate Authorities for certificate renewal
before they expire. Recently the company decides to have their security administrator perform the

job instead, and requires automated notification be sent to the security administrator 30 days prior
to a certificate’s expiration date. What is the most effective way to configure SBI to meet the
requirements?

The customer?

A customer has deployed a two node active-active IBM Sterling B2B Integrator (SBI) cluster in the
secure zone on two servers. The customer has installed two servers in the DMZ for the purpose of
installing remote SBI Perimeter Servers to facilitate communications with external partners. Each
server in the DMZ is multi-homed (two external facing NIC cards with two external IP addresses
and one internal facing NIC card) to two different external facing network segments for
redundancy in case one network segment fails or a NIC card fails. External partners will connect to
an external IP Load Balancer that will distribute inbound FTP/S, SFTP and HTTP Client sessions

across the Perimeter Servers. The Perimeter Servers will be installed without using wildcard
addresses. The customer requirement is that if any single server fails and oneServers. The
Perimeter Servers will be installed without using wildcard addresses. The customer? requirement
is that if any single server fails and one of the two external facing network segments fail, all the
other SBI nodes and remote Perimeter Server instances must continue to actively handle inbound
sessions for each protocol. What is the minimum number of remote Perimeter Server instances
that must be deployed in the DMZ?

How many FTP Server adapters need to be configured to support ACTIVE and PASSIVE user initiated sessions?

For increased availability reasons, a two-node application cluster has two servers in the DMZ.
Each DMZ server has two network adapters. The system needs to be enabled to accept inbound
FTP or FTP SSL client connections on port 25000 and 26000. A wildcard (*) is not used in the
Perimeter Server. How many FTP Server adapters need to be configured to support ACTIVE and
PASSIVE user initiated sessions?


Page 559 of 1,258« First...102030...557558559560561...570580590...Last »