Ensurepass.com : Ensure you pass the IT Exams
2018 Jan IBM Official New Released C2070-581
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/C2070-581.html

IBM FileNet Content Manager V5.1

Question No: 11 – (Topic 1)

Which of the following statements about half maps is true?

  1. Half maps create a deploy dataset.

  2. Halfmaps analyze objects for import.

  3. Half maps store environment specific data.

  4. Half maps are used to create an export manifest.

Answer: C

Question No: 12 – (Topic 1)

To enable log4j logging in Workplace XT debugging, you will perform which of the following?

  1. Download and install log4j and configure with Workplace XT.

  2. Out of the box Workplace XT comes with log4j and always enabled.

  3. Workplace XT does not support log4j debugging. It is used only for Content Engine and ProcessEngine.

  4. To enable logging, rename the sample logging configuration file, _log4j.properties to log4j.properties and restart the application server.

Answer: D

Question No: 13 – (Topic 1)

A document entry template can be designed to allow end users to provide their own values for which of the following?

  1. Document properties and security settings.

  2. Document properties, butnot security settings.

  3. Security settings, but not document properties.

  4. Document properties, security settings, and the document class.

Answer: A

Question No: 14 – (Topic 1)

What value on the FileNet Enterprise Manager -gt; Object Store#39;s property dialog controls the amount of time a security entry remains in the security cache?

  1. GCD Cache TTL.

  2. Object Security Cache Entry TTL.

  3. Directory Service Cache Expiration.

  4. Maximum Marking Set Cache Entries.

Answer: B

Question No: 15 – (Topic 1)

To verify a file storage area, you log onto the machine where the Content Engine Server is installed and examine the contents of the file storage area directory. This directory should contain which of the following objects?

  1. Two subdirectories – content and inbound

  2. Three subdirectories – content, inbound and outbound

  3. An XML file, named fn_stakefile, and two subdirectories, content and inbound

  4. An XML file, named fn_stakefile, and two subdirectories, inbound and outbound

Answer: C

Question No: 16 – (Topic 1)

Data replication for disaster recovery can be accomplished at the application, host, storage or network level. Which of the following statements describes replication at the storage level for a FileNet P8 system?

  1. Replication is configured and implemented by the FileNet P8 product.

  2. Replication is configured and implemented by the host operating system.

  3. Replication is managed by the storage device, typically to another device of the same model.

  4. A device on the network, such as the IBM SAN Volume Controller (SVC), that intercepts device writes and replicates them to a corresponding

storage device at a remote site.

Answer: C

Question No: 17 – (Topic 1)

What is the Composite Platform Installation Tool?

  1. A tool that allows you to install P8 components only.

  2. A tool that allows you to install P8 on multiple servers.

  3. A tool that allows you to install P8 components remotely.

  4. A tool that allows you to install P8 components on a single server, including the middleware applications such as the database and web

application server software.

Answer: D

Question No: 18 – (Topic 1)

When a property is added to a class, what is created?

  1. Choice list.

  2. Property template.

  3. Property description.

  4. Default property value.

Answer: C

Question No: 19 – (Topic 1)

Which of the following is a valid reason for moving content into an encrypted storagearea?

  1. To encrypt content that is currently unencrypted.

  2. To re-encrypt currently encrypted content using a custom key.

  3. To force encryption of existing unencrypted content already in the target storage area.

  4. To improve access performance bymoving content to a storage area that has fewer encryption keys.

Answer: A

Question No: 20 – (Topic 1)

Why is it important for audit processing clients to use audit bookmarks?

  1. To mark important audit records for further investigation.

  2. To lock the audit record so other clients will not process the same audit entry.

  3. To mark the document associated with the audit record for further investigation.

  4. To let the audit disposition process know which records have been processed and are eligible for deletion.

Answer: D

100% Ensurepass Free Download!
Download Free Demo:C2070-581 Demo PDF
100% Ensurepass Free Guaranteed!
C2070-581 Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.