123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Education >> View Article

C8010-250 Certifications Book

Profile Picture
By Author: mcleod.k
Total Articles: 155
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Question: 1

Retailer ABC is using IBM Sterling Order Management for its two sub-divisions (enterprises): ONLINE and RETAIL. The retailer wants to configure a set of users who only have access to the transfer orders (TRANSFER_ORDERS document type) for its ONLINE division (enterprise).
How should an implementation professional configure these users in IBM Sterling Configurator?

A. Configure users under the ONLINE enterprise and assign them to a team that only has access to the ONLINE enterprise and the TRANSFER_ORDERS document type
B. Configure users under the ABC enterprise and assign them to the TRANSFER_ORDERS document type in the user configuration
C. Configure users under the ONLINE enterprise and assign them to the TRANSFER_ORDERS document type in the user configuration
D. Configure users under the ONLINE enterprise and configure a data access policy that only allows access to the TRANSFER_ORDERS document type

Answer: A

Question: 2

An organization needs to limit the output of the getOrderDetails API for user XYZ, while keeping the original API ...
... output intact the remaining users. The user XYZ belongs to User Group A and Team B.
How can this be achieved using IBM Sterling Order Management security configurations?

A. Configure a XSL file to modify the output template to limit output of getOrderDetails API and assign it to user XYZ
B. Use API security configuration for the getOrderDetails API to limit its output and assign it to the user XYZ
C. Use API security configuration for the getOrderDetails API to limit its output and assign it to Team B
D. Use API security configuration for the getOrderDetails API to limit its output and assign it to User Group A

Answer: A

Question: 3

An online retailer implements IBM Sterling Sensitive Data Capture Server (SSDCS) with IBM Sterling Order Management (OMS) to tokenize customer credit card information to conform to the PCI PA-DSS strategy.
Which statement about the order capture process is INCORRECT?

A. The customer submits the order with token to OMS for further processing.
B. SSDCS calls the corporate credit card vault with the customer's Primary Account Number (PAN) and returns the resulting token to the order capture browser screen.
C. SSDCS sends the customer's Primary Account Number (PAN) and a security token to OMS to ensure that the tokenization request is valid
D. The customer enters Primary Account Number (PAN) on the order capture browser screen that is sent to SSDCS for tokenization.

Answer: A

Question: 4

In an IBM Sterling Order Management deployment, the LDAP authentication will be implemented as a web service call against the Employee Active Directory. Which is a valid property for this LDAP implementation?

A. yfs.yfs security Idap user
B. yfs.yfs.security.ldap.authenticator
C. yfs.ldap.authenticator
D. yfs.yfs.security.ldap.uri

Answer: D

Question: 5

In a production environment, agent server JVM has crashed due to an out of a memory error on the agent machine. Agent server JVM is configured to run with 5 threads. At the time of the crash, 5 different records are being processed by the agent server JVM and 1707 more records are present in the non-persistent JMS queue to be processed Agent server JVM is re-started after increasing the memory.
Which statement is true?

A. Agent will start processing the 5+1707 records; agent re-trigger is not required
B. Agent will start processing the 5+1707 records; agent re-trigger is required
C. Agent will start processing the remaining 1707 records; agent re-trigger is not required
D. Agent will start processing the remaining 1707 records; agent re-trigger is required

Answer: A

Total Views: 252Word Count: 573See All articles From Author

Add Comment

Education Articles

1. Decoding Project Management Certifications: Pmp Or Capm?
Author: Myank

2. Best School In Rohini
Author: Sanchit Arora

3. Exploring The Foundations Of Islamic Learning: From Qur'anic Studies To Jurisprudence
Author: faizalkhan1393

4. Jain University Online Bcom
Author: Collegetour

5. Mastering Digital Marketing: Unlocking The Power Of Salesforce Marketing Cloud With Proximsoft
Author: proximsoft

6. Horizon Scholar: Your Source For Personalized University Selection Guidance
Author: Horizon Scholar

7. Advancing Knowledge: Machine Learning Research Proposal Services In Kisumu, Kenya
Author: elaine

8. A Guide To Ms In Business Analytics In Canada
Author: Shilpa Arora

9. The Psychology Of Learning: Understanding Cognitive Processes And Educational Strategies
Author: anwarkhan45314

10. Data Analytics Online Training Hyderabad | Data Analytics Training
Author: Teja

11. Curricular Innovation In Education: Adapting To The Changing Needs Of Students
Author: amankhan99101

12. The Heartbeat Of Windsor Gardens Primary School
Author: Avenues College

13. Buy Research Proposal In Nairobi, Kenya: A Comprehensive Guide
Author: elaine

14. Empowering Minds: Exploring Counseling Techniques For Personal Growth And Healing
Author: abdulshaikh5253

15. Exploring Earth's Extremes: From Antarctica To The Sahara Desert
Author: Madhu Yadav

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: