[PDF

Categories :

QUESTION NO:2

An SLM Policy has been associated with a web service proxy to restrict access to a backend web

service if one of a number of conditions has been met. The list of conditions are described in a

series of SLM statements. What Evaluation Method must the solution implementer select in the

SLM Policy to ensure that every SLM statement is checked until a throttle condition is executed?

A. terminate-at-first-filter

B. terminate-at-first-reject

C. terminate-at-first-action

D. terminate-at-first-refuse

Answer: B

Explanation:

QUESTION NO: 46

A system administrator is making sure that the SSL communications between the plug-in and the

application server are as secure as possible. While configuring SSL for the plug-in what steps

should be taken to ensure the BEST possible security?

A. Replace the private key

B. Replace the plugin-key kdb file

C. Remove the public key

D. Remove the DummyKeyring kdb file

Answer: B

QUESTION NO:131

Given the following code:

ExamReal.com — 100% Real QandAs | 100% Real Pass

What will the alert(WL.Client.getUserPref(‘key1’)); show?

A. The alert will not show since WL.Client.setUserPref cannot be called in the for loop since it is an

asynchronous function.

B. updatedValue1 since WL.Client.setUserPref({‘key1’ : ‘updatedValue1’}); will replace the value of key1

set in the for loop.

C. value1, updatedValue1 or null since WL.Client.setUserPref is an asynchronous function and there is no

guarantee which call, if any,will return first.

D.

value1 since WL.Client.setUserPref(‘key1’, ‘updatedValue1’); will fail because WL.Client.deleteUserPref

(‘key1’) was notcalled before setting the new value.

Correct Answer: C

QUESTION NO:25

A BPM application developer is asked by a system administrator to fix an issue with a failed

process instance in a on-line runtime environment. The system administrator has determined that

the problem is with a variable called tw.local.carSelection. The value of tw.local.carSelection is

incorrect and needs to be set to “Truck”. Assuming the BPM application developer has been

granted all security privileges required, which of the following approaches are valid to fix the

problem? (Choose two)

A. Using the Inspector tab via the Process Designer:

1. Select the failed process

2. Use the execution evaluator to change the data

3. Select the ‘Resume’ button

B. Using the Inspector tab via the Process Designer:

1. Select the failed process

2. Select the variables tab

3. Edit the data

4. Select the ‘Resume’ button

C. Using the Designer tab via the Process Designer:

1. Open the process

2. Change the data

3. Deploy a new snapshot

4. Select “Migrate Existing Instances”

D. Using a database client connected to the BPM Process DB:

1. Open the LSW_BPD_INSTANCE_DATA table

2. Identify the failed process ID

3. Execute SQL to update the data

E. Using the Process Inspector tab via the Process Admin Console:

1. Select the failed process

2. Select the failed task

3. Open the data tree

4. Edit the data

5. Select ‘Retry Failed Steps’

Answer: A,E

QUESTION NO:29

Which two parallel job stages allow you to use partial schemas? (Choose two.)

A. Peek stage

B. File Set stage

C. Data Set stage

D. Column Export stage

E. External Target stage

Answer: B,E

Explanation: