QUESTION NO:2
An SLM Policy has been associated with a web service proxy to restrict access to a backend web
service if one of a number of conditions has been met. The list of conditions are described in a
series of SLM statements. What Evaluation Method must the solution implementer select in the
SLM Policy to ensure that every SLM statement is checked until a throttle condition is executed?
A. terminate-at-first-filter
B. terminate-at-first-reject
C. terminate-at-first-action
D. terminate-at-first-refuse
Answer: B
Explanation:
QUESTION NO: 46
A system administrator is making sure that the SSL communications between the plug-in and the
application server are as secure as possible. While configuring SSL for the plug-in what steps
should be taken to ensure the BEST possible security?
A. Replace the private key
B. Replace the plugin-key kdb file
C. Remove the public key
D. Remove the DummyKeyring kdb file
Answer: B
QUESTION NO:131
Given the following code:
ExamReal.com — 100% Real QandAs | 100% Real Pass
What will the alert(WL.Client.getUserPref(‘key1’)); show?
A. The alert will not show since WL.Client.setUserPref cannot be called in the for loop since it is an
asynchronous function.
B. updatedValue1 since WL.Client.setUserPref({‘key1’ : ‘updatedValue1’}); will replace the value of key1
set in the for loop.
C. value1, updatedValue1 or null since WL.Client.setUserPref is an asynchronous function and there is no
guarantee which call, if any,will return first.
D.
value1 since WL.Client.setUserPref(‘key1’, ‘updatedValue1’); will fail because WL.Client.deleteUserPref
(‘key1’) was notcalled before setting the new value.
Correct Answer: C
QUESTION NO:25
A BPM application developer is asked by a system administrator to fix an issue with a failed
process instance in a on-line runtime environment. The system administrator has determined that
the problem is with a variable called tw.local.carSelection. The value of tw.local.carSelection is
incorrect and needs to be set to “Truck”. Assuming the BPM application developer has been
granted all security privileges required, which of the following approaches are valid to fix the
problem? (Choose two)
A. Using the Inspector tab via the Process Designer:
1. Select the failed process
2. Use the execution evaluator to change the data
3. Select the ‘Resume’ button
B. Using the Inspector tab via the Process Designer:
1. Select the failed process
2. Select the variables tab
3. Edit the data
4. Select the ‘Resume’ button
C. Using the Designer tab via the Process Designer:
1. Open the process
2. Change the data
3. Deploy a new snapshot
4. Select “Migrate Existing Instances”
D. Using a database client connected to the BPM Process DB:
1. Open the LSW_BPD_INSTANCE_DATA table
2. Identify the failed process ID
3. Execute SQL to update the data
E. Using the Process Inspector tab via the Process Admin Console:
1. Select the failed process
2. Select the failed task
3. Open the data tree
4. Edit the data
5. Select ‘Retry Failed Steps’
Answer: A,E
QUESTION NO:29
Which two parallel job stages allow you to use partial schemas? (Choose two.)
A. Peek stage
B. File Set stage
C. Data Set stage
D. Column Export stage
E. External Target stage
Answer: B,E
Explanation: