Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

C1000-116 Exam Dumps - IBM Business Automation Workflow V20.0.0.2 using Workflow Center Development

Question # 4

In the Process Inspector, what happens when the administrator puts an activity to a SKIPPED state?

Available Choices (select all choices that are correct)

A.

The processing of the instance continues without the activity.

B.

The processing of the instance is completed.

C.

The processing of the instance throws an error.

D.

The processing of the instance stops.

Full Access
Question # 5

When a JavaScript error has occurred on a page developed in Business Automation Workflow, where should a developer view this error?

Available Choices (select all choices that are correct)

A.

Process Admin console

B.

Web browser console

C.

Server logs

D.

Process Inspector

Full Access
Question # 6

Which identity governance and access management method is pre-integrated with the starter deployment of Cloud Pak for Business Automation?

A.

SAML

B.

SSO

C.

LDAP

D.

OpenID

Full Access
Question # 7

What are two uses of the Save service implementation under the Behavior tab in the business object definition shown below? (Choose two.)

A.

Provide a service that can be called by an Undercover Agent when an event accesses the shared business object.

B.

Handle any data validation errors for the shared business object only within the "Save service".

C.

Validate or manipulate the data that is saved to the shared business object.

D.

Apply an alternative merge result in case the shared business object is saved in more than one place.

E.

Save a specific version of the shared business object, even when the shared business object is updated at the same time.

Full Access
Question # 8

Which feature in OpenShift Container Platform allows developers to seamlessly provision resources provided by a variety of service brokers?

A.

API Server

B.

Service Catalog

C.

Container Registry

D.

Docker Hub

Full Access
Question # 9

What is used to model a point in the execution of the service flow where only one of several paths can be followed, depending on a condition?

Available Choices (select all choices that are correct)

A.

Event Gateway

B.

Inclusive Gateway

C.

Linked Service Flow

D.

Exclusive Gateway

Full Access
Question # 10

What is the core embodiment of a Robotic Process Automation scenario?

A.

Automating thought-driven tasks in an enterprise

B.

Utilizing Automation-as-a-Service within the Cloud

C.

Automating repetitive tasks across multiple interfaces

D.

Utilizing automation bots to cognitively craft code

Full Access
Question # 11

Which statement is true regarding the security setting4s of exposed Business Automation Workflow capabilities as web services?

Available Choices (select all choices that are correct)

A.

There are no custom security settings on exposing the Web services, they inherit the Process Agp_ security.

B.

The web services follow their own security model, they do not relate to the Process Ap_p_ security.

C.

There are no security capability features when exposing the BAW capabilities, they should be covered by another secured layer.

D.

Custom security can be set on the webservice and must also comply with the Process Application security.

Full Access
Question # 12

A case has started a process. When the case content objects are updated in the case, which statement is true?

Available Choices (select all choices that are correct)

A.

For cases that parent a process, content objects shared are locked to prevent lack of synchronization issues.

B.

The child process gets delayed updates of the changes that can be configured in the admin console.

C.

The child process is not aware of the changes, it should be updated independently.

D.

The child process is synchronously updated with the changes.

Full Access
Question # 13

Traditionally, case solutions were created in Case Builder and can still be used. Which additional interface can be used to create case solutions?

A.

Business Automation Navigator

B.

Business Automation Studio

C.

Process Center

D.

Workflow Center

Full Access
Question # 14

Why should a security proxy hierarchy be created in Case Builder?

Available Choices (select all choices that are correct)

A.

To reuse case types between business units without sharing case data.

B.

To dynamically change security on cases as the cases change stale

C.

To ensure that users can dynamically access documents filed in case folders.

D.

To avoid having to rely on the Security Configuration to handle case security.

Full Access
Question # 15

What is the minimum role-based access control needed to install IBM Cloud Pak for Automation?

A.

Administrator

B.

Operator

C.

Installer

D.

Cluster Administrator

Full Access
Question # 16

What is the minimum system configuration that is needed for a developer to run playbacks?

Available Choices (select all choices that are correct)

A.

One Workflow Server instance as development environment connected to the Workflow Center.

B.

Depending on whether the Business Automation Workflow is on premise or on cloud, the developers may need a local Workflow Server instance on their machine or on the cloud.

C.

A Workflow Center with no Workflow Servers created.

D.

A local Workflow Server instance on their machine connected to the Workflow Center.

Full Access
Question # 17

How can the Service Call be configured to automatically run when a coach starts?

Available Choices (select all choices that are correct)

A.

Enable the 'Auto run' configuration option.

B.

Enable the 'React to input changes' configuration option.

C.

Nothing is required as the Service Call will always automatically run unless it is disabled.

D.

Bind the Input value configuration option to a variable.

Full Access
Question # 18

Which statement is true regarding the Case solution security configuration package file?

Available Choices (select all choices that are correct)

A.

It can be exported from Case administration client and imported into the solution from the Workflow center console.

B.

It can be moved from one environment to another by using the export and import security configuration wizards

C.

It can be imported before the solution is deployed in the target environment and then apply the security settings.

D.

The security configuration might be entirely defined by manual steps and exporting the configuration setting into the configuration package file.

Full Access
Question # 19

What gateway is shown in the image below?

A.

Message Gateway

B.

Inclusive Gateway

C.

Event Gateway

D.

Delay Gateway

Full Access