New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Note! Following C2010-571 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

C2010-571 Exam Dumps - IBM Tivoli Process Automation Engine V7.5 Implementation

Go to page:
Question # 25

Where are roles used?

A.

communication template, escalation, actions, e-mail listeners

B.

communication template, escalation, service level agreement, workflow

C.

communication template, notifications, service level agreement, workflow

D.

communication template, notifications, service level agreement, e-mail listeners

Full Access
Question # 26

Which statement describes how to enable Application Server security?

A.

Make a change to the mxserver.xml file and then rebuild and redeploy the EAR files.

B.

Enable it on the J2EE platform and use the Database Configuration application to set the value of UseAppServerSecurity to 1.

C.

Enable it on the J2EE platform. Tivoli process automation engine is capable or automatically recognizing the security setting.

D.

Make a change to the maximo properties file and two web.xml files, rebuild and redeploy the EAR files, and then enable it on the J2EE platform.

Full Access
Question # 27

A report cannot show more than 200 records even if a query is generated that contains greater then 200 records. Which option restricts the output?

A.

Enable Limit Records and seta Max Record Limit value

B.

Enable Max Records and set an Upper Record Limit value

C.

Enable Restrict Records and set a Max Record Limit value

D.

Enable Record Controls and set an Upper Record Limit value

Full Access
Question # 28

When adding more than one Key Performance Indicator (KPI) to a KPI graph portlet, what happens to the portlet?

A.

It changes to a KPI list.

B.

It changes to a bar graph.

C.

Another KPI portlet is created.

D.

It adds an additional KPI gauge.

Full Access
Question # 29

How are attached documents folders available in an application?

A.

From the application, click the Attachments icon

B.

From the application, select the Add Attached Documents action

C.

From the application, choose Select Action > Attachment Library/Folders> Add Folders

D.

From the application, choose Select Action > Attachment Library/Folders> Associate Folders

Full Access
Question # 30

Which two methods can be used to specify that a record cannot be saved unless there is a value in a data field of an application? (Choose two.)

A.

in Database Configuration, set the Required flag to Yes for the data attribute

B.

use the Application Designer for the desired application and add the Required control

C.

create an Action linked to a crontask that checks if the appropriate data elements have a value

D.

in Organizations > Configuration Options> Define Required Fields, enter the application and field name for the required field

E.

in the Platform Configuration module> System Properties application, query for and enable the Required option for the appropriate data element(s)

Full Access
Question # 31

When can a configuration record be added to a migration collection?

A.

if the migration object cannot migrate the data that is contained in the record

B.

if the migration collection that can migrate the data is contained in the business object

C.

if the record is supported by a migration object that can migrate the data contained in the record

D.

if the record is not supported by a migration object that can migrate the data contained in the record

Full Access
Question # 32

Which statement describes a function of the integrity checker?

A.

It validates database business object relationships.

B.

It looks for data inconsistencies and repairs them where possible.

C.

It compares the data dictionary with the underlying physical database schema.

D.

It examines the data contents of all database tables to check for missing or incomplete data.

Full Access
Go to page: