Your success in IBM C2070-987 is our sole target and we develop all our C2070-987 braindumps in a way that facilitates the attainment of this target. Not only is our C2070-987 study material the best you can find, it is also the most detailed and the most updated. C2070-987 Practice Exams for IBM C2070-987 are written to the highest standards of technical accuracy.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for IBM C2070-987 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW C2070-987 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/C2070-987-exam-dumps.html
Q21. A solution designer is designing the data model for an invoicing system. One of the item types in the system will hold customer information that includes company name, contact name, address and telephone number. The requirements Tor the system state that many of these customers will have multiple contacts with different phone numbers and possibly different addresses. The system must allow users to easily add these contacts and search for them, without relying on text based searching.
Which of the following is the best way to design the data model so that it permits multiple contact information to be entered for each customer and located with a simple search"?
A. Add a child component to the customer item type and place the attributes contact name, address and telephone number into this new component.
B. Add a varchar attribute to the customer item type and use it to hold the contact information, making sure it is large enough to hold repeated information if necessary.
C. Add several attributes to the customer item type for each piece of information which will be repeated such as contact_name1, address 1. phonel. contact_name2, address 2, phone2.
D. Create another item type to hold the attributes contact name, address and telephone number and use the auto-linking feature to connect items in this item type with the main customer item type.
Answer: C
Q22. An IBM Content Managersolution designer is estimating the size of storage required to store business content On an average, 1.2 million images are created daily and the average image size is 300 KB. The content needs to be stored in the local disk for 60 days and then moved to Tivoli Storage Manager (TSMV). The content will be stored on the TSM system for 5 years. For system health and safety, the enterprise plans to add 10% of the required storage as buffer.
Which of the following is the estimated storage size (including the 10% buffer) required for the local disk?
A. 21.6 Terabytes
B. 24 Terabytes
C. 730 Terabytes
D. 750 Terabytes
Answer: C
Q23. An access type is a configuration for a communication protocol used by & resource manager. The configuration consists of the protocol type, the port number to use, and the path to the program needed to access data.
Which two protocols are required when a new resource manager is defined in the system administration client?
A. FTP
B. HTTP
C. JDBC
D. LSRM
E. HTTPS
Answer: A,B
Q24. An administrator is creating a resource manager workstation collection by using the IBM Content Manager System Administration Client. According to the business requirement they should enable collections for replication when creating the workstation collection.
Which of the following is NOT an option that can be specified when creating a workstation collection?
A. Enable synchronous replication
B. Replicate objects from remote migration
C. Replicate objects from remote replication
D. Enable tolerance mode for synchronous replication
Answer: C
Q25. An IBM Content Manager system administrator is adding 25 new users to the system, all of whom are in the same department. These users all need to access the same objects in IBM Content Manager.
How can the administrator assign the same access rights to all 25 users easily and in such a way as to make future changes to the access rights simple?
A. Create the users, then create an ACL which assigns all 25 users the required privilege sets
B. Create a new user group, and assign the users to the group as they are created. Then create an ACL which assigns the required privilege set& to this group,
C. Create the users, then create a user privilege set containing the required privileges for each of the users. Finally- create 25 ACU one for each user privilege set.
D. Create the users and a new privilege group containing the required privileges for these users. Then create an ACL which assigns this privilege group to the 25 users.
Answer: D
Q26. An IBM Content Manager solution designer wants to configure Content Manager administrator user I Ds (icmadmin and rmadmin) on a Microsoft Windows server.
Which of the following options is NOT correct?
A. icmadmin and rmadmin must be superadministrators
B. icmadmin and rmadmin must be defined in the operating system
C. icmadmin and rmadmin passwords when updated, must be updated only in the operating system
D. icmadmin and rmadmin passwords when updated, must be updated both in the operating system and Content Manager
Answer: D
Reference:
https://www-304.ibm.com/support/docview.wss?uid=swg21351448
Q27. An IBM Content Manager user retrieves a document and receives an error.
Which of the following logs does NOT provide any information which may help to debug the issue?
A. icmrm.logfile
B. cfgactions log
C. SystemErr.log
D. ICMSERVER log
Answer: C
Q28. The configuration of the IBM Content Manager V8.5 library server on AIX 7 0 failed. The error message displayed by the configuration utility does not provide enough detail to determine the underlying cause for the failure.
Which of the following options would help diagnose the issue?
A. Review the systemOut.log end systemErr.log files to determine the cause.
B. Enable Trace (full) tracelevel logging for the library server, rerun the configuration end review the corresponding log.
C. Set and export the environment variable arid value IBM_CM_DEBUG"CM. rerun the configuration and review the corresponding log.
D. Set and export the environment variable and value_ IBM_CM_LOGLEVEL=7. rerun the Configuration and review the corresponding log.
Answer: A
Q29. Which of the following components support C# and have C# sample?
A. Java API
B. C++API
C. CM Beans.
D. CM web services
Answer: B
Q30. An IBM Content Manager solution designer is designing a system which requires a certain level of Transport Layer Security (TLS).
Which of the following components need to be configured to use Net Search Extender with TLS?
A. Library server only
B. Resource manager only.
C. Both library server and resource manager,
D. The database connections to library server and resource manager.
Answer: C