Free C2090-420 Exam Braindumps (page: 2)

Page 1 of 27

Which two features differ between the probabilistic and deterministic approach to Suspect Duplication Processing? (Choose two.)

  1. candidate list selection
  2. matching critical data elements between praties
  3. handing A2 suspects
  4. determining the match category

Answer(s): B,D



What is a design component of Data Persistency Entitlements?

  1. Ancestors
  2. Accessors
  3. Activities
  4. Profiles

Answer(s): B



An external system provides a daily master data feed into InfoSphere MDM Server. New business proxies are created to synchronize this information with existing data in the MDM database. The synchronization process involves calling existing InfoSphere MDM Server transactions.
What information does the business proxy use to resolve the identities of business objects and detect transactions needed in the composite transaction?(Choose two.)

  1. business object primary key fields
  2. business object foreign key fields
  3. business object business key fields
  4. business key fields in parent business object hierarchy

Answer(s): C,D



Which two statements are true about the type of history database triggers in InfSphere MDM Server?(Choose two.)

  1. SIMPLE triggers populate the history record in audit tables when a record is inserted into an operational table in the InfoSphere MDM Server database.
  2. COMPOUND triggers populate the history record in audit tables when a record is updated or deleted from within an operational table in the InfoSphere MDM Server database.
  3. SIMPLE triggers populate the history record in audit tables when a record is updated from within an operational table in the InfoSphere MDM Server database.
  4. COMPOUND triggers populate the history record in audit tables when a record is inserted or updated from within an operational table in the InfSphere MDM Server database.

Answer(s): C,D






Post your Comments and Discuss IBM C2090-420 exam with other Community members:

C2090-420 Discussions & Posts