Free C2090-420 Exam Braindumps (page: 9)

Page 8 of 27

A client uses InfoSphere MDM Server's PartyMaintenanceServices sample to perform delta data loading. The client overwrites InfoSphere MDM Server default business keys and needs to customize logic in some of the PartyMaintenanceServices sample code to fulfill the client's special requirements.

What are two ways that the client should implement the customized logic?(Choose two.)

  1. change the source code in the resolveldentity() method of the PartyMaintenanceServices sample business proxies. For example, change the MaintainPartyAddressBP. Resolvedentity() method to implement customized business logic.
  2. Creat an alternative implementation of the business proxy. For example, write a new MaintainPartyAddressCustomeBP.java and extends MaintainPartyAddressBP and override MaintainPartyAddressBP.resolveldentity() method.
  3. Creat an alternative business proxy which implements the IbusProxy interface and adds business logic in the execute() method.
  4. Extend DWL TxnBP and create a public method execute() to overwrite the com.dwl.base.requesthandler.DWL TxnBP.execute() method.

Answer(s): A,B



A customer wants to implement a new search transaction (searchbyZipCode) at the controller component level. This is implemented by associating a finder class to this transaction. This finder class contains the business logic to search for all party details that match the zip code supplied in the input request by a direct SQL statement call.

What are two steps necessary to implement this customization?(Choose two.)

  1. Assign a name for this transaction, e.g, searchByZipCode--modify the OOTB request XML to reflect the required structure for input for the search parameter by changing the appropriate search transaction.
  2. Ensure that the MDM extension framework is disabled (enabled=false).
  3. Register the transaction name searchByZipCode?in the CDBUSINESSTXTP table.
  4. Register the new transaction name searchByZipCode?within the tcrm_extension.properties files.

Answer(s): C,D



When matching two parties, what are two possible suspect category names? (Choose two.)

  1. B
  2. C
  3. A
  4. D

Answer(s): A,B



What are three main tasks to configure and deploy composite business proxies into an InfoSphere MDM Server application?(Choose three.)

  1. Define composite transaction name(s) in the MDM CDBUSINESSTXTP table.
  2. Define customized business keys in the MDM V_ELEMENT table.
  3. Define composite Java business proxies in DWLCommon_extension.properties.
  4. Enable the new proxy configuration in the Configuration and Management component.
  5. Package Java business proxies as jar and add it to MDM.ear

Answer(s): A,C,E






Post your Comments and Discuss IBM C2090-420 exam with other Community members:

C2090-420 Discussions & Posts