Free C9530-001 Exam Braindumps (page: 3)

Page 2 of 31

Which keyword in the Declare statement allows User-defined properties to be used as variables in ESQL?

  1. SET
  2. SHARED
  3. IMPORT
  4. EXTERNAL

Answer(s): D



While processing messages in a message flow, Java exceptions are encountered. Where should more details on these Java exceptions be found?

  1. syslogs
  2. Trace Node output
  3. Integration Node stderr and stdout
  4. Integration Server stderr and stdout

Answer(s): A

Explanation:

When a node in a message flow throws an exception this is assigned a BIP number. As the exception is propagated up the flow, possibly being processed by various exception handling routines attached to the catch terminal of nodes it may be "wrapped" in several outer exceptions. This forms a "stack" of exceptions known as an ExceptionList.

If an exception reaches an input node without being handled by any branch of the flow then the input transaction is rolled back and each message in the ExceptionList is output to the syslog.


Reference:

https://developer.ibm.com/integration/docs/ibm-integration-bus/troubleshooting/diagnostic-tools/



In configurable services that have the UserDefined type, which node is used to read and modify properties dynamically at run time?

  1. PHP node
  2. Mapping node
  3. Compute node
  4. Java Compute node

Answer(s): D

Explanation:

Use the CMP in a JavaCompute node to query, set, create, and delete properties dynamically at run time in configurable services that you have defined with type UserDefined.


Reference:

https://www.ibm.com/support/knowledgecenter/en/SSMKHH_9.0.0/com.ibm.etools.mft.doc/be43730_.htm



Which statement regarding Identity Mapping is true?

  1. Custom token mapping can not be implemented for Identity propagation.
  2. Identity Mapping can be performed in output nodes, if the output node has been configured with a security profile.
  3. When mapping from an X.509 certificate, Tivoli Federated Identity Manager can verify the identity of the original sender.
  4. Identity Mapping is the transformation of a security token from one format to another format within another security realm.

Answer(s): C






Post your Comments and Discuss IBM C9530-001 exam with other Community members:

C9530-001 Discussions & Posts